Cisco Systems 57712 Users Manual
57712 to the manual 1ee0a164-283d-4b55-ba06-e901862c9a63
2015-01-05
: Cisco-Systems Cisco-Systems-57712-Users-Manual-202319 cisco-systems-57712-users-manual-202319 cisco-systems pdf
Open the PDF directly: View PDF .
Page Count: 288
Download | |
Open PDF In Browser | View PDF |
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 First Published: March 04, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-28893-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http:// www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. © 2009-2013 Cisco Systems, Inc. All rights reserved. CONTENTS Preface Preface xi Audience xi Conventions xi New and Changed Information for this Release xiii Related Cisco UCS Documentation xv CHAPTER 1 Overview 1 Overview of the Cisco UCS C-Series Rack-Mount Servers 1 Overview of the Server Software 1 Cisco Integrated Management Controller 2 CIMC CLI 3 Command Modes 3 Command Mode Table 5 Complete a Command 8 Command History 8 Committing, Discarding, and Viewing Pending Commands 8 Command Output Formats 8 Online Help for the CLI 9 CHAPTER 2 Installing the Server OS 11 OS Installation Methods 11 KVM Console 11 PXE Installation Servers 12 Installing an OS Using a PXE Installation Server 12 CHAPTER 3 Managing the Server 13 Toggling the Locator LED 13 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 iii Contents Toggling the Locator LED for a Hard Drive 14 Managing the Server Boot Order 14 Server Boot Order 14 Configuring the Server Boot Order 15 Viewing the Actual Server Boot Order 16 Resetting the Server 16 Shutting Down the Server 17 Managing Server Power 18 Powering On the Server 18 Powering Off the Server 18 Power Cycling the Server 19 Configuring Power Policies 20 Viewing the Power Statistics 20 Power Capping Policy 21 Configuring the Power Cap Policy 21 Configuring the Power Restore Policy 23 Managing the Flexible Flash Controller 24 Cisco Flexible Flash 24 Configuring the Flexible Flash Controller Properties 25 Booting from the Flexible Flash 27 Resetting the Flexible Flash Controller 28 Resetting the Configuration of the Cards in the Cisco Flexible Flash Controller 28 Retaining the Configuration of the Flexible Flash Controller 29 Configuring BIOS Settings 30 Viewing BIOS Status 30 Configuring Main BIOS Settings 31 Configuring Advanced BIOS Settings 32 Configuring Server Management BIOS Settings 33 Restoring BIOS Defaults 34 Restoring BIOS Manufacturing Custom Defaults 34 CHAPTER 4 Viewing Server Properties 37 Viewing Server Properties 37 Viewing CIMC Properties 38 Viewing CPU Properties 38 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 iv OL-28893-01 Contents Viewing Memory Properties 39 Viewing Power Supply Properties 40 Viewing Storage Properties 40 Viewing Storage Adapter Properties 40 Viewing the Flexible Flash Controller Properties 42 Viewing Physical Drive Properties 43 Viewing Virtual Drive Properties 44 Viewing Nvidia GPU Card Information 45 Viewing PCI Adapter Properties 46 Viewing Network Related Properties 46 Viewing LOM Properties 46 CHAPTER 5 Viewing Server Sensors 49 Viewing Power Supply Sensors 49 Viewing Fan Sensors 50 Viewing Temperature Sensors 50 Viewing Voltage Sensors 51 Viewing Current Sensors 52 Viewing Storage Sensors 52 CHAPTER 6 Managing Remote Presence 55 Managing the Virtual KVM 55 KVM Console 55 Enabling the Virtual KVM 56 Disabling the Virtual KVM 56 Configuring the Virtual KVM 57 Configuring Virtual Media 58 Configuring Network Mounted vMedia Mapping 59 Viewing Network Mount vMedia Mapping Properties 60 Removing Network Mounted vMedia Mapping 60 Managing Serial over LAN 61 Serial Over LAN 61 Guidelines and Restrictions for Serial Over LAN 61 Configuring Serial Over LAN 62 Launching Serial Over LAN 63 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 v Contents CHAPTER 7 Managing User Accounts 65 Configuring Local Users 65 Configuring Active Directory 66 Active Directory 66 Configuring the Active Directory Server 66 Configuring Active Directory in CIMC 68 Configuring Active Directory Groups in CIMC 69 Viewing User Sessions 71 Terminating a User Session 71 CHAPTER 8 Configuring Network-Related Settings 73 Server NIC Configuration 73 Server NICs 73 Configuring Server NICs 74 Configuring Common Properties 75 Configuring IPv4 76 Configuring the Server VLAN 77 Connecting to a Port Profile 78 Network Security Configuration 80 Network Security 80 Configuring Network Security 80 Network Time Protocol Configuration 81 Configuring Network Time Protocol Settings 81 CHAPTER 9 Managing Network Adapters 83 Overview of the Cisco UCS C-Series Network Adapters 83 Viewing Network Adapter Properties 85 Configuring Network Adapter Properties 85 Managing vHBAs 86 Guidelines for Managing vHBAs 86 Viewing vHBA Properties 87 Modifying vHBA Properties 88 Creating a vHBA 92 Deleting a vHBA 93 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 vi OL-28893-01 Contents vHBA Boot Table 94 Viewing the Boot Table 94 Creating a Boot Table Entry 94 Deleting a Boot Table Entry 95 vHBA Persistent Binding 96 Enabling Persistent Binding 97 Disabling Persistent Binding 97 Rebuilding Persistent Binding 98 Managing vNICs 99 Guidelines for Managing vNICs 99 Viewing vNIC Properties 99 Modifying vNIC Properties 100 Creating a vNIC 105 Deleting a vNIC 106 Configuring iSCSI Boot Capability 107 Configuring iSCSI Boot Capability for vNICs 107 Configuring iSCSI Boot Capability on a vNIC 107 Deleting an iSCSI Boot Configuration for a vNIC 109 Managing VM FEX 109 Virtual Machine Fabric Extender 109 Viewing VM FEX Properties 110 VM FEX Settings 111 Managing Storage Adapters 115 Create Virtual Drive from Unused Physical Drives 115 Create Virtual Drive from an Existing Drive Group 116 Clearing Foreign Configuration 117 Deleting a Virtual Drive 118 Initializing a Virtual Drive 119 Set as Boot Drive 120 Modifying Attributes of a Virtual Drive 120 Making a Dedicated Hot Spare 121 Making a Global Hot Spare 122 Preparing a Drive for Removal 122 Removing a Drive from Hot Spare Pools 123 Undo Preparing a Drive for Removal 124 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 vii Contents Enabling Auto Learn Cycles for the Battery Backup Unit 124 Disabling Auto Learn Cycles for the Battery Backup Unit 125 Starting a Learn Cycle for a Battery Backup Unit 125 Toggling the Locator LED for a Physical Drive 126 Viewing Storage Controller Logs 127 Backing Up and Restoring the Adapter Configuration 127 Exporting the Adapter Configuration 127 Importing the Adapter Configuration 128 Restoring Adapter Defaults 129 Managing Adapter Firmware 130 Adapter Firmware 130 Installing Adapter Firmware 130 Activating Adapter Firmware 131 Resetting the Adapter 131 CHAPTER 10 Configuring Communication Services 133 Configuring HTTP 133 Configuring SSH 134 Configuring XML API 135 XML API for CIMC 135 Enabling XML API 135 Configuring IPMI 136 IPMI Over LAN 136 Configuring IPMI over LAN 136 Configuring SNMP 137 SNMP 137 Configuring SNMP Properties 137 Configuring SNMP Trap Settings 139 Sending a Test SNMP Trap Message 140 Configuring SNMPv3 Users 140 CHAPTER 11 Managing Certificates 143 Managing the Server Certificate 143 Generating a Certificate Signing Request 143 Creating a Self-Signed Certificate 145 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 viii OL-28893-01 Contents Uploading a Server Certificate 147 CHAPTER 12 Configuring Platform Event Filters 149 Platform Event Filters 149 Enabling Platform Event Alerts 149 Disabling Platform Event Alerts 150 Configuring Platform Event Filters 150 Configuring Platform Event Trap Settings 152 Interpreting Platform Event Traps 153 CHAPTER 13 CIMC Firmware Management 157 Overview of Firmware 157 Obtaining Firmware from Cisco 158 Installing CIMC Firmware from a Remote Server 159 Activating Installed CIMC Firmware 160 Installing BIOS Firmware from a Remote Server 162 CHAPTER 14 Viewing Logs 165 Viewing the Faults and Logs Summary 165 CIMC Log 166 Viewing the CIMC Log 166 Clearing the CIMC Log 167 Configuring the CIMC Log Threshold 167 Sending the CIMC Log to a Remote Server 168 System Event Log 170 Viewing the System Event Log 170 Clearing the System Event Log 171 CHAPTER 15 Server Utilities 173 Exporting Technical Support Data 173 Rebooting the CIMC 175 Clearing the BIOS CMOS 175 Recovering from a Corrupted BIOS 176 Resetting the CIMC to Factory Defaults 177 Exporting and Importing the CIMC Configuration 178 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 ix Contents Exporting and Importing the CIMC Configuration 178 Exporting the CIMC Configuration 178 Importing a CIMC Configuration 179 Generating Non maskable Interrupts to the Host 180 APPENDIX A BIOS Parameters by Server Model 183 C22 and C24 Servers 183 Main BIOS Parameters for C22 and C24 Servers 183 Advanced BIOS Parameters for C22 and C24 Servers 184 Server Management BIOS Parameters for C22 and C24 Servers 200 C220 and C240 Servers 203 Main BIOS Parameters for C220 and C240 Servers 203 Advanced BIOS Parameters for C220 and C240 Servers 203 Server Management BIOS Parameters for C220 and C240 Servers 219 C260 Servers 222 Main BIOS Parameters for C260 Servers 222 Advanced BIOS Parameters for C260 Servers 222 Server Management BIOS Parameters for C260 Servers 232 C420 Servers 235 Main BIOS Parameters for C420 Servers 235 Advanced BIOS Parameters for C420 Servers 235 Server Management BIOS Parameters for C420 Servers 251 C460 Servers 253 Main BIOS Parameters for C460 Servers 253 Advanced BIOS Parameters for C460 Servers 253 Server Management BIOS Parameters for C460 Servers 263 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 x OL-28893-01 Preface This preface includes the following sections: • Audience, page xi • Conventions, page xi • New and Changed Information for this Release, page xiii • Related Cisco UCS Documentation, page xv Audience This guide is intended primarily for data center administrators with responsibilities and expertise in one or more of the following: • Server administration • Storage administration • Network administration • Network security Conventions Text Type Indication GUI elements GUI elements such as tab titles, area names, and field labels appear in this font. Main titles such as window, dialog box, and wizard titles appear in this font. Document titles Document titles appear in this font. TUI elements In a Text-based User Interface, text the system displays appears in this font. System output Terminal sessions and information that the system displays appear in this font. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 xi Preface Conventions Text Type Indication CLI commands CLI command keywords appear in this font. Variables in a CLI command appear in this font. Note Tip [] Elements in square brackets are optional. {x | y | z} Required alternative keywords are grouped in braces and separated by vertical bars. [x | y | z] Optional alternative keywords are grouped in brackets and separated by vertical bars. string A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks. <> Nonprinting characters such as passwords are in angle brackets. [] Default responses to system prompts are in square brackets. !, # An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line. Means reader take note. Notes contain helpful suggestions or references to material not covered in the document. Means the following information will help you solve a problem. The tips information might not be troubleshooting or even an action, but could be useful information, similar to a Timesaver. Caution Means reader be careful. In this situation, you might perform an action that could result in equipment damage or loss of data. Timesaver Means the described action saves time. You can save time by performing the action described in the paragraph. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 xii OL-28893-01 Preface New and Changed Information for this Release Warning IMPORTANT SAFETY INSTRUCTIONS This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. Use the statement number provided at the end of each warning to locate its translation in the translated safety warnings that accompanied this device. SAVE THESE INSTRUCTIONS New and Changed Information for this Release The following tables provide an overview of the significant changes to this guide for the current release. The tables do not provide an exhaustive list of all changes made to the configuration guides or of the new features in this release. For a complete list of all C-Series documentation, see the Cisco UCS C-Series Servers Documentation Roadmap available at the following URL: http://www.cisco.com/go/unifiedcomputing/c-series-doc . New Features and Significant Behavioral Changes in Cisco Integrated Management Controller software, Release 1.4(6) Release Notes for Cisco UCS C-Series Software, Release 1.4(6) Feature Description Where Documented Cisco UCS VIC1225 Virtual Interface Card Support added for the Cisco UCS VIC1225 Virtual Interface Card. Managing Network Adapters, on page 83 BIOS Properties Support for additional BIOS properties BIOS Parameters by Server for the Cisco UCS C22 M3 Server, Model, on page 183 Cisco UCS C24 M3 Server, Cisco UCS C220 M3 Server, and the Cisco UCS C240 M3 Server. New Features and Significant Behavioral Changes in Cisco Integrated Management Controller software, Release 1.4(5) Release Notes for Cisco UCS C-Series Software, Release 1.4(5) Feature Description Where Documented Hard Disk Drive LED Support added for toggling the LED on Managing the Server, on page an installed hard disk drive. 13 BIOS Properties Support for additional BIOS properties BIOS Parameters by Server for the Cisco UCS C220 M3 Server and Model, on page 183 the Cisco UCS C240 M3 Server. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 xiii Preface New and Changed Information for this Release New Features and Significant Behavioral Changes in Cisco Integrated Management Controller software, Release 1.4(4) Release Notes for Cisco UCS C-Series Software, Release 1.4(4) Feature Description Where Documented Platform support The features available in Release 1.4(3) Release Notes for Cisco UCS are now available on the Cisco UCS C-Series Software, Release C220 M3 Server and the Cisco UCS 1.4(4) C240 M3 Server. BIOS Properties Support for additional BIOS properties BIOS Parameters by Server for the Cisco UCS C220 M3 Server and Model, on page 183 the Cisco UCS C240 M3 Server. New Features and Significant Behavioral Changes in Cisco Integrated Management Controller software, Release 1.4(3) Release Notes for Cisco UCS C-Series Software, Release 1.4(3) Feature Description Where Documented Integration with Cisco UCS Manager The supported servers can be integrated See the Hardware Installation into a Cisco UCS domain. Guide (HIG) for the type of server you are using. The C-Series HIGs are available at the following URL: http:// www.cisco.com/en/US/ products/ps10493/prod_ installation_guides_list.html Technical support Support added for downloading the tech support information file from a browser. Server Utilities, on page 173 BIOS parameters Support added for additional BIOS properties. BIOS Parameters by Server Model, on page 183 New Features and Significant Behavioral Changes in Cisco Integrated Management Controller software, Release 1.4(2) Release Notes for Cisco UCS C-Series Software, Release 1.4(2) Feature Description Where Documented Platform support The features available in Release 1.4(1) Release Notes for Cisco UCS are now available on the Cisco UCS C-Series Software, Release C460 M2 Server and the Cisco UCS 1.4(2) C260 M2 Server. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 xiv OL-28893-01 Preface Related Cisco UCS Documentation Feature Description Where Documented BIOS parameters Support added for additional BIOS properties. BIOS Parameters by Server Model, on page 183 New Features and Significant Behavioral Changes in Cisco Integrated Management Controller software, Release 1.4(1) Release Notes for Cisco UCS C-Series Software, Release 1.4(1) Feature Description Where Documented Platform support The features in this release apply to the Release Notes for Cisco UCS Cisco UCS C200 M1 Server, the Cisco C-Series Software, Release UCS C210 M1 Server, and the Cisco 1.4(1) UCS C250 M1 Server. VM FEX Support is added for virtual machine fabric extenders (VM FEX). Create vHBAs Support added in the CLI to create up Managing Network Adapters, to 16 vHBAs. on page 83 Active Directory groups Support added for Active Directory authorization groups. Managing User Accounts, on page 65 Enhanced SNMP features Enhanced SNMPv3 and SNMP trap configuration is relocated in the user interface. Configuring Communication Services, on page 133 XML API Support added for CIMC control by an Configuring Communication XML API. Services, on page 133 HTTP redirect Support added for redirection of HTTP Configuring Communication requests to HTTPS. Services, on page 133 BIOS parameters Support added for additional BIOS properties. Managing Network Adapters, on page 83 BIOS Parameters by Server Model, on page 183 Related Cisco UCS Documentation Documentation Roadmaps For a complete list of all B-Series documentation, see the Cisco UCS B-Series Servers Documentation Roadmap available at the following URL: http://www.cisco.com/go/unifiedcomputing/b-series-doc. For a complete list of all C-Series documentation, see the Cisco UCS C-Series Servers Documentation Roadmap available at the following URL: http://www.cisco.com/go/unifiedcomputing/c-series-doc . Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 xv Preface Related Cisco UCS Documentation Other Documentation Resources An ISO file containing all B and C-Series documents is available at the following URL: http://www.cisco.com/ cisco/software/type.html?mdfid=283853163&flowid=25821. From this page, click Unified Computing System (UCS) Documentation Roadmap Bundle. The ISO file is updated after every major documentation release. Follow Cisco UCS Docs on Twitter to receive document update notifications. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 xvi OL-28893-01 CHAPTER 1 Overview This chapter includes the following sections: • Overview of the Cisco UCS C-Series Rack-Mount Servers, page 1 • Overview of the Server Software, page 1 • Cisco Integrated Management Controller, page 2 • CIMC CLI, page 3 Overview of the Cisco UCS C-Series Rack-Mount Servers The Cisco UCS C-Series rack-mount servers include the following models: • Cisco UCS C200 Rack-Mount Server • Cisco UCS C210 Rack-Mount Server • Cisco UCS C220 Rack-Mount Server • Cisco UCS C240 Rack-Mount Server • Cisco UCS C250 Rack-Mount Server • Cisco UCS C260 Rack-Mount Server • Cisco UCS C460 Rack-Mount Server Note To determine which Cisco UCS C-Series rack-mount servers are supported by this firmware release, see the associated Release Notes. The C-Series release notes are available at the following URL: http:// www.cisco.com/en/US/products/ps10739/prod_release_notes_list.html Overview of the Server Software The Cisco UCS C-Series Rack-Mount Server ships with two major software systems installed. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 1 Overview Cisco Integrated Management Controller CIMC Firmware CIMC is a separate management module built into the motherboard. A dedicated ARM-based processor, separate from the main server CPU, runs the CIMC firmware. The system ships with a running version of the CIMC firmware. You can update the CIMC firmware, but no initial installation is needed. Server OS The main server CPU runs an OS such as Windows or Linux. The server ships with a pre-installed OS, but you can install a different OS using the DVD drive or over the network. You can use CIMC to install the new OS using the KVM console and vMedia. Note You can access the available OS installation documentation from the Cisco UCS C-Series Servers Documentation Roadmap at http://www.cisco.com/go/unifiedcomputing/c-series-doc. Cisco Integrated Management Controller The CIMC is the management service for the C-Series servers. CIMC runs within the server. Note The CIMC management service is used only when the server is operating in Standalone Mode. If your C-Series server is integrated into a UCS system, you must manage it using UCS Manager. For information about using UCS Manager, see the configuration guides listed in the Cisco UCS B-Series Servers Documentation Roadmap at http://www.cisco.com/go/unifiedcomputing/b-series-doc. Management Interfaces You can use a web-based GUI or SSH-based CLI to access, configure, administer, and monitor the server. Almost all tasks can be performed in either interface, and the results of tasks performed in one interface are displayed in another. However, you cannot do the following: • Use CIMC GUI to invoke CIMC CLI • View a command that has been invoked through CIMC CLI in CIMC GUI • Generate CIMC CLI output from CIMC GUI Tasks You Can Perform in CIMC You can use CIMC to perform the following server management tasks: • Power on, power off, power cycle, reset and shut down the server • Toggle the locator LED • Configure the server boot order • View server properties and sensors • Manage remote presence Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 2 OL-28893-01 Overview CIMC CLI • Create and manage local user accounts, and enable remote user authentication through Active Directory • Configure network-related settings, including NIC properties, IPv4, VLANs, and network security • Configure communication services, including HTTP, SSH, and IPMI Over LAN • Manage certificates • Configure platform event filters • Update CIMC firmware • Monitor faults, alarms, and server status No Operating System or Application Provisioning or Management CIMC provisions servers, and as a result, exists below the operating system on a server. Therefore, you cannot use it to provision or manage operating systems or applications on servers. For example, you cannot do the following: • Deploy an OS, such as Windows or Linux • Deploy patches for software, such as an OS or an application • Install base software components, such as anti-virus software, monitoring agents, or backup clients • Install software applications, such as databases, application server software, or web servers • Perform operator actions, including restarting an Oracle database, restarting printer queues, or handling non-CIMC user accounts • Configure or manage external storage on the SAN or NAS storage CIMC CLI The CIMC CLI is a command-line management interface for Cisco UCS C-Series servers. You can launch the CIMC CLI and manage the server over the network by SSH or Telnet. By default, Telnet access is disabled. A user of the CLI will be one of three roles: admin, user (can control, cannot configure), and read-only. Note To recover from a lost admin password, see the Cisco UCS C-Series server installation and service guide for your platform. Command Modes The CLI is organized into a hierarchy of command modes, with the EXEC mode being the highest-level mode of the hierarchy. Higher-level modes branch into lower-level modes. You use the scope command to move from higher-level modes to modes in the next lower level , and the exit command to move up one level in the mode hierarchy. The top command returns to the EXEC mode. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 3 Overview Command Modes Note Most command modes are associated with managed objects. The scope command does not create managed objects and can only access modes for which managed objects already exist. Each mode contains a set of commands that can be entered in that mode. Most of the commands available in each mode pertain to the associated managed object. Depending on your assigned role, you may have access to only a subset of the commands available in a mode; commands to which you do not have access are hidden. The CLI prompt for each mode shows the full path down the mode hierarchy to the current mode. This helps you to determine where you are in the command mode hierarchy and can be an invaluable tool when you need to navigate through the hierarchy. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 4 OL-28893-01 Overview Command Modes Command Mode Table The following table lists the first four levels of command modes, the commands used to access each mode, and the CLI prompt associated with each mode. Mode Name Command to Access Mode Prompt EXEC top command from any mode # bios scope bios command from EXEC /bios # mode advanced scope advanced command from bios mode /bios/advanced # main scope main command from bios mode /bios/main # server-management scope server-management command from bios mode /bios/server-management # certificate scope certificate command from EXEC mode /certificate # chassis scope chassis command from EXEC mode /chassis # scope adapter index command from chassis mode /chassis/adapter # host-eth-if scope host-eth-if command from adapter mode /chassis/adapter/host-eth-if # host-fc-if scope host-fc-if command from adapter mode /chassis/adapter/host-fc-if # port-profiles scope port-profiles command from /chassis/adapter/port-profiles # adapter mode vmfex scope vmfex index command from /chassis/adapter/vmfex # adapter mode adapter dimm-summary scope dimm-summary index command from chassis mode /chassis/dimm-summary # flexflash scope flexflash index command from chassis mode /chassis/flexflash # scope operational-profile command from flexflash mode /chassis/flexflash/operational-profile # operational-profiles Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 5 Overview Command Modes Mode Name Command to Access Mode Prompt scope storageadapter slot command from chassis mode /chassis/storageadapter # physical-drive scope physical-drive command from storageadapter mode /chassis/storageadapter/physical-drive # virtual-drive scope virtual-drive command from storageadapter mode /chassis/storageadapter/virtual-drive # storageadapter cimc scope cimc command from EXEC /cimc # mode firmware scope firmware command from cimc mode /cimc/firmware # import-export scope import-export command from cimc mode /cimc/import-export # log scope log command from cimc mode /cimc/log # server network ipblocking tech-support fault pef scope server index command from /cimc/log/server # log mode scope network command from cimc mode /cimc/network # scope ipblocking command from /cimc/network/ipblocking # network mode scope tech-support command from cimc mode /cimc/tech-support # scope fault command from EXEC /fault # mode scope pef command from fault mode /fault/pef # http scope http command from EXEC /http # mode ipmi scope ipmi command from EXEC /ipmi # mode kvm scope kvm command from EXEC /kvm # mode ldap /ldap # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 6 OL-28893-01 Overview Command Modes Mode Name Command to Access Mode Prompt scope ldap command from EXEC mode role-group scope role-group command from /ldap/role-group # ldap mode power-cap scope power-cap command from /power-cap # EXEC mode sel scope sel command from EXEC mode /sel # sensor scope sensor command from EXEC mode /sensor # snmp scope snmp command from EXEC /snmp # mode trap-destinations scope trap-destinations command /snmp/trap-destinations # from snmp mode v3users scope v3users command from snmp mode /snmp/v3users # sol scope sol command from EXEC mode /sol # ssh scope ssh command from EXEC mode /ssh # user scope user user-number command /user # from EXEC mode user-session scope user-session session-number /user-session # command from EXEC mode vmedia scope vmedia command from EXEC mode /vmedia # xmlapi scope xmlapi command from EXEC mode /xmlapi # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 7 Overview Complete a Command Complete a Command You can use the Tab key in any mode to complete a command. Partially typing a command name and pressing Tab causes the command to be displayed in full or to the point where another keyword must be chosen or an argument value must be entered. Command History The CLI stores all commands used in the current session. You can step through the previously used commands by using the Up Arrow or Down Arrow keys. The Up Arrow key steps to the previous command in the history, and the Down Arrow key steps to the next command in the history. If you get to the end of the history, pressing the Down Arrow key does nothing. All commands in the history can be entered again by simply stepping through the history to recall the desired command and pressing Enter. The command is entered as if you had manually typed it. You can also recall a command and change it before you press Enter. Committing, Discarding, and Viewing Pending Commands When you enter a configuration command in the CLI, the command is not applied until you enter the commit command. Until committed, a configuration command is pending and can be discarded by entering a discard command. When any command is pending, an asterisk (*) appears before the command prompt. The asterisk disappears when you enter the commit command, as shown in this example: Server# scope chassis Server /chassis # set locator-led off Server /chassis *# commit Server /chassis # You can accumulate pending changes in multiple command modes and apply them together with a single commit command. You can view the pending commands by entering the show configuration pending command in any command mode. Note Committing multiple commands together is not an atomic operation. If any command fails, the successful commands are applied despite the failure. Failed commands are reported in an error message. Command Output Formats Most CLI show commands accept an optional detail keyword that causes the output information to be displayed as a list rather than a table. You can configure either of two presentation formats for displaying the output information when the detail keyword is used. The format choices are as follows: • Default—For easy viewing, the command output is presented in a compact list. This example shows command output in the default format: Server /chassis # set cli output default Server /chassis # show hdd detail Name HDD_01_STATUS: Status : present Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 8 OL-28893-01 Overview Online Help for the CLI Name HDD_02_STATUS: Status : present Name HDD_03_STATUS: Status : present Name HDD_04_STATUS: Status : present Server /chassis # • YAML—For easy parsing by scripts, the command output is presented in the YAML (YAML Ain't Markup Language) data serialization language, delimited by defined character strings. This example shows command output in the YAML format: Server /chassis # set cli output yaml Server /chassis # show hdd detail --name: HDD_01_STATUS hdd-status: present --name: HDD_02_STATUS hdd-status: present --name: HDD_03_STATUS hdd-status: present --name: HDD_04_STATUS hdd-status: present ... Server /chassis # For detailed information about YAML, see http://www.yaml.org/about.html. In most CLI command modes, you can enter set cli output default to configure the default format, or set cli output yaml to configure the YAML format. Online Help for the CLI At any time, you can type the ? character to display the options available at the current state of the command syntax. If you have not typed anything at the prompt, typing ? lists all available commands for the mode you are in. If you have partially typed a command, typing ? lists all available keywords and arguments available at your current position in the command syntax. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 9 Overview Online Help for the CLI Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 10 OL-28893-01 CHAPTER 2 Installing the Server OS This chapter includes the following sections: • OS Installation Methods, page 11 • KVM Console, page 11 • PXE Installation Servers, page 12 OS Installation Methods C-Series servers support several operating systems. Regardless of the OS being installed, you can install it on your server using one of the following tools: • KVM console • PXE installation server KVM Console The KVM console is an interface accessible from CIMC that emulates a direct keyboard, video, and mouse (KVM) connection to the server. The KVM console allows you to connect to the server from a remote location. Instead of using CD/DVD or floppy drives physically connected to the server, the KVM console uses virtual media, which are actual disk drives or disk image files that are mapped to virtual CD/DVD or floppy drives. You can map any of the following to a virtual drive: • CD/DVD or floppy drive on your computer • Disk image files (ISO or IMG files) on your computer • USB flash drive on your computer • CD/DVD or floppy drive on the network • Disk image files (ISO or IMG files) on the network • USB flash drive on the network Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 11 Installing the Server OS PXE Installation Servers You can use the KVM console to install an OS on the server. PXE Installation Servers A Preboot Execution Environment (PXE) installation server allows a client to boot and install an OS from a remote location. To use this method, a PXE environment must be configured and available on your VLAN, typically a dedicated provisioning VLAN. Additionally, the server must be set to boot from the network. When the server boots, it sends a PXE request across the network. The PXE installation server acknowledges the request, and starts a sequence of events that installs the OS on the server. PXE servers can use installation disks, disk images, or scripts to install an OS. Proprietary disk images can also be used to install an OS, additional components, or applications. Note PXE installation is an efficient method for installing an OS on a large number of servers. However, considering that this method requires setting up a PXE environment, it might be easier to use another installation method. Installing an OS Using a PXE Installation Server Before You Begin • Verify that the server can be reached over a VLAN. • You must log in as a user with admin privileges to install an OS. Procedure Step 1 Step 2 Set the boot order to PXE first. Reboot the server. If a PXE install server is available on the VLAN, the installation process begins when the server reboots. PXE installations are typically automated and require no additional user input. Refer to the installation guide for the OS being installed to guide you through the rest of the installation process. What to Do Next After the OS installation is complete, reset the LAN boot order to its original setting. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 12 OL-28893-01 CHAPTER 3 Managing the Server This chapter includes the following sections: • Toggling the Locator LED, page 13 • Toggling the Locator LED for a Hard Drive, page 14 • Managing the Server Boot Order, page 14 • Resetting the Server, page 16 • Shutting Down the Server, page 17 • Managing Server Power, page 18 • Configuring Power Policies, page 20 • Managing the Flexible Flash Controller, page 24 • Configuring BIOS Settings, page 30 Toggling the Locator LED Before You Begin You must log in with user or admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server # scope chassis Enters chassis command mode. Step 2 Server /chassis # set locator-led {on | off} Enables or disables the chassis locator LED. Step 3 Server /chassis # commit Commits the transaction to the system configuration. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 13 Managing the Server Toggling the Locator LED for a Hard Drive This example disables the chassis locator LED and commits the transaction: Server# scope chassis Server /chassis # set locator-led off Server /chassis *# commit Server /chassis # Toggling the Locator LED for a Hard Drive Before You Begin You must log in with user or admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server # scope chassis Enters chassis command mode. Step 2 Server/chassis # scope hdd Enters hard disk drive (HDD) command mode. Step 3 Server /chassis/hdd # set locateHDD Where drivenum is the number of the hard drive whose locator LED you want to set. A value of 1 turns the drivenum {1 | 2} LED on while a value of 2 turns the LED off. This example turns on the locator LED on HDD 2: Server# scope chassis Server /chassis # scope hdd Server /chassis/hdd # locateHDD 2 1 HDD Locate LED Status changed to 1 Server /chassis/hdd # show Name Status -------------------- -------------------HDD1_STATUS present HDD2_STATUS present HDD3_STATUS absent HDD4_STATUS absent LocateLEDStatus -------------------TurnOFF TurnON TurnOFF TurnOFF Server /chassis/hdd # Managing the Server Boot Order Server Boot Order Using CIMC, you can configure the order in which the server attempts to boot from available boot device types. When you change the boot order configuration, CIMC sends the configured boot order to the BIOS the next time the server is rebooted. To implement the new boot order, reboot the server after making the configuration change. The new boot order will take effect on any subsequent reboot. The configured boot order is not sent again until the configuration is changed again. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 14 OL-28893-01 Managing the Server Configuring the Server Boot Order Note The actual boot order will differ from the configured boot order if either of the following conditions occur: • The BIOS encounters issues while trying to boot using the configured boot order. • A user changes the boot order directly through the BIOS. Configuring the Server Boot Order Note Do not change the boot order while the host is performing BIOS power-on self test (POST). Before You Begin You must log in with user or admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope bios Enters bios command mode. Step 2 Server /bios # set boot-order device1[,device2[,device3 [,device4[,device5]]]] Specifies the boot device options and order. You can select one or more of the following: • cdrom—Bootable CD-ROM • fdd—Floppy disk drive • hdd—Hard disk drive • pxe—PXE boot • efi—Extensible Firmware Interface Step 3 Server /bios # commit Commits the transaction to the system configuration. The new boot order will be used on the next BIOS boot. This example sets the boot order and commits the transaction: Server# scope bios Server /bios # set boot-order hdd,cdrom,fdd,pxe,efi Server /bios *# commit Server /bios # show detail BIOS: Boot Order: HDD,CDROM,FDD,PXE,EFI Server /bios # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 15 Managing the Server Viewing the Actual Server Boot Order What to Do Next Reboot the server to boot with your new boot order. Viewing the Actual Server Boot Order The actual server boot order is the boot order actually used by the BIOS when the server last booted. The actual boot order can differ from the boot order configured in CIMC. Procedure Command or Action Purpose Step 1 Server# scope bios Enters bios command mode. Step 2 Server /bios # show actual-boot-order [detail] Displays the boot order actually used by the BIOS when the server last booted. This example displays the actual boot order from the last boot: Server# scope bios Server /bios # show actual-boot-order Boot Order -----------1 2 3 4 5 6 7 8 9 10 11 Type ------------------------CD/DVD CD/DVD Network Device (PXE) Network Device (PXE) Network Device (PXE) Network Device (PXE) Network Device (PXE) Network Device (PXE) Internal EFI Shell FDD FDD Boot Device ----------------------------------CD-ROM Cisco Virtual CD/DVD 1.18 Cisco NIC 23:0.0 MBA v5.0.5 Slot 0100 MBA v5.0.5 Slot 0101 MBA v5.0.5 Slot 0200 MBA v5.0.5 Slot 0201 Cisco NIC 22:0.0 Internal EFI Shell Cisco Virtual HDD 1.18 Cisco Virtual Floppy 1.18 Server /bios # Resetting the Server Important If any firmware or BIOS updates are in progress, do not reset the server until those tasks are complete. Before You Begin You must log in with user or admin privileges to perform this task. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 16 OL-28893-01 Managing the Server Shutting Down the Server Procedure Command or Action Purpose Step 1 Server# scope chassis Enters chassis command mode. Step 2 Server /chassis # power hard-reset After a prompt to confirm, resets the server. This example resets the server: Server# scope chassis Server /chassis # power hard-reset This operation will change the server's power state. Continue?[y|N] Shutting Down the Server Important If any firmware or BIOS updates are in progress, do not shut down the server until those tasks are complete. Before You Begin You must log in with user or admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters chassis mode. Step 2 Server /chassis # power shutdown Shuts down the server. The following example shuts down the server: Server# scope chassis Server /chassis # power shutdown Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 17 Managing the Server Managing Server Power Managing Server Power Powering On the Server Note If the server was powered off other than through the CIMC, the server will not become active immediately when powered on. In this case, the server will enter standby mode until the CIMC completes initialization. Important If any firmware or BIOS updates are in progress, do not change the server power until those tasks are complete. Before You Begin You must log in with user or admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters chassis command mode. Step 2 Server /chassis # power on Turns on the server. This example turns on the server: Server# scope chassis Server /chassis # power on This operation will change the server's power state. Continue?[y|N]y Server /chassis # show Power Serial Number Product Name UUID ----- ------------- ------------- -----------------------------------on Not Specified Not Specified 208F0100020F000000BEA80000DEAD00 Powering Off the Server Important If any firmware or BIOS updates are in progress, do not power off the server until those tasks are complete. Before You Begin You must log in with user or admin privileges to perform this task. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 18 OL-28893-01 Managing the Server Power Cycling the Server Procedure Command or Action Purpose Step 1 Server# scope chassis Enters chassis command mode. Step 2 Server /chassis # power off Turns off the server. This example turns off the server: Server# scope chassis Server /chassis # power off This operation will change the server's power state. Continue?[y|N]y Server /chassis # show Power Serial Number Product Name UUID ----- ------------- ------------- -----------------------------------off Not Specified Not Specified 208F0100020F000000BEA80000DEAD00 Power Cycling the Server Important If any firmware or BIOS updates are in progress, do not power cycle the server until those tasks are complete. Before You Begin You must log in with user or admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters chassis command mode. Step 2 Server /chassis # power cycle Power cycles the server. This example power cycles the server: Server# scope chassis Server /chassis # power cycle Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 19 Managing the Server Configuring Power Policies Configuring Power Policies Viewing the Power Statistics Procedure Step 1 Command or Action Purpose Server# show power-cap [detail] Displays the server power consumption statistics and the power cap policy. The displayed fields are described in the following table: Name Description Current Consumption The power currently being used by the server, in watts. Maximum Consumption The maximum number of watts consumed by the server since the last time it was rebooted. Minimum Consumption The minimum number of watts consumed by the server since the last time it was rebooted. Minimum Configurable Limit The minimum amount of power that can be specified as the peak power cap for this server, in watts. Maximum Configurable Limit The maximum amount of power that can be specified as the peak power cap for this server, in watts. Additional fields are described in the following table: Name Description Enable Power Capping , the system monitors how much power is allocated to the server and takes the specified action if the server goes over its maximum allotment. Peak Power The maximum number of watts that can be allocated to this server. If the server requests more power than specified in this field, the system takes the action defined in the Non-Compliance Action field. Enter a number of watts within the range defined by the Minimum Configurable Limit field and the Maximum Configurable Limit field. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 20 OL-28893-01 Managing the Server Power Capping Policy Name Description Non-Compliance Action The action the system should take if power capping is enabled and the server requests more than its peak power allotment. This can be one of the following: • —The server is forced to reduce its power consumption by any means necessary. This option is available only on some C-Series servers. • —No action is taken and the server is allowed to use more power than specified in the Peak Power field. • —The server is shut down. • —Processes running on the server are throttled to bring the total power consumption down. This example displays the detailed power statistics: Server# show power-cap detail Cur Consumption (W): 247 Max Consumption (W): 286 Min Consumption (W): 229 Minimum Configurable Limit (W): 285 Maximum Configurable Limit (W): 1250 Power Cap Enabled: yes Peak Power: 0 Non Compliance Action: throttle Server# Power Capping Policy The power capping policy determines how server power consumption is actively managed. When power capping is enabled, the system monitors how much power is allocated to the server and attempts to keep the power consumption below the allocated power. If the server exceeds its maximum allotment, the power capping policy triggers the specified non-compliance action. Configuring the Power Cap Policy Note This feature is not available on some servers. Before You Begin You must log in with admin privileges to perform this task. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 21 Managing the Server Configuring the Power Cap Policy Procedure Command or Action Purpose Step 1 Server# scope power-cap Enters the power cap command mode. Step 2 Server /power-cap # set enabled {yes | no} Enables or disables the capping of power to the server. Step 3 Server /power-cap # set peak-power watts Specifies the maximum number of watts that can be allocated to this server. Enter a number of watts within the range defined by the Minimum Configurable Limit field and the Maximum Configurable Limit field of the show power-cap detail command output. These fields are determined by the server model. If the server requests more power than specified in this command, the system takes the action defined by the set non-compliance-action command. Step 4 Server /power-cap # set non-compliance-action {force-power-reduction | none | power-off-host | throttle} Specifies the action the system should take if power capping is enabled and the server requests more than its peak power allotment. This can be one of the following: • force-power-reduction—The server is forced to reduce its power consumption by any means necessary. This option is not available on some server models. • none—No action is taken and the server is allowed to use more power than specified in the peak power setting. • power-off-host—The server is shut down. • throttle—Processes running on the server are throttled to bring the total power consumption down. Step 5 Server /power-cap # commit Commits the transaction to the system configuration. This example enables and configures a power cap policy and commits the transaction: Server# scope power-cap Server /power-cap # set enabled yes Server /power-cap *# set peak-power 1000 Server /power-cap *# set non-compliance-action throttle Server /power-cap *# commit Server /power-cap # show detail Cur Consumption (W): 688 Max Consumption (W): 1620 Min Consumption (W): 48 Minimum Configurable Limit (W): 500 Maximum Configurable Limit (W): 2000 Power Cap Enabled: yes Peak Power: 1000 Non Compliance Action: throttle Server /power-cap # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 22 OL-28893-01 Managing the Server Configuring the Power Restore Policy Configuring the Power Restore Policy The power restore policy determines how power is restored to the server after a chassis power loss. Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # set policy {power-off | power-on | restore-last-state} Specifies the action to be taken when chassis power is restored. Select one of the following: • power-off—Server power will remain off until manually turned on. This is the default action. • power-on—Server power will be turned on when chassis power is restored. • restore-last-state—Server power will return to the state before chassis power was lost. When the selected action is power-on, you can select a delay in the restoration of power to the server. Step 3 Server /chassis # set delay {fixed | random} (Optional) Specifies whether server power will be restored after a fixed or random time. The default is fixed. This command is accepted only if the power restore action is power-on. Step 4 Server /chassis # set delay-value delay (Optional) Specifies the delay time in seconds. The range is 0 to 240; the default is 0. Step 5 Server /chassis # commit Commits the transaction to the system configuration. This example sets the power restore policy to power-on with a fixed delay of 180 seconds (3 minutes) and commits the transaction: Server# scope chassis Server /chassis # set policy power-on Server /chassis *# set delay fixed Server /chassis *# set delay-value 180 Server /chassis *# commit Server /chassis # show detail Chassis: Power: on Serial Number: QCI1404A1IT Product Name: UCS C200 M1 PID : R200-1120402 UUID: 01A6E738-D8FE-DE11-76AE-8843E138AE04 Locator LED: off Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 23 Managing the Server Managing the Flexible Flash Controller Description: Testing power restore Power Restore Policy: power-on Power Delay Type: fixed Power Delay Value(sec): 180 Server /chassis # Managing the Flexible Flash Controller Cisco Flexible Flash Some C-Series Rack-Mount Servers support an internal Secure Digital (SD) memory card for storage of server software tools and utilities. The SD card is hosted by the Cisco Flexible Flash storage adapter. The SD storage is available to CIMC as four virtual USB drives. Three are preloaded with Cisco software and the fourth can hold a user-installed hypervisor or other content. The four virtual drives are as follows: • Cisco UCS Server Configuration Utility (bootable) • User-installed (may be bootable) • Cisco drivers (not bootable) • Cisco Host Upgrade Utility (bootable) For information about the Cisco software utilities and packages, see the Cisco UCS C-Series Servers Documentation Roadmap at this URL: http://www.cisco.com/go/unifiedcomputing/c-series-doc Dual Card Management in the Cisco Flexible Flash Controller The Cisco Flexible Flash controller supports management of two SD cards as a RAID-1 pair. With the introduction of dual card management, you can perform the following tasks: Action Description Reset Cisco Flex Flash Allows you to reset the controller. Reset Configuration Allows you to reset the configuration in the selected slot to the default configuration. Retain Configuration Allows you to retain the configuration for an SD card that supports firmware version 1.2.253. Configure Operational Profile Allows you to configure the SD cards on the selected Cisco Flexible Flash controller. RAID Partition Enumeration Non-RAID partitions are always enumerated from the primary card and the enumeration does not depend on the status of the primary card. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 24 OL-28893-01 Managing the Server Configuring the Flexible Flash Controller Properties Following is the behavior of the RAID partition enumeration when there are two cards in the Cisco Flexible Flash controller: Scenario Behavior Single card RAID partitions are enumerated if the card is healthy, and if the mode is either Primary or Secondary-active. Dual paired cards RAID partitions are enumerated if one of the cards is healthy. When only one card is healthy, all read/write operations occur on this healthy card. You must use UCS SCU to synchronize the two RAID partitions. Dual unpaired cards If this scenario is detected when the server is restarting, then neither one of the RAID partitions is enumerated. If this scenario is detected when the server is running, when a user connects a new SD card, then the cards are not managed by the Cisco Flexible Flash controller. This does not affect the host enumeration. You must pair the cards to manage them. You can pair the cards using the Reset Configuration or Retain Configuration options. Configuring the Flexible Flash Controller Properties Before You Begin • You must log in with admin privileges to perform this task. • Cisco Flexible Flash must be supported by your platform. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope flexflash index Enters the Cisco Flexible Flash controller command mode for the specified controller. At this time, the only permissible index value is FlexFlash-0. Step 3 Server /chassis/flexflash # scope operational-profile Enters the operational profile command mode. Step 4 Server Specifies the slot in which the primary copy of the data /chassis/flexflash/operational-profile resides. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 25 Managing the Server Configuring the Flexible Flash Controller Properties Command or Action Purpose # set raid-primary-member {slot1 Important | slot2} Currently, Cisco Flexible Flash cards are supported in slot 1 and slot 2. Therefore, you can specify slot1 or slot2. Step 5 Server The role of the secondary RAID. The currently supported /chassis/flexflash/operational-profile value is active. # set raid-secondary-role {active | initializing} Step 6 Server Specifies the number of read errors that are permitted while /chassis/flexflash/operational-profile accessing the Cisco Flexible Flash card. If the number of # set read-error-count-threshold errors exceeds this threshold, the Cisco Flexible Flash card is disabled and you must reset it manually before CIMC attempts to access it again. To specify a read error threshold, enter an integer between 1 and 255. To specify that the card should never be disabled regardless of the number of errors encountered, enter 0 (zero). Step 7 Server Specifies the number of write errors that are permitted while /chassis/flexflash/operational-profile accessing the Cisco Flexible Flash card. If the number of # set write-error-count-threshold errors exceeds this threshold, the Cisco Flexible Flash card is disabled and you must reset it manually before CIMC attempts to access it again. To specify a write error threshold, enter an integer between 1 and 255. To specify that the card should never be disabled regardless of the number of errors encountered, enter 0 (zero). Step 8 Server Specifies a list of virtual drives to be made available to the /chassis/flexflash/operational-profile server as a USB-style drive. The options are as follows: # set virtual-drives-enabled list • SCU—The server can access the Cisco UCS Server Configuration Utility. • DRIVERS—The server can access the Cisco drivers volume. • HV—The server can access a user-installed hypervisor. • HUU—The server can access the Cisco Host Upgrade Utility. When specifying more than one option, you must enclose the list in quotation marks ("). Step 9 Server /chassis/adapter # commit Commits the transaction to the system configuration. This example shows how to configure the properties of the Flash controller: Server# scope chassis Server /chassis # scope flexflash FlexFlash-0 Server /chassis/flexflash # scope operational-profile Server /chassis/flexflash/operational-profile # set read-error-count-threshold 100 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 26 OL-28893-01 Managing the Server Booting from the Flexible Flash Server Server Server Server Server Server /chassis/flexflash/operational-profile /chassis/flexflash/operational-profile /chassis/flexflash/operational-profile /chassis/flexflash/operational-profile /chassis/flexflash/operational-profile /chassis/flexflash/operational-profile # set write-error-count-threshold 100 *# set raid-primary-member slot1 # set raid-secondary-role active *# set virtual-drives-enabled "SCU HUU" *# commit # Booting from the Flexible Flash You can specify a bootable virtual drive on the Cisco Flexible Flash card that will override the default boot priority the next time the server is restarted, regardless of the default boot order defined for the server. The specified boot device is used only once. After the server has rebooted, this setting is ignored. Note Before you reboot the server, ensure that the virtual drive you select is enabled on the Cisco Flexible Flash card. Before You Begin • You must log in with admin privileges to perform this task. • Cisco Flexible Flash must be supported by your platform. Procedure Command or Action Purpose Step 1 Server# scope bios Enters the BIOS command mode. Step 2 Server /bios # set boot-override The virtual drive from which the server attempts to boot the next time it is restarted. This can be one of the following: {None | SCU | HV | HUU} • None—The server uses the default boot order • SCU—The server boots from the Cisco UCS Server Configuration Utility • HV—The server boots from the hypervisor virtual drive • HUU—The server boots from the Cisco Host Upgrade Utility Step 3 Server /bios # commit Commits the transaction to the system configuration. This example specifies that the server boots from the Cisco UCS Server Configuration Utility the next time it is restarted: Server# scope bios Server /bios # set boot-override SCU Committing the boot override BIOS will try boot to the specified boot device first. Failure to detect the boot device BIOS will boot from the list configured in the BIOS boot order. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 27 Managing the Server Resetting the Flexible Flash Controller Server /bios *# commit Server /bios # Resetting the Flexible Flash Controller In normal operation, it should not be necessary to reset the Cisco Flexible Flash. We recommend that you perform this procedure only when explicitly directed to do so by a technical support representative. Note This operation will disrupt traffic to the virtual drives on the Cisco Flexible Flash controller. Before You Begin • You must log in with admin privileges to perform this task. • Cisco Flexible Flash must be supported by your platform. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope flexflash index Enters the Cisco Flexible Flash controller command mode for the specified controller. At this time, the only permissible index value is FlexFlash-0. Step 3 Server /chassis/flexflash # reset Resets the Cisco Flexible Flash controller. This example resets the flash controller: Server# scope chassis Server /chassis # scope flexflash FlexFlash-0 Server /chassis/flexflash # reset This operation will reset Cisco Flexible Flash controller. Host traffic to VDs on this device will be disrupted. Continue?[y|N] y Server /chassis/flexflash # Resetting the Configuration of the Cards in the Cisco Flexible Flash Controller You can reset the configuration of a selected slot in the Cisco Flexible Flash controller to the default configuration. When you reset the configuration of the slots in the Cisco Flexible Flash card, the following situations occur: • The card in the selected slot is marked as primary healthy. • The card in the other slot is marked as secondary-active unhealthy. • Three non-RAID partitions and one RAID partition are created. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 28 OL-28893-01 Managing the Server Retaining the Configuration of the Flexible Flash Controller • The card read/write error counts and read/write threshold are set to 0. • Host connectivity could be disrupted. Before You Begin • You must log in with admin privileges to perform this task. • Cisco Flexible Flash must be supported on your server. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope flexflash index Enters the Cisco Flexible Flash controller command mode for the specified controller. At this time, the only permissible index value is FlexFlash-0. Step 3 Server /chassis/flexflash # reset-config Resets the configuration of the selected slot to the default configuration. primary slot ID Step 4 Server /chassis/flexflash # commit Commits the transaction to the system configuration. This example shows how to reset the configuration from a slot to the default configuration: Server# scope chassis Server /chassis # scope flexflash FlexFlash-0 Server /chassis/flexflash # reset-config slot1 This action will mark the slot1 as the healthy primary slot, and slot2 (if card exists) as unhealthy secondary active. This operation may disturb the host connectivity as well. Continue? [y|N] y Server /chassis/flexflash/operational-profile *# commit Server /chassis/flexflash/operational-profile # Retaining the Configuration of the Flexible Flash Controller You can copy the configuration of a given slot in the Cisco Flexible Flash card to the other slot. However, the slot from which the configuration is copied from must be of the SDK523 type. You can retain the configuration in the following situations: • There are two unpaired SD cards • The server is operating from a single SD card, and an unpaired SD card is in the other slot. • One SD card supports firmware version 1.2.253, and the other SD card is either unpartitioned or supports firmware version 1.2.247. Before You Begin • You must log in with admin privileges to perform this task. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 29 Managing the Server Configuring BIOS Settings • Cisco Flexible Flash must be supported on your server. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope flexflash index Enters the Cisco Flexible Flash controller command mode for the specified controller. At this time, the only permissible index value is FlexFlash-0. Step 3 Server /chassis/flexflash # retain config primary slot ID Copies the configuration from the primary slot to the secondary slot. Step 4 Server /chassis/flexflash # commit Commits the transaction to the system configuration. This example shows how to copy the configuration from one slot to the other: Server# scope chassis Server /chassis # scope flexflash FlexFlash-0 Server /chassis/flexflash # retain-config slot1 This action will copy the config of slot1 to both the slots, mark slot1 as healthy, primary slot and slot2 (card must be present) as unhealthy secondary active. This operation may disturb the host connectivity as well. Continue? [y|N] y Server /chassis/flexflash/operational-profile *# commit Server /chassis/flexflash/operational-profile # Configuring BIOS Settings Viewing BIOS Status Procedure Command or Action Purpose Step 1 Server# scope bios Enters the BIOS command mode. Step 2 Server /bios # show detail Displays details of the BIOS status. The BIOS status information contains the following fields: Name Description BIOS Version The version string of the running BIOS. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 30 OL-28893-01 Managing the Server Configuring Main BIOS Settings Name Description Boot Order The order of bootable target types that the server will attempt to use. Boot Override Priority This can be None, SCU, HV, or HUU. FW Update/Recovery Status The status of any pending firmware update or recovery action. FW Update/Recovery Progress The percentage of completion of the most recent firmware update or recovery action. This example displays the BIOS status: Server# scope bios Server /bios # show detail BIOS Version: "C460M1.1.2.2a.0 (Build Date: 01/12/2011)" Boot Order: EFI,CDROM,HDD Boot Override Priority: FW Update/Recovery Status: NONE FW Update/Recovery Progress: 100 Server /bios # Configuring Main BIOS Settings Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope bios Enters the BIOS command mode. Step 2 Server /bios # scope main Enters the main BIOS settings command mode. Step 3 Configure the BIOS settings. The BIOS parameters available depend on the model of the server that you are using. For descriptions and information about the options for each BIOS setting, see one the following topics: • Main BIOS Parameters for C22 and C24 Servers , on page 183 • Main BIOS Parameters for C200 and C210 Servers • Main BIOS Parameters for C250 Servers • Main BIOS Parameters for C260 Servers , on page 222 • Main BIOS Parameters for C460 Servers , on page 253 Step 4 Server /bios/main # commit Commits the transaction to the system configuration. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 31 Managing the Server Configuring Advanced BIOS Settings Command or Action Purpose Changes are applied on the next server reboot. If server power is on, you are prompted to choose whether to reboot now. This example configures the BIOS to pause the boot upon a critical POST error and commits the transaction: Server# scope bios Server /bios # scope main Server /bios/main # set POSTErrorPause Enabled Server /bios/main *# commit Changes to BIOS set-up parameters will require a reboot. Do you want to reboot the system?[y|N] n Changes will be applied on next reboot. Server /bios/main # Configuring Advanced BIOS Settings Note Depending on your installed hardware, some configuration options described in this topic may not appear. Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope bios Enters the BIOS command mode. Step 2 Server /bios # scope advanced Enters the advanced BIOS settings command mode. Step 3 Configure the BIOS settings. The BIOS parameters available depend on the model of the server that you are using. For descriptions and information about the options for each BIOS setting, see one the following topics: • Advanced BIOS Parameters for C22 and C24 Servers , on page 184 • Advanced BIOS Parameters for C200 and C210 Servers • Advanced BIOS Parameters for C250 Servers • Advanced BIOS Parameters for C260 Servers , on page 222 • Advanced BIOS Parameters for C460 Servers , on page 253 Step 4 Server /bios/advanced # commit Commits the transaction to the system configuration. Changes are applied on the next server reboot. If server power is on, you are prompted to choose whether to reboot now. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 32 OL-28893-01 Managing the Server Configuring Server Management BIOS Settings Command or Action Purpose This example enables low voltage DDR memory mode and commits the transaction: Server# scope bios Server /bios # scope advanced Server /bios/advanced # set LvDDRMode Enabled Server /bios/advanced *# commit Changes to BIOS set-up parameters will require a reboot. Do you want to reboot the system?[y|N] n Changes will be applied on next reboot. Server /bios/advanced # Configuring Server Management BIOS Settings Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope bios Enters the BIOS command mode. Step 2 Server /bios # scope server-management Enters the server management BIOS settings command mode. Step 3 Configure the BIOS settings. The BIOS parameters available depend on the model of the server that you are using. For descriptions and information about the options for each BIOS setting, see one the following topics: • Server Management BIOS Parameters for C22 and C24 Servers , on page 200 • Server Management BIOS Parameters for C200 and C210 Servers • Server Management BIOS Parameters for C250 Servers • Server Management BIOS Parameters for C260 Servers , on page 232 • Server Management BIOS Parameters for C460 Servers , on page 263 Step 4 Server Commits the transaction to the system configuration. /bios/server-management # Changes are applied on the next server reboot. If server power is commit on, you are prompted to choose whether to reboot now. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 33 Managing the Server Restoring BIOS Defaults This example enables automatic detection of the BMC and commits the transaction: Server# scope bios Server /bios # scope server-management Server /bios/server-management # set BMCPnP Enabled Server /bios/server-management *# commit Changes to BIOS set-up parameters will require a reboot. Do you want to reboot the system?[y|N] n Changes will be applied on next reboot. Server /bios/server-management # Restoring BIOS Defaults Before You Begin You must log in as a user with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope bios Enters the BIOS command mode. Step 2 Server /bios # bios-setup-default Restores BIOS default settings. This command initiates a reboot. This example restores BIOS default settings: Server# scope bios Server /bios # bios-setup-default This operation will reset the BIOS set-up tokens to factory defaults. All your configuration will be lost. Changes to BIOS set-up parameters will initiate a reboot. Continue?[y|N]y Restoring BIOS Manufacturing Custom Defaults In instances where the components of the BIOS no longer function as desired, you can restore the BIOS set up tokens to the manufacturing default values. Note This action is only available for some C-Series servers. Before You Begin • You must log in with admin privileges to perform this task. • The server must be powered off. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 34 OL-28893-01 Managing the Server Restoring BIOS Manufacturing Custom Defaults Procedure Command or Action Purpose Step 1 Server# scope bios Enters the BIOS command mode. Step 2 Server /bios # restore-mfg-defaults Restores the set up tokens to the manufacturing default values. This example shows how to restore the BIOS set up tokens to the manufacturing default values: Server # scope bios Server /bios # restore-mfg-defaults This operation will reset the BIOS set-up tokens to manufacturing defaults. The system will be powered on. Continue? [y|n] N Server /bios # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 35 Managing the Server Restoring BIOS Manufacturing Custom Defaults Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 36 OL-28893-01 CHAPTER 4 Viewing Server Properties This chapter includes the following sections: • Viewing Server Properties, page 37 • Viewing CIMC Properties, page 38 • Viewing CPU Properties, page 38 • Viewing Memory Properties, page 39 • Viewing Power Supply Properties, page 40 • Viewing Storage Properties, page 40 • Viewing PCI Adapter Properties, page 46 • Viewing Network Related Properties, page 46 Viewing Server Properties Procedure Step 1 Command or Action Purpose Server# show chassis [detail] Displays server properties. This example displays server properties: Server# show chassis detail Chassis: Power: on Serial Number: QCI140205ZG Product Name: UCS C210 M2 PID : R210-2121605W UUID: FFFFFFFF-FFFF-FFFF-FFFF-FFFFFFFFFFFF Locator LED: off Description: Power Restore Policy: power-off Power Delay Type: fixed Power Delay Value(sec): 0 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 37 Viewing Server Properties Viewing CIMC Properties Server# Viewing CIMC Properties Note CIMC gets the current date and time from the server BIOS. To change this information, reboot the server and press F2 when prompted to access the BIOS configuration menu. Then change the date or time using the options on the main BIOS configuration tab. Procedure Step 1 Command or Action Purpose Server# show cimc [detail] Displays CIMC properties. This example displays CIMC properties: Server# show cimc detail CIMC: Firmware Version: 1.4(2.18) Current Time: Wed Jan 11 07:01:50 2012 Boot-loader Version: 1.4(2.18).16 Server# Viewing CPU Properties Before You Begin The server must be powered on, or the properties will not display. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters chassis command mode. Step 2 Server /chassis # show cpu [detail] Displays CPU properties. This example displays CPU properties: Server# scope chassis Server /chassis # show cpu Name Cores Version ------------ -------- -------------------------------------------------CPU1 4 Intel(R) Xeon(R) CPU E5520 @ 2.27GHz CPU2 4 Intel(R) Xeon(R) CPU E5520 @ 2.27GHz Server /chassis # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 38 OL-28893-01 Viewing Server Properties Viewing Memory Properties Viewing Memory Properties Before You Begin The server must be powered on, or the properties will not display. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters chassis command mode. Step 2 Server /chassis # show dimm [detail] Displays memory properties. Step 3 Server /chassis # show dimm-summary Displays DIMM summary information. This example displays memory properties: Server# scope chassis Server /chassis # show dimm Name Capacity -------------------- --------------DIMM_A1 2048 MB DIMM_A2 2048 MB DIMM_B1 2048 MB DIMM_B2 2048 MB DIMM_C1 Not Installed DIMM_C2 Not Installed DIMM_D1 2048 MB DIMM_D2 2048 MB DIMM_E1 2048 MB DIMM_E2 2048 MB DIMM_F1 Not Installed DIMM_F2 Not Installed Channel Speed (MHz) ------------------1067 1067 1067 1067 Unknown Unknown 1067 1067 1067 1067 Unknown Unknown Channel Type --------------Other Other Other Other Other Other Other Other Other Other Other Other Server /chassis # This example displays detailed information about memory properties: Server# scope chassis Server /chassis # show dimm detail Name DIMM_A1: Capacity: 2048 MB Channel Speed (MHz): 1067 Channel Type: Other Memory Type Detail: Synchronous Bank Locator: NODE 0 CHANNEL 0 DIMM 0 Visibility: Yes Operability: Operable Manufacturer: 0x802C Part Number: 18JSF25672PY-1G1D1 Serial Number: 0xDA415F3F Asset Tag: Unknown Data Width: 64 bits Name DIMM_A2: Capacity: 2048 MB --More-Server /chassis # This example displays DIMM summary information: Server# scope chassis Server /chassis # show dimm-summary Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 39 Viewing Server Properties Viewing Power Supply Properties DIMM Summary: Memory Speed: 1067 MHz Total Memory: 16384 MB Effective Memory: 16384 MB Redundant Memory: 0 MB Failed Memory: 0 MB Ignored Memory: 0 MB Number of Ignored Dimms: 0 Number of Failed Dimms: 0 Memory RAS possible: Memory configuration can support mirroring Memory Configuration: Maximum Performance Server /chassis # Viewing Power Supply Properties Before You Begin The server must be powered on, or the properties will not display. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters chassis command mode. Step 2 Server /chassis # show psu [detail] Displays power supply properties. This example displays power supply properties: Server# scope chassis Server /chassis # show psu Name In. Power (Watts) ---------- -------------------PSU1 74 PSU2 83 Out. Power (Watts) -------------------650 650 Firmware Status -------- ---------R0E Present R0E Present Server /chassis # Viewing Storage Properties Viewing Storage Adapter Properties Before You Begin The server must be powered on, or the properties will not display. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 40 OL-28893-01 Viewing Server Properties Viewing Storage Adapter Properties Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # show storageadapter [slot] [detail] Displays installed storage cards. Note This command displays all MegaRAID controllers on the server that can be managed through CIMC. If an installed controller or storage device is not displayed, then it cannot be managed through CIMC. Step 3 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 4 Server /chassis/storageadapter # show bbu Displays battery backup unit information for the storage card. [detail] Step 5 Server /chassis/storageadapter # show capabilites [detail] Displays RAID levels supported by the storage card. Step 6 Server /chassis/storageadapter # show error-counters [detail] Displays number of errors seen by the storage card. Step 7 Server /chassis/storageadapter # show firmware-versions [detail] Displays firmware version information for the storage card. Step 8 Server /chassis/storageadapter # show hw-config [detail] Displays hardware information for the storage card. Step 9 Server /chassis/storageadapter # show mfg-data [detail] Displays manufacturer data for the storage card. Step 10 Server /chassis/storageadapter # show pci-info [detail] Displays adapter PCI information for the storage card. Step 11 Server /chassis/storageadapter # show running-firmware-images [detail] Displays running firmware information for the storage card. Step 12 Server /chassis/storageadapter # show settings [detail] Displays adapter firmware settings for the storage card. Step 13 Server /chassis/storageadapter # show startup-firmware-images [detail] Displays firmware images to be activated on startup for the storage card. This example displays storage properties: Server# scope chassis Server /chassis # show storageadapter PCI Slot Product Name Serial Number Firmware Package Build -------- ---------------------------------- -------------- ------------------------SAS LSI MegaRAID SAS 9260-8i SV93404392 12.12.0-0038 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 41 Viewing Server Properties Viewing the Flexible Flash Controller Properties Product ID Battery Status Cache Memory Size ---- -------------- -------------- -------------LSI Logic fully charged 0 MB Server /chassis # This example displays battery backup unit information for the storage card named SAS: Server# scope chassis Server /chassis # scope storageadapter SAS Server /chassis/storageadapter # show bbu Controller Battery Type Battery Present Voltage Current Charge Charging State ---------- ------------ --------------- ---------- ---------- ------ -------------SAS iBBU true 4.051 V 0.000 A 100% fully charged Server /chassis/storageadapter # Viewing the Flexible Flash Controller Properties Before You Begin • Cisco Flexible Flash must be supported by your platform. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # show flexflash [detail] (Optional) Displays the available Cisco Flexible Flash controllers. Step 3 Server /chassis # scope flexflash index Enters the Cisco Flexible Flash controller command mode for the specified controller. At this time, the only permissible index value is FlexFlash-0. Step 4 Server /chassis/flexflash # show operational-profile [detail] Displays the operational profile properties. This example displays the properties of the flash controller: Server# scope chassis Server /chassis # show flexflash Controller Product Name Has Error Firmware Version Vendor Internal State ------------ ---------------- ---------- ----------------- -------- --------------FlexFlash-0 Cisco FlexFlash No 1.2 build 247 Cypress Connected Server /chassis # scope flexflash FlexFlash-0 Server /chassis # show operational-profile Primary Member Slot I/O Error Threshold Host Accessible VDs -------------------- -------------------- -------------------slot1 100 SCU Drivers Server /chassis/flexflash # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 42 OL-28893-01 Viewing Server Properties Viewing Physical Drive Properties Viewing Physical Drive Properties Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # show physical-drive [drive-number] [detail] Displays physical drive information for the storage card. Step 4 Server /chassis/storageadapter # show physical-drive-count [detail] Displays the number of physical drives on the storage card. Step 5 Server /chassis/storageadapter # scope physical-drive drive-number Enters command mode for the specified physical drive. Step 6 Server /chassis/storageadapter/physical-drive # Displays general information about the show general [detail] specified physical drive. Step 7 Server /chassis/storageadapter/physical-drive # Displays inquiry data about the specified show inquiry-data [detail] physical drive. Step 8 Server /chassis/storageadapter/physical-drive # Displays status information about the show status [detail] specified physical drive. This example displays general information about physical drive number 1 on the storage card named SAS: Server# scope chassis Server /chassis # scope storageadapter SAS Server /chassis/storageadapter # scope physical-drive 1 Server /chassis/storageadapter/physical-drive # show general Slot Number 1: Controller: SAS Enclosure Device ID: 27 Device ID: 34 Sequence Number: 2 Media Error Count: 0 Other Error Count: 0 Predictive Failure Count: 0 Link Speed: 6.0 Gb/s Interface Type: SAS Media Type: HDD Block Size: 512 Block Count: 585937500 Raw Size: 286102 MB Non Coerced Size: 285590 MB Coerced Size: 285568 MB SAS Address 0: 500000e112693fa2 SAS Address 1: Connected Port 0: Connected Port 1: Connected Port 2: Connected Port 3: Connected Port 4: Connected Port 5: Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 43 Viewing Server Properties Viewing Virtual Drive Properties Connected Port 6: Connected Port 7: Power State: powersave Server /chassis/storageadapter/physical-drive # This example displays inquiry data about physical drive number 1 on the storage card named SAS: Server# scope chassis Server /chassis # scope storageadapter SAS Server /chassis/storageadapter # scope physical-drive 1 Server /chassis/storageadapter/physical-drive # show inquiry-data Slot Number 1: Controller: SAS Product ID: MBD2300RC Drive Firmware: 5701 Drive Serial Number: D010P9A0016D Server /chassis/storageadapter/physical-drive # This example displays status information about physical drive number 1 on the storage card named SAS: Server# scope chassis Server /chassis # scope storageadapter SAS Server /chassis/storageadapter # scope physical-drive 1 Server /chassis/storageadapter/physical-drive # show inquiry-data Slot Number 1: Controller: SAS State: online Online: true Fault: false Server /chassis/storageadapter/physical-drive # Viewing Virtual Drive Properties Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # show virtual-drive [drive-number] [detail] Displays virtual drive information for the storage card. Step 4 Server /chassis/storageadapter # show virtual-drive-count [detail] Displays the number of virtual drives configured on the storage card. Step 5 Server /chassis/storageadapter # scope virtual-drive drive-number Enters command mode for the specified virtual drive. Step 6 Server /chassis/storageadapter/virtual-drive # Displays physical drive information about the show physical-drive [detail] specified virtual drive. This example displays information about virtual drives on the storage card named SAS: Server# scope chassis Server /chassis # scope storageadapter SAS Server /chassis/storageadapter # show virtual-drive Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 44 OL-28893-01 Viewing Server Properties Viewing Nvidia GPU Card Information Virtual Drive -------------0 1 2 3 4 5 6 7 8 Status --------------Optimal Optimal Optimal Optimal Optimal Optimal Optimal Optimal Optimal Name -----------------------SLES1SP1beta5 RHEL5.5 W2K8R2_DC VD_3 ESX4.0u2 VMs RHEL6-35GB OS_Ins_Test_DR Size ---------30720 MB 30720 MB 30720 MB 30720 MB 30720 MB 285568 MB 35840 MB 158720 MB 285568 MB RAID Level ---------RAID 0 RAID 0 RAID 0 RAID 0 RAID 0 RAID 0 RAID 0 RAID 0 RAID 1 Server /chassis/storageadapter # This example displays physical drive information about virtual drive number 1 on the storage card named SAS: Server# scope chassis Server /chassis # scope storageadapter SAS Server /chassis/storageadapter # scope virtual-drive 1 Server /chassis/storageadapter/virtual-drive # show physical-drive Span Physical Drive Status Starting Block Number Of Blocks ----- -------------- ---------- -------------- ---------------0 12 online 62914560 62914560 Server /chassis/storageadapter/virtual-drive # Viewing Nvidia GPU Card Information These commands are not available on all UCS C-series servers. Before You Begin The server must be powered on to view information on the Nvidia GPU cards. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # show gpu Displays the available Nvidia GPU cards on the system. Step 3 Server /chassis # scope gpu slot-number Enters the GPU card command mode. Specify the slot number of the GPU card. Step 4 Server /chassis/gpu # show gpu-list Displays temperature information on the GPU cards. This example shows how to view the temperature information of the available GPU cards on the system: Server # scope chassis Server /chassis # show gpu Slot ---5 Product Name -----------Nvidia GRID K2 @ BD Num of GPUs ----------2 Server /chassis # scope gpu 5 Server /chassis/gpu # show gpu-list Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 45 Viewing Server Properties Viewing PCI Adapter Properties GPU ID -----0 1 Temperature ----------32 33 Server /chassis/gpu # Viewing PCI Adapter Properties Before You Begin The server must be powered on, or the properties will not display. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # show pci-adapter [detail] Displays PCI adapter properties. This example displays PCI adapter properties: Server# scope chassis Server /chassis # show Name Slot ---------------- ----PCIe Adapter1 1 PCIe Adapter2 5 pci-adapter Vendor ID -----------0x1137 0x1077 Device ID -----------0x0042 0x2432 Product Name ------------------------Cisco UCS P81E Virtual... Qlogic QLE2462 4Gb dua... Server /chassis # Viewing Network Related Properties Viewing LOM Properties You can view the MAC addresses of the LAN On Motherboard (LOM) Ethernet ports. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope network Enters the network command mode. Step 3 Server /cimc/network # show lom-mac-list Displays the MAC addresses of the LOM ports. [detail] Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 46 OL-28893-01 Viewing Server Properties Viewing LOM Properties This example shows how to display the MAC addresses of the LOM ports: Server# scope cimc Server /cimc # scope network Server /cimc/network # show lom-mac-list Interface MAC Address --------------- -------------------eth0 010000002000 eth1 010000002000 Server /cimc/network # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 47 Viewing Server Properties Viewing LOM Properties Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 48 OL-28893-01 CHAPTER 5 Viewing Server Sensors This chapter includes the following sections: • Viewing Power Supply Sensors, page 49 • Viewing Fan Sensors, page 50 • Viewing Temperature Sensors, page 50 • Viewing Voltage Sensors, page 51 • Viewing Current Sensors, page 52 • Viewing Storage Sensors, page 52 Viewing Power Supply Sensors Procedure Command or Action Purpose Step 1 Server# scope sensor Enters sensor command mode. Step 2 Server /sensor # show psu [detail] Displays power supply sensor statistics for the server. Step 3 Server /sensor # show psu-redundancy Displays power supply redundancy sensor status for the server. [detail] This example displays power supply sensor statistics: Server# scope sensor Server /sensor # show psu Name Sensor Status Reading Units Min. Warning Max. Warning Min. Failure Max. Failure -------------------- -------------------- ---------- ---------- ----------------------------- --------------- --------------PSU1_STATUS Normal present Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 49 Viewing Server Sensors Viewing Fan Sensors PSU2_STATUS Normal present Server /sensor # show psu-redundancy Name Reading Sensor Status -------------------- ---------- -------------------PSU_REDUNDANCY full Normal Server /sensor # Viewing Fan Sensors Procedure Command or Action Purpose Step 1 Server# scope sensor Enters sensor command mode. Step 2 Server /sensor # show fan [detail] Displays fan sensor statistics for the server. This example displays fan sensor statistics: Server# scope sensor Server /sensor # show fan Name Sensor Status Min. Failure Max. Failure -------------------- ---------------------------- --------------W793_FAN2_TACH1 Normal 800 N/A W793_FAN2_TACH2 Normal 800 N/A W793_FAN3_TACH1 Normal 800 N/A W793_FAN3_TACH2 Normal 800 N/A W793_FAN4_TACH1 Normal 800 N/A W793_FAN4_TACH2 Normal 800 N/A Reading Units Min. Warning Max. Warning ---------- ---------- --------------- --------------2400 RPM N/A N/A 2400 RPM N/A N/A 2300 RPM N/A N/A 2300 RPM N/A N/A 2400 RPM N/A N/A 1600 RPM N/A N/A Server /sensor # Viewing Temperature Sensors Procedure Command or Action Purpose Step 1 Server# scope sensor Enters sensor command mode. Step 2 Server /sensor # show temperature [detail] Displays temperature sensor statistics for the server. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 50 OL-28893-01 Viewing Server Sensors Viewing Voltage Sensors This example displays temperature sensor statistics: Server# scope sensor Server /sensor # show temperature Name Sensor Status Min. Failure Max. Failure ------------------------- ------------------------- -----------IOH_TEMP_SENS Normal N/A 85.0 P2_TEMP_SENS Normal N/A 81.0 P1_TEMP_SENS Normal N/A 81.0 DDR3_P2_D1_TMP Normal N/A 95.0 DDR3_P1_A1_TMP Normal N/A 95.0 FP_AMBIENT_TEMP Normal N/A 45.0 Reading Units Min. Warning Max. Warning ---------- ---------- ------------ -----------32.0 C N/A 80.0 31.0 C N/A 80.0 34.0 C N/A 80.0 20.0 C N/A 90.0 21.0 C N/A 90.0 28.0 C N/A 40.0 Server /sensor # Viewing Voltage Sensors Procedure Command or Action Purpose Step 1 Server# scope sensor Enters sensor command mode. Step 2 Server /sensor # show voltage [detail] Displays voltage sensor statistics for the server. This example displays voltage sensor statistics: Server# scope sensor Server /sensor # show voltage Name Sensor Status Min. Failure Max. Failure ------------------------- ------------------------- -----------P3V_BAT_SCALED Normal 2.798 3.088 P12V_SCALED Normal 11.623 12.331 P5V_SCALED Normal 4.844 5.157 P3V3_SCALED Normal 3.191 3.381 P5V_STBY_SCALED Normal 4.844 5.157 PV_VCCP_CPU1 Normal 0.725 1.391 PV_VCCP_CPU2 Normal 0.725 1.391 P1V5_DDR3_CPU1 Normal 1.450 1.548 P1V5_DDR3_CPU2 Normal 1.450 1.548 P1V1_IOH Normal 1.068 1.136 P1V8_AUX Normal Reading Units Min. Warning Max. Warning ---------- ---------- ------------ -----------3.022 V N/A N/A 12.154 V N/A N/A 5.036 V N/A N/A 3.318 V N/A N/A 5.109 V N/A N/A 0.950 V N/A N/A 0.891 V N/A N/A 1.499 V N/A N/A 1.499 V N/A N/A 1.087 V N/A N/A 1.773 V N/A N/A Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 51 Viewing Server Sensors Viewing Current Sensors 1.744 1.852 Server /sensor # Viewing Current Sensors Procedure Command or Action Purpose Step 1 Server# scope sensor Enters sensor command mode. Step 2 Server /sensor # show current [detail] Displays current sensor statistics for the server. This example displays current sensor statistics: Server# scope sensor Server /sensor # show current Name Sensor Status Min. Failure Max. Failure ------------------------- ------------------------- -----------VR_P2_IMON Normal N/A 164.80 VR_P1_IMON Normal N/A 164.80 Reading Units Min. Warning Max. Warning ---------- ---------- ------------ -----------16.00 AMP N/A 147.20 27.20 AMP N/A 147.20 Server /sensor # Viewing Storage Sensors Procedure Command or Action Purpose Step 1 Server# scope chassis Enters chassis command mode. Step 2 Server /chassis # show hdd [detail] Displays storage sensor information. The displayed fields are described in the following table: Name Description Name column The name of the storage device. Status column A brief description of the storage device status. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 52 OL-28893-01 Viewing Server Sensors Viewing Storage Sensors Name Description LED Status column The current LED color, if any. To make the physical LED on the storage device blink, select Turn On from the drop-down list. To let the storage device control whether the LED blinks, select Turn Off. Note This information is only available for some C-Series servers. This example displays storage sensor information: Server# scope chassis Server /chassis # show hdd Name Status -------------------- -------------------HDD_01_STATUS present HDD_02_STATUS present HDD_03_STATUS present HDD_04_STATUS present Server /chassis # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 53 Viewing Server Sensors Viewing Storage Sensors Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 54 OL-28893-01 CHAPTER 6 Managing Remote Presence This chapter includes the following sections: • Managing the Virtual KVM, page 55 • Configuring Virtual Media, page 58 • Managing Serial over LAN, page 61 Managing the Virtual KVM KVM Console The KVM console is an interface accessible from CIMC that emulates a direct keyboard, video, and mouse (KVM) connection to the server. The KVM console allows you to connect to the server from a remote location. Instead of using CD/DVD or floppy drives physically connected to the server, the KVM console uses virtual media, which are actual disk drives or disk image files that are mapped to virtual CD/DVD or floppy drives. You can map any of the following to a virtual drive: • CD/DVD or floppy drive on your computer • Disk image files (ISO or IMG files) on your computer • USB flash drive on your computer • CD/DVD or floppy drive on the network • Disk image files (ISO or IMG files) on the network • USB flash drive on the network You can use the KVM console to install an OS on the server. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 55 Managing Remote Presence Enabling the Virtual KVM Enabling the Virtual KVM Before You Begin You must log in as a user with admin privileges to enable the virtual KVM. Procedure Command or Action Purpose Step 1 Server# scope kvm Enters KVM command mode. Step 2 Server /kvm # set enabled yes Enables the virtual KVM. Step 3 Server /kvm # commit Commits the transaction to the system configuration. Step 4 Server /kvm # show [detail] (Optional) Displays the virtual KVM configuration. This example enables the virtual KVM: Server# scope kvm Server /kvm # set enabled yes Server /kvm *# commit Server /kvm # show Encryption Enabled Local Video Active Sessions Enabled KVM Port ------------------ ---------------- --------------- ------- -------no yes 0 yes 2068 Server /kvm # Disabling the Virtual KVM Before You Begin You must log in as a user with admin privileges to disable the virtual KVM. Procedure Command or Action Purpose Step 1 Server# scope kvm Enters KVM command mode. Step 2 Server /kvm # set enabled no Disables the virtual KVM. Note Disabling the virtual KVM disables access to the virtual media feature, but does not detach the virtual media devices if virtual media is enabled. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 56 OL-28893-01 Managing Remote Presence Configuring the Virtual KVM Command or Action Purpose Step 3 Server /kvm # commit Commits the transaction to the system configuration. Step 4 Server /kvm # show [detail] (Optional) Displays the virtual KVM configuration. This example disables the virtual KVM: Server# scope kvm Server /kvm # set enabled no Server /kvm *# commit Server /kvm # show Encryption Enabled Local Video Active Sessions Enabled KVM Port ------------------ ---------------- --------------- ------- -------no yes 0 no 2068 Server /kvm # Configuring the Virtual KVM Before You Begin You must log in as a user with admin privileges to configure the virtual KVM. Procedure Command or Action Purpose Step 1 Server# scope kvm Enters KVM command mode. Step 2 Server /kvm # set enabled {yes | no} Enables or disables the virtual KVM. Step 3 Server /kvm # set encrypted {yes | no} If encryption is enabled, the server encrypts all video information sent through the KVM. Step 4 Server /kvm # set kvm-port port Specifies the port used for KVM communication. Step 5 Server /kvm # set local-video {yes | If local video is yes, the KVM session is also displayed on any monitor attached to the server. no} Step 6 Server /kvm # set max-sessions sessions Specifies the maximum number of concurrent KVM sessions allowed. The sessions argument is an integer between 1 and 4. Step 7 Server /kvm # commit Commits the transaction to the system configuration. Step 8 Server /kvm # show [detail] (Optional) Displays the virtual KVM configuration. This example configures the virtual KVM and displays the configuration: Server# scope kvm Server /kvm # set enabled yes Server /kvm *# set encrypted no Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 57 Managing Remote Presence Configuring Virtual Media Server /kvm *# set kvm-port 2068 Server /kvm *# set max-sessions 4 Server /kvm *# set local-video yes Server /kvm *# commit Server /kvm # show detail KVM Settings: Encryption Enabled: no Max Sessions: 4 Local Video: yes Active Sessions: 0 Enabled: yes KVM Port: 2068 Server /kvm # What to Do Next Launch the virtual KVM from the GUI. Configuring Virtual Media Before You Begin You must log in as a user with admin privileges to configure virtual media. Procedure Command or Action Purpose Step 1 Server# scope vmedia Enters virtual media command mode. Step 2 Server /vmedia # set enabled {yes | Enables or disables virtual media. By default, virtual media is disabled. no} Note Disabling virtual media detaches the virtual CD, virtual floppy, and virtual HDD devices from the host. Step 3 Server /vmedia # set encryption {yes Enables or disables virtual media encryption. | no} Step 4 Server /vmedia # commit Commits the transaction to the system configuration. Step 5 Server /vmedia # show [detail] (Optional) Displays the virtual media configuration. This example configures virtual media encryption: Server# scope vmedia Server /vmedia # set enabled yes Server /vmedia *# set encryption yes Server /vmedia *# commit Server /vmedia # show detail vMedia Settings: Encryption Enabled: yes Enabled: yes Max Sessions: 1 Active Sessions: 0 Server /vmedia # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 58 OL-28893-01 Managing Remote Presence Configuring Network Mounted vMedia Mapping What to Do Next Use the KVM to attach virtual media devices to a host. Configuring Network Mounted vMedia Mapping Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server # scope vmedia Enters the virtual media command mode. Step 2 Server /vmedia # map-cifs {volume-name | remote-share | remote-file-path [mount options] Maps a CIFS file for vMedia. You must specify the following: • Name of the volume to create • Remote share including IP address and the exported directory • Path of the remote file corresponding to the exported directory. • (Optional) Mapping options • Username and password to connect to the server Step 3 Server /vmedia # map-nfs Maps an NFS file for vMedia. You must specify the following: {volume-name | remote-share | remote-file-path} [mount options] • Name of the volume to create • Remote share including IP address and the exported directory • Path of the remote file corresponding to the exported directory. • (Optional) Mapping options Step 4 Server /vmedia # map-www {volume-name | remote-share | remote-file-path [mount options] Maps an HTTPS file for vMedia. You must specify the following: • Name of the volume to create • Remote share including IP address and the exported directory • Path of the remote file corresponding to the exported directory. • (Optional) Mapping options Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 59 Managing Remote Presence Viewing Network Mount vMedia Mapping Properties Command or Action Purpose • Username and password to connect to the server This example shows how to create a CIFS network mounted vMedia mapping: Server # scope vmedia Server /vmedia # map-cifs sample-volume //10.10.10.10/project /test/sample Server username: Server password: **** Confirm password: **** Server /vmedia # Viewing Network Mount vMedia Mapping Properties Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server # scope vmedia Enters the virtual media command mode. Step 2 Server /vmedia # show mappings detail Displays information on all the vmedia mapping that are configured. This example shows how to view the properties of all the configured vmedia mapping: Server # scope vmedia Server /vmedia # show mappings Volume Map-status Drive-type ------ ---------- -----------Huu Rhel OK OK removable CD remote-share remote-file --------------------- ------------------- mount-type ----------- http://10.104.236.99/ rhel-server-6.1-x86_6.iso http://10.104.236.99/ rhel-server-6.1-x86_6.iso www www Removing Network Mounted vMedia Mapping Before You Begin You must log in with admin privileges to perform this task. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 60 OL-28893-01 Managing Remote Presence Managing Serial over LAN Procedure Command or Action Purpose Step 1 Server # scope vmedia Enters the virtual media command mode. Step 2 Server /vmedia # unmap volume_name Specifies the volume name to unmap. This example shows how to unmap a local vmedia volume: Server # scope vmedia Server /vmedia # show mappings Volume Map-status Drive-type ------ ---------- -----------Huu Rhel OK OK remote-share remote-file --------------------- ------------------- removable CD mount-type ----------- http://10.104.236.99/ rhel-server-6.1-x86_6.iso http://10.104.236.99/ rhel-server-6.1-x86_6.iso www www Server /vmedia # unmap huu Server /vmedia # show mappings Volume Map-status Drive-type ------ ---------- -----------Rhel OK remote-share remote-file --------------------- ------------------- CD mount-type ----------- http://10.104.236.99/ rhel-server-6.1-x86_6.iso www Server /vmedia # Managing Serial over LAN Serial Over LAN Serial over LAN (SoL) is a mechanism that enables the input and output of the serial port of a managed system to be redirected via an SSH session over IP. SoL provides a means of reaching the host console via CIMC. Guidelines and Restrictions for Serial Over LAN For redirection to SoL, the server console must have the following configuration: • console redirection to serial port A • no flow control • baud rate the same as configured for SoL • VT-100 terminal type • legacy OS redirection disabled The SoL session will display line-oriented information such as boot messages, and character-oriented screen menus such as BIOS setup menus. If the server boots an operating system or application with a bitmap-oriented Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 61 Managing Remote Presence Configuring Serial Over LAN display, such as Windows, the SoL session will no longer display. If the server boots a command-line-oriented operating system (OS), such as Linux, you may need to perform additional configuration of the OS in order to properly display in an SoL session. In the SoL session, your keystrokes are transmitted to the console except for the function key F2. To send an F2 to the console, press the Escape key, then press 2. Configuring Serial Over LAN Before You Begin You must log in as a user with admin privileges to configure serial over LAN (SoL). Procedure Command or Action Purpose Step 1 Server# scope sol Enters SoL command mode. Step 2 Server /sol # set enabled {yes | no} Enables or disables SoL on this server. Step 3 Server /sol # set baud-rate Sets the serial baud rate the system uses for SoL communication. {9600 | 19200 | 38400 | Note The baud rate must match the baud rate configured in the 57600 | 115200} server serial console. Step 4 Server /sol # set comport {com0 | com1 (Optional) Sets the serial port through which the system routes SoL communications. This field is only available on some C-Series servers. If it is not available, the server always uses COM port 0 for SoL communication. You can specify: Note • com0—SoL communication is routed through COM port 0, an externally accessible serial port that supports either a physical RJ45 connection to an external device or a virtual SoL connection to a network device. If you select this option, the system enables SoL and disables the RJ45 connection, which means that the server can no longer support an external serial device. • com1—SoL communication is routed through COM port 1, an internal port accessible only through SoL. If you select this option, you can use SoL on COM port 1 and the physical RJ45 connection on COM port 0. Note Step 5 Server /sol # commit Changing the comport setting disconnects any existing SoL sessions. Commits the transaction to the system configuration. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 62 OL-28893-01 Managing Remote Presence Launching Serial Over LAN Command or Action Step 6 Purpose Server /sol # show [detail] (Optional) Displays the SoL settings. This example configures SoL: Server# scope sol Server /sol # set enabled yes Server /sol *# set baud-rate 115200 Server /sol *# commit Server /sol # show Enabled Baud Rate(bps) Com Port ------- --------------- -------yes 115200 com2 Server /sol # show detail Serial Over LAN: Enabled: yes Baud Rate(bps): 115200 Com Port: com2 Server /sol # Launching Serial Over LAN Procedure Step 1 Command or Action Purpose Server# connect host Opens a serial over LAN (SoL) connection to the redirected server console port. You can enter this command in any command mode. What to Do Next To end the SoL session, you must close the CLI session. For example, to end an SoL session over an SSH connection, disconnect the SSH connection. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 63 Managing Remote Presence Launching Serial Over LAN Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 64 OL-28893-01 CHAPTER 7 Managing User Accounts This chapter includes the following sections: • Configuring Local Users, page 65 • Configuring Active Directory, page 66 • Viewing User Sessions, page 71 • Terminating a User Session, page 71 Configuring Local Users Before You Begin You must log in as a user with admin privileges to configure or modify local user accounts. Procedure Command or Action Purpose Step 1 Server# scope user usernumber Enters user command mode for user number usernumber. Step 2 Server /user # set enabled {yes Enables or disables the user account on the CIMC. | no} Step 3 Server /user # set name username Specifies the username for the user. Step 4 Server /user # set password You are prompted to enter the password twice. Step 5 Server /user # set role {readonly Specifies the role assigned to the user. The roles are as follows: | user | admin} • readonly—This user can view information but cannot make any changes. • user—This user can do the following: • View all information Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 65 Managing User Accounts Configuring Active Directory Command or Action Purpose • Manage the power control options such as power on, power cycle, and power off • Launch the KVM console and virtual media • Clear all logs • Toggle the locator LED • admin—This user can perform all actions available through the GUI, CLI, and IPMI. Step 6 Server /user # commit Commits the transaction to the system configuration. This example configures user 5 as an admin: Server# scope user 5 Server /user # set enabled yes Server /user *# set name john Server /user *# set password Please enter password: Please confirm password: Server /user *# set role readonly Server /user *# commit Server /user # show User Name Role Enabled ------ ---------------- -------- -------5 john readonly yes Configuring Active Directory Active Directory Active Directory is a technology that provides a variety of network services including LDAP-like directory services, Kerberos-based authentication, and DNS-based naming. The CIMC utilizes the Kerberos-based authentication service of Active Directory. When Active Directory is enabled in the CIMC, user authentication and role authorization is performed by Active Directory for user accounts not found in the local user database. you can require the server to encrypt data sent to Active Directory. Configuring the Active Directory Server The CIMC can be configured to use Active Directory for user authentication and authorization. To use Active Directory, configure users with an attribute that holds the user role and locale information for the CIMC. You can use an existing LDAP attribute that is mapped to the CIMC user roles and locales or you can modify the Active Directory schema to add a new custom attribute, such as the CiscoAVPair attribute, which has an Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 66 OL-28893-01 Managing User Accounts Configuring the Active Directory Server attribute ID of 1.3.6.1.4.1.9.287247.1. For more information about altering the Active Directory schema, see the article at http://technet.microsoft.com/en-us/library/bb727064.aspx. The following steps are to be performed on the Active Directory server. Note This example creates a custom attribute named CiscoAVPair, but you can also use an existing LDAP attribute that is mapped to the CIMC user roles and locales. Procedure Step 1 Step 2 Ensure that the Active Directory schema snap-in is installed. Using the Active Directory schema snap-in, add a new attribute with the following properties: Properties Value Common Name CiscoAVPair LDAP Display Name CiscoAVPair Unique X500 Object ID 1.3.6.1.4.1.9.287247.1 Description CiscoAVPair Syntax Case Sensitive String Step 3 Add the CiscoAVPair attribute to the user class using the Active Directory snap-in: a) Expand the Classes node in the left pane and type U to select the user class. b) Click the Attributes tab and click Add. c) Type C to select the CiscoAVPair attribute. d) Click OK. Step 4 Add the following user role values to the CiscoAVPair attribute, for the users that you want to have access to CIMC: Role CiscoAVPair Attribute Value admin shell:roles="admin" user shell:roles="user" read-only shell:roles="read-only" Note For more information about adding values to attributes, see the article at http://technet.microsoft.com/ en-us/library/bb727064.aspx. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 67 Managing User Accounts Configuring Active Directory in CIMC What to Do Next Use the CIMC to configure Active Directory. Configuring Active Directory in CIMC Configure Active Directory (AD) in CIMC when you want to use an AD server for local user authentication and authorization. Before You Begin You must log in as a user with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope ldap Enters the LDAP command mode for AD configuration. Step 2 Server /ldap # set enabled {yes | no} Enables or disables AD. When AD is enabled, user authentication and role authorization is performed by AD for user accounts not found in the local user database. Step 3 Server /ldap # set dcn dc-host Specifies an Active Directory domain controller (DC) host name or IP address. You can specify up to three DCs using index n values from 1 to 3. Step 4 Server /ldap # set gcn gc-host Specifies an Active Directory global catalog (GC) server host name or IP address. You can specify up to three GCs using index n values from 1 to 3. Step 5 Server /ldap # set timeout seconds Step 6 Server /ldap # set encrypted If encryption is enabled, the server encrypts all information sent to AD. {yes | no} Step 7 Server /ldap # set base-dn domain-name Specifies the domain that all users must be in. Step 8 Server /ldap # set attribute name Specify an LDAP attribute that contains the role and locale information for the user. This property is always a name-value pair. The system queries the user record for the value that matches this attribute name. Specifies the number of seconds the CIMC waits until the LDAP search operation times out. You can use an existing LDAP attribute that is mapped to the CIMC user roles and locales or you can create a custom attribute, such as the CiscoAVPair attribute, which has the following attribute ID: 1.3.6.1.4.1.9.287247.1 Note If you do not specify this property, user access is restricted to read-only. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 68 OL-28893-01 Managing User Accounts Configuring Active Directory Groups in CIMC Command or Action Purpose Step 9 Server /ldap # commit Commits the transaction to the system configuration. Step 10 Server /ldap # show [detail] (Optional) Displays the AD configuration. This example configures AD using the CiscoAVPair attribute: Server# scope ldap Server /ldap # set enabled yes Server /ldap *# set dc1 192.0.20.123 Server /ldap *# set gc1 192.0.20.11 Server /ldap *# set timeout 60 Server /ldap *# set encrypted yes Server /ldap *# set base-dn example.com Server /ldap *# set attribute CiscoAVPair Server /ldap *# commit Server /ldap # show detail LDAP Settings: Domain Controller 1: 192.0.20.123 Domain Controller 2: 0.0.0.0 Domain Controller 3: 0.0.0.0 BaseDN: example.com Encrypted: yes Timeout: 60 Enabled: yes Attribute: CiscoAvPair Group Authorization: no Global Catalog 1: 192.0.20.11 Global Catalog 2: 0.0.0.0 Global Catalog 3: 0.0.0.0 Server /ldap # What to Do Next If you want to use Active Directory groups for group authorization, see Configuring Active Directory Groups in CIMC. Configuring Active Directory Groups in CIMC Note When Active Directory (AD) group authorization is enabled and configured, user authentication is also done on the group level for users that are not found in the local user database or who are not individually authorized to use CIMC in the Active Directory. Before You Begin • You must log in as a user with admin privileges to perform this task. • Active Directory (or LDAP) must be enabled and configured. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 69 Managing User Accounts Configuring Active Directory Groups in CIMC Procedure Command or Action Purpose Step 1 Server# scope ldap Enters the LDAP command mode for AD configuration. Step 2 Server /ldap # set group-auth {yes | no} Enables or disables AD group authorization. Step 3 Server /ldap # scope role-group Selects one of the five available group profiles for configuration, where index is a number between 1 and 5. index Step 4 Server /ldap/role-group # set name Specifies the name of the group in the AD database that is authorized to access the server. group-name Step 5 Server /ldap/role-group # set domain domain-name Step 6 Server /ldap/role-group # set role Specifies the permission level (role) assigned to all users in this AD group. This can be one of the following: {admin | user | readonly} Specifies the AD domain the group must reside in. • admin—The user can perform all actions available. • user—The user can perform the following tasks: ◦View all information ◦Manage the power control options such as power on, power cycle, and power off ◦Launch the KVM console and virtual media ◦Clear all logs ◦Toggle the locator LED • readonly—The user can view information but cannot make any changes. Step 7 Server /ldap/role-group # commit Commits the transaction to the system configuration. This example shows how to configure AD group authorization: Server# scope ldap Server /ldap # set group-auth yes Server /ldap *# scope role-group 5 Server /ldap/role-group *# set name Training Server /ldap/role-group *# set domain example.com Server /ldap/role-group *# set role readonly Server /ldap/role-group *# commit ucs-c250-M2 /ldap # show role-group Group Name Domain Role ------ ---------------- ---------------- -------1 (n/a) (n/a) admin 2 (n/a) (n/a) user 3 (n/a) (n/a) readonly 4 (n/a) (n/a) (n/a) 5 Training example.com readonly Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 70 OL-28893-01 Managing User Accounts Viewing User Sessions Server /ldap/role-group # Viewing User Sessions Procedure Step 1 Command or Action Purpose Server# show user-session Displays information about current user sessions. The command output displays the following information about current user sessions: Name Description Session ID column The unique identifier for the session. Username column The username for the user. IP Address column The IP address from which the user accessed the server. Type column The method by which the user accessed the server. Action column If your user account is assigned the admin user role, this column displays Terminate if you can force the associated user session to end. Otherwise it displays N/A. Note You cannot terminate your current session from this tab. This example displays information about current user sessions: Server# show user-session ID Name IP Address Type Killable ------ ---------------- ----------------- ------------ -------15 admin 10.20.30.138 CLI yes Server /user # Terminating a User Session Before You Begin You must log in as a user with admin privileges to terminate a user session. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 71 Managing User Accounts Terminating a User Session Procedure Command or Action Purpose Step 1 Server# show user-session Displays information about current user sessions. The user session to be terminated must be eligible to be terminated (killable) and must not be your own session. Step 2 Server /user-session # scope user-session session-number Enters user session command mode for the numbered user session that you want to terminate. Step 3 Server /user-session # terminate Terminates the user session. This example shows how the admin at user session 10 terminates user session 15: Server# show user-session ID Name IP Address ------ ---------------- ----------------10 admin 10.20.41.234 15 admin 10.20.30.138 Server# scope user-session 15 Server /user-session # terminate User session 15 terminated. Type -----------CLI CLI Killable -------yes yes Server /user-session # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 72 OL-28893-01 CHAPTER 8 Configuring Network-Related Settings This chapter includes the following sections: • Server NIC Configuration, page 73 • Configuring Common Properties, page 75 • Configuring IPv4, page 76 • Configuring the Server VLAN, page 77 • Connecting to a Port Profile, page 78 • Network Security Configuration, page 80 • Network Time Protocol Configuration, page 81 Server NIC Configuration Server NICs NIC Mode The NIC mode setting determines which ports can reach the CIMC. The following network mode options are available, depending on your platform: • Dedicated—The management port is used to access the CIMC. • Shared LOM—Any LOM (LAN On Motherboard) port can be used to access the CIMC. • Shared LOM 10G—Any 10G LOM port can be used to access the CIMC. This option is only available for some adapter cards. • Cisco Card—Any port on the adapter card can be used to access the CIMC. The Cisco adapter card has to be installed in a slot with Network Communications Services Interface protocol (NCSI) support. • Shared LOM Extended—Any LOM port or adapter card port can be used to access the CIMC. The Cisco adapter card has to be installed in a slot with NCSI support. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 73 Configuring Network-Related Settings Configuring Server NICs NIC Redundancy The following NIC redundancy options are available, depending on the selected NIC mode and your platform: • none—Each port associated with the configured NIC mode operates independently. The ports do not fail over if there is a problem. • active-active—If supported, all ports associated with the configured NIC mode operate simultaneously. This increases throughput and provides multiple paths to the CIMC. • active-standby—If a port associated with the configured NIC mode fails, traffic will fail over to one of the other ports associated with the NIC mode. Note If you select this option, make sure all ports associated with the configured NIC mode are connected to the same subnet to ensure that traffic is secure regardless of which port is used. The available redundancy modes vary depending on the selected network mode and your platform. For the available modes, see the Hardware Installation Guide (HIG) for the type of server you are using. The C-Series HIGs are available at the following URL: http://www.cisco.com/en/US/products/ps10493/prod_installation_ guides_list.html Configuring Server NICs Configure a server NIC when you want to set the NIC mode and NIC redundancy. Before You Begin You must log in as a user with admin privileges to configure the NIC. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope network Enters the CIMC network command mode. Step 3 Server /cimc/network # set Sets the NIC mode to one of the following: mode {dedicated | • Dedicated—The management Ethernet port is used to access shared_lom | the CIMC. shared_lom_10g | shipping | cisco_card} • Shared LOM—The LAN On Motherboard (LOM) Ethernet host ports are used to access the CIMC. Note If you select Shared LOM, make sure that all host ports belong to the same subnet. • Shared LOM 10G—The 10G LOM Ethernet host ports are used to access the CIMC. • Shipping—A limited configuration for initial connection. Select another mode for normal operation. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 74 OL-28893-01 Configuring Network-Related Settings Configuring Common Properties Command or Action Purpose • Cisco card—The ports on the adapter card are used to access the CIMC. Step 4 Server /cimc/network # set redundancy {none | active-active | active-standby} Sets the NIC redundancy mode when the NIC mode is Shared LOM. The redundancy mode can be one of the following: • none—The LOM Ethernet ports operate independently and do not fail over if there is a problem. • active-active—If supported, all LOM Ethernet ports are utilized. • active-standby—If one LOM Ethernet port fails, traffic fails over to another LOM port. Step 5 Server /cimc/network # commit Commits the transaction to the system configuration. Note The available NIC mode and NIC redundancy mode options may vary depending on your platform. If you select a mode not supported by your server, an error message displays when you save your changes. This example configures the CIMC network interface: Server# scope cimc Server /cimc # scope Server /cimc/network Server /cimc/network Server /cimc/network network # set mode dedicated *# commit # Configuring Common Properties Use common properties to describe your server. Before You Begin You must log in as a user with admin privileges to configure common properties. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope network Enters the CIMC network command mode. Step 3 Server /cimc/network # set hostname host-name Specifies the name of the host. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 75 Configuring Network-Related Settings Configuring IPv4 Step 4 Command or Action Purpose Server /cimc/network # commit Commits the transaction to the system configuration. This example configures the common properties: Server# scope cimc Server /cimc # scope Server /cimc/network Server /cimc/network Server /cimc/network network # set hostname Server *# commit # Configuring IPv4 Before You Begin You must log in as a user with admin privileges to configure IPv4 network settings. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope network Enters the CIMC network command mode. Step 3 Server /cimc/network # set dhcp-enabled Selects whether the CIMC uses DHCP. Note If DHCP is enabled, we recommend that {yes | no} the DHCP server be configured to reserve a single IP address for the CIMC. If the CIMC is reachable through multiple ports on the server, the single IP address must be reserved for the full range of MAC addresses of those ports. Step 4 Server /cimc/network # set v4-addr ipv4-address Step 5 Server /cimc/network # set v4-netmask Specifies the subnet mask for the IP address. ipv4-netmask Step 6 Server /cimc/network # set v4-gateway Specifies the gateway for the IP address. gateway-ipv4-address Step 7 Server /cimc/network # set dns-use-dhcp Selects whether the CIMC retrieves the DNS server addresses from DHCP. {yes | no} Step 8 Server /cimc/network # set Specifies the IP address of the primary DNS server. preferred-dns-server dns1-ipv4-address Specifies the IP address for the CIMC. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 76 OL-28893-01 Configuring Network-Related Settings Configuring the Server VLAN Command or Action Purpose Step 9 Server /cimc/network # set Specifies the IP address of the secondary DNS alternate-dns-server dns2-ipv4-address server. Step 10 Server /cimc/network # commit Commits the transaction to the system configuration. Step 11 Server /cimc/network # show [detail] (Optional) Displays the IPv4 network settings. This example configures and displays the IPv4 network settings: Server# scope cimc Server /cimc # scope network Server /cimc/network # set dhcp-enabled yes Server /cimc/network *# set v4-addr 10.20.30.11 Server /cimc/network *# set v4-netmask 255.255.248.0 Server /cimc/network *# set v4-gateway 10.20.30.1 Server /cimc/network *# set dns-use-dhcp-enabled no Server /cimc/network *# set preferred-dns-server 192.168.30.31 Server /cimc/network *# set alternate-dns-server 192.168.30.32 Server /cimc/network *# commit Server /cimc/network # show detail Network Setting: IPv4 Address: 10.20.30.11 IPv4 Netmask: 255.255.248.0 IPv4 Gateway: 10.20.30.1 DHCP Enabled: yes Obtain DNS Server by DHCP: no Preferred DNS: 192.168.30.31 Alternate DNS: 192.168.30.32 VLAN Enabled: no VLAN ID: 1 VLAN Priority: 0 Hostname: Server MAC Address: 01:23:45:67:89:AB NIC Mode: dedicated NIC Redundancy: none Server /cimc/network # Configuring the Server VLAN Before You Begin You must be logged in as admin to configure the server VLAN. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope network Enters the CIMC network command mode. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 77 Configuring Network-Related Settings Connecting to a Port Profile Command or Action Purpose Step 3 Server /cimc/network # set vlan-enabled Selects whether the CIMC is connected to a VLAN. {yes | no} Step 4 Server /cimc/network # set vlan-id id Step 5 Server /cimc/network # set vlan-priority Specifies the priority of this system on the VLAN. priority Step 6 Server /cimc/network # commit Commits the transaction to the system configuration. Step 7 Server /cimc/network # show [detail] (Optional) Displays the network settings. Specifies the VLAN number. This example configures the server VLAN: Server# scope cimc Server /cimc # scope network Server /cimc/network # set vlan-enabled yes Server /cimc/network *# set vlan-id 10 Server /cimc/network *# set vlan-priority 32 Server /cimc/network *# commit Server /cimc/network # show detail Network Setting: IPv4 Address: 10.20.30.11 IPv4 Netmask: 255.255.248.0 IPv4 Gateway: 10.20.30.1 DHCP Enabled: yes Obtain DNS Server by DHCP: no Preferred DNS: 192.168.30.31 Alternate DNS: 192.168.30.32 VLAN Enabled: yes VLAN ID: 10 VLAN Priority: 32 Hostname: Server MAC Address: 01:23:45:67:89:AB NIC Mode: dedicated NIC Redundancy: none Server /cimc/network # Connecting to a Port Profile Note You can configure a port profile or a VLAN, but you cannot use both. If you want to use a port profile, make sure the set vlan-enabled command is set to no. Before You Begin You must be logged in as admin to connect to a port profile. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 78 OL-28893-01 Configuring Network-Related Settings Connecting to a Port Profile Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope network Enters the CIMC network command mode. Step 3 Server /cimc/network # set Specifies the port profile CIMC should use to configure the port-profile port_profile_name management interface, the virtual Ethernet, and the VIF on supported adapter cards such as the Cisco UCS VIC1225 Virtual Interface Card. Enter up to 80 alphanumeric characters. You cannot use spaces or other special characters except for - (hyphen) and _ (underscore). In addition, the port profile name cannot begin with a hyphen. Note The port profile must be defined on the switch to which this server is connected. Step 4 Server /cimc/network # commit Commits the transaction to the system configuration. Step 5 Server /cimc/network # show [detail] (Optional) Displays the network settings. This example connects to port profile abcde12345: Server# scope cimc Server /cimc # scope network Server /cimc/network # set port-profile abcde12345 Server /cimc/network *# commit Server /cimc/network # show detail Network Setting: IPv4 Address: 10.193.66.174 IPv4 Netmask: 255.255.248.0 IPv4 Gateway: 10.193.64.1 DHCP Enabled: no Obtain DNS Server by DHCP: no Preferred DNS: 0.0.0.0 Alternate DNS: 0.0.0.0 VLAN Enabled: no VLAN ID: 1 VLAN Priority: 0 Port Profile: abcde12345 Hostname: Server MAC Address: 50:3D:E5:9D:63:3C NIC Mode: dedicated NIC Redundancy: none Server /cimc/network # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 79 Configuring Network-Related Settings Network Security Configuration Network Security Configuration Network Security The CIMC uses IP blocking as network security. IP blocking prevents the connection between a server or website and certain IP addresses or ranges of addresses. IP blocking effectively bans undesired connections from those computers to a website, mail server, or other Internet servers. IP banning is commonly used to protect against denial of service (DoS) attacks. CIMC bans IP addresses by setting up an IP blocking fail count. Configuring Network Security Configure network security if you want to set up an IP blocking fail count. Before You Begin You must log in as a user with admin privileges to configure network security. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope network Enters the CIMC network command mode. Step 3 Server /cimc/network # scope ipblocking Enters the IP blocking command mode. Step 4 Server /cimc/network/ipblocking # set enabled {yes | no} Enables or disables IP blocking. Step 5 Server /cimc/network/ipblocking # set fail-count fail-count Sets the number of times a user can attempt to log in unsuccessfully before the system locks that user out for a specified length of time. The number of unsuccessful login attempts must occur within the time frame specified in the IP Blocking Fail Window field. Enter an integer between 3 and 10. Step 6 Server /cimc/network/ipblocking # set fail-window fail-seconds Sets the length of time, in seconds, in which the unsuccessful login attempts must occur in order for the user to be locked out. Enter an integer between 60 and 120. Step 7 Server /cimc/network/ipblocking # set penalty-time penalty-seconds Sets the number of seconds the user remains locked out if they exceed the maximum number of login attempts within the specified time window. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 80 OL-28893-01 Configuring Network-Related Settings Network Time Protocol Configuration Command or Action Purpose Enter an integer between 300 and 900. Step 8 Server /cimc/network/ipblocking # commit Commits the transaction to the system configuration. This example configures IP blocking: Server# scope cimc Server /cimc # scope network Server /cimc/network # scope ipblocking Server /cimc/network/ipblocking # set enabled yes Server /cimc/network/ipblocking *# set fail-count 5 Server /cimc/network/ipblocking *# set fail-window 90 Server /cimc/network/ipblocking *# set penalty-time 600 Server /cimc/network/ipblocking *# commit Server /cimc/network/ipblocking # Network Time Protocol Configuration Configuring Network Time Protocol Settings By default, when CIMC is reset, it synchronizes the time with the host. With the introduction of the NTP service, you can configure CIMC to synchronize the time with an NTP server. The NTP server does not run in CIMC by default. You must enable and configure the NTP service by specifying the IP/DNS address of at least one server or a maximum of four servers that function as NTP servers or time source servers. When you enable the NTP service, CIMC synchronizes the time with the configured NTP server. The NTP service can be modified only through CIMC. Note To enable the NTP service, it is preferable to specify the IP address of a server rather than the DNS address. Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server # scope cimc Enters CIMC command mode. Step 2 Server /cimc # scope network Enters network command mode. Step 3 Server /cimc/network # scope ntp Enters NTP service command mode. Step 4 Server /cimc/network/ntp # set enabled Enables the NTP service on the server. yes Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 81 Configuring Network-Related Settings Configuring Network Time Protocol Settings Command or Action Purpose Step 5 Server /cimc/network/ntp* # commit Commits the transaction. Step 6 Server /cimc/network/ntp # set server-1 Specifies the IP/DNS address of one of the four servers that act as an NTP server or the time source 10.120.33.44 server. Step 7 Server /cimc/network/ntp # set server-2 Specifies the IP/DNS address of one of the four servers that act as an NTP server or the time source 10.120.34.45 server. Step 8 Server /cimc/network/ntp # set server-3 Specifies the IP/DNS address of one of the four servers that act as an NTP server or the time source 10.120.35.46 server. Step 9 Server /cimc/network/ntp # set server-4 Specifies the IP/DNS address of one of the four servers that act as an NTP server or the time source 10.120.36.48 server. Step 10 Server /cimc/network/ntp # commit Commits the transaction. This example shows how to configure the NTP service: Server # scope cimc Server /cimc # scope network Server /cimc/network # scope ntp Server /cimc/network/ntp # set enabled yes Warning: IPMI Set SEL Time Command will be disabled if NTP is enabled. Do you wish to continue? [y|N] y Server /cimc/network/ntp* # commit Server /cimc/network/ntp # set server-1 10.120.33.44 Server /cimc/network/ntp* # set server-2 10.120.34.45 Server /cimc/network/ntp* # set server-3 10.120.35.46 Server /cimc/network/ntp* # set server-4 10.120.36.48 Server /cimc/network/ntp* # commit Server /cimc/network/ntp # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 82 OL-28893-01 CHAPTER 9 Managing Network Adapters This chapter includes the following sections: • Overview of the Cisco UCS C-Series Network Adapters, page 83 • Viewing Network Adapter Properties, page 85 • Configuring Network Adapter Properties, page 85 • Managing vHBAs, page 86 • Managing vNICs, page 99 • Managing VM FEX, page 109 • Managing Storage Adapters, page 115 • Backing Up and Restoring the Adapter Configuration, page 127 • Managing Adapter Firmware, page 130 • Resetting the Adapter, page 131 Overview of the Cisco UCS C-Series Network Adapters Note The procedures in this chapter are available only when a Cisco UCS C-Series network adapter is installed in the chassis. A Cisco UCS C-Series network adapter can be installed to provide options for I/O consolidation and virtualization support. The following adapters are available: • Cisco UCS P81E Virtual Interface Card • Cisco UCS VIC1225 Virtual Interface Card The interactive UCS Hardware and Software Interoperability Utility lets you view the supported components and configurations for a selected server model and software release. The utility is available at the following URL: http://www.cisco.com/web/techdoc/ucs/interoperability/matrix/matrix.html Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 83 Managing Network Adapters Overview of the Cisco UCS C-Series Network Adapters Cisco UCS P81E Virtual Interface Card The Cisco UCS P81E Virtual Interface Card is optimized for virtualized environments, for organizations that seek increased mobility in their physical environments, and for data centers that want reduced costs through NIC, HBA, cabling, and switch reduction and reduced management overhead. This Fibre Channel over Ethernet (FCoE) PCIe card offers the following benefits: • Allows up to 16 virtual Fibre Channel and 16 virtual Ethernet adapters to be provisioned in virtualized or nonvirtualized environments using just-in-time provisioning, providing tremendous system flexibility and allowing consolidation of multiple physical adapters. • Delivers uncompromising virtualization support, including hardware-based implementation of Cisco VN-Link technology and pass-through switching. • Improves system security and manageability by providing visibility and portability of network polices and security all the way to the virtual machine. The virtual interface card makes Cisco VN-Link connections to the parent fabric interconnects, which allows virtual links to connect virtual NICs in virtual machines to virtual interfaces in the interconnect. In a Cisco Unified Computing System environment, virtual links then can be managed, network profiles applied, and interfaces dynamically reprovisioned as virtual machines move between servers in the system. Cisco UCS VIC1225 Virtual Interface Card The Cisco UCS VIC1225 Virtual Interface Card is a high-performance, converged network adapter that provides acceleration for the various new operational modes introduced by server virtualization. It brings superior flexibility, performance, and bandwidth to the new generation of Cisco UCS C-Series Rack-Mount Servers. The Cisco UCS VIC 1225 implements the Cisco Virtual Machine Fabric Extender (VM-FEX), which unifies virtual and physical networking into a single infrastructure. It provides virtual-machine visibility from the physical network and a consistent network operations model for physical and virtual servers. In virtualized environments, this highly configurable and self-virtualized adapter provides integrated, modular LAN interfaces on Cisco UCS C-Series Rack-Mount Servers. Additional features and capabilities include: • Supports up to 256 PCIe virtual devices, either virtual network interface cards (vNICs) or virtual host bus adapters (vHBAs), with high I/O operations per second (IOPS), support for lossless Ethernet, and 20 Gbps to servers. • PCIe Gen2 x16 helps assure optimal bandwidth to the host for network-intensive applications with a redundant path to the fabric interconnect. • Half-height design reserves full-height slots in servers for Cisco certified third-party adapters. • Centrally managed by Cisco UCS Manager with support for Microsoft Windows, Red Hat Enterprise Linux, SUSE Linux, VMware vSphere, and Citrix XenServer. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 84 OL-28893-01 Managing Network Adapters Viewing Network Adapter Properties Viewing Network Adapter Properties Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # show adapter [index] [detail] Displays adapter properties. To display the properties of a single adapter, specify the PCI slot number as the index argument. This example displays the properties of adapter 2: Server# scope chassis Server /chassis # show adapter PCI Slot Product Name Serial Number Product ID Vendor -------- -------------- -------------- -------------- -------------------1 UCS VIC 1225 FCH1613796C UCSC-PCIE-C... Cisco Systems Inc Server /chassis # show adapter 2 detail PCI Slot 2: Product Name: UCS VIC 1225 Serial Number: FCH1613796C Product ID: UCSC-PCIE-CSC-02 Adapter Hardware Revision: 4 Current FW Version: 2.1(0.291) NIV: Disabled FIP: Enabled Configuration Pending: no CIMC Management Enabled : no VID: V00 Vendor: Cisco Systems Inc Description: Bootloader Version: 2.1(0.291) FW Image 1 Version: 2.1(0.291) FW Image 1 State: RUNNING ACTIVATED FW Image 2 Version: 1.6(0.547) FW Image 2 State: BACKUP INACTIVATED FW Update Status: Idle FW Update Error: No error FW Update Stage: No operation (0%) FW Update Overall Progress: 0% Server /chassis # Configuring Network Adapter Properties Before You Begin • You must log in with admin privileges to perform this task. • A supported Virtual Interface Card (VIC) must be installed in the chassis and the server must be powered on. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 85 Managing Network Adapters Managing vHBAs Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # show adapter (Optional) Displays the available adapter devices. Step 3 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note Step 4 Server /chassis/adapter # set fip-mode {disable | enable} Enables or disables FCoE Initialization Protocol (FIP) on the adapter card. FIP is enabled by default. Note Step 5 Server /chassis/adapter # set niv-mode {disable | enable} The server must be powered on before you can view or change adapter settings. We recommend that you disable this option only when explicitly directed to do so by a technical support representative. Enables or disables Network Interface Virtualization (NIV) on the adapter card. NIV is disabled by default. If NIV mode is enabled, vNICs: • Can be assigned to a specific channel • Can be associated with a port profile • Can fail over to another vNIC if there are communication problems Step 6 Server /chassis/adapter # configure-vmfex port-count Step 7 Server /chassis/adapter # commit Commits the transaction to the system configuration. If NIV mode is enabled, port-count specifies the number of VM FEX interfaces you want CIMC to create, from 0 to 112. This example configures the properties of adapter 1: Server# scope chassis Server /chassis # scope Server /chassis/adapter Server /chassis/adapter Server /chassis/adapter adapter 1 # set fip-mode enable *# commit # Managing vHBAs Guidelines for Managing vHBAs When managing vHBAs, consider the following guidelines and restrictions: • The Cisco UCS P81E Virtual Interface Card and Cisco UCS VIC1225 Virtual Interface Card provide two vHBAs (fc0 and fc1). You can create up to 16 additional vHBAs on these adapter cards. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 86 OL-28893-01 Managing Network Adapters Viewing vHBA Properties Note If Network Interface Virtualization (NIV) mode is enabled for the adapter, you must assign a channel number to a vHBA when you create it. • When using the Cisco UCS P81E Virtual Interface Card or Cisco UCS VIC1225 Virtual Interface Card in an FCoE application, you must associate the vHBA with the FCoE VLAN. Follow the instructions in to assign the VLAN. • After making configuration changes, you must reboot the host for settings to take effect. Viewing vHBA Properties Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note Step 3 Server /chassis/adapter # show host-fc-if [fc0 | fc1 | name] [detail] The server must be powered on before you can view or change adapter settings. Displays properties of a single vHBA, if specified, or all vHBAs. This example displays all vHBAs on adapter card 1 and the detailed properties of fc0: Server# scope chassis Server /chassis # scope adapter 1 Server /chassis/adapter # show host-fc-if Name World Wide Port Name FC SAN Boot -------- ------------------------ ----------fc0 20:00:00:22:BD:D6:5C:35 Disabled fc1 20:00:00:22:BD:D6:5C:36 Disabled Uplink Port ----------0 1 Server /chassis/adapter # show host-fc-if fc0 detail Name fc0: World Wide Node Name: 10:00:00:22:BD:D6:5C:35 World Wide Port Name: 20:00:00:22:BD:D6:5C:35 FC SAN Boot: Disabled Persistent LUN Binding: Disabled Uplink Port: 0 MAC Address: 00:22:BD:D6:5C:35 CoS: 3 VLAN: NONE Rate Limiting: OFF PCIe Device Order: ANY EDTOV: 2000 RATOV: 10000 Maximum Data Field Size: 2112 Channel Number: 3 Port Profile: Server /chassis/adapter # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 87 Managing Network Adapters Modifying vHBA Properties Modifying vHBA Properties Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # show adapter (Optional) Displays the available adapter devices. Step 3 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note The server must be powered on before you can view or change adapter settings. Step 4 Server /chassis/adapter # scope host-fc-if Enters the host Fibre Channel interface command mode for the specified vHBA. {fc0 | fc1 | name} Step 5 Server /chassis/adapter/host-fc-if # set wwnn wwnn Specifies a unique World Wide Node Name (WWNN) for the adapter in the form hh:hh:hh:hh:hh:hh:hh:hh. Unless specified by this command, the WWNN is generated automatically by the system. Step 6 Server /chassis/adapter/host-fc-if # set wwpn wwpn Specifies a unique World Wide Port Name (WWPN) for the adapter in the form hh:hh:hh:hh:hh:hh:hh:hh. Unless specified by this command, the WWPN is generated automatically by the system. Step 7 Server /chassis/adapter/host-fc-if # set boot {disable | enable} Enables or disables FC SAN boot. The default is disable. Step 8 Server /chassis/adapter/host-fc-if # set persistent-lun-binding {disable | enable} Enables or disables persistent LUN binding. The default is disable. Step 9 Server /chassis/adapter/host-fc-if # set mac-addr mac-addr Specifies a MAC address for the vHBA. Step 10 Server /chassis/adapter/host-fc-if # set vlan {none | vlan-id} Specifies the default VLAN for this vHBA. Valid VLAN numbers are 1 to 4094; the default is none. Step 11 Server /chassis/adapter/host-fc-if # set cos cos-value Specifies the class of service (CoS) value to be marked on received packets unless the vHBA is configured to trust host CoS. Valid CoS values are 0 to 6; the default is 0. Higher values indicate more important traffic. This setting is not functional in NIV mode. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 88 OL-28893-01 Managing Network Adapters Modifying vHBA Properties Step 12 Command or Action Purpose Server /chassis/adapter/host-fc-if # set rate-limit {off | rate} Specifies a maximum data rate for the vHBA. The range is 1 to 10000 Mbps; the default is off. This setting is not functional in NIV mode. Step 13 Server /chassis/adapter/host-fc-if # set order {any | 0-99} Specifies the relative order of this device for PCIe bus device number assignment; the default is any. Step 14 Server /chassis/adapter/host-fc-if # set error-detect-timeout msec Specifies the error detect timeout value (EDTOV), the number of milliseconds to wait before the system assumes that an error has occurred. The range is 1000 to 100000; the default is 2000 milliseconds. Step 15 Server /chassis/adapter/host-fc-if # set resource-allocation-timeout msec Specifies the resource allocation timeout value (RATOV), the number of milliseconds to wait before the system assumes that a resource cannot be properly allocated. The range is 5000 to 100000; the default is 10000 milliseconds. Step 16 Server /chassis/adapter/host-fc-if # set max-field-size size Specifies the maximum size of the Fibre Channel frame payload (in bytes) that the vHBA supports. The range is 1 to 2112; the default is 2112 bytes. Step 17 Server /chassis/adapter/host-fc-if # scope Enters the Fibre Channel error recovery command mode. error-recovery Step 18 Server Enables or disables FCP Error Recovery. The default /chassis/adapter/host-fc-if/error-recovery is disable. # set fcp-error-recovery {disable | enable} Step 19 Server Specifies the link down timeout value, the number of /chassis/adapter/host-fc-if/error-recovery milliseconds the uplink port should be offline before it informs the system that the uplink port is down and # set link-down-timeout msec fabric connectivity has been lost. The range is 0 to 240000; the default is 30000 milliseconds. Step 20 Server Specifies the port down I/O retries value, the number /chassis/adapter/host-fc-if/error-recovery of times an I/O request to a port is returned because # set port-down-io-retry-count count the port is busy before the system decides the port is unavailable. The range is 0 to 255; the default is 8 retries. Step 21 Server Specifies the port down timeout value, the number of /chassis/adapter/host-fc-if/error-recovery milliseconds a remote Fibre Channel port should be offline before informing the SCSI upper layer that the # set port-down-timeout msec port is unavailable. The range is 0 to 240000; the default is 10000 milliseconds. Step 22 Server Exits to the host Fibre Channel interface command /chassis/adapter/host-fc-if/error-recovery mode. # exit Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 89 Managing Network Adapters Modifying vHBA Properties Command or Action Purpose Step 23 Server /chassis/adapter/host-fc-if # scope Enters the interrupt command mode. interrupt Step 24 Server Specifies the Fibre Channel interrupt mode. The /chassis/adapter/host-fc-if/interrupt # set modes are as follows: interrupt-mode {intx | msi | msix} • intx —Line-based interrupt (INTx) • msi —Message-Signaled Interrupt (MSI) • msix —Message Signaled Interrupts with the optional extension (MSIx). This is the recommended and default option. Step 25 Server Exits to the host Fibre Channel interface command /chassis/adapter/host-fc-if/interrupt # exit mode. Step 26 Server /chassis/adapter/host-fc-if # scope Enters the Fibre Channel port command mode. port Step 27 Server /chassis/adapter/host-fc-if/port # Specifies the I/O throttle count, the number of I/O operations that can be pending in the vHBA at one set outstanding-io-count count time. The range is 1 to 1024; the default is 512 operations. Step 28 Server /chassis/adapter/host-fc-if/port # Specifies the maximum logical unit numbers (LUNs) per target, the maximum number of LUNs that the set max-target-luns count driver will discover. This is usually an operating system platform limitation. The range is 1 to 1024; the default is 256 LUNs. Step 29 Server /chassis/adapter/host-fc-if/port # Exits to the host Fibre Channel interface command exit mode. Step 30 Server /chassis/adapter/host-fc-if # scope Enters the Fibre Channel fabric login command mode. port-f-logi Step 31 Server Specifies the fabric login (FLOGI) retries value, the /chassis/adapter/host-fc-if/port-f-logi # number of times that the system tries to log in to the fabric after the first failure. Enter a number between set flogi-retries {infinite | count} 0 and 4294967295 or enter infinite ; the default is infinite retries. Step 32 Server Specifies the fabric login (FLOGI) timeout value, the /chassis/adapter/host-fc-if/port-f-logi # number of milliseconds that the system waits before it tries to log in again. The range is 1 to 255000; the set flogi-timeout msec default is 2000 milliseconds. Step 33 Server Exits to the host Fibre Channel interface command /chassis/adapter/host-fc-if/port-f-logi # mode. exit Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 90 OL-28893-01 Managing Network Adapters Modifying vHBA Properties Command or Action Purpose Step 34 Server /chassis/adapter/host-fc-if # scope Enters the Fibre Channel port login command mode. port-p-logi Step 35 Server Specifies the port login (PLOGI) retries value, the /chassis/adapter/host-fc-if/port-p-logi # number of times that the system tries to log in to the fabric after the first failure. The range is 0 and 255; set plogi-retries count the default is 8 retries. Step 36 Server Specifies the port login (PLOGI) timeout value, the /chassis/adapter/host-fc-if/port-p-logi # number of milliseconds that the system waits before it tries to log in again. The range is 1 to 255000; the set plogi-timeout msec default is 2000 milliseconds. Step 37 Server Exits to the host Fibre Channel interface command /chassis/adapter/host-fc-if/port-p-logi # mode. exit Step 38 Server /chassis/adapter/host-fc-if # scope Enters the SCSI I/O command mode. scsi-io Step 39 Server /chassis/adapter/host-fc-if/scsi-io The number of command descriptor block (CDB) transmit queue resources to allocate. The range is 1 # set cdb-wq-count count to 8; the default is 1. Step 40 Server /chassis/adapter/host-fc-if/scsi-io The number of descriptors in the command descriptor block (CDB) transmit queue. The range is 64 to 512; # set cdb-wq-ring-size size the default is 512. Step 41 Server /chassis/adapter/host-fc-if/scsi-io Exits to the host Fibre Channel interface command # exit mode. Step 42 Server /chassis/adapter/host-fc-if # scope Enters the Fibre Channel transmit queue command mode. trans-queue Step 43 Server The number of descriptors in the Fibre Channel /chassis/adapter/host-fc-if/trans-queue # transmit queue. The range is 64 to 128; the default is 64. set fc-wq-ring-size size Step 44 Server Exits to the host Fibre Channel interface command /chassis/adapter/host-fc-if/trans-queue # mode. exit Step 45 Server /chassis/adapter/host-fc-if # scope Enters the Fibre Channel receive queue command mode. recv-queue Step 46 Server The number of descriptors in the Fibre Channel /chassis/adapter/host-fc-if/recv-queue # receive queue. The range is 64 to 128; the default is 64. set fc-rq-ring-size size Step 47 Server Exits to the host Fibre Channel interface command /chassis/adapter/host-fc-if/recv-queue # mode. exit Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 91 Managing Network Adapters Creating a vHBA Step 48 Command or Action Purpose Server /chassis/adapter/host-fc-if # commit Commits the transaction to the system configuration. Note The changes will take effect upon the next server reboot. This example configures the properties of a vHBA: Server# scope chassis Server /chassis # show adapter PCI Slot Product Name Serial Number Product ID Vendor -------- -------------- -------------- -------------- -------------------1 UCS VIC P81E QCI1417A0QK N2XX-ACPCI01 Cisco Systems Inc Server Server Server Server Server Server Server Server /chassis # scope adapter 1 /chassis/adapter # scope host-fc-if fc1 /chassis/adapter/host-fc-if # set boot enable /chassis/adapter/host-fc-if *# scope scsi-io /chassis/adapter/host-fc-if/scsi-io *# set cdb-wq-count 2 /chassis/adapter/host-fc-if/scsi-io *# exit /chassis/adapter/host-fc-if *# commit /chassis/adapter/host-fc-if # What to Do Next Reboot the server to apply the changes. Creating a vHBA The adapter provides two permanent vHBAs. If NIV mode is enabled, you can create up to 16 additional vHBAs. Before You Begin You must log in with user or admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note Step 3 Server /chassis/adapter # create host-fc-if name The server must be powered on before you can view or change adapter settings. Creates a vHBA and enters the host Fibre Channel interface command mode. The name argument can be up to 32 ASCII characters. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 92 OL-28893-01 Managing Network Adapters Deleting a vHBA Command or Action Purpose Step 4 Server /chassis/adapter/host-fc-if # (Optional) If NIV mode is enabled for the adapter, you must assign set channel-number number a channel number to this vHBA. The range is 1 to 1000. Step 5 Server /chassis/adapter/host-fc-if # Commits the transaction to the system configuration. commit Note The changes will take effect upon the next server reboot. This example creates a vHBA on adapter 1: Server# scope chassis Server /chassis # scope adapter 1 Server /chassis/adapter # create host-fc-if Vhba5 Server /chassis/adapter/host-fc-if *# commit New host-fc-if settings will take effect upon the next server reset Server /chassis/adapter/host-fc-if # What to Do Next • Reboot the server to create the vHBA. • If configuration changes are required, configure the new vHBA as described in Modifying vHBA Properties, on page 88. Deleting a vHBA Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note Step 3 Step 4 Server /chassis/adapter # delete host-fc-if name The server must be powered on before you can view or change adapter settings. Deletes the specified vHBA. You cannot delete either of the two default vHBAs, fc0 or fc1. Server /chassis/adapter # commit Commits the transaction to the system configuration. Note Note The changes will take effect upon the next server reboot. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 93 Managing Network Adapters vHBA Boot Table This example deletes a vHBA on adapter 1: Server# scope chassis Server /chassis # scope Server /chassis/adapter Server /chassis/adapter Server /chassis/adapter adapter 1 # delete host-fc-if Vhba5 *# commit # vHBA Boot Table In the vHBA boot table, you can specify up to four LUNs from which the server can boot. Viewing the Boot Table Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note The server must be powered on before you can view or change adapter settings. Step 3 Server /chassis/adapter # scope host-fc-if {fc0 | fc1 | name} Enters the host Fibre Channel interface command mode for the specified vHBA. Step 4 Server /chassis/adapter/host-fc-if # show boot Displays the boot table of the Fibre Channel interface. This example displays the boot table for a vHBA: Server# scope chassis Server /chassis # scope adapter 1 Server /chassis/adapter # scope host-fc-if fc1 Server /chassis/adapter/host-fc-if # show boot Boot Table Entry Boot Target WWPN Boot LUN ID ----------------- -------------------------- -----------0 20:00:00:11:22:33:44:55 3 1 20:00:00:11:22:33:44:56 5 Server /chassis/adapter/host-fc-if # Creating a Boot Table Entry You can create up to four boot table entries. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 94 OL-28893-01 Managing Network Adapters Deleting a Boot Table Entry Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note The server must be powered on before you can view or change adapter settings. Step 3 Server /chassis/adapter # scope host-fc-if {fc0 | fc1 | name} Step 4 Server /chassis/adapter/host-fc-if # Creates a boot table entry. create-boot-entry wwpn lun-id • wwpn — The World Wide Port Name (WWPN) for the boot target in the form hh:hh:hh:hh:hh:hh:hh:hh. Enters the host Fibre Channel interface command mode for the specified vHBA. • lun-id —The LUN ID of the boot LUN. The range is 0 to 255. Step 5 Server /chassis/adapter/host-fc-if # Commits the transaction to the system configuration. commit Note The changes will take effect upon the next server reboot. This example creates a boot table entry for vHBA fc1: Server# scope chassis Server /chassis # scope adapter 1 Server /chassis/adapter # scope host-fc-if fc1 Server /chassis/adapter/host-fc-if # create-boot-entry 20:00:00:11:22:33:44:55 3 Server /chassis/adapter/host-fc-if *# commit New boot table entry will take effect upon the next server reset Server /chassis/adapter/host-fc-if # Deleting a Boot Table Entry Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note The server must be powered on before you can view or change adapter settings. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 95 Managing Network Adapters vHBA Persistent Binding Command or Action Purpose Step 3 Server /chassis/adapter # scope host-fc-if {fc0 | fc1 | name} Enters the host Fibre Channel interface command mode for the specified vHBA. Step 4 Server /chassis/adapter/host-fc-if # show boot Displays the boot table. From the Boot Table Entry field, locate the number of the entry to be deleted. Step 5 Server /chassis/adapter/host-fc-if # delete boot entry Deletes the boot table entry at the specified position in the table. The range of entry is 0 to 3. The change will take effect upon the next server reset. Step 6 Server /chassis/adapter/host-fc-if # commit Commits the transaction to the system configuration. Note The changes will take effect upon the next server reboot. This example deletes boot table entry number 1 for the vHBA fc1: Server# scope chassis Server /chassis # scope adapter 1 Server /chassis/adapter # scope host-fc-if fc1 Server /chassis/adapter/host-fc-if # show boot Boot Table Entry Boot Target WWPN Boot LUN ID ----------------- -------------------------- -----------0 20:00:00:11:22:33:44:55 3 1 20:00:00:11:22:33:44:56 5 Server /chassis/adapter/host-fc-if # delete boot 1 Server /chassis/adapter/host-fc-if *# commit New host-fc-if settings will take effect upon the next server reset Server /chassis/adapter/host-fc-if # show boot Boot Table Entry Boot Target WWPN Boot LUN ID ----------------- -------------------------- -----------0 20:00:00:11:22:33:44:55 3 Server /chassis/adapter/host-fc-if # What to Do Next Reboot the server to apply the changes. vHBA Persistent Binding Persistent binding ensures that the system-assigned mapping of Fibre Channel targets is maintained after a reboot. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 96 OL-28893-01 Managing Network Adapters Enabling Persistent Binding Enabling Persistent Binding Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note The server must be powered on before you can view or change adapter settings. Step 3 Server /chassis/adapter # scope host-fc-if Enters the host Fibre Channel interface command mode for the specified vHBA. {fc0 | fc1 | name} Step 4 Server /chassis/adapter/host-fc-if # scope Enters the persistent binding command mode for the vHBA. perbi Step 5 Server /chassis/adapter/host-fc-if/perbi # Enables persistent binding for the vHBA. set persistent-lun-binding enable Step 6 Server /chassis/adapter/host-fc-if/perbi # Commits the transaction to the system commit configuration. This example enables persistent binding for a vHBA: Server# scope chassis Server /chassis # scope adapter 4 Server /chassis/adapter # scope host-fc-if fc1 Server /chassis/adapter/host-fc-if # scope perbi Server /chassis/adapter/host-fc-if/perbi # set persistent-lun-binding enable Server /chassis/adapter/host-fc-if/perbi *# commit Server /chassis/adapter/host-fc-if/perbi # Disabling Persistent Binding Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note The server must be powered on before you can view or change adapter settings. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 97 Managing Network Adapters Rebuilding Persistent Binding Command or Action Purpose Step 3 Server /chassis/adapter # scope host-fc-if Enters the host Fibre Channel interface command mode for the specified vHBA. {fc0 | fc1 | name} Step 4 Server /chassis/adapter/host-fc-if # scope Enters the persistent binding command mode for the vHBA. perbi Step 5 Server /chassis/adapter/host-fc-if/perbi # Disables persistent binding for the vHBA. set persistent-lun-binding disable Step 6 Server /chassis/adapter/host-fc-if/perbi # Commits the transaction to the system commit configuration. This example disables persistent binding for a vHBA: Server# scope chassis Server /chassis # scope adapter 4 Server /chassis/adapter # scope host-fc-if fc1 Server /chassis/adapter/host-fc-if # scope perbi Server /chassis/adapter/host-fc-if/perbi # set persistent-lun-binding disable Server /chassis/adapter/host-fc-if/perbi *# commit Server /chassis/adapter/host-fc-if/perbi # Rebuilding Persistent Binding Before You Begin Persistent binding must be enabled in the vHBA properties. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note The server must be powered on before you can view or change adapter settings. Step 3 Server /chassis/adapter # scope host-fc-if {fc0 | fc1 | name} Enters the host Fibre Channel interface command mode for the specified vHBA. Step 4 Server /chassis/adapter/host-fc-if # scope perbi Enters the persistent binding command mode for the vHBA. Step 5 Server /chassis/adapter/host-fc-if/perbi Rebuilds the persistent binding table for the vHBA. # rebuild Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 98 OL-28893-01 Managing Network Adapters Managing vNICs This example rebuilds the persistent binding table for a vHBA: Server# scope chassis Server /chassis # scope adapter 4 Server /chassis/adapter # scope host-fc-if fc1 Server /chassis/adapter/host-fc-if # scope perbi Server /chassis/adapter/host-fc-if/perbi # rebuild Server /chassis/adapter/host-fc-if/perbi # Managing vNICs Guidelines for Managing vNICs When managing vNICs, consider the following guidelines and restrictions: • The Cisco UCS P81E Virtual Interface Card and Cisco UCS VIC1225 Virtual Interface Card provide two default vNICs (eth0 and eth1). You can create up to 16 additional vNICs on these adapter cards. Note If Network Interface Virtualization (NIV) mode is enabled for the adapter, you must assign a channel number to a vNIC when you create it. • After making configuration changes, you must reboot the host for settings to take effect. Viewing vNIC Properties Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note Step 3 The server must be powered on before you can view or change adapter settings. Server /chassis/adapter # show Displays properties of a single vNIC, if specified, or host-eth-if [eth0 | eth1 | name] [detail] all vNICs. This example displays the brief properties of all vNICs and the detailed properties of eth0: Server# scope chassis Server /chassis # scope adapter 1 Server /chassis/adapter # show host-eth-if Name MTU Uplink Port MAC Address -------- ---- ----------- ----------------eth0 1500 0 00:22:BD:D6:5C:33 eth1 1500 1 00:22:BD:D6:5C:34 CoS --0 0 VLAN ---NONE NONE PXE Boot -------Enabled Enabled Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 99 Managing Network Adapters Modifying vNIC Properties Server /chassis/adapter # show host-eth-if eth0 detail Name eth0: MTU: 1500 Uplink Port: 0 MAC Address: 00:22:BD:D6:5C:33 CoS: 0 Trust Host CoS: disabled PCI Order: ANY VLAN: NONE VLAN Mode: TRUNK Rate Limiting: OFF PXE Boot: enabled Channel Number: N/A Port Profile: N/A Uplink Failover: N/A Uplink Failback Timeout: N/A Server /chassis/adapter # Modifying vNIC Properties Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # show adapter (Optional) Displays the available adapter devices. Step 3 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note The server must be powered on before you can view or change adapter settings. Step 4 Server /chassis/adapter # scope host-eth-if {eth0 | eth1 | name} Step 5 Server /chassis/adapter/host-eth-if # set Specifies the maximum transmission unit (MTU) or packet size that the vNIC accepts. Valid MTU values mtu mtu-value are 1500 to 9000 bytes; the default is 1500. Step 6 Server /chassis/adapter/host-eth-if # set Specifies the uplink port associated with this vNIC. All traffic for this vNIC goes through this uplink port. uplink {0 | 1} Step 7 Server /chassis/adapter/host-eth-if # set Specifies a MAC address for the vNIC in the form hh:hh:hh:hh:hh:hh or hhhh:hhhh:hhhh. mac-addr mac-addr Step 8 Server /chassis/adapter/host-eth-if # set Specifies the class of service (CoS) value to be marked on received packets unless the vNIC is configured to cos cos-value trust host CoS. Valid CoS values are 0 to 6; the default is 0. Higher values indicate more important traffic. Enters the host Ethernet interface command mode for the specified vNIC. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 100 OL-28893-01 Managing Network Adapters Modifying vNIC Properties Command or Action Purpose Note Step 9 If NIV is enabled, this setting is determined by the switch, and the command is ignored. Server /chassis/adapter/host-eth-if # set Specifies whether the vNIC will trust host CoS or will remark packets. The behavior is as follows: trust-host-cos {disable | enable} • disable —Received packets are remarked with the configured CoS. This is the default. • enable —The existing CoS value of received packets (host CoS) is preserved. Step 10 Server /chassis/adapter/host-eth-if # set Specifies the relative order of this device for PCI bus device number assignment; the default is any. order {any | 0-99} Step 11 Server /chassis/adapter/host-eth-if # set Specifies the default VLAN for this vNIC. Valid VLAN numbers are 1 to 4094; the default is none. vlan {none | vlan-id} Note Step 12 If NIV is enabled, this setting is determined by the switch, and the command is ignored. Server /chassis/adapter/host-eth-if # set Specifies the VLAN mode for the vNIC. The modes are as follows: vlan-mode {access | trunk} • access —The vNIC belongs to only one VLAN. • trunk —The vNIC can belong to more than one VLAN. This is the default. Note Step 13 If NIV is enabled, this setting is determined by the switch, and the command is ignored. Server /chassis/adapter/host-eth-if # set Specifies a maximum data rate for the vNIC. The range is 1 to 10000 Mbps; the default is off. rate-limit {off | rate} Note If NIV is enabled, this setting is determined by the switch, and the command is ignored. Step 14 Server /chassis/adapter/host-eth-if # set Specifies whether the vNIC can be used to perform a PXE boot. The default is enable for the two default boot {disable | enable} vNICs, and disable for user-created vNICs. Step 15 Server /chassis/adapter/host-eth-if # set If NIV mode is enabled for the adapter, select the channel number that will be assigned to this vNIC. The channel-number number range is 1 to 1000. Step 16 Server /chassis/adapter/host-eth-if # set If NIV mode is enabled for the adapter, select the port profile that should be associated with the vNIC. port-profile name Note Step 17 The name must be a port profile defined on the switch to which this server is connected. Server /chassis/adapter/host-eth-if # set If NIV mode is enabled for the adapter, enable this setting if traffic on this vNIC should fail over to the uplink-failover {disable | enable} Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 101 Managing Network Adapters Modifying vNIC Properties Command or Action Purpose secondary interface if there are communication problems. Step 18 Server /chassis/adapter/host-eth-if # set After a vNIC has started using its secondary interface, this setting controls how long the primary interface uplink-failback-timeout seconds must be available before the system resumes using the primary interface for the vNIC. Enter a number of seconds between 0 and 600. Step 19 Server /chassis/adapter/host-eth-if # scope interrupt Step 20 Server Specifies the number of interrupt resources. The range /chassis/adapter/host-eth-if/interrupt # is 1 to 514; the default is 8. In general, you should allocate one interrupt resource for each completion set interrupt-count count queue. Step 21 Server The time to wait between interrupts or the idle period /chassis/adapter/host-eth-if/interrupt # that must be encountered before an interrupt is sent. set coalescing-time usec The range is 1 to 65535 microseconds; the default is 125. To turn off coalescing, enter 0 (zero). Step 22 Server The coalescing types are as follows: /chassis/adapter/host-eth-if/interrupt # • idle —The system does not send an interrupt until set coalescing-type {idle | min} there is a period of no activity lasting as least as long as the time specified in the coalescing time configuration. Enters the interrupt command mode. • min —The system waits for the time specified in the coalescing time configuration before sending another interrupt event. This is the default. Step 23 Server Specifies the Ethernet interrupt mode. The modes are /chassis/adapter/host-eth-if/interrupt # as follows: set interrupt-mode {intx | msi | msix} • intx —Line-based interrupt (PCI INTx) • msi —Message-Signaled Interrupt (MSI) • msix —Message Signaled Interrupts with the optional extension (MSI-X). This is the recommended and default option. Step 24 Server Exits to the host Ethernet interface command mode. /chassis/adapter/host-eth-if/interrupt # exit Step 25 Server /chassis/adapter/host-eth-if # scope recv-queue Enters receive queue command mode. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 102 OL-28893-01 Managing Network Adapters Modifying vNIC Properties Command or Action Purpose Step 26 Server The number of receive queue resources to allocate. The /chassis/adapter/host-eth-if/recv-queue range is 1 to 256; the default is 4. # set rq-count count Step 27 Server The number of descriptors in the receive queue. The /chassis/adapter/host-eth-if/recv-queue range is 64 to 4094; the default is 512. # set rq-ring-size size Step 28 Server Exits to the host Ethernet interface command mode. /chassis/adapter/host-eth-if/recv-queue # exit Step 29 Server /chassis/adapter/host-eth-if # scope trans-queue Step 30 Server The number of transmit queue resources to allocate. /chassis/adapter/host-eth-if/trans-queue The range is 1 to 256; the default is 1. # set wq-count count Step 31 Server The number of descriptors in the transmit queue. The /chassis/adapter/host-eth-if/trans-queue range is 64 to 4094; the default is 256. # set wq-ring-size size Step 32 Server Exits to the host Ethernet interface command mode. /chassis/adapter/host-eth-if/trans-queue # exit Step 33 Server /chassis/adapter/host-eth-if # scope comp-queue Step 34 Server The number of completion queue resources to allocate. /chassis/adapter/host-eth-if/comp-queue The range is 1 to 512; the default is 5. # set cq-count count In general, the number of completion queues equals the number of transmit queues plus the number of receive queues. Step 35 Server Exits to the host Ethernet interface command mode. /chassis/adapter/host-eth-if/comp-queue # exit Step 36 Server /chassis/adapter/host-eth-if # scope offload Enters TCP offload command mode. Step 37 Server /chassis/adapter/host-eth-if/offload # set tcp-segment-offload {disable | enable} Enables or disables TCP Segmentation Offload as follows: Enters transmit queue command mode. Enters completion queue command mode. • disable —The CPU segments large TCP packets. • enable —The CPU sends large TCP packets to the hardware to be segmented. This option may reduce CPU overhead and increase throughput rate. This is the default. Note This option is also known as Large Send Offload (LSO). Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 103 Managing Network Adapters Modifying vNIC Properties Command or Action Step 38 Purpose Server Enables or disables TCP Receive Offload Checksum /chassis/adapter/host-eth-if/offload # Validation as follows: set tcp-rx-checksum-offload {disable • disable —The CPU validates all packet | enable} checksums. • enable —The CPU sends all packet checksums to the hardware for validation. This option may reduce CPU overhead. This is the default. Step 39 Server Enables or disables TCP Transmit Offload Checksum /chassis/adapter/host-eth-if/offload # Validation as follows: set tcp-tx-checksum-offload {disable • disable —The CPU validates all packet | enable} checksums. • enable —The CPU sends all packet checksums to the hardware for validation. This option may reduce CPU overhead. This is the default. Step 40 Server Enables or disables TCP Large Packet Receive Offload /chassis/adapter/host-eth-if/offload # as follows: set tcp-large-receive-offload {disable • disable —The CPU processes all large packets. | enable} • enable —The hardware reassembles all segmented packets before sending them to the CPU. This option may reduce CPU utilization and increase inbound throughput. This is the default. Step 41 Server /chassis/adapter/host-eth-if/offload # exit Exits to the host Ethernet interface command mode. Step 42 Server /chassis/adapter/host-eth-if # scope rss Enters Receive-side Scaling (RSS) command mode. Step 43 Server /chassis/adapter/host-eth-if/rss # Enables or disables RSS, which allows the efficient set rss {disable | enable} distribution of network receive processing across multiple CPUs in multiprocessor systems. The default is enable for the two default vNICs, and disable for user-created vNICs. Step 44 Server /chassis/adapter/host-eth-if/rss # Enables or disables IPv4 RSS. The default is enable. set rss-hash-ipv4 {disable | enable} Step 45 Server /chassis/adapter/host-eth-if/rss # Enables or disables TCP/IPv4 RSS. The default is set rss-hash-tcp-ipv4 {disable | enable. enable} Step 46 Server /chassis/adapter/host-eth-if/rss # Enables or disables IPv6 RSS. The default is enable. set rss-hash-ipv6 {disable | enable} Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 104 OL-28893-01 Managing Network Adapters Creating a vNIC Command or Action Purpose Step 47 Server /chassis/adapter/host-eth-if/rss # Enables or disables TCP/IPv6 RSS. The default is set rss-hash-tcp-ipv6 {disable | enable. enable} Step 48 Server /chassis/adapter/host-eth-if/rss # Enables or disables IPv6 Extension RSS. The default set rss-hash-ipv6-ex {disable | enable} is disable. Step 49 Server /chassis/adapter/host-eth-if/rss # Enables or disables TCP/IPv6 Extension RSS. The set rss-hash-tcp-ipv6-ex {disable | default is disable. enable} Step 50 Server /chassis/adapter/host-eth-if/rss # Exits to the host Ethernet interface command mode. exit Step 51 Server /chassis/adapter/host-eth-if # commit Commits the transaction to the system configuration. Note The changes will take effect upon the next server reboot. This example configures the properties of a vNIC: Server# scope chassis Server /chassis # show adapter PCI Slot Product Name Serial Number Product ID Vendor -------- -------------- -------------- -------------- -------------------1 UCS VIC P81E QCI1417A0QK N2XX-ACPCI01 Cisco Systems Inc Server Server Server Server Server Server Server Server /chassis # scope adapter 1 /chassis/adapter # scope host-eth-if Test1 /chassis/adapter/host-eth-if # set uplink 1 /chassis/adapter/host-eth-if *# scope offload /chassis/adapter/host-eth-if/offload *# set tcp-segment-offload enable /chassis/adapter/host-eth-if/offload *# exit /chassis/adapter/host-eth-if *# commit /chassis/adapter/host-eth-if # What to Do Next Reboot the server to apply the changes. Creating a vNIC The adapter provides two permanent vNICs. You can create up to 16 additional vNICs. Before You Begin You must log in with user or admin privileges to perform this task. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 105 Managing Network Adapters Deleting a vNIC Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note The server must be powered on before you can view or change adapter settings. Step 3 Server /chassis/adapter # create host-eth-if name Step 4 Server /chassis/adapter/host-eth-if # (Optional) If NIV mode is enabled for the adapter, you must assign set channel-number number a channel number to this vNIC. The range is 1 to 1000. Step 5 Server /chassis/adapter/host-eth-if # Commits the transaction to the system configuration. commit Note The changes will take effect upon the next server reboot. Creates a vNIC and enters the host Ethernet interface command mode. The name argument can be up to 32 ASCII characters. This example creates a vNIC on adapter 1: Server# scope chassis Server /chassis # scope adapter 1 Server /chassis/adapter # create host-eth-if Vnic5 Server /chassis/adapter/host-eth-if *# commit New host-eth-if settings will take effect upon the next server reset Server /chassis/adapter/host-eth-if # Deleting a vNIC Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note Step 3 Step 4 Server /chassis/adapter # delete host-eth-if name The server must be powered on before you can view or change adapter settings. Deletes the specified vNIC. You cannot delete either of the two default vNICs, eth0 or eth1. Server /chassis/adapter # commit Commits the transaction to the system configuration. Note Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 106 OL-28893-01 Managing Network Adapters Configuring iSCSI Boot Capability Command or Action Purpose Note The changes will take effect upon the next server reboot. This example deletes a vNIC on adapter 1: Server# scope chassis Server /chassis # scope Server /chassis/adapter Server /chassis/adapter Server /chassis/adapter adapter 1 # delete host-eth-if Vnic5 *# commit # Configuring iSCSI Boot Capability Configuring iSCSI Boot Capability for vNICs When the rack-servers are configured in a standalone mode, and when the VIC adapters are directly attached to the Nexus 5000 family of switches, you can configure these VIC adapters to boot the servers remotely from iSCSI storage targets. You can configure Ethernet vNICs to enable a rack server to load the host OS image from remote iSCSI target devices. To configure the iSCSI boot capability on a vNIC: • You must log in with admin privileges to perform this task. • To configure a vNIC to boot a server remotely from an iSCSI storage target, you must enable the PXE boot option on the vNIC. Note You can configure a maximum of 2 iSCSI vNICs for each host. Configuring iSCSI Boot Capability on a vNIC You can configure a maximum of 2 iSCSI vNICs for each host. Before You Begin • To configure a vNIC to boot a server remotely from an iSCSI storage target, you must enable the PXE boot option on the vNIC. • You must log in with admin privileges to perform this task. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 107 Managing Network Adapters Configuring iSCSI Boot Capability Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note The server must be powered on before you can view or change adapter settings. Step 3 Server /chassis/adapter # scope host-eth-if Enters the host Ethernet interface command mode for the specified vNIC. {eth0 | eth1 | name} Step 4 Server /chassis/adapter/host-eth-if # create Creates the iSCSI boot index for the vNIC. At this moment, only 0 is allowed as the index. iscsi-boot index Step 5 Server /chassis/adapter/host-eth-if/iscsi-boot* # create iscsi-target index Step 6 Server Enables the DHCP network settings for the iSCSI /chassis/adapter/host-eth-if/iscsi-boot* # set boot. dhcp-net-settings enabled Step 7 Server Sets the initiator name. It cannot be more than 223 /chassis/adapter/host-eth-if/iscsi-boot* # set characters. initiator-name string Step 8 Server Enables the DHCP iSCSI settings. /chassis/adapter/host-eth-if/iscsi-boot* # set dhcp-iscsi-settings enabled Step 9 Server /chassis/adapter/host-eth-if/iscsi-boot* # commit Creates an iSCSI target for the vNIC. The value can either be 0 or 1. Commits the transaction to the system configuration. Note The changes will take effect upon the next server reboot. This example shows how to configure the iSCSI boot capability for a vNIC: Server Server Server Server Server Server Server Server # scope chassis /chassis # scope adapter 1 /chassis/adapter # scope host-eth-if eth0 /chassis/adapter/host-eth-if # create iscsi-boot 0 /adapter/host-eth-if/iscsi-boot *# set dhcp-net-settings enabled /adapter/host-eth-if/iscsi-boot *# set initiator-name iqn.2012-01.com.adser:abcde /adapter/host-eth-if/iscsi-boot *# set dhcp-iscsi-settings enabled /adapter/host-eth-if/iscsi-boot *# commit New host-eth-if settings will take effect upon the next server reset Server /adapter/host-eth-if/iscsi-boot # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 108 OL-28893-01 Managing Network Adapters Managing VM FEX Deleting an iSCSI Boot Configuration for a vNIC Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note The server must be powered on before you can view or change adapter settings. Step 3 Server /chassis/adapter # scope host-eth-if {eth0 | eth1 | name} Enters the host Ethernet interface command mode for the specified vNIC. Step 4 Server /chassis/adapter/host-eth-if # delete iscsi-boot 0 Deletes the iSCSI boot capability for the vNIC. Step 5 Server /chassis/adapter/host-eth-if* # Commits the transaction to the system configuration commit Note The changes will take effect upon the next server reboot. This example shows how to delete the iSCSI boot capability for a vNIC: Server # scope chassis Server /chassis # scope adapter 1 Server /chassis/adapter # scope host-eth-if eth0 Server /chassis/adapter/host-eth-if # delete iscsi-boot 0 Server /adapter/host-eth-if/iscsi-boot *# commit New host-eth-if settings will take effect upon the next server reset Server /adapter/host-eth-if/iscsi-boot # Managing VM FEX Virtual Machine Fabric Extender Cisco Virtual Machine Fabric Extender (VM FEX) extends the (prestandard) IEEE 802.1Qbh port extender architecture to virtual machines. In this architecture, each VM interface is provided with a virtual Peripheral Component Interconnect Express (PCIe) device and a virtual port on a switch. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 109 Managing Network Adapters Viewing VM FEX Properties Viewing VM FEX Properties Before You Begin • The server must be powered on, or the properties will not display. • A supported Virtual Interface Card (VIC) must be installed in the chassis and the server must be powered on. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note The server must be powered on before you can view or change adapter settings. Step 3 Server /chassis/adapter # show vmfex Displays the general VM FEX properties. For field descriptions, see General Properties Settings, on page [detail] 111. Step 4 Server /chassis/adapter # scope vmfex Enters the command mode for the specified VM FEX interface. name Step 5 Server /chassis/adapter/vmfex # show Displays Ethernet interrupt settings. For field descriptions, see Ethernet Interrupt Settings, on page interrupt [detail] 112. Step 6 Server /chassis/adapter/vmfex # show Displays Ethernet receive queue settings. For field descriptions, see Ethernet Receive Queue Settings, on recv-queue [detail] page 113. Step 7 Server /chassis/adapter/vmfex # show Displays Ethernet transmit queue settings. For field descriptions, see Ethernet Transmit Queue Settings, on trans-queue [detail] page 113. Step 8 Server /chassis/adapter/vmfex # show Displays completion queue settings. For field descriptions, see Completion Queue Settings, on page comp-queue [detail] 113. Step 9 Server /chassis/adapter/vmfex # show Displays TCP offload settings. For field descriptions, see TCP Offload Settings, on page 114. offload [detail] Step 10 Server /chassis/adapter/vmfex # show Displays RSS settings. For field descriptions, see Receive Side Scaling Settings, on page 114. rss [detail] Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 110 OL-28893-01 Managing Network Adapters VM FEX Settings This example displays the VM FEX properties: Server /chassis/adapter # show vmfex detail Name pts0: MTU: 1500 Uplink Port: 0 MAC Address: 00:00:00:00:00:00 CoS: N/A Trust Host CoS: PCI Order: VLAN: N/A VLAN Mode: N/A Rate Limiting: PXE Boot: disabled Channel Number: 0 Port Profile: Uplink Failover: Enabled Uplink Failback Timeout: 5 Server /chassis/adapter # scope vmfex pts0 Server /chassis/adapter/vmfex # show Interrupt Count Coalescing Time (us) --------------- -------------------6 125 interrupt Coalescing Type Interrupt Mode --------------- --------------MIN MSI Server /chassis/adapter/vmfex # show recv-queue Receive Queue Count Receive Queue Ring Size ------------------- -----------------------------4 512 Server /chassis/adapter/vmfex # show trans-queue Transmit Queue Count Transmit Queue Ring Size -------------------- ------------------------------1 256 Server /chassis/adapter/vmfex # show comp-queue Completion Queue Count Completion Queue Ring Size ------------------------- -------------------------5 1 Server /chassis/adapter/vmfex # show offload TCP Segment Offload TCP Rx Checksum TCP Tx Checksum Large Receive -------------------- ---------------- ---------------- ------------enabled enabled enabled enabled Server /chassis/adapter/vmfex # show rss TCP Rx Side Scaling -------------------enabled Server /chassis/adapter/vmfex # VM FEX Settings The following tables describe the VM FEX settings that you can view. General Properties Settings Name Description Name A user-defined name for the VM FEX. MTU The maximum transmission unit, or packet size, that this VM FEX accepts. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 111 Managing Network Adapters VM FEX Settings Name Description Uplink Port The uplink port associated with this VM FEX. All traffic for this VM FEX goes through this uplink port. MAC Address The MAC address associated with the VM FEX. Class of Service The class of service to associate with traffic from this VM FEX. Trust Host CoS Whether the VM FEX can use the class of service provided by the host operating system. PCI Order The order in which this VM FEX will be used. Default VLAN The default VLAN for this VM FEX. VLAN Mode Whether VLAN trunking or access is configured. Rate Limit If rate limiting is configured, the maximum rate. Enable PXE Boot Whether the VM FEX can be used to perform a PXE boot. Channel Number If NIV mode is enabled for the adapter, the channel number assigned to this VM FEX. Port Profile If NIV mode is enabled for the adapter, the port profile associated with theVM FEX. Note This field displays the port profiles defined on the switch to which this server is connected. Enable Uplink Failover If NIV mode is enabled for the adapter, whether traffic on this VM FEX should fail over to the secondary interface if there are communication problems. Failback Timeout After a VM FEX has started using its secondary interface, this setting controls how long the primary interface must be available before the system resumes using the primary interface for the VM FEX. Ethernet Interrupt Settings Name Description Interrupt Count field The number of interrupt resources allocated to this VM FEX. Coalescing Time field The time CIMC waits between interrupts or the idle period that must be encountered before an interrupt is sent. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 112 OL-28893-01 Managing Network Adapters VM FEX Settings Name Description Coalescing Type field This can be one of the following: • MIN—The system waits for the time specified in the Coalescing Time field before sending another interrupt event. • IDLE—The system does not send an interrupt until there is a period of no activity lasting as least as long as the time specified in the Coalescing Time field. Interrupt Mode field The preferred driver interrupt mode. This can be one of the following: • MSIx—Message Signaled Interrupts (MSI) with the optional extension. • MSI—MSI only. • INTx—PCI INTx interrupts. Ethernet Receive Queue Settings Name Description Receive Queue Count field The number of receive queue resources allocated to this VM FEX. Receive Queue Ring Size field The number of descriptors in each receive queue. Ethernet Transmit Queue Settings Name Description Transmit Queue Count field The number of transmit queue resources allocated to this VM FEX. Transmit Queue Ring Size field The number of descriptors in each transmit queue. Completion Queue Settings Name Description Completion Queue Count field The number of completion queue resources allocated to this VM FEX. Completion Queue Ring Size field The number of descriptors in each completion queue. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 113 Managing Network Adapters VM FEX Settings TCP Offload Settings Name Description Enable TCP Segmentation Offload field If enabled, the CPU sends large TCP packets to the hardware to be segmented. If disabled, the CPU segments large packets. Note This option is also known as Large Send Offload (LSO). Enable TCP Rx Offload Checksum Validation field If enabled, the CPU sends all packet checksums to the hardware for validation. If disabled, the CPU validates all packet checksums. Enable TCP Tx Offload Checksum Generation field If enabled, the CPU sends all packets to the hardware so that the checksum can be calculated. If disabled, the CPU calculates all packet checksums. Enable Large Receive field If enabled, the hardware reassembles all segmented packets before sending them to the CPU. If disabled, the CPU processes all large packets. Receive Side Scaling Settings Name Description Enable TCP Receive Side Scaling Receive Side Scaling (RSS) distributes network receive processing field across multiple CPUs in multiprocessor systems. If enabled, network receive processing is shared across processors whenever possible. If disabled, network receive processing is always handled by a single processor even if additional processors are available. Enable IPv4 RSS field If enabled, RSS is enabled on IPv4 networks. Enable TCP-IPv4 RSS field If enabled, RSS is enabled for TCP transmissions across IPv4 networks. Enable IPv6 RSS field If enabled, RSS is enabled on IPv6 networks. Enable TCP-IPv6 RSS field If enabled, RSS is enabled for TCP transmissions across IPv6 networks. Enable IPv6 Extension RSS field If enabled, RSS is enabled for IPv6 extensions. Enable TCP-IPv6 Extension RSS If enabled, RSS is enabled for TCP transmissions across IPv6 networks. field Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 114 OL-28893-01 Managing Network Adapters Managing Storage Adapters Managing Storage Adapters Create Virtual Drive from Unused Physical Drives Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # create virtual-drive At this point, you are prompted to enter information corresponding to the RAID level, the physical drives to be used, the size and the write policy for the new virtual drive. Enter the appropriate information at each prompt. When you have finished specifying the virtual drive information, you are prompted to confirm that the information is correct. Enter y (yes) to confirm, or n (no) to cancel the operation. Step 4 Server /chassis/storageadapter # show virtual-drive Displays the existing virtual drives. This example shows how to create a new virtual drive that spans two unused physical drives. Server# scope chassis Server /chassis # scope storageadapter SLOT-3 Server /chassis/storageadapter # create-virtual-drive Please enter RAID level (0, 1, 5, 6, 10, 50, 60) --> 1 Please choose from the following 2 unused physical drives: Slot 6: size 68664 MB Slot 7: size 68664 MB Specify physical disks for span 0: Enter comma-separated PDs from above list--> 6,7 Please enter Virtual Drive name (15 characters maximum)--> test_v_drive Please enter Virtual Drive size in MB, GB, or TB Example format: '400 GB' --> 1000 MB Optional attribute: Write Policy: defaults to Write Back OK? (y or n)--> n 0: Write Through 1: Write Back 2: Write Back with Bad BBU 3: Write Back Adaptive Choose number from above options--> 2 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 115 Managing Network Adapters Create Virtual Drive from an Existing Drive Group Write Policy will be set to Write Back with Bad BBU (2 and 'write-policy\:2') New OK? virtual drive will have the following characteristics: Spans: '[6.7]' RAID level: '1' Name: 'test_v_drive' Size: 1000 MB Write Policy: Write Back with Bad BBU (y or n)--> y Server /chassis/storageadapter # show virtual-drive Virtual Drive Health Status Name Boot Drive ------------- -------------- -------------------- ------------------------0 Good Optimal false 1 Good Optimal true 2 Good Optimal false 3 Good Optimal test_v_drive false 4 Good Optimal new_from_test false Size RAID Level ---------- ---------150528 MB RAID 0 20480 MB RAID 0 114140 MB RAID 0 1000 MB RAID 1 500 MB RAID 1 Server /chassis/storageadapter # Create Virtual Drive from an Existing Drive Group Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # carve-virtual-drive At this point, you are prompted to enter information corresponding to the virtual drives to be used, and the size and the write policy for the new virtual drive. Enter the appropriate information at each prompt. When you have finished specifying the virtual drive information, you are prompted to confirm that the information is correct. Enter y (yes) to confirm, or n (no) to cancel the operation. Step 4 Server /chassis/storageadapter # show virtual-drive Displays the existing virtual drives. This example shows how to carve a new virtual drive out of unused space in an existing RAID 1 drive group: Server# scope chassis Server /chassis # scope storageadapter SLOT-3 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 116 OL-28893-01 Managing Network Adapters Clearing Foreign Configuration Server /chassis/storageadapter # carve-virtual-drive < Fetching virtual drives...> ID Name RL VDSize MaxPossibleSize PD(s) ---------------------------------------------------------------3 test_v_drive 1 1000 MB 67664 MB 6,7 Please choose from the above list the virtual drive number whose space the new virtual drive will share--> 3 New virtual drive will share space with VD 3 Please enter Virtual Drive name (15 characters maximum)--> new_from_test Please enter Virtual Drive size in MB, GB, or TB (maximum: 67664 MB) Example format: '400 GB' --> 500 MB Optional attribute: Write Policy: defaults to Write Back OK? (y or n)--> y New - virtual drive will have the following characteristics: It will share space with virtual drive 3 Name: 'new_from_test' Size: 500 MB OK? (y or n)--> y Server /chassis/storageadapter # show virtual-drive Virtual Drive Health Status Name Boot Drive ------------- -------------- -------------------- ------------------------0 Good Optimal false 1 Good Optimal true 2 Good Optimal false 3 Good Optimal test_v_drive false 4 Good Optimal new_from_test false Size RAID Level ---------- ---------150528 MB RAID 0 20480 MB RAID 0 114140 MB RAID 0 1000 MB RAID 1 500 MB RAID 1 Server /chassis/storageadapter # Clearing Foreign Configuration Important This task clears all foreign configuration on the controller. Also, all configuration information from all physical drives hosting foreign configuration is deleted. This action cannot be reverted. Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter Enters command mode for an installed storage card. slot Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 117 Managing Network Adapters Deleting a Virtual Drive Step 3 Command or Action Purpose Server /chassis/storageadapter # clear-foreign-config You are prompted to confirm the action. Enter yes to confirm. Note If you do not enter yes, the action is aborted. This example shows how to clear all foreign configurations on the MegaRAID controller in slot 3: Server# scope chassis Server /chassis # scope storageadapter SLOT-3 Server /chassis/storageadapter # clear-foreign-config Are you sure you want to clear all foreign configurations on this controller? All data on the drive(s) will be lost. Enter 'yes' to confirm -> yes Server /chassis/storageadapter # Deleting a Virtual Drive Important This task deletes a virtual drive, including the drives that run the booted operating system. So back up any data that you want to retain before you delete a virtual drive. Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope virtual-drive drive-number Step 4 Server /chassis/storageadapter/virtual-drive You are prompted to confirm the action. Enter # delete-virtual-drive yes to confirm. Enters command mode for the specified virtual drive. Note If you do not enter yes, the action is aborted. This example shows how to delete virtual drive 3. Server# scope chassis Server /chassis # scope storageadapter SLOT-3 Server /chassis/storageadapter # scope virtual-drive 3 Server /chassis/storageadapter/virtual-drive # delete-virtual-drive Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 118 OL-28893-01 Managing Network Adapters Initializing a Virtual Drive Are you sure you want to delete virtual drive 3? All data on the drive will be lost. Enter 'yes' to confirm -> yes Server /chassis/storageadapter/virtual-drive # Initializing a Virtual Drive All data on a virtual drive is lost when you initialize the drive. Before you run an initialization, back up any data on the virtual drive that you want to save. Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope virtual-drive drive-number Enters command mode for the specified virtual drive. Step 4 Server /chassis/storageadapter/virtual-drive # Initializes the specified virtual drive. start-initialization Step 5 Server /chassis/storageadapter/virtual-drive # (Optional) Cancels the initialization of the cancel-initialization specified virtual drive. Step 6 Server /chassis/storageadapter/physical-drive Displays the status of the task that is in # get-operation-status progress on the drive. This example shows how to initialize virtual drive 3 using fast initialization: Server# scope chassis Server /chassis # scope storageadapter SLOT-3 Server /chassis/storageadapter # scope virtual-drive 3 Server /chassis/storageadapter/virtual-drive # start-initialization Are you sure you want to initialize virtual drive 3? All data on the drive will be lost. Enter 'yes' to confirm -> yes Fast (0) or full (1) initialization? -> 0 Server /chassis/storageadapter/virtual-drive # get-operation-status progress-percent: 20% elapsed -seconds: 30 operation-in-progress: initializing virtual drive Server /chassis/storageadapter/virtual-drive # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 119 Managing Network Adapters Set as Boot Drive Set as Boot Drive Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope virtual-drive drive-number Enters command mode for the specified virtual drive. Step 4 Server /chassis/storageadapter # set-boot-drive Specifies the controller to boot from this virtual drive. This example shows how to specify the controller to boot from virtual drive 3: Server# scope chassis Server /chassis # scope storageadapter SLOT-3 Server /chassis/storageadapter # scope virtual-drive 3 Server /chassis/storageadapter/virtual-drive # set-boot-drive Are you sure you want to set virtual drive 3 as the boot drive? Enter 'yes' to confirm -> yes Server /chassis/storageadapter/virtual-drive # Modifying Attributes of a Virtual Drive Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope virtual-drive 3 Enters the command mode for the virtual drive. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 120 OL-28893-01 Managing Network Adapters Making a Dedicated Hot Spare Command or Action Step 4 Purpose Server /chassis/storageadapter/virtual-drive # Prompts you to select a different current modify-attributes policy. This example shows how to carve a new virtual drive out of unused space in an existing RAID 1 drive group: Server# scope chassis Server /chassis # scope storageadapter SLOT-3 Server /chassis/storageadapter # scope virtual-drive Server /chassis/storageadapter/virtual-drive # modify-attributes Current write policy: Write Back 0: Write Through 1: Write Back 2: Write Back even if Bad BBU Choose number from above options --> 0 The following attribute will be modified: - Write policy: Write Through OK? (y or n) --> y operation in progress. Server /chassis/storageadapter/virtual-drive # Making a Dedicated Hot Spare Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope physical-drive drive-number Step 4 Server /chassis/storageadapter/physical-drive You are prompted to choose a virtual drive for # make-dedicated-hot-spare which the dedicated hot spare is being created. Enters command mode for the specified physical drive. This example shows how to make physical drive 3 a dedicated hot spare for virtual drive 6: Server# scope chassis Server /chassis # scope storageadapter SLOT-3 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 121 Managing Network Adapters Making a Global Hot Spare Server /chassis/storageadapter # scope physical-drive 3 Server /chassis/storageadapter/physical-drive # make-dedicated-hot-spare 5: VD_OS_1, RAID 0, 102400 MB, physical disks: 1 6: VD_OS_2, RAID 0, 12288 MB, physical disks: 1 7: VD_OS_3, RAID 0, 12288 MB, physical disks: 1 8: VD_DATA_1, RAID 0, 12512 MB, physical disks: 1 9: RAID1_2358, RAID 1, 40000 MB, physical disks: 2,3,5,8 11: JFB_RAID1_67, RAID 1, 20000 MB, physical disks: 6,7 12: JFB_Crv_R1_40, RAID 1, 40000 MB, physical disks: 6,7 13: JFB_R1_10GB, RAID 1, 10000 MB, physical disks: 6,7 Please choose from the above 8 virtual drives-->6 Server /chassis/storageadapter/physical-drive # Making a Global Hot Spare Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope physical-drive drive-number Enters command mode for the specified physical drive. Step 4 Server /chassis/storageadapter/physical-drive # make-global-hot-spare Step 5 Server /chassis/storageadapter/physical-drive # Displays the status of the task that is in get-operation-status progress on the drive. This example shows how to make physical drive 3 a global hot spare: Server# scope chassis Server /chassis # scope storageadapter SLOT-3 Server /chassis/storageadapter # scope physical-drive 3 Server /chassis/storageadapter/physical-drive # make-global-hot-spare Server /chassis/storageadapter/physical-drive # Preparing a Drive for Removal You can confirm this task only on physical drives that display the Unconfigured Good status. Before You Begin You must log in with admin privileges to perform this task. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 122 OL-28893-01 Managing Network Adapters Removing a Drive from Hot Spare Pools Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope physical-drive drive-number Enters command mode for the specified physical drive. Step 4 Server /chassis/storageadapter/physical-drive # prepare-for-removal This example shows how to prepare physical drive 3 for removal. Server# scope chassis Server /chassis # scope storageadapter SLOT-3 Server /chassis/storageadapter # scope physical-drive 3 Server /chassis/storageadapter/physical-drive # prepare-for-removal Server /chassis/storageadapter/physical-drive # Removing a Drive from Hot Spare Pools Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope physical-drive drive-number Enters command mode for the specified physical drive. Step 4 Server /chassis/storageadapter/physical-drive Removes a drive from the host spare pool. # remove-hot-spare This example shows how to remove physical drive 3 from the hot spare pools: Server# scope chassis Server /chassis # scope storageadapter SLOT-3 Server /chassis/storageadapter # scope physical-drive 3 Server /chassis/storageadapter/physical-drive # remove-hot-spare Server /chassis/storageadapter/physical-drive # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 123 Managing Network Adapters Undo Preparing a Drive for Removal Undo Preparing a Drive for Removal Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope physical-drive drive-number Enters command mode for the specified physical drive. Step 4 Server /chassis/storageadapter/physical-drive # undo-prepare-for-removal This example shows how to respin physical drive 3 after preparing the drive for removal. Server# scope chassis Server /chassis # scope storageadapter SLOT-3 Server /chassis/storageadapter # scope physical-drive 3 Server /chassis/storageadapter/physical-drive # undo-prepare-for-removal Server /chassis/storageadapter/physical-drive # Enabling Auto Learn Cycles for the Battery Backup Unit Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope bbu Enter the battery backup unit command mode. Step 4 Server /chassis/storageadapter # enable-auto-learn Enables the battery auto-learn cycles Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 124 OL-28893-01 Managing Network Adapters Disabling Auto Learn Cycles for the Battery Backup Unit This example shows how to enable the battery auto-learn cycles: Server # scope chassis Server /chassis # scope storageadapter SLOT-2 Server /chassis/storageadapter # scope bbu Server /chassis/storageadapter/bbu # enable-auto-learn Automatic BBU learn cycles will occur without notice if enabled. Are you sure? [y/n] --> y enable-auto-learn initiated Server /chassis/storageadapter/bbu # Disabling Auto Learn Cycles for the Battery Backup Unit Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope bbu Enter the battery backup unit command mode. Step 4 Server /chassis/storageadapter # disable-auto-learn Disables the battery auto-learn cycles This example shows how to disables the battery auto-learn cycles: Server # scope chassis Server /chassis # scope storageadapter SLOT-2 Server /chassis/storageadapter # scope bbu Server /chassis/storageadapter/bbu # disable-auto-learn Automatic BBU learn cycles will no longer occur if disabled. Are you sure? [y/n] --> y disable-auto-learn initiated Server /chassis/storageadapter/bbu # Starting a Learn Cycle for a Battery Backup Unit Before You Begin You must be logged in as an admin to use this command. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 125 Managing Network Adapters Toggling the Locator LED for a Physical Drive Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope bbu Enter the battery backup unit command mode. Step 4 Server /chassis/storageadapter # start-learn-cycle Starts the learn cycle for the battery. This example shows how to initiate the learn cycles for a battery: Server Server Server Server Server # scope chassis /chassis # scope storageadapter SLOT-2 /chassis/storageadapter # scope bbu /chassis/storageadapter/bbu # start-learn-cycle /chassis/storageadapter/bbu # Toggling the Locator LED for a Physical Drive Before You Begin You must be logged in as an admin to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # scope physical-drive 3 Enters the physical drive command mode. Step 4 Server /chassis/storageadapter/physical-drive Enables or disables the physical drive locator # locator-led {on | off} LED. This example shows how to enable the locator LED for physical drive 3: Server Server Server Server Server Server # scope chassis /chassis # scope storageadapter SLOT-2 /chassis/storageadapter # scope physical-drive 3 /chassis/storageadapter/physical-drive # locator-led on /chassis/storageadapter/physical-drive* # commit /chassis/storageadapter/physical-drive # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 126 OL-28893-01 Managing Network Adapters Viewing Storage Controller Logs Viewing Storage Controller Logs Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage card. Step 3 Server /chassis/storageadapter # show log Displays the storage controller logs. This example shows how to display storage controller logs: Server # scope chassis Server /chassis # scope storageadapter SLOT-3 Server /chassis/storageadapter # show log Time ---Fri March Fri March Fri March Fri March Fri March Fri March 1 1 1 1 1 1 09:52:19 07:50:19 07:50:19 07:48:19 07:47:19 07:45:19 2013 2013 2013 2013 2013 2013 Severity -------Warning Info Info Info Info Info Description ------------Predictive Failure Battery charge complete Battery charge started Battery relearn complete Battery is discharging Battery relearn started Server /chassis/storageadapter # Backing Up and Restoring the Adapter Configuration Exporting the Adapter Configuration The adapter configuration can be exported as an XML file to a TFTP server. Important If any firmware or BIOS updates are in progress, do not export the adapter configuration until those tasks are complete. Before You Begin A supported Virtual Interface Card (VIC) must be installed in the chassis and the server must be powered on. Obtain the TFTP server IP address. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 127 Managing Network Adapters Importing the Adapter Configuration Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Note Step 3 Server /chassis/adapter # export-vnic protocol remote server IP address The server must be powered on before you can view or change adapter settings. Starts the export operation. The adapter configuration file will be stored at the specified path and filename on the remote server at the specified IP address. The protocol can be one of the following: • TFTP • FTP • SFTP • SCP • HTTP This example exports the configuration of adapter 1: Server# scope chassis Server /chassis # scope adapter 1 Server /chassis/adapter # export-vnic ftp 192.0.20.34 //test/dnld-ucs-k9-bundle.1.0.2h.bin Server /chassis/adapter # Importing the Adapter Configuration Important If any firmware or BIOS updates are in progress, do not import the adapter configuration until those tasks are complete. Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card at the PCI slot number specified by index. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 128 OL-28893-01 Managing Network Adapters Restoring Adapter Defaults Command or Action Purpose Note Step 3 Server /chassis/adapter # import-vnic tftp-ip-address path-and-filename The server must be powered on before you can view or change adapter settings. Starts the import operation. The adapter downloads the configuration file from the specified path on the TFTP server at the specified IP address. The configuration will be installed during the next server reboot. This example imports a configuration for the adapter in PCI slot 1: Server# scope chassis Server /chassis # scope adapter 1 Server /chassis/adapter # import-vnic 192.0.2.34 /ucs/backups/adapter4.xml Import succeeded. New VNIC adapter settings will take effect upon the next server reset. Server /chassis/adapter # What to Do Next Reboot the server to apply the imported configuration. Restoring Adapter Defaults Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # adapter-reset-defaults index Restores factory default settings for the adapter at the PCI slot number specified by the index argument. This example restores the default configuration of the adapter in PCI slot 1: Server# scope chassis Server /chassis # adapter-reset-defaults 1 This operation will reset the adapter to factory default. All your configuration will be lost. Continue?[y|N] y Server /chassis # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 129 Managing Network Adapters Managing Adapter Firmware Managing Adapter Firmware Adapter Firmware A Cisco UCS C-Series network adapter contains the following firmware components: • Adapter firmware—The main operating firmware, consisting of an active and a backup image, can be installed from the CIMC GUI or CLI interface or from the Host Upgrade Utility (HUU). You can upload a firmware image from either a local file system or a TFTP server. • Bootloader firmware—The bootloader firmware cannot be installed from the CIMC GUI or CLI. You can install this firmware using the Host Upgrade Utility. Installing Adapter Firmware Important If any firmware or BIOS updates are in progress, do not install the adapter firmware until those tasks are complete. Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # update-adapter-fw tftp-ip-address path-and-filename {activate | no-activate} [ pci-slot ] [ pci-slot ] Downloads the specified adapter firmware file from the TFTP server, then installs the firmware as the backup image on one or two specified adapters or, if no adapter is specified, on all adapters. If the activate keyword is specified, the new firmware is activated after installation. Step 3 Server /chassis # recover-adapter-update [ pci-slot ] [ pci-slot ] (Optional) Clears an incomplete firmware update condition on one or two specified adapters or, if no adapter is specified, on all adapters. This example begins an adapter firmware upgrade on the adapter in PCI slot 1: Server# scope chassis Server /chassis # update-adapter-fw 192.0.2.34 /ucs/adapters/adapter4.bin activate 1 Server /chassis # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 130 OL-28893-01 Managing Network Adapters Activating Adapter Firmware What to Do Next To activate the new firmware, see Activating Adapter Firmware, on page 131. Activating Adapter Firmware Important While the activation is in progress, do not: • Reset, power off, or shut down the server. • Reboot or reset CIMC. • Activate any other firmware. • Export technical support or configuration data. Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server /chassis # activate-adapter-fw Activates adapter firmware image 1 or 2 on the adapter in the specified PCI slot. pci-slot {1 | 2} Note The changes will take effect upon the next server reboot. This example activates adapter firmware image 2 on the adapter in PCI slot 1: Server# scope chassis Server /chassis # activate-adapter-fw 1 2 Firmware image activation suceeded Please reset the server to run the activated image Server /chassis # What to Do Next Reboot the server to apply the changes. Resetting the Adapter Before You Begin You must log in with admin privileges to perform this task. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 131 Managing Network Adapters Resetting the Adapter Procedure Command or Action Purpose Step 1 Server# scope chassis Enters the chassis command mode. Step 2 Server/chassis # adapter-reset index Resets the adapter at the PCI slot number specified by the index argument. Note Resetting the adapter also resets the host. This example resets the adapter in PCI slot 1: Server# scope chassis Server /chassis # adapter-reset 1 This operation will reset the adapter and the host if it is on. You may lose connectivity to the CIMC and may have to log in again. Continue?[y|N] y Server /chassis # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 132 OL-28893-01 CHAPTER 10 Configuring Communication Services This chapter includes the following sections: • Configuring HTTP, page 133 • Configuring SSH, page 134 • Configuring XML API, page 135 • Configuring IPMI, page 136 • Configuring SNMP, page 137 Configuring HTTP Before You Begin You must log in as a user with admin privileges to configure HTTP. Procedure Command or Action Purpose Step 1 Server# scope http Enters the HTTP command mode. Step 2 Server /http # set enabled {yes | no} Enables or disables HTTP and HTTPS service on the CIMC. Step 3 Server /http # set http-port number Sets the port to use for HTTP communication. The default is 80. Step 4 Server /http # set https-port number Sets the port to use for HTTPS communication. The default is 443. Step 5 Server /http # set http-redirect {yes Enables or disables the redirection of an HTTP request to HTTPS. | no} Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 133 Configuring Communication Services Configuring SSH Step 6 Command or Action Purpose Server /http # set timeout seconds Sets the number of seconds to wait between HTTP requests before the CIMC times out and terminates the session. Enter an integer between 60 and 10,800. The default is 1,800 seconds. Step 7 Server /http # commit Commits the transaction to the system configuration. This example configures HTTP for the CIMC: Server# scope http Server /http # set enabled yes Server /http *# set http-port 80 Server /http *# set https-port 443 Server /http *# set http-redirect yes Server /http *# set timeout 1800 Server /http *# commit Server /http # show HTTP Port HTTPS Port Timeout Active Sessions Enabled HTTP Redirected ---------- ---------- -------- --------------- ------- ---------------80 443 1800 0 yes yes Server /http # Configuring SSH Before You Begin You must log in as a user with admin privileges to configure SSH. Procedure Command or Action Purpose Step 1 Server# scope ssh Enters the SSH command mode. Step 2 Server /ssh # set enabled {yes | no} Enables or disables SSH on the CIMC. Step 3 Server /ssh # set ssh-port number Sets the port to use for secure shell access. The default is 22. Step 4 Server /ssh # set timeout seconds Sets the number of seconds to wait before the system considers an SSH request to have timed out. Enter an integer between 60 and 10,800. The default is 300 seconds. Step 5 Server /ssh # commit Commits the transaction to the system configuration. Step 6 Server /ssh # show [detail] (Optional) Displays the SSH configuration. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 134 OL-28893-01 Configuring Communication Services Configuring XML API This example configures SSH for the CIMC: Server# scope ssh Server /ssh # set enabled yes Server /ssh *# set ssh-port 22 Server /ssh *# set timeout 600 Server /ssh *# commit Server /ssh # show SSH Port Timeout Active Sessions Enabled ---------- -------- --------------- ------22 600 1 yes Server /ssh # Configuring XML API XML API for CIMC The Cisco CIMC XML application programming interface (API) is a programmatic interface to CIMC for a C-Series Rack-Mount Server. The API accepts XML documents through HTTP or HTTPS. For detailed information about the XML API, see Cisco UCS Rack-Mount Servers CIMC XML API Programmer’s Guide. Enabling XML API Before You Begin You must log in as a user with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope xmlapi Enters XML API command mode. Step 2 Server /xmlapi # set enabled {yes | no} Enables or disables XML API control of CIMC. Step 3 Server /xmlapi # commit Commits the transaction to the system configuration. This example enables XML API control of CIMC and commits the transaction: Server# scope xmlapi Server /xmlapi # set enabled yes Server /xmlapi *# commit Server /xmlapi # show detail XMLAPI Settings: Enabled: yes Active Sessions: 0 Max Sessions: 4 Server /xmlapi # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 135 Configuring Communication Services Configuring IPMI Configuring IPMI IPMI Over LAN Intelligent Platform Management Interface (IPMI) defines the protocols for interfacing with a service processor embedded in a server platform. This service processor is called a Baseboard Management Controller (BMC) and resides on the server motherboard. The BMC links to a main processor and other on-board elements using a simple serial bus. During normal operations, IPMI lets a server operating system obtain information about system health and control system hardware. For example, IPMI enables the monitoring of sensors, such as temperature, fan speeds and voltages, for proactive problem detection. If server temperature rises above specified levels, the server operating system can direct the BMC to increase fan speed or reduce processor speed to address the problem. Configuring IPMI over LAN Configure IPMI over LAN when you want to manage the CIMC with IPMI messages. Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope ipmi Enters the IPMI command mode. Step 2 Server /ipmi # set enabled Enables or disables IPMI access on this server. {yes | no} Step 3 Server /ipmi # set Specifies the highest privilege level that can be assigned to an IPMI privilege-level {readonly | session on this server. This can be: user | admin} • readonly — IPMI users can view information but cannot make any changes. If you select this option, IPMI users with the "Administrator", "Operator", or "User" user roles can only create read-only IPMI sessions, regardless of their other IPMI privileges. • user — IPMI users can perform some functions but cannot perform administrative tasks. If you select this option, IPMI users with the "Administrator" or "Operator" user role can create user and read-only sessions on this server. • admin — IPMI users can perform all available actions. If you select this option, IPMI users with the "Administrator" user role can create admin, user, and read-only sessions on this server. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 136 OL-28893-01 Configuring Communication Services Configuring SNMP Command or Action Purpose Step 4 Server /ipmi # set encryption-key key Sets the IPMI encryption key to use for IPMI communications. The key value must be 40 hexadecimal numbers. Step 5 Server /ipmi # commit Commits the transaction to the system configuration. This example configures IPMI over LAN for the CIMC: Server# scope ipmi Server /ipmi # set enabled yes Server /ipmi *# set privilege-level admin Server /ipmi *# set encryption-key abcdef01234567890abcdef01234567890abcdef Server /ipmi *# commit Server /ipmi # show Enabled Encryption Key Privilege Level Limit ------- ---------------------------------------- --------------------yes abcdef01234567890abcdef01234567890abcdef admin Server /ipmi # Configuring SNMP SNMP The Cisco UCS C-Series Rack-Mount Servers support the Simple Network Management Protocol (SNMP) for viewing server configuration and status and for sending fault and alert information by SNMP traps. For information on Management Information Base (MIB) files supported by CIMC, see the MIB Quick Reference for Cisco UCS at this URL: http://www.cisco.com/en/US/docs/unified_computing/ucs/sw/mib/reference/UCS_ MIBRef.html. Configuring SNMP Properties Before You Begin You must log in as a user with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope snmp Enters SNMP command mode. Step 2 Server /snmp # set enabled {yes Enables or disables SNMP. | no} Note SNMP must be enabled and saved before additional SNMP configuration commands are accepted. Step 3 Server /snmp # commit Commits the transaction to the system configuration. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 137 Configuring Communication Services Configuring SNMP Properties Command or Action Purpose Step 4 Server /snmp # set community-str community Specifies the default SNMP v1 or v2c community name that CIMC includes on any trap messages it sends to the SNMP host. The name can be up to 18 characters. Step 5 Server /snmp # setcommunity-access This can be one of the following : Disabled, Limited, or Full. Step 6 Server /snmp # settrap-community-str Specifies the SNMP community group to which trap information should be sent. The name can be up to 18 characters Step 7 Server /snmp # set sys-contact Specifies the system contact person responsible for the SNMP implementation. The contact information can be up to 254 contact characters, such as an email address or a name and telephone number. To enter a value that contains spaces, you must enclose the entry with quotation marks. Step 8 Server /snmp # set sys-location Specifies the location of the host on which the SNMP agent (server) runs. The location information can be up to 254 location characters. To enter a value that contains spaces, you must enclose the entry with quotation marks. Step 9 Server /snmp # commit Commits the transaction to the system configuration. This example configures the SNMP properties and commits the transaction: Server# scope snmp Server /snmp # set enabled yes Server /snmp *# commit Server /snmp # set community-str cimcpublic Server /snmp # set community-access Full Server /snmp # set trap-community-str public Server /snmp *# set sys-contact "User Name+1-408-555-1212" Server /snmp *# set sys-location "San Jose, California" Server /snmp *# commit Server /snmp # show detail SNMP Settings: SNMP Port: 161 System Contact: User Name +1-408-555-1212 System Location: San Jose, California SNMP Community: cimcpublic SNMP Trap community: public SNMP Community access: Full Enabled: yes Server /snmp # What to Do Next Configure SNMP trap settings as described in Configuring SNMP Trap Settings, on page 139. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 138 OL-28893-01 Configuring Communication Services Configuring SNMP Trap Settings Configuring SNMP Trap Settings Before You Begin • You must log in with admin privileges to perform this task. • SNMP must be enabled and saved before trap settings can be configured. Procedure Command or Action Purpose Step 1 Server# scope snmp Enters the SNMP command mode. Step 2 Server /snmp # scope trap-destinations number Enters the SNMP trap destination command mode for the specified destination. Four SNMP trap destinations are available. The destination number is an integer between 1 and 15. Step 3 Server /snmp/trap-destinations # set enabled {yes | no} Enables or disables the SNMP trap destination. Step 4 Server /snmp/trap-destinations # set version {1 | 2 | 3} Specify the desired SNMP version of the trap message. Server /snmp/trap-destinations # set type {trap | inform} Specifies whether SNMP notification messages are sent as simple traps or as inform requests requiring acknowledgment by the receiver. Step 5 Note Note SNMPv3 traps will be delivered only to locations where the SNMPv3 user and key values are configured correctly. The inform option can be chosen only for V2 users. Step 6 Server /snmp/trap-destinations # set user user Step 7 Server /snmp/trap-destination # set v4-addr ip-address Specifies the destination IP address to which SNMP trap information is sent. Step 8 Server /snmp/trap-destination # commit Commits the transaction to the system configuration. This example configures general SNMP trap settings and trap destination number 1 and commits the transaction: Server# scope snmp Server /snmp # Scope trap-destinations 1 Server /snmp/trap-destination *# set enabled yes Server /snmp/trap-destination *# set version 2 Server /snmp/trap-destination *# set type inform Server /snmp/trap-destination *# set user user1 Server /snmp/trap-destination *# set v4-addr 192.2.3.4 Server /snmp/trap-destination *# commit Server /snmp/trap-destination # show detail Trap Destination 1: Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 139 Configuring Communication Services Sending a Test SNMP Trap Message Enabled: yes SNMP version: 2 Trap type: inform SNMP user: user1 IPv4 Address: 192.2.3.4 Delete Trap: no Server /snmp/trap-destination # Sending a Test SNMP Trap Message Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope snmp Enters the SNMP command mode. Step 2 Server /snmp # sendSNMPtrap Sends an SNMP test trap to the configured SNMP trap destination that are enabled. Note The trap must be configured and enabled in order to send a test message. This example sends a test message to all the enabled SNMP trap destinations: Server# scope snmp Server /snmp # sendSNMPtrap SNMP Test Trap sent to the destination. Server /snmp # Configuring SNMPv3 Users Before You Begin • You must log in as a user with admin privileges to perform this task. • SNMP must be enabled and saved before these configuration commands are accepted. Procedure Command or Action Purpose Step 1 Server# scope snmp Enters the SNMP command mode. Step 2 Server /snmp # scope v3users number Enters the SNMPv3 users command mode for the specified user number. Step 3 Server /snmp/v3users # set v3add {yes | no} Adds or deletes an SNMPv3 user. This can be one of the following: Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 140 OL-28893-01 Configuring Communication Services Configuring SNMPv3 Users Command or Action Purpose • yes—This user is enabled as an SNMPv3 user and is allowed to access the SNMP OID tree. Note The security name and security level must also be configured at this time or the user addition will fail. • no—This user configuration is deleted. Step 4 Server /snmp/v3users # set v3security-name security-name Enter an SNMP username for this user. Step 5 Server /snmp/v3users # set v3security-level {noauthnopriv | authnopriv | authpriv} Select a security level for this user. This can be one of the following: • noauthnopriv—The user does not require an authorization or privacy password. • authnopriv—The user requires an authorization password but not a privacy password. If you select this option, you must configure an authentication key. • authpriv—The user requires both an authorization password and a privacy password. If you select this option, you must configure an authentication key and a private encryption key. Step 6 Server /snmp/v3users # set v3proto Select an authentication protocol for this user. {MD5 | SHA} Step 7 Server /snmp/v3users # set v3auth-key auth-key Enter an authorization password for this user. Step 8 Server /snmp/v3users # set v3priv-proto {DES | AES} Select an encryption protocol for this user. Step 9 Server /snmp/v3users # set v3priv-auth-key priv-auth-key Enter a private encryption key (privacy password) for this user. Step 10 Server /snmp/v3users # commit Commits the transaction to the system configuration. This example configures SNMPv3 user number 2 and commits the transaction: Server# scope snmp Server /snmp # scope v3users 2 Server /snmp/v3users # set v3add yes Server /snmp/v3users *# set v3security-name ucsSNMPV3user Server /snmp/v3users *# set v3security-level authpriv Server /snmp/v3users *# set v3proto SHA Server /snmp/v3users *# set v3auth-key Please enter v3auth-key:ex4mp1ek3y Please confirm v3auth-key:ex4mp1ek3y Server /snmp/v3users *# set v3priv-proto AES Server /snmp/v3users *# set v3priv-auth-key Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 141 Configuring Communication Services Configuring SNMPv3 Users Please enter v3priv-auth-key:!1@2#3$4%5^6&7*8 Please confirm v3priv-auth-key:!1@2#3$4%5^6&7*8 Server /snmp/v3users *# commit Settings are being applied ... allow a few minutes for the process to complete Server /snmp/v3users # show detail User 2: Add User: yes Security Name: ucsSNMPV3user Security Level: authpriv Auth Type: SHA Auth Key: ****** Encryption: AES Private Key: ****** Server /snmp/v3users # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 142 OL-28893-01 CHAPTER 11 Managing Certificates This chapter includes the following sections: • Managing the Server Certificate, page 143 • Generating a Certificate Signing Request, page 143 • Creating a Self-Signed Certificate, page 145 • Uploading a Server Certificate, page 147 Managing the Server Certificate You can generate a certificate signing request (CSR) to obtain a new certificate, and you can upload the new certificate to the CIMC to replace the current server certificate. The server certificate may be signed either by a public Certificate Authority (CA), such as Verisign, or by your own certificate authority. Procedure Step 1 Step 2 Step 3 Generate the CSR from the CIMC. Submit the CSR file to a certificate authority that will issue and sign your certificate. If your organization generates its own self-signed certificates, you can use the CSR file to generate a self-signed certificate. Upload the new certificate to the CIMC. Note The uploaded certificate must be created from a CSR generated by the CIMC. Do not upload a certificate that was not created by this method. Generating a Certificate Signing Request Before You Begin You must log in as a user with admin privileges to configure certificates. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 143 Managing Certificates Generating a Certificate Signing Request Procedure Command or Action Purpose Step 1 Server# scope certificate Enters the certificate command mode. Step 2 Server /certificate # generate-csr Launches a dialog for the generation of a certificate signing request (CSR). You will be prompted to enter the following information for the certificate signing request: Common Name (CN) The fully qualified hostname of the CIMC. Organization Name (O) The organization requesting the certificate. Organization Unit (OU) The organizational unit. Locality (L) The city or town in which the company requesting the certificate is headquartered. StateName (S) The state or province in which the company requesting the certificate is headquartered. Country Code (CC) The two-letter ISO country code for the country in which the company is headquartered. Email The administrative email contact at the company. After you have entered the requested information, the system will generate and display a certificate signing request in the console output. A CSR file will not be created, but you can copy the CSR information from the console output and paste the information into a text file. This example generates a certificate signing request: Server# scope certificate Server /certificate # generate-csr Common Name (CN): test.example.com Organization Name (O): Example, Inc. Organization Unit (OU): Test Department Locality (L): San Jose StateName (S): CA Country Code (CC): US Email: user@example.com Continue to generate CSR?[y|N]y -----BEGIN CERTIFICATE REQUEST----MIIB/zCCAWgCAQAwgZkxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDQTEVMBMGA1UE BxMMU2FuIEpvc2UsIENBMRUwEwYDVQQKEwxFeGFtcGxlIEluYy4xEzARBgNVBAsT ClRlc3QgR3JvdXAxGTAXBgNVBAMTEHRlc3QuZXhhbXBsZS5jb20xHzAdBgkqhkiG 9w0BCQEWEHVzZXJAZXhhbXBsZS5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJ AoGBAMZw4nTepNIDhVzb0j7Z2Je4xAG56zmSHRMQeOGHemdh66u2/XAoLx7YCcYU ZgAMivyCsKgb/6CjQtsofvzxmC/eAehuK3/SINv7wd6Vv2pBt6ZpXgD4VBNKONDl GMbkPayVlQjbG4MD2dx2+H8EH3LMtdZrgKvPxPTE+bF5wZVNAgMBAAGgJTAjBgkq hkiG9w0BCQcxFhMUQSBjaGFsbGVuZ2UgcGFzc3dvcmQwDQYJKoZIhvcNAQEFBQAD Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 144 OL-28893-01 Managing Certificates Creating a Self-Signed Certificate gYEAG61CaJoJaVMhzCl903O6Mg51zq1zXcz75+VFj2I6rH9asckCld3mkOVx5gJU Ptt5CVQpNgNLdvbDPSsXretysOhqHmp9+CLv8FDuy1CDYfuaLtvlWvfhevskV0j6 mK3Ku+YiORnv6DhxrOoqau8r/hyI/L43l7IPN1HhOi3oha4= -----END CERTIFICATE REQUEST----Copy everything from "-----BEGIN ..." to "END CERTIFICATE REQUEST-----", paste to a file, send to your chosen CA for signing, and finally upload the signed certificate via upload command. ---OR--Continue to self sign CSR and overwrite the current certificate? All HTTPS and SSH sessions will be disconnected. [y|N]N What to Do Next Perform one of the following tasks: • If you do not want to obtain a certificate from a public certificate authority, and if your organization does not operate its own certificate authority, you can allow CIMC to internally generate a self-signed certificate from the CSR and upload it immediately to the server. Type y after the final prompt in the example to perform this action. • If your organization operates its own certificate server for generating self-signed certificates, copy the command output from "-----BEGIN ..." to "END CERTIFICATE REQUEST-----" and paste to a file named csr.txt. Input the CSR file to your certificate server to generate a self-signed certificate. • If you will obtain a certificate from a public certificate authority, copy the command output from "-----BEGIN ..." to "END CERTIFICATE REQUEST-----" and paste to a file named csr.txt. Submit the CSR file to the certificate authority to obtain a signed certificate. If you did not use the first option, in which CIMC internally generates and uploads a self-signed certificate, you must upload the new certificate using the upload command in certificate command mode. Creating a Self-Signed Certificate As an alternative to using a public Certificate Authority (CA) to generate and sign a server certificate, you can operate your own CA and sign your own certificates. This section shows commands for creating a CA and generating a server certificate using the OpenSSL certificate server running on Linux. For detailed information about OpenSSL, see http://www.openssl.org. Note These commands are to be entered on a Linux server with the OpenSSL package, not in the CIMC CLI. Before You Begin Obtain and install a certificate server software package on a server within your organization. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 145 Managing Certificates Creating a Self-Signed Certificate Procedure Step 1 Command or Action Purpose openssl genrsa -out CA_keyfilename keysize This command generates an RSA private key that will be used by the CA. Note To allow the CA to access the key without user input, do not use the -des3 option for this command. The specified file name contains an RSA key of the specified key size. Example: # openssl genrsa -out ca.key 1024 Step 2 Step 3 This command generates a new self-signed certificate openssl req -new -x509 -days numdays -key CA_keyfilename -out CA_certfilename for the CA using the specified key. The certificate is valid for the specified period. The command prompts the user for additional certificate information. Example: # openssl req -new -x509 -days 365 -key ca.key -out ca.crt The certificate server is an active CA. echo "nsCertType = server" > openssl.conf This command adds a line to the OpenSSL configuration file to designate the certificate as a server-only certificate. This designation is a defense against a man-in-the-middle attack, in which an authorized client attempts to impersonate the server. Example: # echo "nsCertType = server" > openssl.conf Step 4 The OpenSSL configuration file openssl.conf contains the statement "nsCertType = server". This command directs the CA to use your CSR file to openssl x509 -req -days numdays -in generate a server certificate. CSR_filename -CA CA_certfilename -set_serial 04 -CAkey CA_keyfilename -out Your server certificate is contained in the output file. server_certfilename -extfile openssl.conf Example: # openssl x509 -req -days 365 -in csr.txt -CA ca.crt -set_serial 04 -CAkey ca.key -out myserver05.crt -extfile openssl.conf This example shows how to create a CA and to generate a server certificate signed by the new CA. These commands are entered on a Linux server running OpenSSL. # /usr/bin/openssl genrsa -out ca.key 1024 Generating RSA private key, 1024 bit long modulus .............++++++ .....++++++ e is 65537 (0x10001) # /usr/bin/openssl req -new -x509 -days 365 -key ca.key -out ca.crt You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 146 OL-28893-01 Managing Certificates Uploading a Server Certificate If you enter '.', the field will be left blank. ----Country Name (2 letter code) [GB]:US State or Province Name (full name) [Berkshire]:California Locality Name (eg, city) [Newbury]:San Jose Organization Name (eg, company) [My Company Ltd]:Example Incorporated Organizational Unit Name (eg, section) []:Unit A Common Name (eg, your name or your server's hostname) []:example.com Email Address []:admin@example.com # echo "nsCertType = server" > openssl.conf # /usr/bin/openssl x509 -req -days 365 -in csr.txt -CA ca.crt -set_serial 01 -CAkey ca.key -out server.crt -extfile openssl.conf Signature ok subject=/C=US/ST=California/L=San Jose/O=Example Inc./OU=Unit A/CN=example.com/emailAddress=john@example.com Getting CA Private Key # What to Do Next Upload the new certificate to the CIMC. Uploading a Server Certificate Before You Begin You must log in as a user with admin privileges to upload a certificate. The certificate to be uploaded must be available as readable text. During the upload procedure, you will copy the certificate text and paste it into the CLI. Note You must first generate a CSR using the CIMC certificate management CSR generation procedure, and you must use that CSR to obtain the certificate for uploading. Do not upload a certificate that was not obtained by this method. Note All current HTTPS and SSH sessions are disconnected when the new server certificate is uploaded. Procedure Command or Action Purpose Step 1 Server# scope certificate Enters the certificate command mode. Step 2 Server /certificate # upload Launches a dialog for entering and uploading the new server certificate. Copy the certificate text, paste it into the console when prompted, and type CTRL+D to upload the certificate. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 147 Managing Certificates Uploading a Server Certificate This example uploads a new certificate to the server: Server# scope certificate Server /certificate # upload Please paste your certificate here, when finished, press CTRL+D. -----BEGIN CERTIFICATE----MIIB/zCCAWgCAQAwgZkxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDQTEVMBMGA1UE BxMMU2FuIEpvc2UsIENBMRUwEwYDVQQKEwxFeGFtcGxlIEluYy4xEzARBgNVBAsT ClRlc3QgR3JvdXAxGTAXBgNVBAMTEHRlc3QuZXhhbXBsZS5jb20xHzAdBgkqhkiG 9w0BCQEWEHVzZXJAZXhhbXBsZS5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJ AoGBAMZw4nTepNIDhVzb0j7Z2Je4xAG56zmSHRMQeOGHemdh66u2/XAoLx7YCcYU ZgAMivyCsKgb/6CjQtsofvzxmC/eAehuK3/SINv7wd6Vv2pBt6ZpXgD4VBNKONDl GMbkPayVlQjbG4MD2dx2+H8EH3LMtdZrgKvPxPTE+bF5wZVNAgMBAAGgJTAjBgkq hkiG9w0BCQcxFhMUQSBjaGFsbGVuZ2UgcGFzc3dvcmQwDQYJKoZIhvcNAQEFBQAD gYEAG61CaJoJaVMhzCl903O6Mg51zq1zXcz75+VFj2I6rH9asckCld3mkOVx5gJU Ptt5CVQpNgNLdvbDPSsXretysOhqHmp9+CLv8FDuy1CDYfuaLtvlWvfhevskV0j6 mK3Ku+YiORnv6DhxrOoqau8r/hyI/L43l7IPN1HhOi3oha4= -----END CERTIFICATE---- Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 148 OL-28893-01 CHAPTER 12 Configuring Platform Event Filters This chapter includes the following sections: • Platform Event Filters, page 149 • Enabling Platform Event Alerts, page 149 • Disabling Platform Event Alerts, page 150 • Configuring Platform Event Filters, page 150 • Configuring Platform Event Trap Settings, page 152 • Interpreting Platform Event Traps, page 153 Platform Event Filters A platform event filter (PEF) can trigger an action and generate an alert when a critical hardware-related event occurs. For each PEF, you can choose the action to be taken (or take no action) when a platform event occurs. You can also choose to generate and send an alert when a platform event occurs. Alerts are sent as an SNMP trap, so you must configure an SNMP trap destination before the alerts can be sent. You can globally enable or disable the generation of platform event alerts. When disabled, alerts are not sent even if PEFs are configured to send them. Enabling Platform Event Alerts Procedure Command or Action Purpose Step 1 Server# scope fault Enters the fault command mode. Step 2 Server /fault # set platform-event-enabled yes Enables platform event alerts. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 149 Configuring Platform Event Filters Disabling Platform Event Alerts Command or Action Purpose Step 3 Server /fault # commit Commits the transaction to the system configuration. Step 4 Server /fault # show [detail] (Optional) Displays the platform event alert configuration. The following example enables platform event alerts: Server# scope fault Server /fault # set platform-event-enabled yes Server /fault *# commit Server /fault # show SNMP Community String Platform Event Enabled --------------------- ----------------------public yes Server /fault # Disabling Platform Event Alerts Procedure Command or Action Purpose Step 1 Server# scope fault Enters the fault command mode. Step 2 Server /fault # set platform-event-enabled no Disables platform event alerts. Step 3 Server /fault # commit Commits the transaction to the system configuration. Step 4 Server /fault # show [detail] (Optional) Displays the platform event alert configuration. The following example disables platform event alerts: Server# scope fault Server /fault # set platform-event-enabled no Server /fault *# commit Server /fault # show SNMP Community String Platform Event Enabled --------------------- ----------------------public no Server /fault # Configuring Platform Event Filters You can configure actions and alerts for the following platform event filters: Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 150 OL-28893-01 Configuring Platform Event Filters Configuring Platform Event Filters ID Platform Event Filter 1 Temperature Critical Assert Filter 2 Temperature Warning Assert Filter 3 Voltage Critical Assert Filter 4 Current Assert Filter 5 Fan Critical Assert Filter 6 Processor Assert Filter 7 Power Supply Critical Assert Filter 8 Power Supply Warning Assert Filter 9 Power Supply Redundancy Lost Filter 10 Discrete Power Supply Assert Filter 11 Memory Assert Filter 12 Drive Slot Assert Filter Procedure Command or Action Purpose Step 1 Server# scope fault Enters the fault command mode. Step 2 Server /fault # scope pef id Enters the platform event filter command mode for the specified event. See the Platform Event Filter table for event ID numbers. Step 3 Server /fault/pef # set action {none | reboot | power-cycle | power-off} Selects the desired system action when this event occurs. The action can be one of the following: • none —No system action is taken. • reboot —The server is rebooted. • power-cycle —The server is power cycled. • power-off —The server is powered off. Step 4 Server /fault/pef # set send-alert Enables or disables the sending of a platform event alert for this event. {yes | no} Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 151 Configuring Platform Event Filters Configuring Platform Event Trap Settings Command or Action Purpose Note Step 5 Server /fault/pef # commit For an alert to be sent, the filter trap settings must be configured properly and platform event alerts must be enabled. Commits the transaction to the system configuration. This example configures the platform event alert for an event: Server# scope fault Server /fault # scope pef 11 Server /fault/pef # set action reboot Server /fault/pef *# set send-alert yes Server /fault/pef *# commit Server /fault/pef # show Platform Event Filter Event Action Send Alert --------------------- --------------------------- ----------- -----------------11 Memory Assert Filter reboot yes Server /fault/pef # What to Do Next If you configure any PEFs to send an alert, enable platform event alerts. Configuring Platform Event Trap Settings Before You Begin You must log in with admin privileges to perform this task. Procedure Command or Action Purpose Step 1 Server# scope fault Enters the fault command mode. Step 2 Server /fault # scope pef-destinations Enters the platform event filter destinations command mode. Step 3 Server /fault /pef-destinations # set enabled yes Enables the platform event trap destination. Step 4 Server /fault /pef-destinations # set addr Specifies the destination IP address to which platform event trap information is sent. IP Address Step 5 Server /fault /pef-destinations # commit Commits the transaction to the system configuration. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 152 OL-28893-01 Configuring Platform Event Filters Interpreting Platform Event Traps This example configures general platform event trap settings and trap destination number 1 and commits the transaction: Server# scope Server /fault Server /fault Server /fault Server /fault Server /fault fault # scope pef-destination 1 /pef-destinations *# set enabled yes /pef-destinations *# set addr 1.2.3.4 /pef-destinations *# commit /pef-destinations # show Trap Destination 1: IP Address: 1.2.3.4 Enabled: yes Server /fault /pef-destinations # Interpreting Platform Event Traps A CIMC platform event alert contains an enterprise object identifier (OID) in the form 1.3.6.1.4.1.3183.1.1.0.event. The first ten fields of the OID represent the following information: iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).wired_for_management(3183).PET(1).version(1).version(0), indicating an IPMI platform event trap (PET) version 1.0 message. The last field is an event number, indicating the specific condition or alert being notified. Platform Event Trap Descriptions The following table provides a description of the event being notified in a platform event trap message, based on the event number in the trap OID. Event Number [Note 1] Platform Event Description 0 0h Test Trap 65799 010107h Temperature Warning 65801 010109h Temperature Critical 131330 020102h Under Voltage, Critical 131337 020109h Voltage Critical 196871 030107h Current Warning 262402 040102h Fan Critical 459776 070400h Processor related (IOH-Thermalert/Caterr sensor) – predictive failure deasserted 459777 070401h Processor related (IOH-Thermalert/Caterr sensor) – predictive failure asserted 460032 070500h Processor Power Warning – limit not exceeded 460033 070501h Processor Power Warning – limit exceeded 524533 0800F5h Power Supply Critical 524551 080107h Power Supply Warning Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 153 Configuring Platform Event Filters Interpreting Platform Event Traps Event Number [Note 1] Platform Event Description 525313 080401h Discrete Power Supply Warning 527105 080B01h Power Supply Redundancy Lost 527106 080B02h Power Supply Redundancy Restored 552704 086F00h Power Supply Inserted 552705 086F01h Power Supply Failure 552707 086F03h Power Supply AC Lost 786433 0C0001h Correctable ECC Memory Errors, Release 1.3(1) and later releases, filter set to accept all reading types [Note 4] 786439 0C0007h DDR3_INFO sensor LED - RED bit asserted (Probable ECC error on a DIMM), Generic Sensor [Notes 2,3] 786689 0C0101h Correctable ECC Memory Errors, Release 1.3(1) and later releases 818945 0C7F01h Correctable ECC Memory Errors, Release 1.2(x) and earlier releases 818951 0C7F07h DDR3_INFO sensor LED - RED bit asserted (Probable ECC error on a DIMM), 1.2(x) and earlier releases [Note 3] 851968 0D0000h HDD sensor indicates no fault, Generic Sensor [Note 2] 851972 0D0004h HDD sensor indicates a fault, Generic Sensor [Note 2] 854016 0D0800h HDD Absent, Generic Sensor [Note 2] 854017 0D0801h HDD Present, Generic Sensor [Note 2] 880384 0D6F00h HDD Present, no fault indicated 880385 0D6F01h HDD Fault 880512 0D6F80h HDD Not Present 880513 0D6F81h HDD is deasserted but not in a fault state 884480 0D7F00h Drive Slot LED Off 884481 0D7F01h Drive Slot LED On 884482 0D7F02h Drive Slot LED fast blink 884483 0D7F03h Drive Slot LED slow blink 884484 0D7F04h Drive Slot LED green 884485 0D7F05h Drive Slot LED amber 884486 0D7F01h Drive Slot LED blue 884487 0D7F01h Drive Slot LED read 884488 0D7F08h Drive Slot Online 884489 0D7F09h Drive Slot Degraded Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 154 OL-28893-01 Configuring Platform Event Filters Interpreting Platform Event Traps Event Number [Note 1] Platform Event Description Note 1: Basic information about the event number format can be found in the IPMI Platform Event Trap Format Specification v1.0 at this URL: ftp://download.intel.com/design/servers/ipmi/pet100.pdf. Note 2: Some platforms and releases use generic sensor implementations, while some use Cisco proprietary sensor implementations. Note 3: In Release 1.3(1) and later releases, the ECC sensor no longer activates the LED. Note 4: When the event filter is set to accept all reading types, bits 15:8 of the hex event number are masked to 0. For example, event number 786689 (0C0101h) becomes 786433 (0C0001h). Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 155 Configuring Platform Event Filters Interpreting Platform Event Traps Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 156 OL-28893-01 CHAPTER 13 CIMC Firmware Management This chapter includes the following sections: • Overview of Firmware, page 157 • Obtaining Firmware from Cisco, page 158 • Installing CIMC Firmware from a Remote Server, page 159 • Activating Installed CIMC Firmware, page 160 • Installing BIOS Firmware from a Remote Server, page 162 Overview of Firmware C-Series servers use Cisco-certified firmware specific to the C-Series server model that you are using. You can download new releases of the firmware for all supported server models from Cisco.com. Caution When you install new BIOS firmware, it must be from the same software release as the CIMC firmware running on the server. Do not install new BIOS firmware until after you have activated the matching CIMC firmware or the server will not boot. To avoid potential problems, we strongly recommend that you use the Cisco Host Upgrade Utility (HUU), which upgrades the BIOS, CIMC, and other firmware to compatible levels. For detailed information about this utility, see the Cisco Host Upgrade Utility Guide for the version of the HUU that goes with the CIMC software release that you want to install. The HUU guides are available at the following URL: http:// www.cisco.com/en/US/products/ps10493/products_user_guide_list.html. If you elect to update the firmware manually, you must update the CIMC firmware first. The CIMC firmware update process is divided into the following stages to minimize the amount of time the server will be offline: • Installation. During this stage, CIMC installs the selected CIMC firmware in the non-active, or backup, slot on the server. • Activation. During this stage, CIMC sets the non-active firmware version as active and reboots the server, causing a disruption in service. When the server reboots, the firmware in the new active slot becomes the running version. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 157 CIMC Firmware Management Obtaining Firmware from Cisco After you activate the CIMC firmware, you can update the BIOS firmware. The server must be powered off during the entire BIOS update process, so the process is not divided into stages. Instead, you only need to issue a single command and CIMC installs and updates the BIOS firmware as quickly as possible. Once the CIMC finishes rebooting, the server can be powered on and returned to service. Note You can either upgrade an older firmware version to a newer one, or downgrade a newer firmware version to an older one. Obtaining Firmware from Cisco Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Navigate to http://www.cisco.com/. If you are not already logged in, click Log In at the top right-hand edge of the page and log in using your Cisco.com credentials. In the menu bar at the top, click Support. Click All Downloads in the roll down menu. If your server model is listed in the Recently Used Products list, click the server name. Otherwise, do the following: a) In the left-hand box, click Products. b) In the center box, click Unified Computing and Servers. c) In the right-hand box, click Cisco UCS C-Series Rack-Mount Standalone Server Software. d) In the right-hand box, click the server model whose software you want to download. Click the Unified Computing System (UCS) Server Firmware link. (Optional) Select a prior release from the menu bar on the left-hand side of the page. Click the Download button associated with the Cisco Host Upgrade Utility ISO for the selected release. Click Accept License Agreement. Save the ISO file to a local drive. We recommend you upgrade the CIMC and BIOS firmware on your server using this ISO file, which contains the Cisco Host Upgrade Utility. For detailed information about this utility, see the Cisco Host Upgrade Utility Guide for the version of the HUU that goes with the CIMC software release that you want to install. The HUU guides are available at the following URL: http://www.cisco.com/en/US/products/ps10493/products_user_ guide_list.html. Step 11 (Optional) If you plan to upgrade the CIMC and BIOS firmware manually, do the following: a) From the ISO file, open the ZIP file containing the firmware installation files. The ZIP file is on the top-level of the ISO file, and its name follows the format ServerModel_ReleaseNumber.ZIP. For example, C240M3_1.4.4A.ZIP. You do not need to extract all of the files contained in this ZIP file. Instead, you only need to open it so that you can access the BIOS firmware installation CAP file and the ZIP file containing the CIMC firmware installation BIN file. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 158 OL-28893-01 CIMC Firmware Management Installing CIMC Firmware from a Remote Server b) From the ServerModel_ReleaseNumber.ZIP file, extract the BIOS firmware installation CAP file and save it to your local drive. The CAP file is in the ReleaseNumber/bios/cimc folder, and its name follows the format Server-BIOS-Release-Number.CAP. For example, 1.4.4a/bios/cimc/C240-BIOS-1-4-4c-0.CAP. c) From the ServerModel_ReleaseNumber.ZIP file, open the ZIP file containing the CIMC firmware installation files. The ZIP file is in the ReleaseNumber/cimc folder and its name follows the format server-model-cimc-release.zip. For example, 1.4.4a/cimc/c240-m3-cimc.1.4.4a.zip. You do not need to extract all of the files contained in this zip file. Instead, you only need to open it so that you can access the CIMC firmware installation BIN file. d) From the server-model-cimc-release.zip file, extract the full CIMC firmware installation BIN file and save it to your local drive. The BIN file is in the server-model-cimc-release folder and its name follows the format upd-pkg-server-model-cimc.full.release.bin. For example, c240-m3-cimc.1.4.4a/upd-pkg-c240-m3-cimc.full.1.4.4a.bin. Step 12 (Optional) If you plan to install the firmware from a remote server, copy the BIOS installation CAP file and the CIMC installation BIN file to the remote server you want to use. The remote server can be one of the following: • TFTP • FTP • SFTP • SCP • HTTP The server must have read permission for the destination folder on the remote server. What to Do Next Use the Cisco Host Upgrade Utility to upgrade all firmware on the server or manually install the CIMC firmware on the server. Installing CIMC Firmware from a Remote Server Before You Begin • Log in to the as a user with admin privileges. • Obtain the Cisco Host Upgrade Utility ISO file from Cisco.com and extract the firmware installation files as described in Obtaining Firmware from Cisco, on page 158. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 159 CIMC Firmware Management Activating Installed CIMC Firmware Note If you start an update while an update is already in process, both updates will fail. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope firmware Enters the CIMC firmware command mode. Step 3 Server /cimc/firmware # update protocol IP Address path Specifies the protocol, IP address of the remote server and the file path to the firmware file on the server. The protocol can be one of the following: • TFTP • FTP • SFTP • SCP • HTTP Step 4 Server /cimc/firmware # show detail (Optional) Displays the progress of the firmware update. This example updates the CIMC firmware: Server# scope cimc Server /cimc # scope firmware Server /cimc/firmware # update ftp 192.0.20.34 //test/dnld-ucs-k9-bundle.1.0.2h.bin Press Enter key Firmware update has started. Please check the status using "show detail" Server /cimc/firmware # What to Do Next Activate the new firmware. Activating Installed CIMC Firmware Before You Begin Install the CIMC firmware on the server. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 160 OL-28893-01 CIMC Firmware Management Activating Installed CIMC Firmware Important While the activation is in progress, do not: • Reset, power off, or shut down the server. • Reboot or reset CIMC. • Activate any other firmware. • Export technical support or configuration data. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope firmware Enters the firmware command mode. Step 3 Server /cimc/firmware # show detail Displays the available firmware images and status. Step 4 Server /cimc/firmware # activate [1 | 2] Activates the selected image. If no image number is specified, the server activates the currently inactive image. Step 5 At the prompt, enter y to activate the selected firmware image. The BMC reboots, terminating all CLI and GUI sessions until the reboot completes. Step 6 Log back into the CLI and repeat steps 1–3 (Optional) to verify the activation. This example activates firmware image 1 and then verifies the activation after the BMC reboots: Server# scope cimc Server /cimc # scope firmware Server /cimc/firmware # show detail Firmware Image Information: Update Stage: NONE Update Progress: 100 Current FW Version: 1.3(3a) FW Image 1 Version: 1.4(3j) FW Image 1 State: BACKUP INACTIVATED FW Image 2 Version: 1.3(3a) FW Image 2 State: RUNNING ACTIVATED Boot-loader Version: 1.4(3.21).18 Server /cimc/firmware # activate 1 This operation will activate firmware 1 and reboot the BMC. Continue?[y|N]y . . -- BMC reboot -. . -- Log into CLI as Admin -Server# scope cimc Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 161 CIMC Firmware Management Installing BIOS Firmware from a Remote Server Server /cimc # scope firmware Server /cimc/firmware # show detail Firmware Image Information: Update Stage: NONE Update Progress: 100 Current FW Version: 1.4(3j) FW Image 1 Version: 1.4(3j) FW Image 1 State: RUNNING ACTIVATED FW Image 2 Version: 1.3(3a) FW Image 2 State: BACKUP INACTIVATED Boot-loader Version: 1.4(3.21).18 Installing BIOS Firmware from a Remote Server Note This procedure is not available on some servers. For other BIOS installation methods, see the Cisco UCS C-Series Rack-Mount Server BIOS Upgrade Guide available at the following URL: http://www.cisco.com/ en/US/docs/unified_computing/ucs/c/sw/bios/b_Upgrading_BIOS_Firmware.html. Before You Begin • Log in to the as a user with admin privileges. • Activate the CIMC firmware that goes with the BIOS version you want to install, as described in . • Power off the server. Note If you start an update while an update is already in process, both updates will fail. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope firmware Enters the firmware command mode. Step 3 Server /cimc/firmware # show detail Displays the available firmware images and status. Step 4 Make sure the firmware version shown Important in the Current FW Version field matches the BIOS firmware version you are installing. Step 5 Server /cimc/firmware # top Returns to the server root level. Step 6 Server# scope bios Enters the BIOS command mode. If the CIMC firmware version does not match, activate the CIMC firmware before continuing with this procedure or the server will not boot. For details, see Activating Installed CIMC Firmware, on page 160. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 162 OL-28893-01 CIMC Firmware Management Installing BIOS Firmware from a Remote Server Command or Action Purpose Step 7 Server /bios # update protocol Specifies the protocol to be used. It can be TFTP, FTP, SFTP, SCP or HTTP. Step 8 Server /bios # update IP Address Specifies the IP address or the host name of the remote server. Step 9 Server /bios # update path Specifies the file path to the BIOS firmware file on the remote server. This example updates the BIOS firmware to CIMC software release 1.4(3j): Server# scope cimc Server /cimc # scope firmware Server /cimc/firmware # show detail Firmware Image Information: Update Stage: NONE Update Progress: 100 Current FW Version: 1.4(3j) FW Image 1 Version: 1.4(3j) FW Image 1 State: RUNNING ACTIVATED FW Image 2 Version: 1.3(3a) FW Image 2 State: BACKUP INACTIVATED Boot-loader Version: 1.4(3.21).18 Server /cimc/firmware # top Server # scope bios Server /bios # update ftp 192.0.20.34 //upgrade_bios_files/C260-BIOS-1-4-3j-0.CAP Press Enter key Firmware update has started. Please check the status using "show detail" Server /bios # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 163 CIMC Firmware Management Installing BIOS Firmware from a Remote Server Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 164 OL-28893-01 CHAPTER 14 Viewing Logs This chapter includes the following sections: • Viewing the Faults and Logs Summary, page 165 • CIMC Log, page 166 • System Event Log, page 170 Viewing the Faults and Logs Summary Procedure Command or Action Purpose Step 1 Server # scope fault Enters fault command mode. Step 2 Server # show fault-entries Displays a log of all the faults. This example displays a summary of faults: Server # scope fault Server /fault # show fault-entries Time Severity Description ------------------------ ------------ ----------------Sun Jun 27 04:00:52 2013 info Storage Local disk 12 missing Sat Jun 26 05:00:22 2013 warning Power Supply redundancy is lost Server /fault # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 165 Viewing Logs CIMC Log CIMC Log Viewing the CIMC Log Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope log Enters the CIMC log command mode. Step 3 Server /cimc/log # show entries [detail] Displays CIMC events, including timestamp, the software module that logged the event, and a description of the event. This example displays the log of CIMC events: Server# scope cimc Server /cimc # scope log Server /cimc/log # show entries Time Severity Source Description ------------------- ------------- ---------------- ---------------------------------------2012 Jan 30 05:20:45 Informational BMC:ciscoNET:961 " rpc_aim_callback_function_1_svc() result == SUCCESS, callbackData size: 600 " 2012 Jan 30 05:20:45 Informational BMC:ciscoNET:961 rpc_aim_callback_function_1_svc() returned from pFunctionCallback result:0 2012 Jan 30 05:20:45 Informational BMC:ciscoNET:961 " rpc_aim_callback_function_1_svc() szFunctionName:netGetCurrentIfConfig nSize:0 nMaxSize: 600 " --More-Server /cimc/log # show entries detail Trace Log: Time: 2012 Jan 30 05:20:45 Severity: Informational Source: BMC:ciscoNET:961 Description: " rpc_aim_callback_function_1_svc() - result == SUCCESS, callbackData size: 600 " Order: 0 Trace Log: Time: 2012 Jan 30 05:20:45 Severity: Informational Source: BMC:ciscoNET:961 Description: rpc_aim_callback_function_1_svc() - returned from pFunctionCallback result:0 Order: 1 Trace Log: Time: 2012 Jan 30 05:20:45 Severity: Informational Source: BMC:ciscoNET:961 Description: " rpc_aim_callback_function_1_svc() - szFunctionName:netGetCurrentIfConfig nSize:0 nMaxSize: 600 " Order: 2 --More-Server /cimc/log # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 166 OL-28893-01 Viewing Logs Clearing the CIMC Log Clearing the CIMC Log Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope log Enters the CIMC log command mode. Step 3 Server /cimc/log # clear Clears the CIMC log. The following example clears the log of CIMC events: Server# scope cimc Server /cimc # scope log Server /cimc/log # clear Configuring the CIMC Log Threshold You can specify the lowest level of messages that will be included in the CIMC log. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope log Enters the CIMC log command mode. Step 3 Server /cimc/log # set local-syslog-severity level The severity level can be one of the following, in decreasing order of severity: • emergency • alert • critical • error • warning • notice • informational • debug Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 167 Viewing Logs Sending the CIMC Log to a Remote Server Command or Action Purpose Note CIMC does not log any messages with a severity below the selected severity. For example, if you select error, then the CIMC log will contain all messages with the severity Emergency, Alert, Critical, or Error. It will not show Warning, Notice, Informational, or Debug messages. Step 4 Server /cimc/log # commit Commits the transaction to the system configuration. Step 5 Server /cimc/log # show local-syslog-severity (Optional) Displays the configured severity level. This example shows how to configure the logging of messages with a minimum severity of Warning: Server# scope cimc Server /cimc # scope log Server /cimc/log # set local-syslog-severity warning Server /cimc/log *# commit Server /cimc/log # show local-syslog-severity Local Syslog Severity: warning Server /cimc/log # Sending the CIMC Log to a Remote Server You can configure profiles for one or two remote syslog servers to receive CIMC log entries. Before You Begin • The remote syslog server must be configured to receive logs from a remote host. • The remote syslog server must be configured to receive all types of logs, including authentication-related logs. • The remote syslog server's firewall must be configured to allow syslog messages to reach the syslog server. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope log Enters the CIMC log command mode. Step 3 Server /cimc/log # set remote-syslog-severity level (Optional) The severity level can be one of the following, in decreasing order of severity: • emergency • alert Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 168 OL-28893-01 Viewing Logs Sending the CIMC Log to a Remote Server Command or Action Purpose • critical • error • warning • notice • informational • debug Note CIMC does not remotely log any messages with a severity below the selected severity. For example, if you select error, then the remote syslog server will receive all CIMC log messages with the severity Emergency, Alert, Critical, or Error. It will not show Warning, Notice, Informational, or Debug messages. Step 4 Server /cimc/log # scope server {1 | 2} Selects one of the two remote syslog server profiles and enters the command mode for configuring the profile. Step 5 Server /cimc/log/server # set server-ip ip-address Specifies the remote syslog server IP address. Step 6 Server /cimc/log/server # set enabled {yes | no} Enables the sending of CIMC log entries to this syslog server. Step 7 Server /cimc/log/server # commit Commits the transaction to the system configuration. This example shows how to configure a remote syslog server profile and enable the sending of CIMC log entries with a minimum severity level of Warning: Server# scope cimc Server /cimc # scope log Server /cimc/log # set remote-syslog-severity warning Server /cimc/log *# scope server 2 Server /cimc/log/server *# set server-ip 192.0.2.34 Server /cimc/log/server *# set enabled yes Server /cimc/log/server *# commit Server /cimc/log/server # exit Server /cimc/log # show server Syslog Server IP Address Enabled ---------------- ---------------- -------1 0.0.0.0 no 2 192.0.2.34 yes Server /cimc/log # show remote-syslog-severity Remote Syslog Severity: warning Server /cimc/log # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 169 Viewing Logs System Event Log System Event Log Viewing the System Event Log Procedure Command or Action Purpose Step 1 Server# scope sel Enters the system event log (SEL) command mode. Step 2 Server /sel # show entries [detail] For system events, displays timestamp, the severity of the event, and a description of the event. The detail keyword displays the information in a list format instead of a table format. This example displays the system event log: Server# scope sel Server /sel # show entries Time Severity Description ------------------- ------------- ---------------------------------------[System Boot] Informational " LED_PSU_STATUS: Platform sensor, OFF event was asserted" [System Boot] Informational " LED_HLTH_STATUS: Platform sensor, GREEN was asserted" [System Boot] Normal " PSU_REDUNDANCY: PS Redundancy sensor, Fully Redundant was asserted" [System Boot] Normal " PSU2 PSU2_STATUS: Power Supply sensor for PSU2, Power Supply input lost (AC/DC) was deasserted" [System Boot] Informational " LED_PSU_STATUS: Platform sensor, ON event was asserted" [System Boot] Informational " LED_HLTH_STATUS: Platform sensor, AMBER was asserted" [System Boot] Critical " PSU_REDUNDANCY: PS Redundancy sensor, Redundancy Lost was asserted" [System Boot] Critical " PSU2 PSU2_STATUS: Power Supply sensor for PSU2, Power Supply input lost (AC/DC) was asserted" [System Boot] Normal " HDD_01_STATUS: Drive Slot sensor, Drive Presence was asserted" [System Boot] Critical " HDD_01_STATUS: Drive Slot sensor, Drive Presence was deasserted" [System Boot] Informational " DDR3_P2_D1_INFO: Memory sensor, OFF event was asserted" 2001-01-01 08:30:16 Warning " PSU2 PSU2_VOUT: Voltage sensor for PSU2, failure event was deasserted" 2001-01-01 08:30:16 Critical " PSU2 PSU2_VOUT: Voltage sensor for PSU2, non-recoverable event was deasserted" 2001-01-01 08:30:15 Informational " LED_PSU_STATUS: Platform sensor, ON event was asserted" 2001-01-01 08:30:15 Informational " LED_HLTH_STATUS: Platform sensor, AMBER was asserted" 2001-01-01 08:30:15 Informational " LED_HLTH_STATUS: Platform sensor, FAST BLINK event was asserted" 2001-01-01 08:30:14 Non-Recoverable " PSU2 PSU2_VOUT: Voltage sensor for PSU2, non-recoverable event was asserted" 2001-01-01 08:30:14 Critical " PSU2 PSU2_VOUT: Voltage sensor for PSU2, failure event was asserted" --More-- Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 170 OL-28893-01 Viewing Logs Clearing the System Event Log Clearing the System Event Log Procedure Command or Action Purpose Step 1 Server# scope sel Enters the system event log command mode. Step 2 Server /sel # clear You are prompted to confirm the action. If you enter y at the prompt, the system event log is cleared. This example clears the system event log: Server# scope sel Server /sel # clear This operation will clear the whole sel. Continue?[y|N]y Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 171 Viewing Logs Clearing the System Event Log Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 172 OL-28893-01 CHAPTER 15 Server Utilities This chapter includes the following sections: • Exporting Technical Support Data, page 173 • Rebooting the CIMC, page 175 • Clearing the BIOS CMOS, page 175 • Recovering from a Corrupted BIOS, page 176 • Resetting the CIMC to Factory Defaults, page 177 • Exporting and Importing the CIMC Configuration, page 178 • Generating Non maskable Interrupts to the Host, page 180 Exporting Technical Support Data Perform this task when requested by the Cisco Technical Assistance Center (TAC). This utility creates a summary report containing configuration information, logs and diagnostic data that will help TAC in troubleshooting and resolving a technical issue. Important If any firmware or BIOS updates are in progress, do not export the technical support data until those tasks are complete. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope tech-support Enters the tech-support command mode. Step 3 Server /cimc/tech-support # set remote-ip ip-address Specifies the IP address of the remote server on which the technical support data file should be stored. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 173 Server Utilities Exporting Technical Support Data Step 4 Command or Action Purpose Server /cimc/tech-support # set remote-path path/filename Specifies the file name in which the support data should be stored on the remote server. When you enter this name, include the relative path for the file from the top of the server tree to the desired location. Tip Step 5 Server /cimc/tech-support # set remote-protocol protocol To have the system auto-generate the file name, enter the file name as default.tar.gz. Specifies the protocol to connect to the remote server. It can be of the following types: • tftp • ftp • sftp • scp • http Step 6 Server /cimc/tech-support # set remote-username name Specifies the user name on the remote server on which the technical support data file should be stored. This field does not apply if the protocol is TFTP or HTTP. Step 7 Server /cimc/tech-support # set remote-password password Specifies the password on the remote server on which the technical support data file should be stored. This field does not apply if the protocol is TFTP or HTTP. Step 8 Server /cimc/tech-support # commit Commits the transaction to the system configuration. Step 9 Server /cimc/tech-support # start Begins the transfer of the data file to the remote server. Step 10 Server /cimc/tech-support # show detail (Optional) Displays the progress of the transfer of the data file to the remote server. Step 11 Server /cimc/tech-support # cancel (Optional) Cancels the transfer of the data file to the remote server. This example creates a technical support data file and transfers the file to a TFTP server: Server# scope cimc Server /cimc # scope tech-support Server /cimc/tech-support # set remote-ip 192.0.20.41 Server /cimc/tech-support* # set remote-protocol tftp Server /cimc/tech-support *# set remote-path /user/user1/default.tar.gz Server /cimc/tech-support *# commit Server /cimc/tech-support # start Tech Support upload started. Server /cimc/tech-support # show detail Tech Support: Server Address: 192.0.20.41 Path: default.tar.gz Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 174 OL-28893-01 Server Utilities Rebooting the CIMC Protocol: tftp Username: Password: ******* Progress (%): 5 Status: Collecting Server /cimc/tech-support # What to Do Next Provide the generated report file to Cisco TAC. Rebooting the CIMC On rare occasions, such as an issue with the current running firmware, troubleshooting a server may require you to reboot the CIMC. This procedure is not part of the normal maintenance of a server. After you reboot the CIMC, you are logged off and the CIMC will be unavailable for a few minutes. Note If you reboot the CIMC while the server is performing power-on self test (POST) or is operating in the Extensible Firmware Interface (EFI) shell, the server will be powered down until the CIMC reboot is complete. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # reboot The CIMC reboots. This example reboots the CIMC: Server# scope cimc Server /cimc # reboot Clearing the BIOS CMOS On rare occasions, troubleshooting a server may require you to clear the server's BIOS CMOS memory. This procedure is not part of the normal maintenance of a server. Procedure Step 1 Command or Action Purpose Server# scope bios Enters the bios command mode. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 175 Server Utilities Recovering from a Corrupted BIOS Step 2 Command or Action Purpose Server /bios # clear-cmos After a prompt to confirm, clears the CMOS memory. This example clears the BIOS CMOS memory: Server# scope bios Server /bios # clear-cmos This operation will clear the BIOS CMOS. Note: Server should be in powered off state to clear CMOS. Continue?[y|n] y Server /bios # Recovering from a Corrupted BIOS Note This procedure is not available in some server models. In addition to this procedure, there are three other methods for recovering from a corrupted BIOS: • Use the Cisco Host Upgrade Utility (HUU). This is the recommended method. • Use the CIMC GUI interface. • If your server model supports it, use the BIOS recovery function of the hardware jumper on the server motherboard. For instructions, see the Cisco UCS Server Installation and Service Guide for your server model. Before You Begin • You must be logged in as admin to recover from a corrupted BIOS. • Have the BIOS recovery ISO image ready. You will find the BIOS recovery ISO image under the Recovery folder of the firmware distribution package. • Schedule some down time for the server because it will be power cycled at the end of the recovery procedure. Procedure Command or Action Purpose Step 1 Server# scope bios Enters the bios command mode. Step 2 Server# recover Launches a dialog for loading the BIOS recovery image. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 176 OL-28893-01 Server Utilities Resetting the CIMC to Factory Defaults This example shows how to recover from a corrupted BIOS: Server# scope bios Server /bios # recover This operation will automatically power on the server to perform BIOS FW recovery. Continue?[y|N]y What to Do Next Power cycle or reset the server. Resetting the CIMC to Factory Defaults On rare occasions, such as an issue with the current running firmware, troubleshooting a server may require you to reset the CIMC to the factory default. When this happens, all user-configurable settings are reset. This procedure is not part of the normal server maintenance. After you reset the CIMC, you are logged off and must log in again. You may also lose connectivity and may need to reconfigure the network settings. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # factory-default After a prompt to confirm, the CIMC resets to factory defaults. The CIMC factory defaults include the following conditions: • SSH is enabled for access to the CIMC CLI. Telnet is disabled. • HTTPS is enabled for access to the CIMC GUI. • A single user account exists (user name is admin , password is password ). • DHCP is enabled on the management port. • The boot order is EFI, CDROM, PXE (using LoM), FDD, HDD. • KVM and vMedia are enabled. • USB is enabled. • SoL is disabled. This example resets the CIMC to factory defaults: Server# scope cimc Server /cimc # factory-default This operation will reset the CIMC configuration to factory default. All your configuration will be lost. Continue?[y|N] Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 177 Server Utilities Exporting and Importing the CIMC Configuration Exporting and Importing the CIMC Configuration Exporting and Importing the CIMC Configuration To perform a backup of the CIMC configuration, you take a snapshot of the system configuration and export the resulting CIMC configuration file to a location on your network. The export operation saves information from the management plane only; it does not back up data on the servers. Sensitive configuration information such as user accounts and the server certificate are not exported. You can restore an exported CIMC configuration file to the same system or you can import it to another CIMC system, provided that the software version of the importing system is the same as or is configuration-compatible with the software version of the exporting system. When you import a configuration file to another system as a configuration template, you must modify system-specific settings such as IP addresses and host names. An import operation modifies information on the management plane only. The CIMC configuration file is an XML text file whose structure and elements correspond to the CIMC command modes. When performing an export or import operation, consider these guidelines: • You can perform an export or an import while the system is up and running. While an export operation has no impact on the server or network traffic, some modifications caused by an import operation, such as IP address changes, can disrupt traffic or cause a server reboot. • You cannot execute an export and an import simultaneously. Exporting the CIMC Configuration Note For security reasons, this operation does not export user accounts or the server certificate. Important If any firmware or BIOS updates are in progress, do not export the CIMC configuration until those tasks are complete. Before You Begin Obtain the backup remote server IP address. Procedure Command or Action Purpose Step 1 Server# scope cimc Enters the CIMC command mode. Step 2 Server /cimc # scope import-export Enters the import-export command mode. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 178 OL-28893-01 Server Utilities Importing a CIMC Configuration Step 3 Command or Action Purpose Server /cimc/import-export # export-config protocol ip-address path-and-filename Starts the backup operation. The configuration file will be stored at the specified path and file name on a remote server at the specified IP address. The remote server could be one of the following types: • TFTP • FTP • SFTP • SCP • HTTP To determine whether the export operation has completed successfully, use the show detail command. To abort the operation, type CTRL+C. This example shows how to back up the CIMC configuration: Server# scope cimc Server /cimc # scope import-export Server /cimc/import-export # export-config tftp 192.0.2.34 /ucs/backups/cimc5.xml Export config started. Please check the status using "show detail". Server /cimc/import-export # show detail Import Export: Operation: EXPORT Status: COMPLETED Error Code: 100 (No Error) Diagnostic Message: NONE Server /cimc/import-export # Importing a CIMC Configuration Important If any firmware or BIOS updates are in progress, do not import the CIMC configuration until those tasks are complete. Before You Begin If you want to restore the SNMP configuration information when you import the configuration file, make sure that SNMP is disabled on this server before you do the import. If SNMP is enabled when you perform the import, CIMC does not overwrite the current values with those saved in the configuration file. Procedure Step 1 Command or Action Purpose Server# scope cimc Enters the CIMC command mode. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 179 Server Utilities Generating Non maskable Interrupts to the Host Command or Action Purpose Step 2 Server /cimc # scope import-export Enters the import-export command mode. Step 3 Server /cimc/import-export # import-config protocol ip-address path-and-filename Starts the import operation. The configuration file at the specified path and file name on the remote server at the specified IP address will be imported. The remote server can be one of the following: • TFTP • FTP • SFTP • SCP • HTTP To determine whether the import operation has completed successfully, use the show detail command. To abort the operation, type CTRL+C. This example shows how to import a CIMC configuration: Server# scope cimc Server /cimc # scope import-export Server /cimc/import-export # import-config tftp 192.0.2.34 /ucs/backups/cimc5.xml Import config started. Please check the status using "show detail". Server /cimc/import-export # Generating Non maskable Interrupts to the Host In some situations, the server might hang and not respond to traditional debug mechanisms. By generating a non maskable interrupt (NMI) to the host, you can create and send a crash dump file of the server and use it to debug the server. Depending on the type of operating system associated with the server, this task might restart the OS. Procedure Command or Action Purpose Step 1 Server # scope chassis Enters chassis command mode. Step 2 Server /chassis # generate-nmi Generates the crash dump file for the server. To use this command, the server must be powered on, and you must be logged in as an administrator. This example shows how to generate NMI signals to the host: Server # scope chassis Server /chassis # generate-nmi Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 180 OL-28893-01 Server Utilities Generating Non maskable Interrupts to the Host This operation will send NMI to the host and may cause reboot of the OS. OS reboot depends on it's NMI configuration. Do you want to continue? [y|N] y Server /chassis # Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 181 Server Utilities Generating Non maskable Interrupts to the Host Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 182 OL-28893-01 APPENDIX A BIOS Parameters by Server Model This appendix contains the following sections: • C22 and C24 Servers, page 183 • C220 and C240 Servers, page 203 • C260 Servers, page 222 • C420 Servers, page 235 • C460 Servers, page 253 C22 and C24 Servers Main BIOS Parameters for C22 and C24 Servers Name Description TPM Support TPM (Trusted Platform Module) is a microchip designed to provide basic security-related functions primarily involving encryption keys. This option allows you to control the TPM Security Device support for the system. It can be one of the following: • Disabled—The server does not use the TPM. • Enabled—The server uses the TPM. Note We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 183 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Advanced BIOS Parameters for C22 and C24 Servers Processor Configuration Parameters Name Description Intel Hyper-Threading Technology Whether the processor uses Intel Hyper-Threading Technology, which allows multithreaded software applications to execute threads in parallel within each processor. This can be one of the following: • Disabled—The processor does not permit hyperthreading. • Enabled—The processor allows for the parallel execution of multiple threads. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Number of Enabled Cores Allows you to disable one or more of the physical cores on the server. This can be one of the following: • All—Enables all physical cores. This also enables Hyper Threading on the associated logical processor cores. • 1 through n—Specifies the number of physical processor cores that can run on the server. Each physical core has an associated logical core. To disable Hyper Threading and have only one logical processor core running on the server, select 1. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Execute Disable Classifies memory areas on the server to specify where application code can execute. As a result of this classification, the processor disables code execution if a malicious worm attempts to insert code in the buffer. This setting helps to prevent damage, worm propagation, and certain classes of malicious buffer overflow attacks. This can be one of the following: • Disabled—The processor does not classify memory areas. • Enabled—The processor classifies memory areas. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 184 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Name Description Intel VT Whether the processor uses Intel Virtualization Technology (VT), which allows a platform to run multiple operating systems and applications in independent partitions. This can be one of the following: • Disabled—The processor does not permit virtualization. • Enabled—The processor allows multiple operating systems in independent partitions. Note If you change this option, you must power cycle the server before the setting takes effect. Whether the processor uses Intel Virtualization Technology for Directed I/O (VT-d). This can be one of the following: Intel VT-d • Disabled—The processor does not use virtualization technology. • Enabled—The processor uses virtualization technology. Intel VT-d Coherency Support Whether the processor supports Intel VT-d Coherency. This can be one of the following: • Disabled—The processor does not support coherency. • Enabled—The processor uses VT-d Coherency as required. Intel VT-d ATS Support Whether the processor supports Intel VT-d Address Translation Services (ATS). This can be one of the following: • Disabled—The processor does not support ATS. • Enabled—The processor uses VT-d ATS as required. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 185 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Name Description CPU Performance Sets the CPU performance profile for the server. The performance profile consists of the following options: • Data Reuse Optimization • DCU Streamer Prefetcher • DCU IP Prefetcher • Hardware Prefetcher • Adjacent Cache-Line Prefetch This can be one of the following: • Enterprise—Only the DCU IP Prefetcher is enabled. The rest of the options are disabled. • —All options are enabled. • HPC—Data Reuse Optimization is disabled and all other options are enabled. This setting is also known as high performance computing. • Custom—All performance profile options can be configured from the BIOS setup on the server. In addition, the Hardware Prefetcher and Adjacent Cache-Line Prefetch options can be configured in the fields below. Hardware Prefetcher Whether the processor allows the Intel hardware prefetcher to fetch streams of data and instruction from memory into the unified second-level cache when necessary. This can be one of the following: • Disabled—The hardware prefetcher is not used. • Enabled—The processor uses the hardware prefetcher when cache issues are detected. Adjacent Cache Line Prefetcher Whether the processor fetches cache lines in even/odd pairs instead of fetching just the required line. This can be one of the following: • Disabled—The processor only fetches the required line. • Enabled— The processor fetches both the required line and its paired line. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 186 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Name Description DCU Streamer Prefetch Whether the processor uses the DCU IP Prefetch mechanism to analyze historical cache access patterns and preload the most relevant lines in the L1 cache. This can be one of the following: • Disabled—The processor does not try to anticipate cache read requirements and only fetches explicitly requested lines. • Enabled—The DCU prefetcher analyzes the cache read pattern and prefetches the next line in the cache if it determines that it may be needed. DCU IP Prefetcher Whether the processor uses the DCU IP Prefetch mechanism to analyze historical cache access patterns and preload the most relevant lines in the L1 cache. This can be one of the following: • Disabled—The processor does not preload any cache data. • Enabled—The DCU IP prefetcher preloads the L1 cache with the data it determines to be the most relevant. Direct Cache Access Support Allows processors to increase I/O performance by placing data from I/O devices directly into the processor cache. This setting helps to reduce cache misses. This can be one of the following: • Disabled—Data from I/O devices is not placed directly into the processor cache. • Enabled—Data from I/O devices is placed directly into the processor cache. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 187 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Name Description Power Technology Enables you to configure the CPU power management settings for the following options: • Enhanced Intel Speedstep Technology • Intel Turbo Boost Technology • Processor Power State C6 Power Technology can be one of the following: • Custom—The server uses the individual settings for the BIOS parameters mentioned above. You must select this option if you want to change any of these BIOS parameters. • Disabled—The server does not perform any CPU power management and any settings for the BIOS parameters mentioned above are ignored. • —The server determines the best settings for the BIOS parameters mentioned above and ignores the individual settings for these parameters. Enhanced Intel Speedstep Technology Whether the processor uses Enhanced Intel SpeedStep Technology, which allows the system to dynamically adjust processor voltage and core frequency. This technology can result in decreased average power consumption and decreased average heat production. This can be one of the following: • Disabled—The processor never dynamically adjusts its voltage or frequency. • Enabled—The processor utilizes Enhanced Intel SpeedStep Technology and enables all supported processor sleep states to further conserve power. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Note must be set to Custom or the server ignores the setting for this parameter. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 188 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Name Description Intel Turbo Boost Technology Whether the processor uses Intel Turbo Boost Technology, which allows the processor to automatically increase its frequency if it is running below power, temperature, or voltage specifications. This can be one of the following: • Disabled—The processor does not increase its frequency automatically. • Enabled—The processor utilizes Turbo Boost Technology if required. Note Processor Power State C6 must be set to Custom or the server ignores the setting for this parameter. Whether the BIOS sends the C6 report to the operating system. When the OS receives the report, it can transition the processor into the lower C6 power state to decrease energy usage while maintaining optimal processor performance. This can be one of the following: • Disabled—The BIOS does not send the C6 report. • Enabled—The BIOS sends the C6 report, allowing the OS to transition the processor to the C6 low power state. Note Processor Power State C1 Enhanced must be set to Custom or the server ignores the setting for this parameter. Whether the CPU transitions to its minimum frequency when entering the C1 state. This can be one of the following: • Disabled—The CPU continues to run at its maximum frequency in C1 state. • Enabled—The CPU transitions to its minimum frequency. This option saves the maximum amount of power in C1 state. Frequency Floor Override Whether the CPU is allowed to drop below the maximum non-turbo frequency when idle. This can be one of the following: • Disabled— The CPU can drop below the maximum non-turbo frequency when idle. This option decreases power consumption but may reduce system performance. • Enabled— The CPU cannot drop below the maximum non-turbo frequency when idle. This option improves system performance but may increase power consumption. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 189 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Name Description P-STATE Coordination Allows you to define how BIOS communicates the P-state support model to the operating system. There are 3 models as defined by the Advanced Configuration and Power Interface (ACPI) specification. • HW_ALL—The processor hardware is responsible for coordinating the P-state among logical processors with dependencies (all logical processors in a package). • SW_ALL—The OS Power Manager (OSPM) is responsible for coordinating the P-state among logical processors with dependencies (all logical processors in a physical package), and must initiate the transition on all of the logical processors. • SW_ANY—The OS Power Manager (OSPM) is responsible for coordinating the P-state among logical processors with dependencies (all logical processors in a package), and may initiate the transition on any of the logical processors in the domain. Note Energy Performance must be set to Custom or the server ignores the setting for this parameter. Allows you to determine whether system performance or energy efficiency is more important on this server. This can be one of the following: • • • • Note must be set to Custom or the server ignores the setting for this parameter. In addition, some operating systems, such as Windows 2008, ignore this parameter in favor of their own power plan. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 190 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Memory Configuration Parameters Name Description Select Memory RAS How the memory reliability, availability, and serviceability (RAS) is configured for the server. This can be one of the following: • —System performance is optimized. • Mirroring—System reliability is optimized by using half the system memory as backup. • Lockstep—If the DIMM pairs in the server have an identical type, size, and organization and are populated across the SMI channels, you can enable lockstep mode to minimize memory access latency and provide better performance. This option offers better system performance than Mirroring and better reliability than Maximum Performance but lower reliability than Mirroring and lower system performance than Maximum Performance. DRAM Clock Throttling Allows you to determine whether memory bandwidth or system performance is more important on this server. This can be one of the following: • Balanced— DRAM clock throttling is reduced, providing a balance between performance and power. • Performance—DRAM clock throttling is disabled, providing increased memory bandwidth at the cost of additional power. • —DRAM clock throttling is increased to improve energy efficiency. NUMA Whether the BIOS supports NUMA. This can be one of the following: • Disabled—The BIOS does not support NUMA. • Enabled—The BIOS includes the ACPI tables that are required for NUMA-aware operating systems. If you enable this option, the system must disable Inter-Socket Memory interleaving on some platforms. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 191 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Name Description Low Voltage DDR Mode Whether the system prioritizes low voltage or high frequency memory operations. This can be one of the following: • —The system prioritizes low voltage memory operations over high frequency memory operations. This mode may lower memory frequency in order to keep the voltage low. • —The system prioritizes high frequency operations over low voltage operations. DRAM Refresh rate Allows you to set the rate at which the DRAM cells are refreshed. This can be one of the following: • 1x—DRAM cells are refreshed every 64ms. • 2x—DRAM cells are refreshed every 32ms. • 3x—DRAM cells are refreshed every 21ms. • 4x—DRAM cells are refreshed every 16ms. Channel Interleaving Whether the CPU divides memory blocks and spreads contiguous portions of data across interleaved channels to enable simultaneous read operations. This can be one of the following: • Auto—The CPU determines what interleaving is done. • —Some channel interleaving is used. • • • —The maximum amount of channel interleaving is used. Rank Interleaving Whether the CPU interleaves physical ranks of memory so that one rank can be accessed while another is being refreshed. This can be one of the following: • Auto—The CPU determines what interleaving is done. • —Some rank interleaving is used. • • • —The maximum amount of rank interleaving is used. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 192 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Name Description Patrol Scrub Whether the system actively searches for, and corrects, single bit memory errors even in unused portions of the memory on the server. This can be one of the following: • Disabled—The system checks for memory ECC errors only when the CPU reads or writes a memory address. • Enabled—The system periodically reads and writes memory searching for ECC errors. If any errors are found, the system attempts to fix them. This option may correct single bit errors before they become multi-bit errors, but it may adversely affect performance when the patrol scrub is running. Demand Scrub Whether the system corrects single bit memory errors encountered when the CPU or I/O makes a demand read. This can be one of the following: • Disabled— Single bit memory errors are not corrected. • Enabled— Single bit memory errors are corrected in memory and the corrected data is set in response to the demand read. Altitude The approximate number of meters above sea level at which the physical server is installed. This can be one of the following: • Auto—The CPU determines the physical elevation. • —The server is approximately 300 meters above sea level. • —The server is approximately 900 meters above sea level. • —The server is approximately 1500 meters above sea level. • —The server is approximately 3000 meters above sea level. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 193 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers QPI Configuration Parameters Name Description QPI Link Frequency The Intel QuickPath Interconnect (QPI) link frequency, in gigatransfers per second (GT/s). This can be one of the following: • Auto—The CPU determines the QPI link frequency. • • • Onboard Storage Parameters Name Description Onboard SCU Storage Support Whether the onboard software RAID controller is available to the server. This can be one of the following: • Disabled—The software RAID controller is not available. • Enabled—The software RAID controller is available. USB Configuration Parameters Name Description Legacy USB Support Whether the system supports legacy USB devices. This can be one of the following: • Disabled—USB devices are only available to EFI applications. • Enabled—Legacy USB support is always available. • Auto—Disables legacy USB support if no USB devices are connected. Port 60/64 Emulation Whether the system supports 60h/64h emulation for complete USB keyboard legacy support. This can be one of the following: • Disabled—60h/64 emulation is not supported. • Enabled—60h/64 emulation is supported. You should select this option if you are using a non-USB aware operating system on the server. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 194 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Name Description All USB Devices Whether all physical and virtual USB devices are enabled or disabled. This can be one of the following: • Disabled—All USB devices are disabled. • Enabled—All USB devices are enabled. USB Port: Rear Whether the rear panel USB devices are enabled or disabled. This can be one of the following: • Disabled—Disables the rear panel USB ports. Devices connected to these ports are not detected by the BIOS and operating system. • Enabled—Enables the rear panel USB ports. Devices connected to these ports are detected by the BIOS and operating system. USB Port: Front Whether the front panel USB devices are enabled or disabled. This can be one of the following: • Disabled—Disables the front panel USB ports. Devices connected to these ports are not detected by the BIOS and operating system. • Enabled—Enables the front panel USB ports. Devices connected to these ports are detected by the BIOS and operating system. USB Port: Internal Whether the internal USB devices are enabled or disabled. This can be one of the following: • Disabled—Disables the internal USB ports. Devices connected to these ports are not detected by the BIOS and operating system. • Enabled—Enables the internal USB ports. Devices connected to these ports are detected by the BIOS and operating system. USB Port: KVM Whether the KVM ports are enabled or disabled.This can be one of the following: • Disabled—Disables the KVM port. Devices connected to these ports are not detected by the BIOS and operating system. • Enabled—Enables the KVM ports. Devices connected to these ports are detected by the BIOS and operating system. USB Port: VMedia Whether the virtual media devices are enabled or disabled. This can be one of the following: • Disabled—Disables the vMedia devices. • Enabled—Enables the vMedia devices. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 195 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers PCI Configuration Parameters Name Description MMIO Above 4GB Whether to enable or disable memory mapped I/O of 64-bit PCI devices to 4GB or greater address space. Legacy option ROMs are not able to access addresses above 4GB. PCI devices that are 64-bit compliant but use a legacy option ROM may not function correctly with this setting enabled. This can be one of the following: • Disabled—The server does not map I/O of 64-bit PCI devices to 4GB or greater address space. • Enabled—The server maps I/O of 64-bit PCI devices to 4GB or greater address space. ASPM Support Allows you to set the level of ASPM (Active Power State Management) support in the BIOS.This can be one of the following: • Disabled—ASPM support is disabled in the BIOS. • Force L0s—Force all links to L0 standby (L0s) state. • Auto—The CPU determines the power state. VGA Priority Allows you to set the priority for VGA graphics devices if multiple VGA devices are found in the system. This can be one of the following: • Onboard—Priority is given to the onboard VGA device. BIOS post screen and OS boot are driven through the onboard VGA port. • Offboard—Priority is given to the PCIE Graphics adapter. BIOS post screen and OS boot are driven through the external graphics adapter port. • —Priority is given to the PCIE Graphics adapter, and the onboard VGA device is disabled. Note The vKVM does not function when the onboard VGA is disabled. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 196 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Serial Configuration Parameters Name Description Console Redirection Allows a serial port to be used for console redirection during POST and BIOS booting. After the BIOS has booted and the operating system is responsible for the server, console redirection is irrelevant and has no effect. This can be one of the following: • Disabled—No console redirection occurs during POST. • Enabled—Enables console redirection on serial port A during POST. Terminal Type What type of character formatting is used for console redirection. This can be one of the following: • PC-ANSI—The PC-ANSI terminal font is used. • VT100—A supported vt100 video terminal and its character set are used. • VT100+—A supported vt100-plus video terminal and its character set are used. • VT-UTF8—A video terminal with the UTF-8 character set is used. Note Bits per second This setting must match the setting on the remote terminal application. What BAUD rate is used for the serial port transmission speed. If you disable Console Redirection, this option is not available. This can be one of the following: • 9600—A 9,600 BAUD rate is used. • 19200—A 19,200 BAUD rate is used. • 38400—A 38,400 BAUD rate is used. • 57600—A 57,600 BAUD rate is used. • 115200—A 115,200 BAUD rate is used. Note This setting must match the setting on the remote terminal application. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 197 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers Name Description Flow Control Whether a handshake protocol is used for flow control. Request to Send / Clear to Send (RTS/CTS) helps to reduce frame collisions that can be introduced by a hidden terminal problem. This can be one of the following: • None—No flow control is used. • —RTS/CTS is used for flow control. Note Putty KeyPad This setting must match the setting on the remote terminal application. Allows you to change the action of the PuTTY function keys and the top row of the numeric keypad. This can be one of the following: • VT100—The function keys generate ESC OP through ESC O[. • LINUX—Mimics the Linux virtual console. Function keys F6 to F12 behave like the default mode, but F1 to F5 generate ESC [[A through ESC [[E. • XTERMR6—Function keys F5 to F12 behave like the default mode. Function keys F1 to F4 generate ESC OP through ESC OS, which are the sequences produced by the top row of the keypad on Digital terminals. • SCO—The function keys F1 to F12 generate ESC [M through ESC [X. The function and shift keys generate ESC [Y through ESC [j. The control and function keys generate ESC [k through ESC [v. The shift, control and function keys generate ESC [w through ESC [{. • ESCN—The default mode. The function keys match the general behavior of Digital terminals. The function keys generate sequences such as ESC [11~ and ESC [12~. • VT400—The function keys behave like the default mode. The top row of the numeric keypad generates ESC OP through ESC OS. Redirection After BIOS POST Whether BIOS console redirection should be active after BIOS POST is complete and control given to the OS bootloader. This can be one of the following: • —BIOS Legacy console redirection is active during the OS boot and run time. • Bootloader—BIOS Legacy console redirection is disabled before giving control to the OS boot loader. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 198 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C22 and C24 Servers LOM and PCIe Slots Configuration Parameters Name Description All Onboard LOM Ports Whether all LOM ports are enabled or disabled. This can be one of the following: • Disabled—All LOM ports are disabled. • Enabled—All LOM ports are enabled. LOM Port n OptionROM Whether Option ROM is available on the LOM port designated by n. This can be one of the following: • Disabled—Option ROM is not available on LOM port n. • Enabled—Option ROM is available on LOM port n. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. All PCIe Slots OptionROM Whether the server can use the PCIe Option ROM expansion slots. This can be one of the following: • Disabled—PCIe Option ROMs are not available. • Enabled—PCIe Option ROMs are available. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. PCIe Slot:n OptionROM Whether PCIe expansion slot n is available to the server. This can be one of the following: • Disabled—The expansion slot n is not available. • Enabled—The expansion slot n is available. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 199 BIOS Parameters by Server Model Server Management BIOS Parameters for C22 and C24 Servers Name Description PCIe Slot:n Link Speed This option allows you to restrict the maximum speed of an adapter card installed in PCIe slot n. This can be one of the following: • GEN1—2.5GT/s (gigatransfers per second) is the maximum speed allowed. • GEN2—5GT/s is the maximum speed allowed. • GEN3—8GT/s is the maximum speed allowed. • Disabled—The maximum speed is not restricted. For example, if you have a 3rd generation adapter card in PCIe slot 2 that you want to run at a maximum of 5GT/s instead of the 8GT/s that card supports, set the PCIe Slot 2 Link Speed to GEN2. The system then ignores the card's supported maximum speed of 8GT/s and forces it to run at a maximum of 5 GT/s. Server Management BIOS Parameters for C22 and C24 Servers Name Description FRB-2 Timer Whether the FRB2 timer is used by CIMC to recover the system if it hangs during POST. This can be one of the following: • Disabled—The FRB2 timer is not used. • Enabled—The FRB2 timer is started during POST and used to recover the system if necessary. OS Watchdog Timer Whether the BIOS programs the watchdog timer with a specified timeout value. This can be one of the following: • Disabled—The watchdog timer is not used to track how long the server takes to boot. • Enabled—The watchdog timer tracks how long the server takes to boot. If the server does not boot within the length of time specified Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 200 OL-28893-01 BIOS Parameters by Server Model Server Management BIOS Parameters for C22 and C24 Servers Name Description OS Watchdog Timer Timeout What timeout value the BIOS uses to configure the watchdog timer. This can be one of the following: • —The watchdog timer expires 5 minutes after the OS begins to boot. • —The watchdog timer expires 10 minutes after the OS begins to boot. • —The watchdog timer expires 15 minutes after the OS begins to boot. • —The watchdog timer expires 20 minutes after the OS begins to boot. Note OS Watchdog Timer Policy This option is only applicable if you enable the OS Boot Watchdog Timer. What action the system takes if the watchdog timer expires. This can be one of the following: • —The server takes no action if the watchdog timer expires during OS boot. • —The server is powered off if the watchdog timer expires during OS boot. • Reset—The server is reset if the watchdog timer expires during OS boot. Note This option is only applicable if you enable the OS Boot Watchdog Timer. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 201 BIOS Parameters by Server Model Server Management BIOS Parameters for C22 and C24 Servers Name Description Boot Order Rules How the server changes the boot order list defined through the CIMC GUI or CLI when there are no devices of a particular device type available or when the user defines a different boot order using the server's BIOS Setup Utility. The supported device types are: • HDD—Hard disk drive • FDD—Floppy disk drive • CDROM—Bootable CD-ROM or DVD • PXE—PXE boot • EFI—Extensible Firmware Interface The Boot Order Rules option can be one of the following: • Strict—When no devices of a particular type are available, the system creates a placeholder for that device type in the boot order list. When a device of that type becomes available, it is added to the boot order in the previously defined position. If the user defines a boot order through the server's BIOS Setup Utility, that boot order is given priority over the boot order configured through the CIMC GUI or CLI. All device types defined through CIMC that are not present in the boot order defined through the BIOS Setup Utility are removed from the boot order list. • Loose—When no devices of a particular type are available, the system removes that device type from the boot order. When a device of that type becomes available, the system adds it to the end of the boot order list. If the boot order is configured through the server's BIOS Setup Utility, that boot order is given priority over the boot order configured through the CIMC GUI or CLI. All device types defined through CIMC that are not present in the boot order defined through the BIOS Setup Utility are moved to the end of the boot order list. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 202 OL-28893-01 BIOS Parameters by Server Model C220 and C240 Servers C220 and C240 Servers Main BIOS Parameters for C220 and C240 Servers Name Description TPM Support TPM (Trusted Platform Module) is a microchip designed to provide basic security-related functions primarily involving encryption keys. This option allows you to control the TPM Security Device support for the system. It can be one of the following: • Disabled—The server does not use the TPM. • Enabled—The server uses the TPM. Note We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Advanced BIOS Parameters for C220 and C240 Servers Processor Configuration Parameters Name Description Intel Hyper-Threading Technology Whether the processor uses Intel Hyper-Threading Technology, which allows multithreaded software applications to execute threads in parallel within each processor. This can be one of the following: • Disabled—The processor does not permit hyperthreading. • Enabled—The processor allows for the parallel execution of multiple threads. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 203 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description Number of Enabled Cores Allows you to disable one or more of the physical cores on the server. This can be one of the following: • All—Enables all physical cores. This also enables Hyper Threading on the associated logical processor cores. • 1 through n—Specifies the number of physical processor cores that can run on the server. Each physical core has an associated logical core. To disable Hyper Threading and have only one logical processor core running on the server, select 1. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Execute Disable Classifies memory areas on the server to specify where application code can execute. As a result of this classification, the processor disables code execution if a malicious worm attempts to insert code in the buffer. This setting helps to prevent damage, worm propagation, and certain classes of malicious buffer overflow attacks. This can be one of the following: • Disabled—The processor does not classify memory areas. • Enabled—The processor classifies memory areas. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Intel VT Whether the processor uses Intel Virtualization Technology (VT), which allows a platform to run multiple operating systems and applications in independent partitions. This can be one of the following: • Disabled—The processor does not permit virtualization. • Enabled—The processor allows multiple operating systems in independent partitions. Note Intel VT-d If you change this option, you must power cycle the server before the setting takes effect. Whether the processor uses Intel Virtualization Technology for Directed I/O (VT-d). This can be one of the following: • Disabled—The processor does not use virtualization technology. • Enabled—The processor uses virtualization technology. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 204 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description Intel VT-d Coherency Support Whether the processor supports Intel VT-d Coherency. This can be one of the following: • Disabled—The processor does not support coherency. • Enabled—The processor uses VT-d Coherency as required. Intel VT-d ATS Support Whether the processor supports Intel VT-d Address Translation Services (ATS). This can be one of the following: • Disabled—The processor does not support ATS. • Enabled—The processor uses VT-d ATS as required. CPU Performance Sets the CPU performance profile for the server. The performance profile consists of the following options: • Data Reuse Optimization • DCU Streamer Prefetcher • DCU IP Prefetcher • Hardware Prefetcher • Adjacent Cache-Line Prefetch This can be one of the following: • Enterprise—Only the DCU IP Prefetcher is enabled. The rest of the options are disabled. • —All options are enabled. • HPC—Data Reuse Optimization is disabled and all other options are enabled. This setting is also known as high performance computing. • Custom—All performance profile options can be configured from the BIOS setup on the server. In addition, the Hardware Prefetcher and Adjacent Cache-Line Prefetch options can be configured in the fields below. Hardware Prefetcher Whether the processor allows the Intel hardware prefetcher to fetch streams of data and instruction from memory into the unified second-level cache when necessary. This can be one of the following: • Disabled—The hardware prefetcher is not used. • Enabled—The processor uses the hardware prefetcher when cache issues are detected. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 205 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description Adjacent Cache Line Prefetcher Whether the processor fetches cache lines in even/odd pairs instead of fetching just the required line. This can be one of the following: • Disabled—The processor only fetches the required line. • Enabled— The processor fetches both the required line and its paired line. DCU Streamer Prefetch Whether the processor uses the DCU IP Prefetch mechanism to analyze historical cache access patterns and preload the most relevant lines in the L1 cache. This can be one of the following: • Disabled—The processor does not try to anticipate cache read requirements and only fetches explicitly requested lines. • Enabled—The DCU prefetcher analyzes the cache read pattern and prefetches the next line in the cache if it determines that it may be needed. DCU IP Prefetcher Whether the processor uses the DCU IP Prefetch mechanism to analyze historical cache access patterns and preload the most relevant lines in the L1 cache. This can be one of the following: • Disabled—The processor does not preload any cache data. • Enabled—The DCU IP prefetcher preloads the L1 cache with the data it determines to be the most relevant. Direct Cache Access Support Allows processors to increase I/O performance by placing data from I/O devices directly into the processor cache. This setting helps to reduce cache misses. This can be one of the following: • Disabled—Data from I/O devices is not placed directly into the processor cache. • Enabled—Data from I/O devices is placed directly into the processor cache. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 206 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description Power Technology Enables you to configure the CPU power management settings for the following options: • Enhanced Intel Speedstep Technology • Intel Turbo Boost Technology • Processor Power State C6 Power Technology can be one of the following: • Custom—The server uses the individual settings for the BIOS parameters mentioned above. You must select this option if you want to change any of these BIOS parameters. • Disabled—The server does not perform any CPU power management and any settings for the BIOS parameters mentioned above are ignored. • —The server determines the best settings for the BIOS parameters mentioned above and ignores the individual settings for these parameters. Enhanced Intel Speedstep Technology Whether the processor uses Enhanced Intel SpeedStep Technology, which allows the system to dynamically adjust processor voltage and core frequency. This technology can result in decreased average power consumption and decreased average heat production. This can be one of the following: • Disabled—The processor never dynamically adjusts its voltage or frequency. • Enabled—The processor utilizes Enhanced Intel SpeedStep Technology and enables all supported processor sleep states to further conserve power. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Note must be set to Custom or the server ignores the setting for this parameter. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 207 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description Intel Turbo Boost Technology Whether the processor uses Intel Turbo Boost Technology, which allows the processor to automatically increase its frequency if it is running below power, temperature, or voltage specifications. This can be one of the following: • Disabled—The processor does not increase its frequency automatically. • Enabled—The processor utilizes Turbo Boost Technology if required. Note Processor Power State C6 must be set to Custom or the server ignores the setting for this parameter. Whether the BIOS sends the C6 report to the operating system. When the OS receives the report, it can transition the processor into the lower C6 power state to decrease energy usage while maintaining optimal processor performance. This can be one of the following: • Disabled—The BIOS does not send the C6 report. • Enabled—The BIOS sends the C6 report, allowing the OS to transition the processor to the C6 low power state. Note Processor Power State C1 Enhanced must be set to Custom or the server ignores the setting for this parameter. Whether the CPU transitions to its minimum frequency when entering the C1 state. This can be one of the following: • Disabled—The CPU continues to run at its maximum frequency in C1 state. • Enabled—The CPU transitions to its minimum frequency. This option saves the maximum amount of power in C1 state. Frequency Floor Override Whether the CPU is allowed to drop below the maximum non-turbo frequency when idle. This can be one of the following: • Disabled— The CPU can drop below the maximum non-turbo frequency when idle. This option decreases power consumption but may reduce system performance. • Enabled— The CPU cannot drop below the maximum non-turbo frequency when idle. This option improves system performance but may increase power consumption. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 208 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description P-STATE Coordination Allows you to define how BIOS communicates the P-state support model to the operating system. There are 3 models as defined by the Advanced Configuration and Power Interface (ACPI) specification. • HW_ALL—The processor hardware is responsible for coordinating the P-state among logical processors with dependencies (all logical processors in a package). • SW_ALL—The OS Power Manager (OSPM) is responsible for coordinating the P-state among logical processors with dependencies (all logical processors in a physical package), and must initiate the transition on all of the logical processors. • SW_ANY—The OS Power Manager (OSPM) is responsible for coordinating the P-state among logical processors with dependencies (all logical processors in a package), and may initiate the transition on any of the logical processors in the domain. Note Energy Performance must be set to Custom or the server ignores the setting for this parameter. Allows you to determine whether system performance or energy efficiency is more important on this server. This can be one of the following: • • • • Note must be set to Custom or the server ignores the setting for this parameter. In addition, some operating systems, such as Windows 2008, ignore this parameter in favor of their own power plan. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 209 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Memory Configuration Parameters Name Description Select Memory RAS How the memory reliability, availability, and serviceability (RAS) is configured for the server. This can be one of the following: • —System performance is optimized. • Mirroring—System reliability is optimized by using half the system memory as backup. • Lockstep—If the DIMM pairs in the server have an identical type, size, and organization and are populated across the SMI channels, you can enable lockstep mode to minimize memory access latency and provide better performance. This option offers better system performance than Mirroring and better reliability than Maximum Performance but lower reliability than Mirroring and lower system performance than Maximum Performance. DRAM Clock Throttling Allows you to determine whether memory bandwidth or system performance is more important on this server. This can be one of the following: • Balanced— DRAM clock throttling is reduced, providing a balance between performance and power. • Performance—DRAM clock throttling is disabled, providing increased memory bandwidth at the cost of additional power. • —DRAM clock throttling is increased to improve energy efficiency. NUMA Whether the BIOS supports NUMA. This can be one of the following: • Disabled—The BIOS does not support NUMA. • Enabled—The BIOS includes the ACPI tables that are required for NUMA-aware operating systems. If you enable this option, the system must disable Inter-Socket Memory interleaving on some platforms. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 210 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description Low Voltage DDR Mode Whether the system prioritizes low voltage or high frequency memory operations. This can be one of the following: • —The system prioritizes low voltage memory operations over high frequency memory operations. This mode may lower memory frequency in order to keep the voltage low. • —The system prioritizes high frequency operations over low voltage operations. DRAM Refresh rate Allows you to set the rate at which the DRAM cells are refreshed. This can be one of the following: • 1x—DRAM cells are refreshed every 64ms. • 2x—DRAM cells are refreshed every 32ms. • 3x—DRAM cells are refreshed every 21ms. • 4x—DRAM cells are refreshed every 16ms. Channel Interleaving Whether the CPU divides memory blocks and spreads contiguous portions of data across interleaved channels to enable simultaneous read operations. This can be one of the following: • Auto—The CPU determines what interleaving is done. • —Some channel interleaving is used. • • • —The maximum amount of channel interleaving is used. Rank Interleaving Whether the CPU interleaves physical ranks of memory so that one rank can be accessed while another is being refreshed. This can be one of the following: • Auto—The CPU determines what interleaving is done. • —Some rank interleaving is used. • • • —The maximum amount of rank interleaving is used. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 211 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description Patrol Scrub Whether the system actively searches for, and corrects, single bit memory errors even in unused portions of the memory on the server. This can be one of the following: • Disabled—The system checks for memory ECC errors only when the CPU reads or writes a memory address. • Enabled—The system periodically reads and writes memory searching for ECC errors. If any errors are found, the system attempts to fix them. This option may correct single bit errors before they become multi-bit errors, but it may adversely affect performance when the patrol scrub is running. Demand Scrub Whether the system corrects single bit memory errors encountered when the CPU or I/O makes a demand read. This can be one of the following: • Disabled— Single bit memory errors are not corrected. • Enabled— Single bit memory errors are corrected in memory and the corrected data is set in response to the demand read. Altitude The approximate number of meters above sea level at which the physical server is installed. This can be one of the following: • Auto—The CPU determines the physical elevation. • —The server is approximately 300 meters above sea level. • —The server is approximately 900 meters above sea level. • —The server is approximately 1500 meters above sea level. • —The server is approximately 3000 meters above sea level. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 212 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers QPI Configuration Parameters Name Description QPI Link Frequency The Intel QuickPath Interconnect (QPI) link frequency, in gigatransfers per second (GT/s). This can be one of the following: • Auto—The CPU determines the QPI link frequency. • • • Onboard Storage Parameters Name Description Onboard SCU Storage Support Whether the onboard software RAID controller is available to the server. This can be one of the following: • Disabled—The software RAID controller is not available. • Enabled—The software RAID controller is available. USB Configuration Parameters Name Description Legacy USB Support Whether the system supports legacy USB devices. This can be one of the following: • Disabled—USB devices are only available to EFI applications. • Enabled—Legacy USB support is always available. • Auto—Disables legacy USB support if no USB devices are connected. Port 60/64 Emulation Whether the system supports 60h/64h emulation for complete USB keyboard legacy support. This can be one of the following: • Disabled—60h/64 emulation is not supported. • Enabled—60h/64 emulation is supported. You should select this option if you are using a non-USB aware operating system on the server. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 213 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description All USB Devices Whether all physical and virtual USB devices are enabled or disabled. This can be one of the following: • Disabled—All USB devices are disabled. • Enabled—All USB devices are enabled. USB Port: Rear Whether the rear panel USB devices are enabled or disabled. This can be one of the following: • Disabled—Disables the rear panel USB ports. Devices connected to these ports are not detected by the BIOS and operating system. • Enabled—Enables the rear panel USB ports. Devices connected to these ports are detected by the BIOS and operating system. USB Port: Front Whether the front panel USB devices are enabled or disabled. This can be one of the following: • Disabled—Disables the front panel USB ports. Devices connected to these ports are not detected by the BIOS and operating system. • Enabled—Enables the front panel USB ports. Devices connected to these ports are detected by the BIOS and operating system. USB Port: Internal Whether the internal USB devices are enabled or disabled. This can be one of the following: • Disabled—Disables the internal USB ports. Devices connected to these ports are not detected by the BIOS and operating system. • Enabled—Enables the internal USB ports. Devices connected to these ports are detected by the BIOS and operating system. USB Port: KVM Whether the KVM ports are enabled or disabled.This can be one of the following: • Disabled—Disables the KVM port. Devices connected to these ports are not detected by the BIOS and operating system. • Enabled—Enables the KVM ports. Devices connected to these ports are detected by the BIOS and operating system. USB Port: VMedia Whether the virtual media devices are enabled or disabled. This can be one of the following: • Disabled—Disables the vMedia devices. • Enabled—Enables the vMedia devices. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 214 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description USB Port: SD Card Whether the SD card drives are enabled or disabled. This can be one of the following: • Disabled—Disables the SD card drives. The SD card drives are not detected by the BIOS and operating system. • Enabled—Enables the SD card drives. PCI Configuration Parameters Name Description Memory Mapped I/O Above 4GB Whether to enable or disable memory mapped I/O of 64-bit PCI devices to 4GB or greater address space. Legacy option ROMs are not able to access addresses above 4GB. PCI devices that are 64-bit compliant but use a legacy option ROM may not function correctly with this setting enabled. This can be one of the following: • Disabled—The server does not map I/O of 64-bit PCI devices to 4GB or greater address space. • Enabled—The server maps I/O of 64-bit PCI devices to 4GB or greater address space. ASPM Support Allows you to set the level of ASPM (Active Power State Management) support in the BIOS.This can be one of the following: • Disabled—ASPM support is disabled in the BIOS. • Force L0s—Force all links to L0 standby (L0s) state. • Auto—The CPU determines the power state. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 215 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description VGA Priority Allows you to set the priority for VGA graphics devices if multiple VGA devices are found in the system. This can be one of the following: • Onboard—Priority is given to the onboard VGA device. BIOS post screen and OS boot are driven through the onboard VGA port. • Offboard—Priority is given to the PCIE Graphics adapter. BIOS post screen and OS boot are driven through the external graphics adapter port. • —Priority is given to the PCIE Graphics adapter, and the onboard VGA device is disabled. Note The vKVM does not function when the onboard VGA is disabled. Serial Configuration Parameters Name Description Console Redirection Allows a serial port to be used for console redirection during POST and BIOS booting. After the BIOS has booted and the operating system is responsible for the server, console redirection is irrelevant and has no effect. This can be one of the following: • Disabled—No console redirection occurs during POST. • —Enables console redirection on COM port 0 during POST. • —Enables console redirection on COM port 1 during POST. Terminal Type What type of character formatting is used for console redirection. This can be one of the following: • PC-ANSI—The PC-ANSI terminal font is used. • VT100—A supported vt100 video terminal and its character set are used. • VT100+—A supported vt100-plus video terminal and its character set are used. • VT-UTF8—A video terminal with the UTF-8 character set is used. Note This setting must match the setting on the remote terminal application. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 216 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description Bits per second What BAUD rate is used for the serial port transmission speed. If you disable Console Redirection, this option is not available. This can be one of the following: • 9600—A 9,600 BAUD rate is used. • 19200—A 19,200 BAUD rate is used. • 38400—A 38,400 BAUD rate is used. • 57600—A 57,600 BAUD rate is used. • 115200—A 115,200 BAUD rate is used. Note Flow Control This setting must match the setting on the remote terminal application. Whether a handshake protocol is used for flow control. Request to Send / Clear to Send (RTS/CTS) helps to reduce frame collisions that can be introduced by a hidden terminal problem. This can be one of the following: • None—No flow control is used. • —RTS/CTS is used for flow control. Note Putty KeyPad This setting must match the setting on the remote terminal application. Allows you to change the action of the PuTTY function keys and the top row of the numeric keypad. This can be one of the following: • VT100—The function keys generate ESC OP through ESC O[. • LINUX—Mimics the Linux virtual console. Function keys F6 to F12 behave like the default mode, but F1 to F5 generate ESC [[A through ESC [[E. • XTERMR6—Function keys F5 to F12 behave like the default mode. Function keys F1 to F4 generate ESC OP through ESC OS, which are the sequences produced by the top row of the keypad on Digital terminals. • SCO—The function keys F1 to F12 generate ESC [M through ESC [X. The function and shift keys generate ESC [Y through ESC [j. The control and function keys generate ESC [k through ESC [v. The shift, control and function keys generate ESC [w through ESC [{. • ESCN—The default mode. The function keys match the general behavior of Digital terminals. The function keys generate sequences such as ESC [11~ and ESC [12~. • VT400—The function keys behave like the default mode. The top row of the numeric keypad generates ESC OP through ESC OS. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 217 BIOS Parameters by Server Model Advanced BIOS Parameters for C220 and C240 Servers Name Description Redirection After BIOS POST Whether BIOS console redirection should be active after BIOS POST is complete and control given to the OS bootloader. This can be one of the following: • —BIOS Legacy console redirection is active during the OS boot and run time. • Bootloader—BIOS Legacy console redirection is disabled before giving control to the OS boot loader. LOM and PCIe Slots Configuration Parameters Name Description All Onboard LOM Ports Whether all LOM ports are enabled or disabled. This can be one of the following: • Disabled—All LOM ports are disabled. • Enabled—All LOM ports are enabled. LOM Port n OptionROM Whether Option ROM is available on the LOM port designated by n. This can be one of the following: • Disabled—The expansion slot n is not available. • Enabled—The expansion slot n is available. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. All PCIe Slots OptionROM Whether the server can use the PCIe Option ROM expansion slots. This can be one of the following: • Disabled—The expansion slot n is not available. • Enabled—The expansion slot n is available. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 218 OL-28893-01 BIOS Parameters by Server Model Server Management BIOS Parameters for C220 and C240 Servers Name Description PCIe Slot:n OptionROM Whether PCIe expansion slot n is available to the server. This can be one of the following: • Disabled—The expansion slot n is not available. • Enabled—The expansion slot n is available. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. PCIe Mezzanine OptionROM Whether the PCIe mezzanine slot expansion ROM is available to the server. This can be one of the following: • Disabled—The expansion slot n is not available. • Enabled—The expansion slot n is available. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. PCIe Slot:n Link Speed This option allows you to restrict the maximum speed of an adapter card installed in PCIe slot n. This can be one of the following: • GEN1—2.5GT/s (gigatransfers per second) is the maximum speed allowed. • GEN2—5GT/s is the maximum speed allowed. • GEN3—8GT/s is the maximum speed allowed. • Disabled—The maximum speed is not restricted. For example, if you have a 3rd generation adapter card in PCIe slot 2 that you want to run at a maximum of 5GT/s instead of the 8GT/s that card supports, set the PCIe Slot 2 Link Speed to GEN2. The system then ignores the card's supported maximum speed of 8GT/s and forces it to run at a maximum of 5 GT/s. Server Management BIOS Parameters for C220 and C240 Servers Name Description FRB-2 Timer Whether the FRB2 timer is used by CIMC to recover the system if it hangs during POST. This can be one of the following: • Disabled—The FRB2 timer is not used. • Enabled—The FRB2 timer is started during POST and used to recover the system if necessary. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 219 BIOS Parameters by Server Model Server Management BIOS Parameters for C220 and C240 Servers Name Description OS Watchdog Timer Whether the BIOS programs the watchdog timer with a specified timeout value. This can be one of the following: • Disabled—The watchdog timer is not used to track how long the server takes to boot. • Enabled—The watchdog timer tracks how long the server takes to boot. If the server does not boot within the length of time specified OS Watchdog Timer Timeout What timeout value the BIOS uses to configure the watchdog timer. This can be one of the following: • —The watchdog timer expires 5 minutes after the OS begins to boot. • —The watchdog timer expires 10 minutes after the OS begins to boot. • —The watchdog timer expires 15 minutes after the OS begins to boot. • —The watchdog timer expires 20 minutes after the OS begins to boot. Note OS Watchdog Timer Policy This option is only applicable if you enable the OS Boot Watchdog Timer. What action the system takes if the watchdog timer expires. This can be one of the following: • —The server takes no action if the watchdog timer expires during OS boot. • —The server is powered off if the watchdog timer expires during OS boot. • Reset—The server is reset if the watchdog timer expires during OS boot. Note This option is only applicable if you enable the OS Boot Watchdog Timer. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 220 OL-28893-01 BIOS Parameters by Server Model Server Management BIOS Parameters for C220 and C240 Servers Name Description Boot Order Rules How the server changes the boot order list defined through the CIMC GUI or CLI when there are no devices of a particular device type available or when the user defines a different boot order using the server's BIOS Setup Utility. The supported device types are: • HDD—Hard disk drive • FDD—Floppy disk drive • CDROM—Bootable CD-ROM or DVD • PXE—PXE boot • EFI—Extensible Firmware Interface The Boot Order Rules option can be one of the following: • Strict—When no devices of a particular type are available, the system creates a placeholder for that device type in the boot order list. When a device of that type becomes available, it is added to the boot order in the previously defined position. If the user defines a boot order through the server's BIOS Setup Utility, that boot order is given priority over the boot order configured through the CIMC GUI or CLI. All device types defined through CIMC that are not present in the boot order defined through the BIOS Setup Utility are removed from the boot order list. • Loose—When no devices of a particular type are available, the system removes that device type from the boot order. When a device of that type becomes available, the system adds it to the end of the boot order list. If the boot order is configured through the server's BIOS Setup Utility, that boot order is given priority over the boot order configured through the CIMC GUI or CLI. All device types defined through CIMC that are not present in the boot order defined through the BIOS Setup Utility are moved to the end of the boot order list. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 221 BIOS Parameters by Server Model C260 Servers C260 Servers Main BIOS Parameters for C260 Servers Name Description POST Error Pause What happens when the server encounters a critical error during POST. This can be one of the following: • Enabled—The BIOS pauses the attempt to boot the server and opens the Error Manager when a critical error occurs during POST. • Disabled—The BIOS continues to attempt to boot the server. Boot Option Retry Whether the BIOS retries NON-EFI based boot options without waiting for user input. This can be one of the following: • Enabled—Continually retries NON-EFI based boot options without waiting for user input. • Disabled—Waits for user input before retrying NON-EFI based boot options. Advanced BIOS Parameters for C260 Servers Processor Configuration Parameters Name Description Intel Turbo Boost Technology Whether the processor uses Intel Turbo Boost Technology, which allows the processor to automatically increase its frequency if it is running below power, temperature, or voltage specifications. This can be one of the following: • Disabled—The processor does not increase its frequency automatically. • Enabled—The processor utilizes Turbo Boost Technology if required. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 222 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C260 Servers Name Description Enhanced Intel Speedstep Technology Whether the processor uses Enhanced Intel SpeedStep Technology, which allows the system to dynamically adjust processor voltage and core frequency. This technology can result in decreased average power consumption and decreased average heat production. This can be one of the following: • Disabled—The processor never dynamically adjusts its voltage or frequency. • Enabled—The processor utilizes Enhanced Intel SpeedStep Technology and enables all supported processor sleep states to further conserve power. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Intel Hyper-Threading Technology Whether the processor uses Intel Hyper-Threading Technology, which allows multithreaded software applications to execute threads in parallel within each processor. This can be one of the following: • Disabled—The processor does not permit hyperthreading. • Enabled—The processor allows for the parallel execution of multiple threads. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Number of Enabled Cores Allows you to disable one or more of the physical cores on the server. This can be one of the following: • All—Enables all physical cores. This also enables Hyper Threading on the associated logical processor cores. • 1 through n—Specifies the number of physical processor cores that can run on the server. Each physical core has an associated logical core. To disable Hyper Threading and have only one logical processor core running on the server, select 1. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 223 BIOS Parameters by Server Model Advanced BIOS Parameters for C260 Servers Name Description Execute Disable Classifies memory areas on the server to specify where application code can execute. As a result of this classification, the processor disables code execution if a malicious worm attempts to insert code in the buffer. This setting helps to prevent damage, worm propagation, and certain classes of malicious buffer overflow attacks. This can be one of the following: • Disabled—The processor does not classify memory areas. • Enabled—The processor classifies memory areas. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Intel Virtualization Technology Whether the processor uses Intel Virtualization Technology (VT), which allows a platform to run multiple operating systems and applications in independent partitions. This can be one of the following: • Disabled—The processor does not permit virtualization. • Enabled—The processor allows multiple operating systems in independent partitions. Note Intel VT for Directed IO If you change this option, you must power cycle the server before the setting takes effect. Whether the processor uses Intel Virtualization Technology for Directed I/O (VT-d). This can be one of the following: • Disabled—The processor does not use virtualization technology. • Enabled—The processor uses virtualization technology. Intel VT-d Interrupt Remapping Whether the processor supports Intel VT-d Interrupt Remapping. This can be one of the following: • Disabled—The processor does not support remapping. • Enabled—The processor uses VT-d Interrupt Remapping as required. Intel VT-d Coherency Support Whether the processor supports Intel VT-d Coherency. This can be one of the following: • Disabled—The processor does not support coherency. • Enabled—The processor uses VT-d Coherency as required. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 224 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C260 Servers Name Description Intel VT-d Address Translation Services Whether the processor supports Intel VT-d Address Translation Services (ATS). This can be one of the following: • Disabled—The processor does not support ATS. • Enabled—The processor uses VT-d ATS as required. Intel VT-d PassThrough DMA Whether the processor supports Intel VT-d Pass-through DMA. This can be one of the following: • Disabled—The processor does not support pass-through DMA. • Enabled—The processor uses VT-d Pass-through DMA as required. Direct Cache Access Allows processors to increase I/O performance by placing data from I/O devices directly into the processor cache. This setting helps to reduce cache misses. This can be one of the following: • Disabled—Data from I/O devices is not placed directly into the processor cache. • Enabled—Data from I/O devices is placed directly into the processor cache. Processor C3 Report Whether the BIOS sends the C3 report to the operating system. When the OS receives the report, it can transition the processor into the lower C3 power state to decrease energy usage while maintaining optimal processor performance. This can be one of the following: • Disabled—The BIOS does not send the C3 report. • —The BIOS sends the C3 report using the ACPI C2 format, allowing the OS to transition the processor to the C3 low power state. • —The BIOS sends the C3 report using the ACPI C3 format, allowing the OS to transition the processor to the C3 low power state. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 225 BIOS Parameters by Server Model Advanced BIOS Parameters for C260 Servers Name Description Processor C6 Report Whether the BIOS sends the C6 report to the operating system. When the OS receives the report, it can transition the processor into the lower C6 power state to decrease energy usage while maintaining optimal processor performance. This can be one of the following: • Disabled—The BIOS does not send the C6 report. • Enabled—The BIOS sends the C6 report, allowing the OS to transition the processor to the C6 low power state. Package C State Limit The amount of power available to the server components when they are idle. This can be one of the following: • —The server provides all server components with full power at all times. This option maintains the highest level of performance and requires the greatest amount of power. • —When the CPU is idle, the system slightly reduces the power consumption. This option requires less power than C0 and allows the server to return quickly to high performance mode. • —When the CPU is idle, the system reduces the power consumption further than with the C1 option. This requires less power than C1 or C0, but it takes the server slightly longer to return to high performance mode. • —When the CPU is idle, the system reduces the power consumption further than with the C3 option. This option saves more power than C0, C1, or C3, but there may be performance issues until the server returns to full power. • —When the CPU is idle, the server makes a minimal amount of power available to the components. This option saves the maximum amount of power but it also requires the longest time for the server to return to high performance mode. • —The server may enter any available C state. Note CPU C State This option is used only if CPU C State is enabled. Whether the system can enter a power savings mode during idle periods. This can be one of the following: • Disabled—The system remains in high performance state even when idle. • Enabled—The system can reduce power to system components such as the DIMMs and CPUs. The amount of power reduction is specified . Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 226 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C260 Servers Name Description C1E Whether the CPU transitions to its minimum frequency when entering the C1 state. This can be one of the following: • Disabled—The CPU continues to run at its maximum frequency in C1 state. • Enabled—The CPU transitions to its minimum frequency. This option saves the maximum amount of power in C1 state. Note This option is used only if is enabled. Memory Configuration Parameters Name Description Select Memory RAS How the memory reliability, availability, and serviceability (RAS) is configured for the server. This can be one of the following: • —System performance is optimized. • Mirroring—System reliability is optimized by using half the system memory as backup. • Sparing—The system reserves some memory for use in the event a DIMM fails. If that happens, the server takes the DIMM offline and replaces it with the reserved memory. This option provides less redundancy than mirroring, but it leaves more of the memory available for programs running on the server. NUMA Optimized Whether the BIOS supports NUMA. This can be one of the following: • Disabled—The BIOS does not support NUMA. • Enabled—The BIOS includes the ACPI tables that are required for NUMA-aware operating systems. If you enable this option, the system must disable Inter-Socket Memory interleaving on some platforms. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 227 BIOS Parameters by Server Model Advanced BIOS Parameters for C260 Servers Name Description Sparing Mode The sparing mode used by the CIMC. This can be one of the following: • —The spared memory is allocated at the rank level. • DIMM Sparing—The spared memory is allocated at the DIMM level. Note Mirroring Mode This option is used only if is set to Sparing. Mirroring is supported across Integrated Memory Controllers (IMCs) where one memory riser is mirrored with another. This can be one of the following: • Intersocket—Each IMC is mirrored across two sockets. • Intrasocket—One IMC is mirrored with another IMC in the same socket. Note DRAM Refresh rate This option is used only if is set to Mirroring. Allows you to set the rate at which the DRAM cells are refreshed. This can be one of the following: • 1x—DRAM cells are refreshed every 64ms. • 2x—DRAM cells are refreshed every 32ms. • 3x—DRAM cells are refreshed every 21ms. • 4x—DRAM cells are refreshed every 16ms. Patrol Scrub Whether the system actively searches for, and corrects, single bit memory errors even in unused portions of the memory on the server. This can be one of the following: • Disabled—The system checks for memory ECC errors only when the CPU reads or writes a memory address. • Enabled—The system periodically reads and writes memory searching for ECC errors. If any errors are found, the system attempts to fix them. This option may correct single bit errors before they become multi-bit errors, but it may adversely affect performance when the patrol scrub is running. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 228 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C260 Servers Name Description Patrol Scrub Interval Controls the time interval between each patrol scrub memory access. A lower interval scrubs the memory more often but requires more memory bandwidth. Select a value between 5 and 23. The default value is 8. Note This option is used only if Patrol Scrub is enabled. Controls the DIMM power savings mode policy. This can be one of the following: CKE Low Policy • Disabled—DIMMs do not enter power saving mode. • Slow—DIMMs can enter power saving mode, but the requirements are higher. Therefore, DIMMs enter power saving mode less frequently. • Fast—DIMMs enter power saving mode as often as possible. • Auto—The BIOS controls when a DIMM enters power saving mode based on the DIMM configuration. Serial Port Configuration Parameters Name Description Serial A Enable Whether serial port A is enabled or disabled. This can be one of the following: • Disabled—The serial port is disabled. • Enabled—The serial port is enabled. USB Configuration Parameters Name Description Make Device Non-Bootable Whether the server can boot from a USB device. This can be one of the following: • Disabled—The server can boot from a USB device. • Enabled—The server cannot boot from a USB device. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 229 BIOS Parameters by Server Model Advanced BIOS Parameters for C260 Servers PCI Configuration Parameters Name Description Memory Mapped I/O Above 4GB Whether to enable or disable memory mapped I/O of 64-bit PCI devices to 4GB or greater address space. Legacy option ROMs are not able to access addresses above 4GB. PCI devices that are 64-bit compliant but use a legacy option ROM may not function correctly with this setting enabled. This can be one of the following: • Disabled—The server does not map I/O of 64-bit PCI devices to 4GB or greater address space. • Enabled—The server maps I/O of 64-bit PCI devices to 4GB or greater address space. Onboard NIC n ROM Whether the system loads the embedded PXE option ROM for the onboard NIC designated by n. This can be one of the following: • Disabled—PXE option ROM is not available for NIC n. • Enabled—PXE option ROM is available for NIC n. PCIe OptionROMs Whether the server can use the PCIe Option ROM expansion slots. This can be one of the following: • Disabled—PCIe Option ROMs are not available. • Enabled—PCIe Option ROMs are available. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. PCIe Slot n ROM Whether PCIe expansion slot n is available to the server. This can be one of the following: • Disabled—The expansion slot n is not available. • Enabled—The expansion slot n is available. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. Onboard Gbit LOM Whether Gbit LOM is enabled or disabled on the server. This can be one of the following: • Disabled—Gbit LOM is not available. • Enabled—10Git LOM is available. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 230 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C260 Servers Name Description Onboard 10Gbit LOM Whether 10Gbit LOM is enabled or disabled on the server. This can be one of the following: • Disabled—10GBit LOM is not available. • Enabled—10GBit LOM is available. Whether SR-IOV (Single Root I/O Virtualization) is enabled or disabled on the server. This can be one of the following: Sriov • Disabled—SR-IOV is disabled. • Enabled—SR-IOV is enabled. IOH Resource Allocation Enables you to distribute 64KB of 16-bit IO resources between IOH0 and IOH1 as per system requirement. This can be one of the following: • IOH0 24k IOH1 40k— Allocates 24KB of 16-bit IO resources to IOH0 and 40KB of 16-bit IO resources to IOH1. • IOH0 32k IOH1 32k— Allocates 32KB of 16-bit IO resources to IOH0 and 32KB of 16-bit IO resources to IOH1. • IOH0 40k IOH1 24k— Allocates 40KB of 16-bit IO resources to IOH0 and 24KB of 16-bit IO resources to IOH1. • IOH0 48k IOH1 16k— Allocates 48KB of 16-bit IO resources to IOH0 and 16KB of 16-bit IO resources to IOH1. • IOH0 56k IOH1 8k— Allocates 56KB of 16-bit IO resources to IOH0 and 8KB of 16-bit IO resources to IOH1. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 231 BIOS Parameters by Server Model Server Management BIOS Parameters for C260 Servers Server Management BIOS Parameters for C260 Servers Name Description Assert NMI on SERR Whether the BIOS generates a non-maskable interrupt (NMI) and logs an error when a system error (SERR) occurs. This can be one of the following: • Disabled—The BIOS does not generate an NMI or log an error when a SERR occurs. • Enabled—The BIOS generates an NMI and logs an error when a SERR occurs. You must enable this setting if you want to enable . Assert NMI on PERR Whether the BIOS generates a non-maskable interrupt (NMI) and logs an error when a processor bus parity error (PERR) occurs. This can be one of the following: • Disabled—The BIOS does not generate an NMI or log an error when a PERR occurs. • Enabled—The BIOS generates an NMI and logs an error when a PERR occurs. You must enable to use this setting. Console Redirection Allows a serial port to be used for console redirection during POST and BIOS booting. After the BIOS has booted and the operating system is responsible for the server, console redirection is irrelevant and has no effect. This can be one of the following: • Disabled—No console redirection occurs during POST. • —Enables console redirection on serial port A during POST. Note Flow Control If you enable this option, you also disable the display of the Quiet Boot logo screen during POST. Whether a handshake protocol is used for flow control. Request to Send / Clear to Send (RTS/CTS) helps to reduce frame collisions that can be introduced by a hidden terminal problem. This can be one of the following: • None—No flow control is used. • RTS-CTS—RTS/CTS is used for flow control. Note This setting must match the setting on the remote terminal application. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 232 OL-28893-01 BIOS Parameters by Server Model Server Management BIOS Parameters for C260 Servers Name Description Baud Rate What BAUD rate is used for the serial port transmission speed. If you disable Console Redirection, this option is not available. This can be one of the following: • 9.6k—A 9600 BAUD rate is used. • 19.2k—A 19200 BAUD rate is used. • 38.4k—A 38400 BAUD rate is used. • 57.6k—A 57600 BAUD rate is used. • 115.2k—A 115200 BAUD rate is used. Note Terminal Type This setting must match the setting on the remote terminal application. What type of character formatting is used for console redirection. This can be one of the following: • PC-ANSI—The PC-ANSI terminal font is used. • VT100—A supported vt100 video terminal and its character set are used. • VT100-PLUS—A supported vt100-plus video terminal and its character set are used. • VT-UTF8—A video terminal with the UTF-8 character set is used. Note OS Boot Watchdog Timer Timeout This setting must match the setting on the remote terminal application. What timeout value the BIOS uses to configure the watchdog timer. This can be one of the following: • —The watchdog timer expires 5 minutes after the OS begins to boot. • —The watchdog timer expires 10 minutes after the OS begins to boot. • —The watchdog timer expires 15 minutes after the OS begins to boot. • —The watchdog timer expires 20 minutes after the OS begins to boot. Note This option is only applicable if you enable the OS Boot Watchdog Timer. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 233 BIOS Parameters by Server Model Server Management BIOS Parameters for C260 Servers Name Description OS Boot Watchdog Policy What action the system takes if the watchdog timer expires. This can be one of the following: • —The server is powered off if the watchdog timer expires during OS boot. • Reset—The server is reset if the watchdog timer expires during OS boot. Note Legacy OS Redirection This option is only applicable if you enable the OS Boot Watchdog Timer. Whether redirection from a legacy operating system, such as DOS, is enabled on the serial port. This can be one of the following: • Disabled—The serial port enabled for console redirection is hidden from the legacy operating system. • Enabled—The serial port enabled for console redirection is visible to the legacy operating system. OS Boot Watchdog Timer Whether the BIOS programs the watchdog timer with a specified timeout value. This can be one of the following: • Disabled—The watchdog timer is not used to track how long the server takes to boot. • Enabled—The watchdog timer tracks how long the server takes to boot. If the server does not boot within the length of time specified Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 234 OL-28893-01 BIOS Parameters by Server Model C420 Servers C420 Servers Main BIOS Parameters for C420 Servers Name Description TPM Support TPM (Trusted Platform Module) is a microchip designed to provide basic security-related functions primarily involving encryption keys. This option allows you to control the TPM Security Device support for the system. It can be one of the following: • Disabled—The server does not use the TPM. • Enabled—The server uses the TPM. Note We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Advanced BIOS Parameters for C420 Servers Processor Configuration Parameters Name Description Intel Hyper-Threading Technology Whether the processor uses Intel Hyper-Threading Technology, which allows multithreaded software applications to execute threads in parallel within each processor. This can be one of the following: • Disabled—The processor does not permit hyperthreading. • Enabled—The processor allows for the parallel execution of multiple threads. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 235 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description Number of Enabled Cores Allows you to disable one or more of the physical cores on the server. This can be one of the following: • All—Enables all physical cores. This also enables Hyper Threading on the associated logical processor cores. • 1 through n—Specifies the number of physical processor cores that can run on the server. Each physical core has an associated logical core. To disable Hyper Threading and have only one logical processor core running on the server, select 1. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Execute Disable Classifies memory areas on the server to specify where application code can execute. As a result of this classification, the processor disables code execution if a malicious worm attempts to insert code in the buffer. This setting helps to prevent damage, worm propagation, and certain classes of malicious buffer overflow attacks. This can be one of the following: • Disabled—The processor does not classify memory areas. • Enabled—The processor classifies memory areas. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Intel VT Whether the processor uses Intel Virtualization Technology (VT), which allows a platform to run multiple operating systems and applications in independent partitions. This can be one of the following: • Disabled—The processor does not permit virtualization. • Enabled—The processor allows multiple operating systems in independent partitions. Note Intel VT-d If you change this option, you must power cycle the server before the setting takes effect. Whether the processor uses Intel Virtualization Technology for Directed I/O (VT-d). This can be one of the following: • Disabled—The processor does not use virtualization technology. • Enabled—The processor uses virtualization technology. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 236 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description Intel VT-d Coherency Support Whether the processor supports Intel VT-d Coherency. This can be one of the following: • Disabled—The processor does not support coherency. • Enabled—The processor uses VT-d Coherency as required. Intel VT-d ATS Support Whether the processor supports Intel VT-d Address Translation Services (ATS). This can be one of the following: • Disabled—The processor does not support ATS. • Enabled—The processor uses VT-d ATS as required. CPU Performance Sets the CPU performance profile for the server. The performance profile consists of the following options: • Data Reuse Optimization • DCU Streamer Prefetcher • DCU IP Prefetcher • Hardware Prefetcher • Adjacent Cache-Line Prefetch This can be one of the following: • Enterprise—Only the DCU IP Prefetcher is enabled. The rest of the options are disabled. • —All options are enabled. • HPC—Data Reuse Optimization is disabled and all other options are enabled. This setting is also known as high performance computing. • Custom—All performance profile options can be configured from the BIOS setup on the server. In addition, the Hardware Prefetcher and Adjacent Cache-Line Prefetch options can be configured in the fields below. Hardware Prefetcher Whether the processor allows the Intel hardware prefetcher to fetch streams of data and instruction from memory into the unified second-level cache when necessary. This can be one of the following: • Disabled—The hardware prefetcher is not used. • Enabled—The processor uses the hardware prefetcher when cache issues are detected. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 237 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description Adjacent Cache Line Prefetcher Whether the processor fetches cache lines in even/odd pairs instead of fetching just the required line. This can be one of the following: • Disabled—The processor only fetches the required line. • Enabled— The processor fetches both the required line and its paired line. DCU Streamer Prefetch Whether the processor uses the DCU IP Prefetch mechanism to analyze historical cache access patterns and preload the most relevant lines in the L1 cache. This can be one of the following: • Disabled—The processor does not try to anticipate cache read requirements and only fetches explicitly requested lines. • Enabled—The DCU prefetcher analyzes the cache read pattern and prefetches the next line in the cache if it determines that it may be needed. DCU IP Prefetcher Whether the processor uses the DCU IP Prefetch mechanism to analyze historical cache access patterns and preload the most relevant lines in the L1 cache. This can be one of the following: • Disabled—The processor does not preload any cache data. • Enabled—The DCU IP prefetcher preloads the L1 cache with the data it determines to be the most relevant. Direct Cache Access Support Allows processors to increase I/O performance by placing data from I/O devices directly into the processor cache. This setting helps to reduce cache misses. This can be one of the following: • Disabled—Data from I/O devices is not placed directly into the processor cache. • Enabled—Data from I/O devices is placed directly into the processor cache. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 238 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description Power Technology Enables you to configure the CPU power management settings for the following options: • Enhanced Intel Speedstep Technology • Intel Turbo Boost Technology • Processor Power State C6 Power Technology can be one of the following: • Custom—The server uses the individual settings for the BIOS parameters mentioned above. You must select this option if you want to change any of these BIOS parameters. • Disabled—The server does not perform any CPU power management and any settings for the BIOS parameters mentioned above are ignored. • —The server determines the best settings for the BIOS parameters mentioned above and ignores the individual settings for these parameters. Enhanced Intel Speedstep Technology Whether the processor uses Enhanced Intel SpeedStep Technology, which allows the system to dynamically adjust processor voltage and core frequency. This technology can result in decreased average power consumption and decreased average heat production. This can be one of the following: • Disabled—The processor never dynamically adjusts its voltage or frequency. • Enabled—The processor utilizes Enhanced Intel SpeedStep Technology and enables all supported processor sleep states to further conserve power. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Note must be set to Custom or the server ignores the setting for this parameter. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 239 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description Intel Turbo Boost Technology Whether the processor uses Intel Turbo Boost Technology, which allows the processor to automatically increase its frequency if it is running below power, temperature, or voltage specifications. This can be one of the following: • Disabled—The processor does not increase its frequency automatically. • Enabled—The processor utilizes Turbo Boost Technology if required. Note Processor Power State C6 must be set to Custom or the server ignores the setting for this parameter. Whether the BIOS sends the C6 report to the operating system. When the OS receives the report, it can transition the processor into the lower C6 power state to decrease energy usage while maintaining optimal processor performance. This can be one of the following: • Disabled—The BIOS does not send the C6 report. • Enabled—The BIOS sends the C6 report, allowing the OS to transition the processor to the C6 low power state. Note Processor Power State C1 Enhanced must be set to Custom or the server ignores the setting for this parameter. Whether the CPU transitions to its minimum frequency when entering the C1 state. This can be one of the following: • Disabled—The CPU continues to run at its maximum frequency in C1 state. • Enabled—The CPU transitions to its minimum frequency. This option saves the maximum amount of power in C1 state. Frequency Floor Override Whether the CPU is allowed to drop below the maximum non-turbo frequency when idle. This can be one of the following: • Disabled— The CPU can drop below the maximum non-turbo frequency when idle. This option decreases power consumption but may reduce system performance. • Enabled— The CPU cannot drop below the maximum non-turbo frequency when idle. This option improves system performance but may increase power consumption. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 240 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description P-STATE Coordination Allows you to define how BIOS communicates the P-state support model to the operating system. There are 3 models as defined by the Advanced Configuration and Power Interface (ACPI) specification. • HW_ALL—The processor hardware is responsible for coordinating the P-state among logical processors with dependencies (all logical processors in a package). • SW_ALL—The OS Power Manager (OSPM) is responsible for coordinating the P-state among logical processors with dependencies (all logical processors in a physical package), and must initiate the transition on all of the logical processors. • SW_ANY—The OS Power Manager (OSPM) is responsible for coordinating the P-state among logical processors with dependencies (all logical processors in a package), and may initiate the transition on any of the logical processors in the domain. Note Energy Performance must be set to Custom or the server ignores the setting for this parameter. Allows you to determine whether system performance or energy efficiency is more important on this server. This can be one of the following: • • • • Note must be set to Custom or the server ignores the setting for this parameter. In addition, some operating systems, such as Windows 2008, ignore this parameter in favor of their own power plan. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 241 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Memory Configuration Parameters Name Description Select Memory RAS How the memory reliability, availability, and serviceability (RAS) is configured for the server. This can be one of the following: • —System performance is optimized. • Mirroring—System reliability is optimized by using half the system memory as backup. • Lockstep—If the DIMM pairs in the server have an identical type, size, and organization and are populated across the SMI channels, you can enable lockstep mode to minimize memory access latency and provide better performance. This option offers better system performance than Mirroring and better reliability than Maximum Performance but lower reliability than Mirroring and lower system performance than Maximum Performance. DRAM Clock Throttling Allows you to determine whether memory bandwidth or system performance is more important on this server. This can be one of the following: • Balanced— DRAM clock throttling is reduced, providing a balance between performance and power. • Performance—DRAM clock throttling is disabled, providing increased memory bandwidth at the cost of additional power. • —DRAM clock throttling is increased to improve energy efficiency. NUMA Whether the BIOS supports NUMA. This can be one of the following: • Disabled—The BIOS does not support NUMA. • Enabled—The BIOS includes the ACPI tables that are required for NUMA-aware operating systems. If you enable this option, the system must disable Inter-Socket Memory interleaving on some platforms. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 242 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description Low Voltage DDR Mode Whether the system prioritizes low voltage or high frequency memory operations. This can be one of the following: • —The system prioritizes low voltage memory operations over high frequency memory operations. This mode may lower memory frequency in order to keep the voltage low. • —The system prioritizes high frequency operations over low voltage operations. DRAM Refresh rate Allows you to set the rate at which the DRAM cells are refreshed. This can be one of the following: • 1x—DRAM cells are refreshed every 64ms. • 2x—DRAM cells are refreshed every 32ms. • 3x—DRAM cells are refreshed every 21ms. • 4x—DRAM cells are refreshed every 16ms. Channel Interleaving Whether the CPU divides memory blocks and spreads contiguous portions of data across interleaved channels to enable simultaneous read operations. This can be one of the following: • Auto—The CPU determines what interleaving is done. • —Some channel interleaving is used. • • • —The maximum amount of channel interleaving is used. Rank Interleaving Whether the CPU interleaves physical ranks of memory so that one rank can be accessed while another is being refreshed. This can be one of the following: • Auto—The CPU determines what interleaving is done. • —Some rank interleaving is used. • • • —The maximum amount of rank interleaving is used. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 243 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description Patrol Scrub Whether the system actively searches for, and corrects, single bit memory errors even in unused portions of the memory on the server. This can be one of the following: • Disabled—The system checks for memory ECC errors only when the CPU reads or writes a memory address. • Enabled—The system periodically reads and writes memory searching for ECC errors. If any errors are found, the system attempts to fix them. This option may correct single bit errors before they become multi-bit errors, but it may adversely affect performance when the patrol scrub is running. Demand Scrub Whether the system corrects single bit memory errors encountered when the CPU or I/O makes a demand read. This can be one of the following: • Disabled— Single bit memory errors are not corrected. • Enabled— Single bit memory errors are corrected in memory and the corrected data is set in response to the demand read. Altitude The approximate number of meters above sea level at which the physical server is installed. This can be one of the following: • Auto—The CPU determines the physical elevation. • —The server is approximately 300 meters above sea level. • —The server is approximately 900 meters above sea level. • —The server is approximately 1500 meters above sea level. • —The server is approximately 3000 meters above sea level. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 244 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers QPI Configuration Parameters Name Description QPI Link Frequency The Intel QuickPath Interconnect (QPI) link frequency, in gigatransfers per second (GT/s). This can be one of the following: • Auto—The CPU determines the QPI link frequency. • • • USB Configuration Parameters Name Description Legacy USB Support Whether the system supports legacy USB devices. This can be one of the following: • Disabled—USB devices are only available to EFI applications. • Enabled—Legacy USB support is always available. • Auto—Disables legacy USB support if no USB devices are connected. All USB Devices Whether all physical and virtual USB devices are enabled or disabled. This can be one of the following: • Disabled—All USB devices are disabled. • Enabled—All USB devices are enabled. USB Port: Rear Whether the rear panel USB devices are enabled or disabled. This can be one of the following: • Disabled—Disables the rear panel USB ports. Devices connected to these ports are not detected by the BIOS and operating system. • Enabled—Enables the rear panel USB ports. Devices connected to these ports are detected by the BIOS and operating system. USB Port: Front Whether the front panel USB devices are enabled or disabled. This can be one of the following: • Disabled—Disables the front panel USB ports. Devices connected to these ports are not detected by the BIOS and operating system. • Enabled—Enables the front panel USB ports. Devices connected to these ports are detected by the BIOS and operating system. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 245 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description USB Port: Internal Whether the internal USB devices are enabled or disabled. This can be one of the following: • Disabled—Disables the internal USB ports. Devices connected to these ports are not detected by the BIOS and operating system. • Enabled—Enables the internal USB ports. Devices connected to these ports are detected by the BIOS and operating system. USB Port: KVM Whether the KVM ports are enabled or disabled.This can be one of the following: • Disabled—Disables the KVM port. Devices connected to these ports are not detected by the BIOS and operating system. • Enabled—Enables the KVM ports. Devices connected to these ports are detected by the BIOS and operating system. USB Port: VMedia Whether the virtual media devices are enabled or disabled. This can be one of the following: • Disabled—Disables the vMedia devices. • Enabled—Enables the vMedia devices. USB Port: SD Card Whether the SD card drives are enabled or disabled. This can be one of the following: • Disabled—Disables the SD card drives. The SD card drives are not detected by the BIOS and operating system. • Enabled—Enables the SD card drives. PCI Configuration Parameters Name Description MMIO Above 4GB Whether to enable or disable memory mapped I/O of 64-bit PCI devices to 4GB or greater address space. Legacy option ROMs are not able to access addresses above 4GB. PCI devices that are 64-bit compliant but use a legacy option ROM may not function correctly with this setting enabled. This can be one of the following: • Disabled—The server does not map I/O of 64-bit PCI devices to 4GB or greater address space. • Enabled—The server maps I/O of 64-bit PCI devices to 4GB or greater address space. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 246 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description ASPM Support Allows you to set the level of ASPM (Active Power State Management) support in the BIOS.This can be one of the following: • Disabled—ASPM support is disabled in the BIOS. • Force L0s—Force all links to L0 standby (L0s) state. • Auto—The CPU determines the power state. VGA Priority Allows you to set the priority for VGA graphics devices if multiple VGA devices are found in the system. This can be one of the following: • Onboard—Priority is given to the onboard VGA device. BIOS post screen and OS boot are driven through the onboard VGA port. • Offboard—Priority is given to the PCIE Graphics adapter. BIOS post screen and OS boot are driven through the external graphics adapter port. • —Priority is given to the PCIE Graphics adapter, and the onboard VGA device is disabled. Note The vKVM does not function when the onboard VGA is disabled. Serial Configuration Parameters Name Description Console Redirection Allows a serial port to be used for console redirection during POST and BIOS booting. After the BIOS has booted and the operating system is responsible for the server, console redirection is irrelevant and has no effect. This can be one of the following: • Disabled—No console redirection occurs during POST. • Enabled—Enables console redirection on serial port A during POST. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 247 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description Terminal Type What type of character formatting is used for console redirection. This can be one of the following: • PC-ANSI—The PC-ANSI terminal font is used. • VT100—A supported vt100 video terminal and its character set are used. • VT100+—A supported vt100-plus video terminal and its character set are used. • VT-UTF8—A video terminal with the UTF-8 character set is used. Note Bits per second This setting must match the setting on the remote terminal application. What BAUD rate is used for the serial port transmission speed. If you disable Console Redirection, this option is not available. This can be one of the following: • 9600—A 9,600 BAUD rate is used. • 19200—A 19,200 BAUD rate is used. • 38400—A 38,400 BAUD rate is used. • 57600—A 57,600 BAUD rate is used. • 115200—A 115,200 BAUD rate is used. Note Flow Control This setting must match the setting on the remote terminal application. Whether a handshake protocol is used for flow control. Request to Send / Clear to Send (RTS/CTS) helps to reduce frame collisions that can be introduced by a hidden terminal problem. This can be one of the following: • None—No flow control is used. • —RTS/CTS is used for flow control. Note This setting must match the setting on the remote terminal application. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 248 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description Putty KeyPad Allows you to change the action of the PuTTY function keys and the top row of the numeric keypad. This can be one of the following: • VT100—The function keys generate ESC OP through ESC O[. • LINUX—Mimics the Linux virtual console. Function keys F6 to F12 behave like the default mode, but F1 to F5 generate ESC [[A through ESC [[E. • XTERMR6—Function keys F5 to F12 behave like the default mode. Function keys F1 to F4 generate ESC OP through ESC OS, which are the sequences produced by the top row of the keypad on Digital terminals. • SCO—The function keys F1 to F12 generate ESC [M through ESC [X. The function and shift keys generate ESC [Y through ESC [j. The control and function keys generate ESC [k through ESC [v. The shift, control and function keys generate ESC [w through ESC [{. • ESCN—The default mode. The function keys match the general behavior of Digital terminals. The function keys generate sequences such as ESC [11~ and ESC [12~. • VT400—The function keys behave like the default mode. The top row of the numeric keypad generates ESC OP through ESC OS. Redirection After BIOS POST Whether BIOS console redirection should be active after BIOS POST is complete and control given to the OS bootloader. This can be one of the following: • —BIOS Legacy console redirection is active during the OS boot and run time. • Bootloader—BIOS Legacy console redirection is disabled before giving control to the OS boot loader. LOM and PCIe Slots Configuration Parameters Name Description All Onboard LOM Ports Whether all LOM ports are enabled or disabled. This can be one of the following: • Disabled—All LOM ports are disabled. • Enabled—All LOM ports are enabled. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 249 BIOS Parameters by Server Model Advanced BIOS Parameters for C420 Servers Name Description LOM Port n OptionROM Whether Option ROM is available on the LOM port designated by n. This can be one of the following: • Disabled—Option ROM is not available on LOM port n. • Enabled—Option ROM is available on LOM port n. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. All PCIe Slots OptionROM Whether the server can use the PCIe Option ROM expansion slots. This can be one of the following: • Disabled—PCIe Option ROMs are not available. • Enabled—PCIe Option ROMs are available. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. PCIe Slot:n OptionROM Whether PCIe expansion slot n is available to the server. This can be one of the following: • Disabled—The expansion slot n is not available. • Enabled—The expansion slot n is available. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. PCIe Slot:n Link Speed This option allows you to restrict the maximum speed of an adapter card installed in PCIe slot n. This can be one of the following: • GEN1—2.5GT/s (gigatransfers per second) is the maximum speed allowed. • GEN2—5GT/s is the maximum speed allowed. • GEN3—8GT/s is the maximum speed allowed. • Disabled—The maximum speed is not restricted. For example, if you have a 3rd generation adapter card in PCIe slot 2 that you want to run at a maximum of 5GT/s instead of the 8GT/s that card supports, set the PCIe Slot 2 Link Speed to GEN2. The system then ignores the card's supported maximum speed of 8GT/s and forces it to run at a maximum of 5 GT/s. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 250 OL-28893-01 BIOS Parameters by Server Model Server Management BIOS Parameters for C420 Servers Server Management BIOS Parameters for C420 Servers Name Description FRB-2 Timer Whether the FRB2 timer is used by CIMC to recover the system if it hangs during POST. This can be one of the following: • Disabled—The FRB2 timer is not used. • Enabled—The FRB2 timer is started during POST and used to recover the system if necessary. OS Watchdog Timer Whether the BIOS programs the watchdog timer with a specified timeout value. This can be one of the following: • Disabled—The watchdog timer is not used to track how long the server takes to boot. • Enabled—The watchdog timer tracks how long the server takes to boot. If the server does not boot within the length of time specified OS Watchdog Timer Timeout What timeout value the BIOS uses to configure the watchdog timer. This can be one of the following: • —The watchdog timer expires 5 minutes after the OS begins to boot. • —The watchdog timer expires 10 minutes after the OS begins to boot. • —The watchdog timer expires 15 minutes after the OS begins to boot. • —The watchdog timer expires 20 minutes after the OS begins to boot. Note OS Watchdog Timer Policy This option is only applicable if you enable the OS Boot Watchdog Timer. What action the system takes if the watchdog timer expires. This can be one of the following: • —The server takes no action if the watchdog timer expires during OS boot. • —The server is powered off if the watchdog timer expires during OS boot. • Reset—The server is reset if the watchdog timer expires during OS boot. Note This option is only applicable if you enable the OS Boot Watchdog Timer. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 251 BIOS Parameters by Server Model Server Management BIOS Parameters for C420 Servers Name Description Boot Order Rules How the server changes the boot order list defined through the CIMC GUI or CLI when there are no devices of a particular device type available or when the user defines a different boot order using the server's BIOS Setup Utility. The supported device types are: • HDD—Hard disk drive • FDD—Floppy disk drive • CDROM—Bootable CD-ROM or DVD • PXE—PXE boot • EFI—Extensible Firmware Interface The Boot Order Rules option can be one of the following: • Strict—When no devices of a particular type are available, the system creates a placeholder for that device type in the boot order list. When a device of that type becomes available, it is added to the boot order in the previously defined position. If the user defines a boot order through the server's BIOS Setup Utility, that boot order is given priority over the boot order configured through the CIMC GUI or CLI. All device types defined through CIMC that are not present in the boot order defined through the BIOS Setup Utility are removed from the boot order list. • Loose—When no devices of a particular type are available, the system removes that device type from the boot order. When a device of that type becomes available, the system adds it to the end of the boot order list. If the boot order is configured through the server's BIOS Setup Utility, that boot order is given priority over the boot order configured through the CIMC GUI or CLI. All device types defined through CIMC that are not present in the boot order defined through the BIOS Setup Utility are moved to the end of the boot order list. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 252 OL-28893-01 BIOS Parameters by Server Model C460 Servers C460 Servers Main BIOS Parameters for C460 Servers Name Description POST Error Pause What happens when the server encounters a critical error during POST. This can be one of the following: • Enabled—The BIOS pauses the attempt to boot the server and opens the Error Manager when a critical error occurs during POST. • Disabled—The BIOS continues to attempt to boot the server. Boot Option Retry Whether the BIOS retries NON-EFI based boot options without waiting for user input. This can be one of the following: • Enabled—Continually retries NON-EFI based boot options without waiting for user input. • Disabled—Waits for user input before retrying NON-EFI based boot options. Advanced BIOS Parameters for C460 Servers Processor Configuration Parameters Name Description Intel Turbo Boost Technology Whether the processor uses Intel Turbo Boost Technology, which allows the processor to automatically increase its frequency if it is running below power, temperature, or voltage specifications. This can be one of the following: • Disabled—The processor does not increase its frequency automatically. • Enabled—The processor utilizes Turbo Boost Technology if required. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 253 BIOS Parameters by Server Model Advanced BIOS Parameters for C460 Servers Name Description Enhanced Intel Speedstep Technology Whether the processor uses Enhanced Intel SpeedStep Technology, which allows the system to dynamically adjust processor voltage and core frequency. This technology can result in decreased average power consumption and decreased average heat production. This can be one of the following: • Disabled—The processor never dynamically adjusts its voltage or frequency. • Enabled—The processor utilizes Enhanced Intel SpeedStep Technology and enables all supported processor sleep states to further conserve power. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Intel Hyper-Threading Technology Whether the processor uses Intel Hyper-Threading Technology, which allows multithreaded software applications to execute threads in parallel within each processor. This can be one of the following: • Disabled—The processor does not permit hyperthreading. • Enabled—The processor allows for the parallel execution of multiple threads. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Number of Enabled Cores Allows you to disable one or more of the physical cores on the server. This can be one of the following: • All—Enables all physical cores. This also enables Hyper Threading on the associated logical processor cores. • 1 through n—Specifies the number of physical processor cores that can run on the server. Each physical core has an associated logical core. To disable Hyper Threading and have only one logical processor core running on the server, select 1. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 254 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C460 Servers Name Description Execute Disable Classifies memory areas on the server to specify where application code can execute. As a result of this classification, the processor disables code execution if a malicious worm attempts to insert code in the buffer. This setting helps to prevent damage, worm propagation, and certain classes of malicious buffer overflow attacks. This can be one of the following: • Disabled—The processor does not classify memory areas. • Enabled—The processor classifies memory areas. We recommend that you contact your operating system vendor to make sure the operating system supports this feature. Intel Virtualization Technology Whether the processor uses Intel Virtualization Technology (VT), which allows a platform to run multiple operating systems and applications in independent partitions. This can be one of the following: • Disabled—The processor does not permit virtualization. • Enabled—The processor allows multiple operating systems in independent partitions. Note Intel VT for Directed IO If you change this option, you must power cycle the server before the setting takes effect. Whether the processor uses Intel Virtualization Technology for Directed I/O (VT-d). This can be one of the following: • Disabled—The processor does not use virtualization technology. • Enabled—The processor uses virtualization technology. Intel VT-d Interrupt Remapping Whether the processor supports Intel VT-d Interrupt Remapping. This can be one of the following: • Disabled—The processor does not support remapping. • Enabled—The processor uses VT-d Interrupt Remapping as required. Intel VT-d Coherency Support Whether the processor supports Intel VT-d Coherency. This can be one of the following: • Disabled—The processor does not support coherency. • Enabled—The processor uses VT-d Coherency as required. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 255 BIOS Parameters by Server Model Advanced BIOS Parameters for C460 Servers Name Description Intel VT-d Address Translation Services Whether the processor supports Intel VT-d Address Translation Services (ATS). This can be one of the following: • Disabled—The processor does not support ATS. • Enabled—The processor uses VT-d ATS as required. Intel VT-d PassThrough DMA Whether the processor supports Intel VT-d Pass-through DMA. This can be one of the following: • Disabled—The processor does not support pass-through DMA. • Enabled—The processor uses VT-d Pass-through DMA as required. Direct Cache Access Allows processors to increase I/O performance by placing data from I/O devices directly into the processor cache. This setting helps to reduce cache misses. This can be one of the following: • Disabled—Data from I/O devices is not placed directly into the processor cache. • Enabled—Data from I/O devices is placed directly into the processor cache. Processor C3 Report Whether the BIOS sends the C3 report to the operating system. When the OS receives the report, it can transition the processor into the lower C3 power state to decrease energy usage while maintaining optimal processor performance. This can be one of the following: • Disabled—The BIOS does not send the C3 report. • —The BIOS sends the C3 report using the ACPI C2 format, allowing the OS to transition the processor to the C3 low power state. • —The BIOS sends the C3 report using the ACPI C3 format, allowing the OS to transition the processor to the C3 low power state. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 256 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C460 Servers Name Description Processor C6 Report Whether the BIOS sends the C6 report to the operating system. When the OS receives the report, it can transition the processor into the lower C6 power state to decrease energy usage while maintaining optimal processor performance. This can be one of the following: • Disabled—The BIOS does not send the C6 report. • Enabled—The BIOS sends the C6 report, allowing the OS to transition the processor to the C6 low power state. Package C State Limit The amount of power available to the server components when they are idle. This can be one of the following: • —The server provides all server components with full power at all times. This option maintains the highest level of performance and requires the greatest amount of power. • —When the CPU is idle, the system slightly reduces the power consumption. This option requires less power than C0 and allows the server to return quickly to high performance mode. • —When the CPU is idle, the system reduces the power consumption further than with the C1 option. This requires less power than C1 or C0, but it takes the server slightly longer to return to high performance mode. • —When the CPU is idle, the system reduces the power consumption further than with the C3 option. This option saves more power than C0, C1, or C3, but there may be performance issues until the server returns to full power. • —When the CPU is idle, the server makes a minimal amount of power available to the components. This option saves the maximum amount of power but it also requires the longest time for the server to return to high performance mode. • —The server may enter any available C state. Note CPU C State This option is used only if CPU C State is enabled. Whether the system can enter a power savings mode during idle periods. This can be one of the following: • Disabled—The system remains in high performance state even when idle. • Enabled—The system can reduce power to system components such as the DIMMs and CPUs. The amount of power reduction is specified . Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 257 BIOS Parameters by Server Model Advanced BIOS Parameters for C460 Servers Name Description C1E Whether the CPU transitions to its minimum frequency when entering the C1 state. This can be one of the following: • Disabled—The CPU continues to run at its maximum frequency in C1 state. • Enabled—The CPU transitions to its minimum frequency. This option saves the maximum amount of power in C1 state. Note This option is used only if is enabled. Memory Configuration Parameters Name Description Select Memory RAS How the memory reliability, availability, and serviceability (RAS) is configured for the server. This can be one of the following: • —System performance is optimized. • Mirroring—System reliability is optimized by using half the system memory as backup. • Sparing—The system reserves some memory for use in the event a DIMM fails. If that happens, the server takes the DIMM offline and replaces it with the reserved memory. This option provides less redundancy than mirroring, but it leaves more of the memory available for programs running on the server. NUMA Optimized Whether the BIOS supports NUMA. This can be one of the following: • Disabled—The BIOS does not support NUMA. • Enabled—The BIOS includes the ACPI tables that are required for NUMA-aware operating systems. If you enable this option, the system must disable Inter-Socket Memory interleaving on some platforms. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 258 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C460 Servers Name Description Sparing Mode The sparing mode used by the CIMC. This can be one of the following: • —The spared memory is allocated at the rank level. • DIMM Sparing—The spared memory is allocated at the DIMM level. Note Mirroring Mode This option is used only if is set to Sparing. Mirroring is supported across Integrated Memory Controllers (IMCs) where one memory riser is mirrored with another. This can be one of the following: • Intersocket—Each IMC is mirrored across two sockets. • Intrasocket—One IMC is mirrored with another IMC in the same socket. Note Patrol Scrub This option is used only if is set to Mirroring. Whether the system actively searches for, and corrects, single bit memory errors even in unused portions of the memory on the server. This can be one of the following: • Disabled—The system checks for memory ECC errors only when the CPU reads or writes a memory address. • Enabled—The system periodically reads and writes memory searching for ECC errors. If any errors are found, the system attempts to fix them. This option may correct single bit errors before they become multi-bit errors, but it may adversely affect performance when the patrol scrub is running. Patrol Scrub Interval Controls the time interval between each patrol scrub memory access. A lower interval scrubs the memory more often but requires more memory bandwidth. Select a value between 5 and 23. The default value is 8. Note This option is used only if Patrol Scrub is enabled. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 259 BIOS Parameters by Server Model Advanced BIOS Parameters for C460 Servers Name Description CKE Low Policy Controls the DIMM power savings mode policy. This can be one of the following: • Disabled—DIMMs do not enter power saving mode. • Slow—DIMMs can enter power saving mode, but the requirements are higher. Therefore, DIMMs enter power saving mode less frequently. • Fast—DIMMs enter power saving mode as often as possible. • Auto—The BIOS controls when a DIMM enters power saving mode based on the DIMM configuration. Serial Port Configuration Parameters Name Description Serial A Enable Whether serial port A is enabled or disabled. This can be one of the following: • Disabled—The serial port is disabled. • Enabled—The serial port is enabled. USB Configuration Parameters Name Description Make Device Non-Bootable Whether the server can boot from a USB device. This can be one of the following: • Disabled—The server can boot from a USB device. • Enabled—The server cannot boot from a USB device. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 260 OL-28893-01 BIOS Parameters by Server Model Advanced BIOS Parameters for C460 Servers PCI Configuration Parameters Name Description Memory Mapped I/O Above 4GB Whether to enable or disable memory mapped I/O of 64-bit PCI devices to 4GB or greater address space. Legacy option ROMs are not able to access addresses above 4GB. PCI devices that are 64-bit compliant but use a legacy option ROM may not function correctly with this setting enabled. This can be one of the following: • Disabled—The server does not map I/O of 64-bit PCI devices to 4GB or greater address space. • Enabled—The server maps I/O of 64-bit PCI devices to 4GB or greater address space. Onboard NIC n ROM Whether the system loads the embedded PXE option ROM for the onboard NIC designated by n. This can be one of the following: • Disabled—PXE option ROM is not available for NIC n. • Enabled—PXE option ROM is available for NIC n. PCIe OptionROMs Whether the server can use the PCIe Option ROM expansion slots. This can be one of the following: • Disabled—PCIe Option ROMs are not available. • Enabled—PCIe Option ROMs are available. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. PCIe Slot n ROM Whether PCIe expansion slot n is available to the server. This can be one of the following: • Disabled—The expansion slot n is not available. • Enabled—The expansion slot n is available. • —The expansion slot n is available for UEFI only. • —The expansion slot n is available for legacy only. Onboard Gbit LOM Whether Gbit LOM is enabled or disabled on the server. This can be one of the following: • Disabled—Gbit LOM is not available. • Enabled—10Git LOM is available. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 261 BIOS Parameters by Server Model Advanced BIOS Parameters for C460 Servers Name Description Onboard 10Gbit LOM Whether 10Gbit LOM is enabled or disabled on the server. This can be one of the following: • Disabled—10GBit LOM is not available. • Enabled—10GBit LOM is available. Sriov Whether SR-IOV (Single Root I/O Virtualization) is enabled or disabled on the server. This can be one of the following: • Disabled—SR-IOV is disabled. • Enabled—SR-IOV is enabled. IOH Resource Allocation Enables you to distribute 64KB of 16-bit IO resources between IOH0 and IOH1 as per system requirement. This can be one of the following: • IOH0 24k IOH1 40k— Allocates 24KB of 16-bit IO resources to IOH0 and 40KB of 16-bit IO resources to IOH1. • IOH0 32k IOH1 32k— Allocates 32KB of 16-bit IO resources to IOH0 and 32KB of 16-bit IO resources to IOH1. • IOH0 40k IOH1 24k— Allocates 40KB of 16-bit IO resources to IOH0 and 24KB of 16-bit IO resources to IOH1. • IOH0 48k IOH1 16k— Allocates 48KB of 16-bit IO resources to IOH0 and 16KB of 16-bit IO resources to IOH1. • IOH0 56k IOH1 8k— Allocates 56KB of 16-bit IO resources to IOH0 and 8KB of 16-bit IO resources to IOH1. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 262 OL-28893-01 BIOS Parameters by Server Model Server Management BIOS Parameters for C460 Servers Server Management BIOS Parameters for C460 Servers Name Description Assert NMI on SERR Whether the BIOS generates a non-maskable interrupt (NMI) and logs an error when a system error (SERR) occurs. This can be one of the following: • Disabled—The BIOS does not generate an NMI or log an error when a SERR occurs. • Enabled—The BIOS generates an NMI and logs an error when a SERR occurs. You must enable this setting if you want to enable . Assert NMI on PERR Whether the BIOS generates a non-maskable interrupt (NMI) and logs an error when a processor bus parity error (PERR) occurs. This can be one of the following: • Disabled—The BIOS does not generate an NMI or log an error when a PERR occurs. • Enabled—The BIOS generates an NMI and logs an error when a PERR occurs. You must enable to use this setting. Console Redirection Allows a serial port to be used for console redirection during POST and BIOS booting. After the BIOS has booted and the operating system is responsible for the server, console redirection is irrelevant and has no effect. This can be one of the following: • Disabled—No console redirection occurs during POST. • —Enables console redirection on serial port A during POST. Note Flow Control If you enable this option, you also disable the display of the Quiet Boot logo screen during POST. Whether a handshake protocol is used for flow control. Request to Send / Clear to Send (RTS/CTS) helps to reduce frame collisions that can be introduced by a hidden terminal problem. This can be one of the following: • None—No flow control is used. • RTS-CTS—RTS/CTS is used for flow control. Note This setting must match the setting on the remote terminal application. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 263 BIOS Parameters by Server Model Server Management BIOS Parameters for C460 Servers Name Description Baud Rate What BAUD rate is used for the serial port transmission speed. If you disable Console Redirection, this option is not available. This can be one of the following: • 9.6k—A 9600 BAUD rate is used. • 19.2k—A 19200 BAUD rate is used. • 38.4k—A 38400 BAUD rate is used. • 57.6k—A 57600 BAUD rate is used. • 115.2k—A 115200 BAUD rate is used. Note Terminal Type This setting must match the setting on the remote terminal application. What type of character formatting is used for console redirection. This can be one of the following: • PC-ANSI—The PC-ANSI terminal font is used. • VT100—A supported vt100 video terminal and its character set are used. • VT100-PLUS—A supported vt100-plus video terminal and its character set are used. • VT-UTF8—A video terminal with the UTF-8 character set is used. Note OS Boot Watchdog Timer Timeout This setting must match the setting on the remote terminal application. What timeout value the BIOS uses to configure the watchdog timer. This can be one of the following: • —The watchdog timer expires 5 minutes after the OS begins to boot. • —The watchdog timer expires 10 minutes after the OS begins to boot. • —The watchdog timer expires 15 minutes after the OS begins to boot. • —The watchdog timer expires 20 minutes after the OS begins to boot. Note This option is only applicable if you enable the OS Boot Watchdog Timer. Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 264 OL-28893-01 BIOS Parameters by Server Model Server Management BIOS Parameters for C460 Servers Name Description OS Boot Watchdog Policy What action the system takes if the watchdog timer expires. This can be one of the following: • —The server is powered off if the watchdog timer expires during OS boot. • Reset—The server is reset if the watchdog timer expires during OS boot. Note Legacy OS Redirection This option is only applicable if you enable the OS Boot Watchdog Timer. Whether redirection from a legacy operating system, such as DOS, is enabled on the serial port. This can be one of the following: • Disabled—The serial port enabled for console redirection is hidden from the legacy operating system. • Enabled—The serial port enabled for console redirection is visible to the legacy operating system. OS Boot Watchdog Timer Whether the BIOS programs the watchdog timer with a specified timeout value. This can be one of the following: • Disabled—The watchdog timer is not used to track how long the server takes to boot. • Enabled—The watchdog timer tracks how long the server takes to boot. If the server does not boot within the length of time specified Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 265 BIOS Parameters by Server Model Server Management BIOS Parameters for C460 Servers Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 266 OL-28893-01 INDEX A Active Directory 66, 68, 69 configuring groups 69 configuring in CIMC 68 adapter 46, 85, 127, 128, 129, 130, 131 activating firmware 131 configuring properties 85 exporting the configuration 127 firmware 130 importing the configuration 128 installing firmware 130 network 85 PCI 46 resetting 131 restoring default configuration 129 viewing properties 85 adapters 83 overview 83 advanced BIOS parameters 184, 203, 222, 235, 253 C22 and C24 servers 184 C220 and C240 servers 203 C260 server 222 C420 servers 235 C460 server 253 BIOS parameters (continued) main parameters for C22 and C24 183 main parameters for C220 and C240 203 main parameters for C260 222 main parameters for C420 235 main parameters for C460 253 server management parameters for C22 and C24 200 server management parameters for C220 and C240 219 server management parameters for C260 232 server management parameters for C420 251 server management parameters for C460 263 BIOS settings 14, 31, 32, 33, 34 advanced 32 main 31 restoring defaults 34 server boot order 14 server management 33 BIOS status 30 viewing 30 boot order 14, 15, 16 about 14 configuring 15 viewing 16 boot table 94, 95 creating entry 94 deleting entry 94, 95 description 94 B backing up 178 CIMC configuration 178 bios 176 recovering corrupt 176 BIOS 158, 162 installing from remote server 162 obtaining firmware from Cisco 158 BIOS parameters 183, 184, 200, 203, 219, 222, 232, 235, 251, 253, 263 advanced parameters for C22 and C24 184 advanced parameters for C220 and C240 203 advanced parameters for C260 222 advanced parameters for C420 235 advanced parameters for C460 253 C C22 and C24 servers 183, 184, 200 advanced BIOS parameters 184 main BIOS parameters 183 server management BIOS parameters 200 C220 and C240 servers 203, 219 advanced BIOS parameters 203 main BIOS parameters 203 server management BIOS parameters 219 C260 server 222, 232 advanced BIOS parameters 222 main BIOS parameters 222 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 IN-1 Index C260 server (continued) server management BIOS parameters 232 C420 server 235, 251 main BIOS parameters 235 server management BIOS parameters 251 C420 servers 235 advanced BIOS parameters 235 C460 server 253, 263 advanced BIOS parameters 253 main BIOS parameters 253 server management BIOS parameters 263 certificate management 147 uploading a certificate 147 CIMC 38, 157, 158, 159, 160, 166, 167, 168, 177 activating firmware 160 clearing log 167 configuring log threshold 167 firmware overview 157 installing firmware from remote server 159 obtaining firmware from Cisco 158 resetting to factory defaults 177 sending log 168 viewing log 166 viewing properties 38 CIMC CLI 3 CIMC overview 2 clearing foreign configuration 117 common properties 75 communication services properties 133, 134, 136 HTTP properties 133 IPMI over LAN properties 136 SSH properties 134 configuration 178, 179 backing up 178 exporting 178 importing 179 CPU properties 38 create virtual drive 115 Create Virtual Drive 116 current sensors 52 D date 38 setting 38 delete virtual drive 118 disabling KVM 56 disabling-auto-learn 125 E enabling KVM 56, 57 enabling-auto-learn 124 encrypting virtual media 58 event filters, platform 149, 150 about 149 configuring 150 event log, system 170, 171 clearing 171 viewing 170 events 149, 150 platform 149, 150 disabling alerts 150 enabling alerts 149 exporting 178 CIMC configuration 178 F fan sensors 50 fault summary 165 viewing 165 faults, logs 165 viewing summary 165 FEX 109, 110 description 109 viewing properties 110 FIP mode 85 enabling 85 firmware 157, 158, 159, 160 about 157 activating 160 installing from remote server 159 obtaining from Cisco 158 Flexible Flash 24, 25, 27, 28, 42 booting from 27 configuring properties 25 description 24 resetting 28 viewing properties 42 floppy disk emulation 58 G generate NMI 180 H hard drive locator LED 14 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 IN-2 OL-28893-01 Index hot spare 121, 122, 123 dedicated 121 global 122, 123 HTTP properties 133 making a global hot spare 122, 123 memory properties 39 N network adapter 85 viewing properties 85 network mounted vMedia mapping 59 cifs 59 nfs 59 www 59 network properties 74, 75, 76, 77, 78 common properties 75 IPv4 properties 76 NIC properties 74 port profile properties 78 VLAN properties 77 network security 80 NIC properties 74 NIV mode 85 enabling 85 NTP settings 81 Nvidia GPU card information 45 temperature 45 I importing 179 CIMC configuration 179 initializing virtual drive 119 IP blocking 80 IPMI over LAN 136 description 136 IPMI over LAN properties 136 IPv4 properties 76 iscsi-boot 107 vNIC 107 K KVM 56, 57 configuring 57 disabling 56 enabling 56, 57 KVM console 11, 55 O OS installation 11, 12 methods 11 PXE 12 L LDAP, See Active Directory local users 65 locator LED 13, 14 hard drive 14 server 13 locator-led 126 bbu 126 LOM ports 46 viewing properties 46 P M MAC address 46 LOM ports 46 main BIOS parameters 183, 203, 222, 235, 253 C22 and C24 servers 183 C220 and C240 servers 203 C260 server 222 C420 server 235 C460 server 253 making a dedicated hot spare 121 PCI adapter 46 viewing properties 46 persistent binding 96, 97, 98 description 96 disabling 97 enabling 97 rebuilding 98 platform event filters 149, 150 about 149 configuring 150 platform events 153 interpreting traps 153 Platform events 149, 150 diabling alerts 150 enabling alerts 149 port profile properties 78 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 IN-3 Index power cap policy 21 configuring 21 power capping policy 21 about 21 power cycling the server 19 power restore policy 23 power statistics 20 viewing 20 power supply properties 40 power supply sensors 49 powering off the server 18 powering on the server 18 prepare for removal 122 PXE installation 12 R recovering from a corrupted bios 176 remote presence 56, 57, 58, 62, 63 configuring serial over LAN 62 launching serial over LAN 63 virtual KVM 56, 57 virtual media 58 reset configuration of cards, Cisco FlexFlash Controller 28 resetting the server 16 restore BIOS manufacturing custom defaults 34 retain configuration, FlexFlash Controller 29 S server management BIOS parameters 200, 219, 232, 251, 263 C22 and C24 servers 200 C220 and C240 servers 219 C260 server 232 C420 server 251 C460 server 263 server NICs 73 server overview 1 server software 1 set as boot drive 120 shutting down the server 17 SNMP 137, 139, 140 configuring properties 137 configuring SNMPv3 users 140 configuring trap settings 139 sending test message 140 SSH properties 134 start-learn-cycle 125 storage properties 40, 43, 44 viewing adapter properties 40 viewing physical drive properties 43 viewing virtual drive properties 44 storage sensors 52 viewing 52 syslog 168 sending CIMC log 168 system event log 170, 171 clearing 171 viewing 170 T self-signed certificate 145 sensors 49, 50, 51, 52 current 52 fan 50 power supply 49 temperature 50 voltage 51 serial over LAN 61, 62, 63 configuring 62 launching 63 server 37 viewing properties 37 server management 13, 14, 16, 17, 18, 19 hard drive locator LED 14 power cycling the server 19 powering off the server 18 powering on the server 18 resetting the server 16 server boot order 14 server locator LED 13 shutting down the server 17 technical support data 173 exporting 173 Telnet 3 temperature sensors 50 time 38 setting 38 U undo prepare for removal 124 uploading a server certificate 147 user management 65, 68, 71 Active Directory 68 local users 65 terminating user sessions 71 viewing user sessions 71 user sessions 71 terminating 71 viewing 71 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 IN-4 OL-28893-01 Index V vHBA 86, 87, 88, 92, 93, 94, 95, 96, 97, 98 boot table 94 creating 92 creating boot table entry 94 deleting 93 deleting boot table entry 94, 95 disabling persistent binding 97 enabling persistent binding 97 guidelines for managing 86 modifying properties 88 persistent binding 96 rebuilding persistent binding 98 viewing properties 87 viewing storage controller logs 127 virtual drive 119, 120 initializing 119 modifying attributes 120 set as boot drive 120 virtual KVM 56, 57 virtual media 58 VLAN properties 77 VM FEX 109, 110 description 109 viewing properties 110 vmedia mapping 60 removing 60 viewing properties 60 vNIC 99, 100, 105, 106, 107, 109 creating 105 deleting 106 guidelines for managing 99 iscsi-boot 107 iscsi-boot deletion 109 modifying properties 100 viewing properties 99 vNICs 107 iSCSI-boot guidelines 107 voltage sensors 51 X XML API 135 description 135 enabling 135 Y YAML 8 Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 OL-28893-01 IN-5 Index Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5 IN-6 OL-28893-01
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Title : Untitled Creator : Unknown Author : Unknown Producer : XEP 4.9 build 20070312 Trapped : False Create Date : 2013:03:04 04:55:43 Modify Date : 2013:03:04 04:55:43 Page Count : 288 Page Mode : UseOutlinesEXIF Metadata provided by EXIF.tools