Nothing Special   »   [go: up one dir, main page]

B Intersight Managed Mode Configuration Guide

Download as pdf or txt
Download as pdf or txt
You are on page 1of 224
At a glance
Powered by AI
The document discusses Cisco Intersight managed mode and provides an overview of supported hardware and initial configuration steps for fabric interconnects.

The document discusses chassis, fabric extenders, fabric interconnects, and their associated views in Intersight for monitoring and management.

The document outlines some of the initial configuration steps using the console for fabric interconnects A and B, including password guidelines.

Cisco Intersight Managed Mode Configuration Guide

First Published: 2017-08-13


Last Modified: 2022-01-13

Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.

All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.

Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2020–2021 Cisco Systems, Inc. All rights reserved.
CONTENTS

CHAPTER 1 About Intersight Managed Mode 1

About Intersight Managed Mode 1


Supported Hardware 1

CHAPTER 2 Setting Up Fabric Interconnects 5

Initial Fabric Interconnect Configuration 5


Configuring Fabric Interconnect-A Using the Console 6
Configuring Fabric Interconnect-B Using the Console 8
Fabric Interconnect Password Guidelines 9
Fabric Interconnect Views 9
Fabric Interconnects Details View 9
Fabric Interconnects Inventory View 12
Fabric Interconnects Connections View 13
Fabric Interconnects UCS Domain Profile View 13

CHAPTER 3 Chassis and FEX Lifecycle 15

Chassis and Fabric Extender Discovery and Actions 15


Chassis Details View 17
Chassis Inventory View 17
Chassis Connections View 18
Fabric Extender Details View 18
Fabric Extender Inventory View 19
Fabric Extender Connection View 19

CHAPTER 4 Server Lifecycle 21

Server Discovery and Actions 21

Cisco Intersight Managed Mode Configuration Guide


iii
Contents

Server Inventory View 24


Compliance with Hardware Compatibility List (HCL) 25

CHAPTER 5 Configuring UCS Domain Profiles 27

About UCS Domain Profile 27


Creating a UCS Domain Profile 28
UCS Domain Profile Details 29

CHAPTER 6 Configuring Server Profiles 31

Server Profiles 31
Creating a UCS Server Profile 36
UCS Server Profile Details 37

CHAPTER 7 Configuring UCS Chassis Profiles 41

About UCS Chassis Profile 41


Creating a Chassis Profile 42
UCS Chassis Profile Details 42

CHAPTER 8 Configuring UCS Domain Policies 45

Domain Policies 45
Creating a Port Policy 48
Creating an Ethernet Network Group Policy 53
Creating an Ethernet Network Control Policy 54
Creating a VLAN Configuration Policy 55
Creating a VSAN Configuration Policy 56
Creating an NTP Policy 58
Creating a Network Connectivity Policy 58
Creating an SNMP Policy 60
Creating a System QoS Policy 62
Creating a Syslog Policy 63
Creating a Switch Control Policy 65
Creating a Flow Control Policy 67
Creating a Link Aggregation Policy 68
Creating a Link Control Policy 69

Cisco Intersight Managed Mode Configuration Guide


iv
Contents

Creating a Multicast Policy 70

CHAPTER 9 Configuring Server Policies 73

Server Policies 74
Creating a Policy 80
Supported UCS Server Policies 80
Creating an Adapter Configuration Policy 83
Creating a LAN Connectivity Policy 85
Creating an Ethernet Adapter Policy 89
Creating an Ethernet QoS Policy 96
Creating an Ethernet Network Policy 97
Creating an Ethernet Network Group Policy 101
Creating an Ethernet Network Control Policy 102
Creating a SAN Connectivity Policy 103
Creating a Fibre Channel Adapter Policy 106
Creating a Fibre Channel Network Policy 109
Creating a Fibre Channel QoS Policy 110
Creating a BIOS Policy 111
Creating a Boot Order Policy 124
Configuring an iSCSI Boot Policy 129
Creating an iSCSI Adapter Policy 132
Creating an iSCSI Static Target Policy 133
Creating a Device Connector Policy 133
Creating a Disk Group Policy 134
Creating an IMC Access Policy 136
Creating an IPMI Over LAN Policy 137
Creating an LDAP Policy 138
Creating a Local User Policy 143
Creating an NTP Policy 145
Creating an SD Card Policy 146
Create a Serial Over LAN Policy 148
Create SSH Policy 150
Creating a Virtual KVM Policy 151
Creating a Virtual Media Policy 152

Cisco Intersight Managed Mode Configuration Guide


v
Contents

Creating a Network Connectivity Policy 155


Creating a SMTP Policy 157
Creating an SNMP Policy 158
Creating a Storage Policy 160
Creating a Syslog Policy 167
Creating a Power Policy for Server 168

CHAPTER 10 Configuring UCS Chassis Policies 171

Chassis Policies 171


Creating an IMC Access Policy 172
Creating an SNMP Policy 173
Creating a Power Policy for Chassis 175
Creating a Thermal Policy 176

CHAPTER 11 Configuring Pools 179

Pools 179
IP Pools 179
Creating an IP Pool 180
IP Pool Details 181
MAC Pools 181
Creating a MAC Pool 181
MAC Pool Details 182
UUID Pools 182
Creating a UUID Pool 183
UUID Pool Details 184
WWN Pools 184
Creating a WWNN Pool 185
WWNN Pool Details 186
Creating a WWPN Pool 186
WWPN Pool Details 187
IQN Pools 187
Creating an IQN Pool 187
IQN Pool Details 188
Resource Pools 189

Cisco Intersight Managed Mode Configuration Guide


vi
Contents

Creating a Resource Pool 190


Resource Pool Details 190
Virtual Routing and Forwarding 192
Creating a VRF Instance 192

CHAPTER 12 Managing the Device Console 195

Device Console 195


Device Console CLI Commands 199

CHAPTER 13 Managing Firmware 205

Firmware Upgrade in a Cisco UCS Domain through Intersight 205


Upgrading Fabric Interconnect Firmware 207
Upgrading Server Firmware 209
Upgrades and Replacement of RMA Servers and Fabric Interconnects 210

CHAPTER 14 Managing Technical Support 213

Integration with Cisco TAC 213


Tech Support Diagnostic File Collection 214

Cisco Intersight Managed Mode Configuration Guide


vii
Contents

Cisco Intersight Managed Mode Configuration Guide


viii
CHAPTER 1
About Intersight Managed Mode
• About Intersight Managed Mode, on page 1
• Supported Hardware, on page 1

About Intersight Managed Mode


Cisco Intersight™ is a management platform delivered as a service with embedded analytics for your Cisco
and 3rd party IT infrastructure. Intersight Managed Mode (IMM) is a new architecture that manages the UCS
Fabric Interconnected systems through a Redfish-based standard model. Intersight Managed Mode unifies
the capabilities of the UCS Systems and the cloud-based flexibility of Intersight, thus unifying the management
experience for the standalone and Fabric Interconnect attached systems. Intersight Management Model
standardizes policy and operation management for UCS-FI-6454, UCS-FI-64108, and Cisco UCS M5, M6,
and X-Series servers.
You can choose between the native UCSM Managed Mode (UMM) or Intersight Managed Mode (IMM) for
the Fabric attached UCS Systems during initial setup of the Fabric Interconnects. If you choose to switch back
between UMM and IMM, you must erase the present configuration and start from initial setup.

Note Before erasing the configuration, you must ensure to unclaim the device from Intersight and decommission
all rack servers.

• Before you set up Intersight Managed Mode, please review the system requirements, supported hardware
and software, and the steps required to migrate from UMM to IMM.
• For latest updates on Intersight features and functionality, see Help Center.
• Servers in IMM mode require a minimum of Essentials license.

Supported Hardware
The following table lists the supported hardware:

Cisco Intersight Managed Mode Configuration Guide


1
About Intersight Managed Mode
Supported Hardware

Note • The Intersight Managed Mode (IMM) features are now made Generally Available supporting scale up
to 10 chassis and 80 blade servers.
• The operations that can be run on multiple servers in parallel is limited to 50 servers.
• The Fabric Interconnect port licensing is required in IMM but will not be enforced until a future date.
• In IMM, after discovery of a rack server, online swapping of cables on rack network adapters between
Fabric Interconnects is not supported.
• Cisco HyperFlex hyperconverged infrastructure is currently not supported in IMM.

Component Model Number

Switches UCS-FI-6454, UCS-FI-64108

Servers B-Series M5: UCSB-B200-M5, UCSB-B480-M5


B-Series M6: UCSB-B200-M6
C-Series M5: UCSC-C220-M5, UCSC-C240-M5,
UCSC-C480-M5
C-Series M6: UCSC-C220-M6, UCSC-C240-M6,
UCSC-C245-M6, UCSC-C225-M6
X-Series M6: UCSX-210C-M6

Chassis N20-C6508, UCSB-5108-AC2, UCSX-9508

IOM UCS-IOM-2204XP, UCS-IOM-2208XP,


UCS-IOM-2408 *1, UCSX-I-9108-25G

Fabric Extender (FEX) Cisco Nexus 2232PP

Adapters B-Series M5: UCSB-MLOM-40G-04,


UCSB-MLOM-PT-01, UCSB-VIC-M84-4P
B-Series M6: UCSB-MLOM-40G-04,
UCSB-VIC-M84-4P
C-Series M5: UCSC-MLOM-C25Q-04,
UCSC-PCIE-C25Q-04
C-Series M6: UCSC-M-V25-04,
UCSC-PCIE-C25Q-04
X-Series M6: UCSX-V4-Q25GML,
UCSX-V4-Q25GME

Topologies Direct-Attached Racks through 10G/25G connections


FEX-Attached Racks through 10GE connections
Chassis through 10G/25G connections

Cisco Intersight Managed Mode Configuration Guide


2
About Intersight Managed Mode
Supported Hardware

Component Model Number

Storage Controller B-Series M5: UCS-M2-HWRAID,


UCSB-MRAID12G, UCSB-LSTOR-PT
C-Series M5: UCS-M2-HWRAID,
UCSC-RAID-M5HD, UCSC-RAID-M5,
UCSC-SAS-M5, UCSC-SAS-M5HD,
UCSC-SAS12GHBA, UCSC-9400-8E
B-Series M6: UCS-M2-HWRAID,
UCSB-RAID12G-M6, UCSB-MSTOR-M6,
UCSB-LSTOR-PT-M6
C-Series M6: UCS-M2-HWRAID,
UCSC-RAID-M6T,UCSC-RAID-M6SD,
UCSC-RAID-M6HD, UCSC-SAS-M6HD,
UCSC-SAS-M6T
X-Series M6: UCSX-X10C-PT4F,
UCSX-X10C-RAIDF, UCSX-M2-HWRAID

Trusted Platform Module (TPM) UCSX-TPM1-001, UCSX-TPM2-001,


UCSX-TPM2-002, UCSX-TPM3-002
X-Series: UCSX-TPM3-002

The minimum supported firmware version for Intersight Managed Mode is 4.1(3)
*1
UCS-IOM-2408 requires Cisco UCS Intersight Infra 4.1(2b) and later.

Cisco Intersight Managed Mode Configuration Guide


3
About Intersight Managed Mode
Supported Hardware

Cisco Intersight Managed Mode Configuration Guide


4
CHAPTER 2
Setting Up Fabric Interconnects
• Initial Fabric Interconnect Configuration, on page 5
• Configuring Fabric Interconnect-A Using the Console, on page 6
• Configuring Fabric Interconnect-B Using the Console, on page 8
• Fabric Interconnect Password Guidelines, on page 9
• Fabric Interconnect Views, on page 9
• Fabric Interconnects Details View, on page 9
• Fabric Interconnects Inventory View, on page 12
• Fabric Interconnects Connections View, on page 13
• Fabric Interconnects UCS Domain Profile View, on page 13

Initial Fabric Interconnect Configuration


The initial configuration for a Fabric Interconnect can be done by using the serial console when the Fabric
Interconnect boots for the first time. This can happen either during factory install, or after the existing
configuration is cleared. The configuration wizard enables you to select the management mode and other
parameters such as the administrative subnet, gateway, and DNS IP addresses for each Fabric Interconnect.
For the management mode, you can choose whether you want to manage the Fabric Interconnect through
Cisco UCS Manager or Cisco Intersight.
You can change the management mode for the Fabric Interconnects between Cisco Intersight and Cisco UCS
Manager. However, this is a disruptive process because it will cause all endpoint configurations to be reset,
and will result in the loss of the current configuration.

Note All the discovered servers, chassis, and Fabric Extenders (FEX) must be decommissioned before changing
the management mode.

The erase configuration option, which is available in both management modes, allows you to clear the existing
configuration and reboot the Fabric Interconnects. After the Fabric Interconnects are rebooted, the initial
configuration screen appears, and you can configure the Fabric Interconnects with the appropriate management
mode.
This configuration process is valid only for Cisco UCS 6400 Series Fabric Interconnects in a cluster setup.
To configure the Fabric Interconnects in a cluster:

Cisco Intersight Managed Mode Configuration Guide


5
Setting Up Fabric Interconnects
Configuring Fabric Interconnect-A Using the Console

1. Configuring Fabric Interconnect-A Using the Console


2. Configuring Fabric Interconnect-B Using the Console

After completing the initial configuration of the Fabric Interconnects, you must claim them for use with the
Cisco Intersight platform. For more information about claiming devices in Cisco Intersight, see Target Claim
in Intersight Managed Mode.
After you claim the Fabric Interconnects, they appear in the list of available devices. The device type for
Fabric Interconnects managed through Cisco Intersight is Intersight Managed Domain. The Device IP field
shows the IP addresses of both the Fabric Interconnects, and the Device ID field shows the serial numbers of
both the Fabric Interconnects. The Fabric Interconnects now appear in the Fabric Interconnects table view.
After you claim the Fabric Interconnects, you must configure the ports on the Fabric Interconnect to discover
the connected chassis and servers. For each Fabric Interconnect, you can view the properties, and an inventory
of its components, including ports, fan modules, and power supply units (PSUs).

Configuring Fabric Interconnect-A Using the Console


Step 1 Connect to the console port.
Step 2 Power on the Fabric Interconnect.
You will see the power-on self-test messages as the Fabric Interconnect boots.
Step 3 When the unconfigured system boots, it prompts you for the setup method to be used. Enter console to continue the
initial setup using the console CLI.
Step 4 Enter the management mode for the Fabric Interconnect:
• intersight to manage the Fabric Interconnect through Cisco Intersight
• ucsm to manage the Fabric Interconnect through Cisco UCS Manager

Step 5 Enter y to confirm that you want to continue the initial setup.
Step 6 To use a strong password, enter y
Step 7 Enter the password for the admin account. For more details, see Fabric Interconnect Password Guidelines.
Step 8 To confirm, re-enter the password for the admin account.
Step 9 Enter yes to continue the initial setup for a cluster configuration.
Step 10 Enter the Fabric Interconnect fabric (either A or B ).
Step 11 Enter the system name.
Step 12 Enter the IPv4 or IPv6 address for the management port of the Fabric Interconnect.
If you enter an IPv4 address, you will be prompted to enter an IPv4 subnet mask. If you enter an IPv6 address, you will
be prompted to enter an IPv6 network prefix.

Step 13 Enter the respective IPv4 subnet mask or IPv6 network prefix, then press Enter.
You are prompted for an IPv4 or IPv6 address for the default gateway, depending on the address type you entered for
the management port of the Fabric Interconnect.

Step 14 Enter either of the following:


• IPv4 address of the default gateway
• IPv6 address of the default gateway

Cisco Intersight Managed Mode Configuration Guide


6
Setting Up Fabric Interconnects
Configuring Fabric Interconnect-A Using the Console

Step 15 Enter the IPv4 or IPv6 address for the DNS server.
The address type must be the same as the address type of the management port of the Fabric Interconnect.
Step 16 Enter yes if you want to specify the default Domain name, or no if you do not.
Step 17 (Optional) Enter the default Domain name.
Step 18 Review the setup summary and enter yes to save and apply the settings, or enter no to go through the setup again to
change some of the settings.
If you choose to go through the setup again, it provides the values that you previously entered, and the values appear
in brackets. To accept previously entered values, press Enter.

Example
Here is an example of how to configure Fabric Interconnect-A in Cisco Intersight management mode
for a cluster configuration using the console and management addresses:
Enter the configuration method (console/gui)? console
Enter the management mode [ucsm/intersight]? intersight
You have chosen to setup a new Fabric Interconnect in “intersight” managed mode. Continue?
(y/n): y
Enforce strong password? (y/n) [y]:n

Enter the password for "admin":


Confirm the password for "admin":

Enter the switch fabric (A/B) []: A

Enter the system name: UCS

Physical Switch Mgmt0 IP address : 15.XX.XX.XX

Physical Switch Mgmt0 IPv4 netmask : 255.255.255.X

IPv4 address of the default gateway : 15.XX.XX.XX

DNS IP address : 15.XX.XX.XX

Configure the default domain name? (yes/no) [n]:

Following configurations will be applied:

Management Mode=intersight
Switch Fabric=A
System Name=UCS-A
Enforced Strong Password=no
Physical Switch Mgmt0 IP Address=15.XX.XX.XX
Physical Switch Mgmt0 IP Netmask=255.255.255.X
Default Gateway=15.XX.XX.XX
Ipv6 value=0
DNS Server=15.XX.XX.XX

Apply and save the configuration (select 'no' if you want to re-enter)? (yes/no): yes
Applying configuration. Please wait.

Configuration file - Ok

Cisco Intersight Managed Mode Configuration Guide


7
Setting Up Fabric Interconnects
Configuring Fabric Interconnect-B Using the Console

What to do next
Configure the Fabric Interconnect-B using the console.

Configuring Fabric Interconnect-B Using the Console


This procedure describes setting up Fabric Interconnect-B using IPv4 or IPv6 addresses for the management
port.

Step 1 Connect to the console port.


Step 2 Power up the Fabric Interconnect.
You will see the power-on self-test messages as the Fabric Interconnect boots.
Step 3 When the unconfigured system boots, it prompts you for the setup method to be used. Enter console to continue the
initial setup using the console CLI.
Note Fabric Interconnect-A should detect Fabric Interconnect-B in the cluster. If it does not, check the physical
connections between the L1 and L2 ports, and verify that Fabric Interconnect-B has been enabled for a cluster
configuration.

Step 4 Enter y to add Fabric Interconnect-B to the cluster.


Step 5 Enter the admin password of the peer Fabric Interconnect.
Step 6 Enter the IP address for the management port on Fabric Interconnect-B.
Step 7 Review the setup summary and enter yes to save and apply the settings, or enter no to go through the setup again to
change some of the settings.
If you choose to go through the setup again, it provides the values you previously entered, and the values appear in
brackets. To accept previously entered values, press Enter.

Example
Here is an example of how to configure Fabric Interconnect-B in Cisco Intersight management mode
for a cluster configuration using the console and management addresses:
Enter the configuration method. (console/gui) ? console

Installer has detected the presence of a peer Fabric interconnect. This Fabric interconnect
will be added to the cluster. Continue (y/n) ? y

Enter the admin password of the peer Fabric interconnect:


Connecting to peer Fabric interconnect... done
Retrieving config from peer Fabric interconnect... done
Peer Fabric interconnect management mode : intersight
Peer Fabric interconnect Mgmt0 IPv4 Address: 15.XX.XX.XX
Peer Fabric interconnect Mgmt0 IPv4 Netmask: 255.255.255.0

Peer FI is IPv4 Cluster enabled. Please Provide Local Fabric Interconnect Mgmt0 IPv4 Address

Physical Switch Mgmt0 IP address : 15.XX.XX.XX

Cisco Intersight Managed Mode Configuration Guide


8
Setting Up Fabric Interconnects
Fabric Interconnect Password Guidelines

Local fabric interconnect model(UCS-FI-6454)


Peer fabric interconnect is compatible with the local fabric interconnect. Continuing with
the installer...

Apply and save the configuration (select 'no' if you want to re-enter)? (yes/no): yes
Applying configuration. Please wait.

Configuration file - Ok

What to do next
Claim the Intersight Managed Domain through Cisco Intersight. For more information, see Target Claim in
Intersight Managed Mode.

Fabric Interconnect Password Guidelines


Cisco recommends using a strong password; otherwise, the password strength check for the admin user of
the Fabric Interconnect, Cisco Intersight rejects any password that does not meet the following requirements:
• Must contain a minimum of eight characters and a maximum of 80 characters.
• Must contain at least three of the following:
• Lower case letters
• Upper case letters
• Digits
• Special characters

• Must not contain a character that is repeated more than three times consecutively, such as aaabbb.
• Must not be identical to the username or the reverse of the username.
• Must pass a password dictionary check. For example, the password must not be based on a standard
dictionary word.
• Must not contain the following symbols: $ (dollar sign), ? (question mark), and = (equals sign).
• Should not be blank.

Fabric Interconnect Views

Fabric Interconnects Details View


When you select a Fabric Interconnect in the Fabric Interconnects table view, a Details page with information
specific to the Fabric Interconnect is displayed. If a Fabric Interconnect is in Not Connected status, you can
view the device details to resolve the issue. To view recommendations for further troubleshooting, see Device
Connection to Intersight is unsuccessful.

Cisco Intersight Managed Mode Configuration Guide


9
Setting Up Fabric Interconnects
Fabric Interconnects Details View

In addition to the Fabric Interconnect Health status, you can view the following information in the Fabric
Interconnects Details page:
• Name
• Peer Switch—Name of Fabric Interconnect A or B, depending on the device you choose to view. Click
Peer Switch to view the details of the other Fabric Interconnect.
• Model—The model number of the Fabric Interconnect
• Expansion Modules—The number of expansion modules in the Fabric Interconnect
• Serial—The serial number of the Fabric Interconnect
• Management IP—The IP address of the management interface on the Fabric Interconnect
• Switch Profile—The name of the switch profile created for the UCS Domain to which the Fabric
Interconnect belongs
• Switch Profile Status—The current status of the switch profile associated with the Fabric Interconnect
• Firmware Version—The firmware version running on the Fabric Interconnect
• Ports—The total number of ports
• Used—The number of used ports
• Available—The number of ports available for use
• Tags—The existing tags for the Fabric Interconnects. You can add new tags, or modify the existing ones
from Manage tags

The Properties area displays a graphical view of the Fabric Interconnect. The Health Overlay function
enables you to monitor the health of the ports on the Fabric Interconnect. Additionally, this area provides the
following information:
• Mode—UCS Fabric Interconnects operate in two main switching modes: Ethernet or Fibre Channel.
These modes are independent of each other. They determine how the Fabric Interconnect behaves as a
device between the server and network/server and storage device.
• Ethernet Mode—The Ethernet switching mode determines how the Fabric Interconnect behaves
as a switching device between the servers and the network. The Fabric Interconnect operates in
either of the following Ethernet switching modes:
• End-Host Mode—Allows the Fabric Interconnect to act as an end host to the network,
representing all servers (hosts) connected to it through virtual Network Interface Cards (vNICs).
• Switch Mode—Allows the Fabric Interconnect to run STP to avoid loops. Broadcast and
multicast packets are handled in the traditional way.

• FC Mode—The Fibre Channel switching mode determines how the Fabric Interconnect behaves
as a switching device between the servers and storage devices. The Fabric Interconnect operates in
either of the following Fibre Channel switching modes:
• End-Host Mode—Allows the Fabric Interconnect to act as an end host to the connected fibre
channel networks, representing all servers (hosts) connected to it through virtual Host Bus
Adapters (vHBAs).
• Switch Mode—Allows the Fabric Interconnect to connect directly to a storage device.

Cisco Intersight Managed Mode Configuration Guide


10
Setting Up Fabric Interconnects
Fabric Interconnects Details View

• Admin Evac State—Specifies the evacuation state of Fabric Interconnect traffic. This can be one
of the following options:
• Disabled—Restarts traffic on the Fabric Interconnect.
• Enabled—Stops traffic on the Fabric Interconnect.

• Oper Evac State—Specifies the operational evacuation state of Fabric Interconnect traffic.

• FC Zone Count
• FC Zone Limit—The maximum number of Fibre Channel zones allowed on this Fabric Interconnect.
• FC User Zone Limit—The maximum number of user-created Fibre Channel zones allowed on this
Fabric Interconnect.
• FC Zone Count—The number of Fibre Channel zones defined on this Fabric Interconnect.
• FC User Zone Count—The number of user-created Fibre Channel zones defined on this Fabric
Interconnect.

• Access
• IP Address—The IP address to use when communicating with the Fabric Interconnect.
• Subnet Mask—The subnet mask associated with the IP address.
• Default Gateway—The gateway associated with the IP address.
• MAC—The MAC address.

• VLAN Port Count


• VLAN Port Limit—The maximum number of VLAN ports allowed on this Fabric Interconnect.
• Access VLAN Port Count—The number of available VLAN access ports.
• Border VLAN Port Count—The number of available VLAN border ports.
• Compressed Optimization Sets—The number of VP optimization groups.
• Compressed VLAN Port Count—The number of compressed VLAN ports.
• Uncompressed VLAN Port Count—The number of uncompressed VLAN ports.

Alarms
Intersight provides fault monitoring capabilities to track and set up alarms for all managed UCS and HyperFlex
systems. An alarm alerts you about a failure in the setup (a fault) or a threshold that has been raised. An alarm
in Intersight includes information about the operational state of the affected object at the time the fault was
raised. Click on a specific alarm to view the fault code, the source type and name, component on which the
fault occurred, and a description of the fault.

Note Intersight managed devices must be running with firmware version of 4.1(3) or later releases to generate
alarms.

Cisco Intersight Managed Mode Configuration Guide


11
Setting Up Fabric Interconnects
Fabric Interconnects Inventory View

Click on any of the categories to view more details about the alarms.
• All(Info)—Displays the total number of faults both Critical and Warning.
• Critical—Displays the total number of Critical faults. Raised when a service-affecting condition requires
an immediate corrective action. For example, the severity could indicate that the managed object is out
of service and its capability must be restored immediately.
• Warning—Displays the total number of Warning faults. Raised when a potential or impending
service-affecting fault occurs.
This fault could have no significant or immediate effects on the system. A warning status indicates that
you must take the appropriate action to diagnose the fault and correct the problem to prevent it from
becoming a more serious service-affecting fault.

Note: The Fabric Interconnects models supported in Intersight Managed Mode are:
• UCS-FI-6454
• UCS-FI-64108

and
The Fabric Interconnects models supported in UCSM Managed Mode are:
• UCS-FI-6248UP, UCS-FI-6296UP
• UCS-FI-6332, UCS-FI-6332-16UP
• UCS-FI-M-6324
• UCS-FI-6454
• UCS-FI-64108

Fabric Interconnects Inventory View


When you select a Fabric Interconnect in the Fabric Interconnects table view, you can view the inventory
of its components on the Inventory tab.
For the selected Fabric Interconnect, you can view details of each of the following components:
• Ports & Port Channels—You can see a summary of the Ethernet ports, FC ports, Ethernet Port Channels,
and FC Port Channels on the Fabric Interconnect. When you click a specific port, you can view the
properties and graphical view of that port.
You can Enable or Disable a port or a port channel from this view. Disabling a port may lead to traffic
disruption. The device connected to a disabled port will also go offline. Disabling a port channel will
lead to the member ports also getting disabled.
• Fan Modules—You can see a summary of the fan modules on the Fabric Interconnect. When you click
a specific fan module, you can view the list of fans on the fan module, and the properties and graphical
view of that fan module.
• PSUs—You can see a summary of the Power Supply Units (PSUs) on the Fabric Interconnect. When
you click a specific PSU, you can view the properties and graphical view of that PSU.

Cisco Intersight Managed Mode Configuration Guide


12
Setting Up Fabric Interconnects
Fabric Interconnects Connections View

• Local Storage—You can see a summary of the partitions on the Fabric Interconnect, including details
such as their size and current usage.

Fabric Interconnects Connections View


The Connections view provides a list of all the components that are directly or indirectly connected to your
Fabric Interconnect, such as servers, chassis, and Fabric Extenders (FEX).
Depending on the information available for the selected Fabric Interconnect, the following is displayed:
• Compute
• Servers—The details of all the servers that are connected to the Fabric Interconnect. These details
are Name, Health, User Label, Slot Id, Management IP, Model, and Serial.
• Chassis—The details of all the chassis that are connected to the Fabric Interconnect. These details
are Name, Health, Model, and Serial.

• Network
• Fabric Extenders—The details of the Fabric Extenders that are connected to the Fabric Interconnect.
These details are Name, Health, Model, Vendor, and Serial.

• Decommissioned
• Devices—The details of decommissioned devices. These details are Type, Model, Serial,
Decommissioned Date.

Fabric Interconnects UCS Domain Profile View


The UCS Domain Profile view displays a graphic representation of the port configuration, VLAN and VSAN
configuration, and the UCS Domain Configuration. Additionally, the following information is displayed:
• Details
• Status—Status of the UCS Domain profile deployment to the assigned Fabric Interconnect pair
• Name
• Fabric Interconnect A—Name of Fabric Interconnect A
• Fabric Interconnect B—Name of Fabric Interconnect B
• Last Update—Date and time that the UCS Domain profile was last updated
• Description—Optional description of the UCS Domain profile

• Tags—The existing tags for the Domain. You can add new tags, or modify the existing ones from Manage
tags.
• Policies

Cisco Intersight Managed Mode Configuration Guide


13
Setting Up Fabric Interconnects
Fabric Interconnects UCS Domain Profile View

View the Policies that are attached to the UCS Domain profile. The Policies pane displays details of the
Port, VLAN and VSAN, and UCS Domain Configuration. A graphical representation of the ports
configuration on the Fabric Interconnects, including port roles and port channels and a list of associated
policies is displayed. The VLAN, VSAN, and UCS Domain Configuration lists the Domain policies
associated with the selected Domain profile.

Cisco Intersight Managed Mode Configuration Guide


14
CHAPTER 3
Chassis and FEX Lifecycle
• Chassis and Fabric Extender Discovery and Actions, on page 15
• Chassis Details View, on page 17
• Chassis Inventory View, on page 17
• Chassis Connections View, on page 18
• Fabric Extender Details View, on page 18
• Fabric Extender Inventory View, on page 19
• Fabric Extender Connection View, on page 19

Chassis and Fabric Extender Discovery and Actions


Chassis and Fabric Extender Discovery
Chassis and Fabric Extenders (FEX) that are connected to a Fabric Interconnect are automatically discovered
in Cisco Intersight. To discover chassis and FEX connected to a Fabric Interconnect, ensure that the Fabric
Interconnect is claimed in Cisco Intersight.
After the Fabric Interconnect is claimed, do the following:
1. Connect the server ports to both Fabric Interconnects. For example, ports 1 and 2 to FI-A and ports 3 and
4 to FI-B.
2. Configure the server ports on both Fabric Interconnects by using a UCS Domain profile. Creating a UCS
Domain Profile provides detailed information about creating a UCS Domain profile and assigning it to a
UCS Fabric Interconnect Domain.

After the server ports are configured and applied, all the chassis and FEX that are connected to the Fabric
Interconnect are automatically discovered. During discovery, the chassis and FEX will auto sync firmware
with the Fabric Interconnect if their firmware versions do not match the firmware version of the Fabric
Interconnect. Because of this, it may take 25-30 minutes for the chassis and FEX to appear in the GUI. You
can check the chassis and FEX status through the nxos CLI by using the show fex command.

Chassis Actions
From the left navigation panel, click Chassis for the Chassis table view. You can perform the following
operations to manage one or more chassis.
Chassis Actions

Cisco Intersight Managed Mode Configuration Guide


15
Chassis and FEX Lifecycle
Chassis and Fabric Extender Discovery and Actions

• Rediscover—Rediscovering the chassis initiates the chassis discovery process and then the chassis
inventory process.
• Decommission—Decommissioning is performed when a chassis is physically present and connected,
but you want to temporarily remove it from the Cisco Intersight configuration. This action removes the
chassis and IOM inventories. Because it is expected that a decommissioned chassis will be eventually
recommissioned, a portion of the chassis information, including the chassis ID, is retained by Cisco
Intersight.
• Remove—Removing a chassis involves physically removing a chassis from the system.
Before removing a chassis from the system, ensure that you unconfigure the server ports to which the
chassis is connected. After the physical removal of the chassis is completed, the configuration for that
chassis is removed from Cisco Intersight.
If you need to add a chassis, which was earlier removed, back to the Cisco Intersight configuration, it
must be reconnected and then rediscovered. During rediscovery Cisco Intersight will assign the chassis
a new ID that may be different from ID that it was assigned earlier.
• Recommission—Recommissioning a chassis brings the chassis and IOM back online and initiates the
chassis discovery process and then the chassis inventory process. After this action is complete, you can
access the chassis and any servers in it.
A list of decommissioned chassis is available in the Devices area under Fabric Interconnects > Fabric
Interconnect Name > Connections > Decommissioned.

FEX Actions
From the left navigation panel, click Fabric Interconnects > Fabric Interconnect Name > Connections >
Fabric Extenders for the FEX table view. You can perform the following operations to manage one or more
FEX.
FEX Actions
• Decommission—Decommissioning is performed when a FEX is physically present and connected, but
you want to temporarily remove it from the Cisco Intersight configuration. This action takes the FEX
offline and removes the FEX inventory. Because it is expected that a decommissioned FEX will be
eventually recommissioned, a portion of the FEX information is retained by Cisco Intersight.
• Remove—Removing a FEX involves physically removing a FEX from the system. After the physical
removal of the FEX is completed, the configuration for that FEX is removed from Cisco Intersight.
To add a removed FEX back to the Cisco Intersight configuration, it must be reconnected to server ports
that are configured on the Fabric Interconnect. The FEX is automatically discovered. During discovery
Cisco Intersight will assign the FEX a new ID that may be different from ID that it was assigned earlier.
• Recommission—Recommissioning a FEX brings the FEX back online, initiates the FEX discovery
process and then the FEX inventory process. After this action is complete, you can access the FEX.
A list of decommissioned FEX is available in the Devices area under Fabric Interconnects > Fabric
Interconnect Name > Connections > Decommissioned.
• Turn On Locator—Turn on the LED Locator on the selected FEX. Locators are indicators that help
direct administrators to specific nodes in large data center environments.
• Turn Off Locator—Turn off the LED Locator on the selected FEX. Locators are indicators that help
direct administrators to specific nodes in large data center environments.

Cisco Intersight Managed Mode Configuration Guide


16
Chassis and FEX Lifecycle
Chassis Details View

Chassis Details View


When you select a chassis in the chassis table view, a Details page with information specific to the chassis is
displayed. In addition to the chassis Health status, you can view the following information in the Chassis
Details page:
• Name
• Serial—The serial number of the chassis
• Model—The model number of the chassis, for example, UCSB-5108-AC2
• Revision—The revision number of the chassis
• Part Number—The part number of the chassis
• UCS Domain—The name of the UCS Domain of which the selected chassis is a part
• Firmware Version—The firmware version on the chassis
• Tags—The existing tags for the selected object are displayed by default. Click Manage to add new tags
or modify the existing ones.

The Properties area provides a graphical representation of the front and rear view of the chassis, the health
overlay for the chassis, and an overview of the hardware properties of the chassis and its components.
The Alarms area in Cisco Intersight provides fault monitoring capabilities to track and set up alarms for all
managed UCS systems. An alarm alerts you about a failure in the endpoint (a fault) or a threshold that has
been raised.

Chassis Inventory View


After a chassis is discovered, an inventory of all its components is made available. When you select a chassis
in the Chassis table view, you can view the inventory of its components on the Inventory tab.
For the selected chassis, you can view details of each of the following components:
• IO Modules—You can see a summary of the IO modules in the chassis. When you click a specific IO
module, you can view its properties and graphical view.
Action: You can reset an IO module from the page.

Note In the Cisco UCS X-series chassis, each Intelligent Fabric Module
(IFM) contains fan modules. When you click a fan module, you can
view the properties and operational state of the fans.

• XFM Modules—You can see a summary of the X-Fabric Modules (XFM) in the chassis. Each XFM
contains fan modules. When you click a fan module, you can view the properties and operational state
of the fans.

Cisco Intersight Managed Mode Configuration Guide


17
Chassis and FEX Lifecycle
Chassis Connections View

Note The XFM slots are present only in the Cisco UCS X-series chassis.

• Fan Modules—You can see a summary of the fan modules in the chassis. When you click a specific fan
module, you can view the list of fans on the fan module, properties, and graphical view of that fan module.
• PSUs—You can see a summary of the Power Supply Units (PSUs) in the chassis. When you click a
specific PSU, you can view the properties and graphical view of that PSU.
• Servers—You can see a summary of the servers in the chassis, including details such as their health,
model, and serial number.

Chassis Connections View


The Connections view provides a list of all the components that are directly or indirectly connected to your
chassis, such as Fabric Interconnects and servers.
Depending on the information available for the selected chassis, the following is displayed:
• Network
• Switches—Displays the details of the Fabric Interconnects that are connected to the chassis. These
details are Name, Health, Model, Vendor, and Serial.

Fabric Extender Details View


When you select a Fabric Extender (FEX) in the FEX table view, a Details page with information specific to
the chassis is displayed. In addition to the FEX Health status, you can view the following information in the
FEX Details page:
• Name
• Serial—The serial number of the Fabric Extender
• Model—The model number of the Fabric Extender
• Vendor—The name of the manufacturer
• Revision—The revision number of the Fabric Extender
• Part Number—The part number of the Fabric Extender
• Ports—The total number of ports on the Fabric Extender, and their operational status. The status can
be:
• Used—Number of ports that are currently connected to the Fabric Interconnects and servers
• Available—Number of ports available for use on the Fabric Extender

• Tags—The existing tags for the Fabric Extender. You can add new tags, or modify the existing ones
from Manage tags.

Cisco Intersight Managed Mode Configuration Guide


18
Chassis and FEX Lifecycle
Fabric Extender Inventory View

Fabric Extender Inventory View


After a Fabric Extender (FEX) is discovered, an inventory of all its components is made available. When you
select a FEX in the FEX table view, you can view the inventory of its components on the Inventory tab.
For the selected FEX, you can view details of each of the following components:
• Ports—The details of all the Backplane Ports and Fabric Ports on the FEX that is selected.
The Backplane Ports table shows the server ports, which are host ports. This includes information such
as the port Name, Status, Port Channel ID to which it belongs, Speed of the port and the Peer server
port.
The Fabric Ports table shows the network ports that are connected to the Fabric Interconnect. This
includes information such as the port Name, Status, Port Channel ID to which it belongs, Switch Slot
ID of the Fabric Interconnect to which it is connected, the Peer Fabric Interconnect, and the Switch Port
ID of the Fabric Interconnect to which it is connected.
It also includes detailed hardware information and graphic view of each port.
• Fan Modules—The details of all the fan modules on the FEX, such as Name, Fans, Model, and Status.
It also includes detailed hardware information and graphic view of each fan module and the fans in it.
• PSUs—The details of the Power Supply Units (PSUs) on the FEX, such as Name, ID, Model, Vendor,
Serial and Status.
It also includes detailed hardware information and graphic view of each PSU.

Fabric Extender Connection View


The Connections view provides a list of all the components that are directly or indirectly connected to your
Fabric Extender (FEX), such as servers and Fabric Interconnects.
Depending on the information available for the selected FEX, the following is displayed:
• Compute
• Servers—The details of all the servers that are connected to the FEX. These details are Name,
Health, User Label, Model, and Serial.

• Network
• Switches—Displays the details of the Fabric Interconnects that are connected to the FEX. These
details are Name, Health, Model, Vendor, and Serial.

Cisco Intersight Managed Mode Configuration Guide


19
Chassis and FEX Lifecycle
Fabric Extender Connection View

Cisco Intersight Managed Mode Configuration Guide


20
CHAPTER 4
Server Lifecycle
• Server Discovery and Actions, on page 21
• Server Inventory View, on page 24
• Compliance with Hardware Compatibility List (HCL), on page 25

Server Discovery and Actions


After a chassis or FEX is discovered, the blade servers connected to the chassis or the rack servers connected
to the FEX are automatically claimed and discovered. Chassis and FEX Discovery and Operations provides
information about this process. For servers to be claimed and discovered, they must be in the factory default
state.
For rack servers that are directly attached to the Fabric Interconnect, do the following after the Fabric
Interconnect is claimed:
1. Connect the server ports to both Fabric Interconnects. For example, ports 1 and 2 to FI-A and ports 3 and
4 to FI-B.
2. Configure the server ports on both Fabric Interconnects.

The servers that are discovered appear on the Servers page.

Server Actions
The server actions enable you to manage the server. In Cisco Intersight, when you click on Servers, the Servers
Table view is displayed. In Servers Table view page, click the Ellipsis (…) icon to perform server actions.
Server Actions: You can perform the following operations to manage a server:
• Power
• Power On—Turns on the power of the server.
• Power Off—Turns off the power of the server.
• Power Cycle—Turns off and on for the server.
• Hard Reset—Reboots the server.
• Shut Down OS—Shuts down the server if supported by an operating system.

Cisco Intersight Managed Mode Configuration Guide


21
Server Lifecycle
Server Discovery and Actions

• System
• Turn On Locator—Turns on the LED Locator.
• Turn Off Locator—Turns off the LED Locator.
• Reset CMOS—Resets the BIOS configuration settings to the original state hence helps in recovery
when the server is not in a healthy state. The option to reset CMOS appears only when the server
is powered off. For the reset to complete, the server must be powered on. There is an additional
option to power on the server using the toggle button present in the Reset CMOS confirmation
window.

Note This option is available only for Intersight Managed Mode


servers.

• Lock Front Panel—Locks the physical power button on the server. For a server that already has
the front panel locked, this option appears as Unlock Front Panel.

Note This option is available only for Intersight Managed Mode


servers.

• Rediscover—Rediscovers the server and all endpoints in that server.


• Decommission—Decommissions the server and removes the server from the Cisco UCS
configuration. However, the server hardware physically remains in the Cisco UCS instance.
• Reboot Cisco IMC—Reboots the Cisco IMC.
• Set Certificate—Configures the certificate and private key on the server from a third-party managed
Certificate Authority(CA).

Note This option is available only for Intersight Managed Mode


servers.

• Set Asset Tags—Enables to set the custom asset tag.


• Set User Label—Enables to set the custom asset label.

• Install Operating System—Perform an unattended OS installation on one a Cisco UCS C-Series


Standalone servers from your centralized data center through a simple process.
• Upgrade Firmware—Perform a firmware upgrade. For more information, see the Firmware Upgrade.
• Launch vKVM—Launch the Tunneled vKVM that enables you to access a server’s KVM console even
if the user is not in the same network as the server.
• Open TAC Case—Open a case to report an issue with the server.

Cisco Intersight Managed Mode Configuration Guide


22
Server Lifecycle
Server Discovery and Actions

• Set License Tier—Update the server to a new license tier. Updating license tier is not allowed on server(s)
with an associated server profile. To move the license to another tier, unassign the profile from one or
more selected servers and try again.

Bulk Server Actions


On the Servers table page, you can perform the following operations to manage more than one server.
• Power
• Power On—Power on for one or more servers.
• Power Off—Turn power off for one or more servers.
• Power Cycle—Turns power off and on for one or more servers.
• Hard Reset—Reboot the server.
• Shut Down OS—Shuts down the server if supported by an operating system.

• System
• Turn On Locator—Turn on the LED Locator.
• Turn Off Locator—Turn off the LED Locator.
• Reset CMOS—Resets the BIOS configuration settings to the original state hence helps in recovery
when the server is not in a healthy state. The option to reset CMOS appears only when the server
is powered off. For the reset to complete, the server must be powered on. There is an additional
option to power on the server using the toggle button present in the Reset CMOS confirmation
window.

Note This option is available only for Intersight Managed Mode


servers.

• Lock Front Panel—Locks the physical power button on the server. For a server that already has
the front panel locked, this option appears as Unlock Front Panel.

Note This option is available only for Intersight Managed Mode


servers.

• Reboot Cisco IMC—Reboots the Cisco IMC.

• Install Operating System—Perform an unattended OS installation on one or more Cisco UCS C-Series
Standalone servers from your centralized data center through a simple process.
• Upgrade Firmware—Perform a firmware upgrade.
• Set License Tier—Update one or more servers to a new license tier. Updating license tier is not allowed
on server(s) with an associated server profile. To move the license to another tier, unassign the profile
from one or more selected servers and try again.

Cisco Intersight Managed Mode Configuration Guide


23
Server Lifecycle
Server Inventory View

Server Inventory View


After a server is discovered, an inventory of all its components is made available. When you select a server
in the Server table view, you can view the inventory of its components on the Inventory tab.
For the selected server, you can view details of each of the following components:
• Boot—You can see the actual boot order of the devices configured on the server. The boot order displays
the details that include device name, device type, configuration details such as Boot Mode (Legacy or
UEFI), and Secure Boot Mode (Enabled or Disabled). A device configured in the server profile of Boot
Order Policy may not appear in the actual boot order, if the server BIOS does not detect the device during
server boot.
• Cisco IMC—You can see the firmware version, a summary of the outband management access, and
hardware details of Cisco IMC.
• CPUs—You can see details about the processors, including the architecture, model, socket designation,
and vendor. Expanding CPUs displays the state and a summary of the hardware and resource details of
each processor.
• Memory—You can see a summary of the memory cards, including their location, ID, capacity, and
Clock Speed. Expanding Memory displays the state and hardware details of each memory card.
• Network Adapters—You can see details about the network adapter cards, including the slot ot which
they are connected, model, serial, vendor, and the interfaces to which they are connected. Expanding
Network Adapters displays the firmware version, interface details, hardware details, and a list of alarms
pertaining to each adapter.
• GPUs—You can see a list of GPUs and their slot IDs. Expanding GPUs displays the product name and
connection details for each GPU.
• PCIe Devices—You can see a list of PCIe devices and their slot IDs. Expanding PCIe Devices displays
the firmware version and hardware details for each PCIe device.
• Storage Controllers—You can see a list of storage controllers, their ID, and their type. Expanding
Storage Controllers displays the firmware version and hardware details for each storage controller.
You can perform the following operations to manage one or more storage controllers.
• Physical Drives—Enables a single physical drive or multiple physical drives to switch between
Unconfigured Good and JBOD drive states.
• Virtual Drives—Enables you to select and remove the unused virtual drive to reclaim the used
space in the RAID controller. Removing the virual drive destroys all information on the file systems
and deletes the virtual drive from the RAID controller.

Note This is the only storage operation supported in Cisco Boot


Optimized M.2 RAID Controller.

• Import Foreign Configurations—Imports the virtual drives and adds them to the RAID controller
configuration.

Cisco Intersight Managed Mode Configuration Guide


24
Server Lifecycle
Compliance with Hardware Compatibility List (HCL)

• Clear Foreign Configurations—Clears or erases all the data stored on the physical drives or the
virtual drives.

• TPM—Trusted Platform Module (TPM) enables protection to data and hardware components of the
claimed server. TPM also enables you to view the state of the key identifiers and a summary of hardware
details.
You can view the following components of TPM:
• Key identifiers
• Activation Status
• Enabled State

• Hardware
• Ownership

Note This property can be viewed only for TPM 1.2 version.

• Version
• Model
• Vendor
• Serial
• Firmware Version

Note This property can be viewed only for TPM 2.0 version.

Compliance with Hardware Compatibility List (HCL)


Cisco Intersight provides the capability to evaluate and mitigate the impact of service issues from running
non-validated combinations of firmware, server model, processor, adapters, operating system, and driver
versions. Intersight evaluates the compatibility of your Cisco UCS systems, HyperFlex systems, Intersight
Managed Mode (IMM) servers, and Cisco UCS S-Series servers to check if the hardware and software have
been tested and validated by Cisco or Cisco partners. Intersight reports validation issues after checking the
compatibility of the server model, processor, firmware, adapters, operating system and drivers, and displays
the compliance status with the Hardware Compatibility List (HCL). This features requires a Cisco Intersight
Essentials or above license.
You can use Cisco UCS Tools, a host utility vSphere Installation Bundle (VIB), or OS Discovery Tool, an
open source script to collect OS and driver information to evaluate HCL compliance. For more information
about Hardware Compatibility Status, a detailed description and instructions on how to download Cisco UCS

Cisco Intersight Managed Mode Configuration Guide


25
Server Lifecycle
Compliance with Hardware Compatibility List (HCL)

Tools, and for instructions on how to use the OS Discovery Tool, see Compliance with Hardware Compatibility
List (HCL) in Resources.

Cisco Intersight Managed Mode Configuration Guide


26
CHAPTER 5
Configuring UCS Domain Profiles
• About UCS Domain Profile, on page 27
• Creating a UCS Domain Profile, on page 28
• UCS Domain Profile Details, on page 29

About UCS Domain Profile


Overview of a UCS Domain Profile
A UCS Domain Profile configures a Fabric Interconnect pair through reusable policies, allows for configuration
of the ports and port channels, and configures the VLANs and VSANs in the network. It defines the
characteristics of and configures ports on Fabric Interconnects. You can create a UCS Domain profile and
associate it with a Fabric Interconnect Domain. The Domain-related policies can be attached to the profile
either at the time of creation or later. One UCS Domain profile can be assigned to one Fabric Interconnect
Domain.

Cisco Intersight Managed Mode Configuration Guide


27
Configuring UCS Domain Profiles
Creating a UCS Domain Profile

Important • Cisco Intersight supports attaching one port policy per UCS Domain profile.
• Policies that are attached to a UCS Domain profile can be created ahead of creating a profile or during
the creation of the profile.
• Policies that are attached to a UCS Domain and the global policies of all UCS Domain Profiles associated
with a specific UCS Domain are shared.

Creating a UCS Domain Profile


A UCS Domain Profile configures a Fabric Interconnect pair through reusable policies, streamlines the
deployment of Fabric Interconnect pairs, allows for configuration of the ports and port channels, and configures
the VLANs and VSANs in the network.

Step 1 Log in to Cisco Intersight with your Cisco ID and select admin role.
Step 2 Navigate to Service Profiles > UCS Domain Profiles tab, and click Create UCS Domain Profile.
Step 3 On the General page, enter a name for your profile. Optionally, include a short description and tag information to help
identify the profile. Tags must be in the key:value format. For example, Org: IT or Site: APJ.
Step 4 On the UCS Domain Assignment page, assign a switch pair to the Domain profile. You can also click Assign Later
and assign a switch pair to the Domain profile at a later time.
Step 5 Click Next.
Step 6 On the Ports Configuration page, attach a port policy for each switch to the UCS Domain Profile and click Next.

Cisco Intersight Managed Mode Configuration Guide


28
Configuring UCS Domain Profiles
UCS Domain Profile Details

Step 7 On the VLAN & VSAN Configuration page, attach VLAN and VSAN policies for each switch to the UCS Domain
Profile and click Next.
Step 8 On the UCS Domain Configuration page, attach the required compute and management policies to the UCS Domain
Profile and click Next.
Note: In this step, it is mandatory to create and attach the Switch Control Policy to enable VLAN port count optimization.

Step 9 On the Summary page, verify the details of the UCS Domain Profile and the policies attached to it.
Step 10 Click Deploy to deploy the UCS Domain Profile to the assigned Fabric Interconnect Domain.

UCS Domain Profile Details


The UCS Domain Profile Details page displays a graphic representation of the Port Configuration, VLAN
and VSAN Configuration, and the UCS Domain Configuration in addition to the status and the Actions menu.
Navigate to the UCS Domain Details from the UCS Domain Profiles Table view. On this page, you can:
• Perform UCS Domain profile Actions:
• Deploy—Deploy the UCS Domain profile on a Fabric Interconnect pair.
• Unassign—Unassign the UCS Domain profile from the Fabric Interconnect pair.
• Edit—Edit the properties of the UCS Domain Profile.
• Clone—Clone the UCS Domain profile with properties similar to an existing UCS Domain profile.
The clones are associated with the same policies as on the original UCS Domain profile.
• Set Tags

• View UCS Domain profile Details:

Property Essential Information

Status The status of deploying the UCS Domain profile


on a Fabric Interconnect pair. This could be:
• OK
• Failed
• Not Deployed

Name The UCS Domain profile name.

Fabric Interconnect A The name of the associated Fabric Interconnect A


in the UCS Domain.

Fabric Interconnect B The name of the associated Fabric Interconnect B


in the UCS Domain.

Last Update The date and time that the UCS Domain Profile
was last updated.

Cisco Intersight Managed Mode Configuration Guide


29
Configuring UCS Domain Profiles
UCS Domain Profile Details

Property Essential Information

Tags The existing tags for the selected object are


displayed by default. Click Manage to add new
tags or modify the existing ones.

• View the Policies that are attached to the UCS Domain profile. The Policies pane displays details of the
Ports, VLAN and VSAN, and UCS Domain Configuration. A graphical representation of the ports
configuration on the Fabric Interconnects, including port roles and port channels and a list of associated
policies is displayed. The VLAN, VSAN, and UCS Domain Configuration lists the Domain policies
associated with the selected Domain profile.

Cisco Intersight Managed Mode Configuration Guide


30
CHAPTER 6
Configuring Server Profiles
• Server Profiles, on page 31
• Creating a UCS Server Profile, on page 36
• UCS Server Profile Details, on page 37

Server Profiles
In Cisco Intersight, a Server Profile enables resource management by streamlining policy alignment, and
server configuration. You can create Server Profiles using the Server Profile wizard or you can import the
configuration details of C-series servers in standalone mode and FI-attached servers in Intersight Managed
Mode (IMM), directly from Cisco IMC. You can create Server Profiles using the Server Profile wizard to
provision servers, create policies to ensure smooth deployment of servers, and eliminate failures that are
caused by inconsistent configuration. The Server Profiles wizard groups the server policies into the following
four categories to provide a quick Summary View of the policies that are attached to a profile:
• Compute Policies—BIOS, Boot Order, and Virtual Media.
• Network Policies—Adapter Configuration, iSCSI Boot, LAN Connectivity, and SAN Connectivity
policies.
• The LAN Connectivity policy requires you to create Ethernet Network Policy, Ethernet Adapter
Policy, and Ethernet QoS Policy. When you attach a LAN Connectivity policy to a server profile,
the addresses of the MAC address Pool, or the static MAC address, are automatically assigned.

Note A LAN Connectivity policy that has a static MAC address can
be attached to only one server profile.

• The SAN Connectivity policy requires you to create Fibre Channel Network Policy, Fibre Channel
Adapter Policy, and Fiber Channel QoS Policy. When you attach a SAN Connectivity policy to a
server profile, the addresses of the WWPN and WWNN Pools, or the static WWPN and WWNN
addresses, are automatically assigned.

Note A SAN Connectivity policy that has a static WWPN, or a static


WWNN can be attached to only one server profile.

Cisco Intersight Managed Mode Configuration Guide


31
Configuring Server Profiles
Server Profiles

• Storage Policies—SD Card and Storage policies


• Management Policies—Device Connector, IPMI Over LAN, LDAP, Local User, Network Connectivity,
SMTP, SNMP, SSH, Serial over LAN, Syslog, NTP, Certificate Management, and Virtual KVM policies

For more information and descriptions of the policies, see the Server Policies section. For an example of the
policy creation workflow, see Creating Network Policies.
After creating Server Profiles, you can edit, clone, deploy, attach to a template, create a template, detach from
template, or unassign them as required. From the Server Profiles table view, you can select a profile to view
details in the Server Profiles Details view.
• A server profile can be used to create a template. This template can then be used to create multiple profiles
with same configurations and deployed on multiple servers.
• While template creation, if you toggle ON the Attach UCS Server Profile to Profile Template button,
the selected profile gets attached to the template under creation.

Note Create a Template and Attach to Template actions can be


performed only if a server profile is not attached to any template.

If you keep the toggle button OFF, the selected profile's properties are carried to the template but the
profile does not get attached to it.
• A server profile can be attached to an existing template. This attachment overrides the config properties
of the profile and replaces them with the template properties.
• A server profile attached to a template cannot be modified. The modifications can be done in the associated
template.
• A server profile can be detached from a template and modified as per the requirements.
• A detached server profile can always be reattached to a template.

The Server Profile List View displays the Name, Status, Target Platform, UCS Server Template, Server,
Last Update timestamp of the policy deployment to reflect the edits to the profile, attached template, or the
referenced policies.
Clicking on a profile redirects to the Server Profile Details View that displays the configuration details of
the policies attached to the profile.
The Status of the profiles can have any of the following values:
• Not Deployed—Policies are assigned but not deployed to the Server Profile.
• Not Assigned—Policies are not assigned to the Server Profile.

Cisco Intersight Managed Mode Configuration Guide


32
Configuring Server Profiles
Server Profiles

Note • Once you deploy policies to the Server Profile, the status changes
automatically from Not Assigned to the new status depending
on the outcome. You may need to Refresh your screen to view
the updated status.
• You must do the Power Cycle/Power ON after each profile
deployment.

• OK—Policies deployed successfully on the Server Profile


• In Progress—Deployment of policies to the Server Profile is in progress
• Not Deployed Changes—Indicates that current Server Profile and its referenced policies are different
from the last deployed policy configuration.
• Failed—Server Profile validation, configuration, or deployment has failed.
• Out of Sync—Indicates that the policy configuration at the endpoint is not in sync with the last deployed
policy configuration in the Server Profile. If the endpoint settings are altered manually after a Server
Profile is deployed, Intersight automatically detects the configuration changes and they will be shown
on the Server Profile as Out of Sync. For more details, see Server Profile Drift section.

Server Profile Drift


A server profile drift occurs when the policy configuration at the endpoint is not in sync with the last deployed
policy configuration in the Server Profile.
The check to look up for any configuration change at the endpoint is performed every 30 min.
To see the policy configurations that have changed at the endpoint relative to the currently deployed policy
configuration in Intersight, navigate to server profile details view and click View Changes. You can choose
to view the Changes Only or All the policy configuration details.

Property Essential Information

Saved Settings Displays the policy settings in Intersight.

Last Deployed Settings Displays the latest policy settings deployed on the
server profile.

Endpoint Settings Displays the configuration at the endpoint.

To move the Server Profile status back to OK, you can either redeploy the profile or change the values at the
endpoint. You can use the Device Connector Policy in Intersight to control configuration changes allowed
from Cisco IMC. In the Device Connector Policy, choose Configuration from Intersight only to stop allowing
configuration changes from Cisco IMC directly.
Limitations of Server Profile Drift
Configuration changes at the endpoint will not be detected for the following policies under these specific
conditions:

Cisco Intersight Managed Mode Configuration Guide


33
Configuring Server Profiles
Server Profiles

Policy Configuration at the endpoint

SD Card Policy If an SD card is removed.

Storage Policy • If Expand to Available is set for any of the virtual


drives in the policy.
• If the Power Cycle is not done after every
deployment.
• If there are additional drive groups that are not
configured from Intersight

Boot Order Policy If the Power Cycle is not done after every deployment.

Local User, SNMP, LDAP, and IPMI over LAN If there are changes to the Password at the endpoint.
Policy

Virtual Media policy If there are changes to the Password, Mount Options,
or Authentication Protocols at the endpoint.

BIOS Policy • BIOS token values which are configured as


'platform-default' will not be considered. For
more details, see Table 16 in Creating a BIOS
Policy section.
• BIOS tokens whose values depend on other BIOS
token values will not be considered. For more
details, see Cisco UCS Server BIOS Tokens.

IPMI over LAN policy 'Privilege Level’ field will not be considered.

Network Connectivity Policy ‘Preferred IPv6 DNS Server’ and ‘Alternate IPv6
DNS Server’ fields in the policy will not be
considered. Server Profile may move to Out of Sync
status temporarily.

Adapter Configuration Policy This policy will not be considered for drift calculation.

Cisco Intersight Managed Mode Configuration Guide


34
Configuring Server Profiles
Server Profiles

Policy Configuration at the endpoint

Ethernet Adapter Policy If a usNIC or VMMQ has a different Ethernet Adapter


policy, then the configuration changes will not be
calculated for usNIC or VMMQ attached Ethernet
Adapter policy.
Due to VMQ configuration restrictions, VMQ Number
of Interrupts will override the value of Interrupts in
Ethernet Adapter Policy, and VMQ Number of Virtual
Machine Queues will override the value of Receive
Queue Count, Transmit Queue Count, and Completion
Queue Count (Receive+Transmit) of Ethernet Adapter
Policy. Drift will not be detected for Number of
Interrupts, Number of Virtual Machine Queues,
Receive Queue Count, Transmit Queue Count, and
Completion Queue Count.
Intersight does not detect drift for `Number of
Interrupts', 'Number of Virtual Machine Queues',
'Receive Queue Count', 'Transmit Queue Count', and
'Completion Queue Count'.

LAN Connectivity Policy ‘CDN’ field will not be considered.

IMC Access Policy If both In-Band IPv6 and IPv4 configurations are
available, the IPv6 DNS configuration is prioritized.

Server Profile Import


Intersight provides the capability to import configuration details of C-series servers in standalone mode and
FI-attached servers in Intersight Managed Mode (IMM), directly from Cisco IMC. The Server Profile import
enables you to migrate the configuration of your existing servers to Intersight without having to create a profile
and the policies manually. The Server Profile import operation creates a profile and the associated policies
based on the server configuration. You can create a golden configuration profile and clone it and apply to
another server already claimed in Intersight.
You can import a server profile configuration from the following locations in Intersight:
• Servers table view—Select a Cisco UCS C-Series Standalone server or any FI-attached server in Intersight
Managed Mode (IMM) from the table view and click the ellipses (…) and select Import Server Profile.
• Click a C-series server in standalone mode or any FI-attached server in Intersight Managed Mode (IMM)
in the Servers table view to access the Server details page. Click Actions on the top-right corner and
select Import Server Profile. This option is enabled only when no server profile is associated with the
server.

Note A partially imported server profile cannot be attached to a template or cannot be used for creating a template.

For more information on how to import a Server Profile Import and about the detection of manual configuration
changes at the endpoint, see Importing a Server Profile in Resources.

Cisco Intersight Managed Mode Configuration Guide


35
Configuring Server Profiles
Creating a UCS Server Profile

Creating a UCS Server Profile


A server profile defines a server and its compute, storage, management, and network characteristics. When a
server profile is deployed to a server, Cisco Intersight automatically configures the server and its connections
to match the configuration specified in the server profile.

Note A Server profile can also be derived from Server Profile Templates. For more details, see Server Profile
Templates

Step 1 Log in to Cisco Intersight with your Cisco ID and select admin role.
Step 2 Navigate to Service Profiles > UCS Server Profiles tab, and click Create UCS Server Profile.
Step 3 On the General page, enter the following information:
a) Name of your server profile.
b) Target Platform for which the profile is applicable. This can be Standalone servers or FI Attached servers.
A UCS server profile created for Standalone servers cannot be deployed on FI Attached servers. Similarly, a UCS
server profile created for FI Attached servers cannot be deployed on Standalone servers.
c) (Optional) Tag for the profile. Tags must be in the key:value format. For example, Org: IT or Site: APJ.
d) (Optional) Description to help identify the profile.
Step 4 On the Server Assignment page, assign a server to the server profile. You can choose any of the following options for
the server assignment:
• Assign Now—Use this option for an immediate assignation of a server to the server profile.
• Assign Server from a Resource Pool—Use this option to assign a server from a resource pool to the server
profile.
• Assign Later—Use this option to assign a server to the server profile at a later time.

The server assignment table displays list of servers or resource pools and their details. You can use any of the following
options:
• Show All to view all the servers or resource pool currently present
• Show Selected to view the current server or resource pool selected
• Unselect to remove the selection.

Step 5 Click Next.


Step 6 On the Compute Configuration page, do the following:
a) Choose the appropriate UUID Assignment:
• Pool—Allows UUID Pool association to the server.
• Static—Allows UUID association to the server using Static UUID address.

b) Select the existing policies or create new policies.

Cisco Intersight Managed Mode Configuration Guide


36
Configuring Server Profiles
UCS Server Profile Details

c) Click Next.
Step 7 On the Management page, attach the required policies to the UCS Server Profile and click Next.
Step 8 On the Storage page, attach the required policies to the UCS Server Profile and click Next.
Step 9 On the Network Configuration page, attach the required policies to the UCS Server Profile and click Next.
Step 10 On the Summary page, verify the details of the UCS Server Profile and the policies attached to it.
Step 11 Click Deploy to create the UCS Server Profile and deploy it to the assigned server.
Note • For the Assign Server from a Resource Pool assignment type, if a resource is not available in the
resource pool, the status of the Server Profile changes to Waiting for Resources . When a server is
added to the resource pool at a later time, the server gets automatically added to the server profile from
the Waiting for Resources status.
• Resource pool does not support dynamic selection of server. You can manually assign servers to a
resource pool and can continue with the automated server profile assignment.
• For more information on creating a resource pool and viewing the resource pool details, see Resource
Pools.
• For more information on creating a UUID pool and viewing the UUID pool details, see UUID Pools.

UCS Server Profile Details


The UCS Server Profile Details page displays details of the UCS Server profile and the server that it is assigned
to. Navigate to the UCS Server Details from the UCS Server Profiles Table view. On this page, you can:
• Perform UCS Server profile Actions:
• Deploy—Deploy the UCS Server profile on a Fabric Interconnect pair.

Note This action can be performed on a server profile that has servers
assigned to it.

• Unassign—Unassign the UCS Server profile from the Fabric Interconnect pair.

Note This action can be performed on a server profile that has servers
assigned to it.

• Edit—Edit the properties of the UCS Server Profile.


• Clone—Clone the UCS Server profile with properties similar to an existing UCS Server profile.
The clones are associated with the same policies as on the original UCS Server profile.
• Delete—Delete the server profile.
• Attach to template—Attach the server profile to an existing server profile template.

Cisco Intersight Managed Mode Configuration Guide


37
Configuring Server Profiles
UCS Server Profile Details

Note This action can be performed on a server profile that is not


attached to any template.

• Create a template—Create a new template using the properties of the server profile.

Note This action can be performed on a server profile that is not


attached to any template.

• Detach from template—Detach the server profile from a template and modify its properties.

Note This action can be performed on a server profile that is attached


to a server profile template.

• Manage Tags— Set a tag for a profile in the key:value format.

• View UCS Server profile Details in the General tab:

Property Essential Information

Status The status of deploying the UCS Server profile on


a Fabric Interconnect pair. This could be:
• OK
• Failed
• Not Assigned
• Not Deployed

Name The UCS Server profile name.

Server The name of the associated server.

Last Update The date and time that the UCS Server profile was
last updated.

Tags The existing tags for the selected object are


displayed by default. Click Manage to add new
tags or modify the existing ones.

Displays the policies associated with the server profile. Click on the policy name to view details of the
associated policy.
If you make changes to a policy attached to a Server Profile after it is deployed, or add a new policy to
the profile, the Server Profile Table view displays Not Deployed Changes to reflect the edits to the profile
or the referenced policies. The Server Profile Detail view highlights the referenced policies, and the View

Cisco Intersight Managed Mode Configuration Guide


38
Configuring Server Profiles
UCS Server Profile Details

Changes window allows you to view the actual changes. You can also view the Configuration details
from the Service Profiles table view.
• View the assigned server and its properties in the Server tab.
• View the inventory of the assigned server in the Inventory tab.

Cisco Intersight Managed Mode Configuration Guide


39
Configuring Server Profiles
UCS Server Profile Details

Cisco Intersight Managed Mode Configuration Guide


40
CHAPTER 7
Configuring UCS Chassis Profiles
• About UCS Chassis Profile, on page 41
• Creating a Chassis Profile, on page 42
• UCS Chassis Profile Details, on page 42

About UCS Chassis Profile


Overview of a UCS Chassis Profile
A UCS Chassis profile enables to create and associate chassis policy to an Intersight Managed Mode (IMM)
claimed chassis. When a chassis profile is associated to a chassis, Cisco Intersight automatically configures
the chassis to match the configuration specified in the policies of the chassis profile. The chassis-related
policies can be attached to the profile either at the time of creation or later.

Cisco Intersight Managed Mode Configuration Guide


41
Configuring UCS Chassis Profiles
Creating a Chassis Profile

Important • The chassis profile feature is available in Cisco Intersight only if:
• You have installed the Cisco Intersight Essentials License.
• You are either an Account Administrator or Server Administrator.

• Policies that are attached to a chassis profile can be created ahead of creating a profile or during the
creation of the profile.
• If chassis polices are changed after deployment, the chassis profile will be set in Pending Changes state
and you must manually re-associate the changed policies to chassis.
• Chassis policies will be applied to both the input/output modules (IOMs) in a chassis. The chassis policies
association workflow will get failed even if the policy cannot be applied to one of the IOMs.

Creating a Chassis Profile


A Chassis Profile configures a chassis through reusable policies.

Step 1 Log in to Cisco Intersight with your Cisco ID and select admin role.
Step 2 Navigate to Profiles > Chassis Profiles tab and click Create UCS Chassis Profile.
Step 3 On the General page, select the organization and enter a name for your profile. Optionally, include a short description
and tag information to help identify the profile. Tags must be in the key:value format. For example, Org: IT or Site: APJ.
Step 4 On the Chassis Assignment page, assign a chassis to the Chassis Profile. You can also click Assign Later and assign
a chassis to the chassis profile later.
Step 5 Click Next.
Step 6 On the Chassis Configuration page, attach the required policies and click Next.
Step 7 On the Summary page, verify the details of the UCS Chassis Profile and the policies attached to it.
Step 8 Click Deploy to deploy the UCS Chassis Profile to the assigned Fabric Interconnect.

UCS Chassis Profile Details


On the UCS Chassis Profile Details page, you can:
• Perform chassis profile Actions:
• Deploy—Deploy the chassis profile on a Fabric Interconnect pair.
• Edit—Edit the properties of the chassis profile.
• Unassign Chassis—Unassign the chassis profile from the Fabric Interconnect pair.

• View the UCS Chassis profile Details:

Cisco Intersight Managed Mode Configuration Guide


42
Configuring UCS Chassis Profiles
UCS Chassis Profile Details

• Status—The status of deploying the Chassis profile on a Fabric Interconnect pair, such as:
• OK
• Not Assigned
• Not Deployed
• Failed
• Not Deployed Changes

• Name—The chasis profile name.


• Chassis—The chassis details.
• Last Update—The date and time that the chassis profile was last updated.
• Description—The description of the chassis profile.
• Organization—The selected organization is displayed. Click default to set a default organization.
• Tags—The existing tags for the selected object are displayed by default. Click Set to add new tags
or modify the existing ones.

• View the Policies that are attached to the chassis profile.

Cisco Intersight Managed Mode Configuration Guide


43
Configuring UCS Chassis Profiles
UCS Chassis Profile Details

Cisco Intersight Managed Mode Configuration Guide


44
CHAPTER 8
Configuring UCS Domain Policies
• Domain Policies, on page 45
• Creating a Port Policy, on page 48
• Creating an Ethernet Network Group Policy, on page 53
• Creating an Ethernet Network Control Policy, on page 54
• Creating a VLAN Configuration Policy, on page 55
• Creating a VSAN Configuration Policy, on page 56
• Creating an NTP Policy, on page 58
• Creating a Network Connectivity Policy, on page 58
• Creating an SNMP Policy, on page 60
• Creating a System QoS Policy, on page 62
• Creating a Syslog Policy, on page 63
• Creating a Switch Control Policy, on page 65
• Creating a Flow Control Policy, on page 67
• Creating a Link Aggregation Policy, on page 68
• Creating a Link Control Policy, on page 69
• Creating a Multicast Policy, on page 70

Domain Policies
Domain policies in Cisco Intersight allow you to configure various parameters for UCS Fabric Interconnects,
including port configuration, network control settings, and VLAN and VSAN settings. A domain policy can
be assigned to any number of domain profiles to provide a configuration baseline. Domain policies in Cisco
Intersight are a new feature, and native to the application. Policy-based configuration with Domain Profiles
is a Cisco Intersight Essentials feature, and is supported on Cisco UCS B and C-Series M5 and M6 servers,
and Cisco UCS X-Series M6 servers that are in a UCS Domain.
The Domain Policy creation wizard in Cisco Intersight has two pages:
• General—The general page allows you to select the organization and enter a name for your policy.
Optionally, include a short description and tag information to help identify the policy. Tags must be in
the key:value format. For example, Org:IT or Site APJ
• Policy Details—The policy details page has properties that are applicable to UCS Domain Policies.

The following list describes the domain policies that you can configure in Cisco Intersight.

Cisco Intersight Managed Mode Configuration Guide


45
Configuring UCS Domain Policies
Domain Policies

• Port Policy—Configures the ports and port roles for the Fabric Interconnect. Each Fabric Interconnect
has a set of ports in a fixed port module that you can configure. You can enable or disable a port or a
port channel.
The port policy is associated with a switch model. The network configuration limits also vary with the
switch model.
The maximum number of ports and port channels supported are:
• Ethernet Uplink, Fibre Channel over Ethernet (FCoE) Uplink port channels, and Appliance port
channels (combined)—12
• Ethernet Uplink ports per port channel—16
• FCoE Uplink ports per port channel—16
• Ethernet Uplink and FCoE Uplink ports (combined)—31
• Server ports—54 ports for Cisco UCS 6454 and 108 ports for Cisco UCS 64108 Fabric Interconnects

• Ethernet Network Control Policy—Configures the network control settings for appliance ports, port
channels, or vNICS.
• Ethernet Network Group Policy—Configures the allowed VLANs and native VLAN for appliance
ports, port channels or vNICs.
• VLAN Configuration Policy—Creates a connection to a specific external LAN.
• VSAN Configuration Policy—Partitions the Fibre Channel fabric into one or more zones. Each zone
defines the set of Fibre Channel initiators and Fibre Channel targets that can communicate with each
other in a VSAN.
• NTP Policy—Enables the NTP service to configure a UCS system that is managed by Cisco Intersight
to synchronize the time with an NTP server. You must enable and configure the NTP service by specifying
the IP/DNS address of at least one server or a maximum of four servers that function as NTP servers.
When you enable the NTP service, Cisco Intersight configures the NTP details on the endpoint. For more
information, see Creating an NTP policy.
• Network Connectivity Policy—Specifies the DNS Domain settings that are used to add or update the
resource records on the DNS server from the endpoints, and the DNS server settings for IPv4 and IPv6
on an endpoint.
• System QoS Policy (Preview)—Implements network traffic prioritization based on the importance of
the connected network by assigning system classes for individual vNICs. Intersight uses Data Center
Ethernet (DCE) to handle all traffic inside a Cisco UCS domain. This industry standard enhancement to
Ethernet divides the bandwidth of the Ethernet pipe into eight virtual lanes. Two virtual lanes are reserved
for internal system and management traffic. You can configure quality of service (QoS) for the other six
virtual lanes. System classes determine how the DCE bandwidth in these six virtual lanes is allocated
across the entire Cisco UCS domain.
Each system class reserves a specific segment of the bandwidth for a specific type of traffic, which
provides a level of traffic management, even in an oversubscribed system. For example, you can configure
the Fibre Channel Priority system class to determine the percentage of DCE bandwidth allocated to
FCoE traffic. The configuration setup validates each input on the system class to prevent duplicate or
invalid entries.

Cisco Intersight Managed Mode Configuration Guide


46
Configuring UCS Domain Policies
Domain Policies

This feature is in preview and is not meant for use in your production environment. Cisco recommends
that you use this feature on a test network or system.
The following list describes the system classes that you can configure.
• Platinum, Gold, Silver, and Bronze—A configurable set of system classes that you can include in
the QoS policy for a service profile. Each system class manages one lane of traffic. All properties
of these system classes are available for you to assign custom settings and policies.
• Best Effort—A system class that sets the quality of service for the lane reserved for basic Ethernet
traffic. Some properties of this system class are preset and cannot be modified. For example, this
class has a drop policy that allows it to drop data packets if required. You cannot disable this system
class.
• Fibre Channel—A system class that sets the quality of service for the lane reserved for Fibre Channel
over Ethernet traffic. Some properties of this system class are preset and cannot be modified. For
example, this class has a no-drop policy that ensures it never drops data packets. You cannot disable
this system class.

• Multicast Policy (Preview)—Configures Internet Group Management Protocol (IGMP) snooping and
IGMP querier. IGMP Snooping dynamically determines hosts in a VLAN that should be included in
multicast transmissions.
You can create, modify, and delete a multicast policy that can be associated to one or more VLANs.
When a multicast policy is modified, all VLANs associated with that multicast policy are re-processed
to apply the changes. By default, IGMP snooping is enabled and IGMP querier is disabled. On enabling
IGMP querier, you can configure the IPv4 addresses for the local and peer IGMP snooping querier
interfaces.
• Simple Network Management Protocol (SNMP) Policy—Configures the SNMP settings for sending
fault and alert information by SNMP traps from the managed devices. Any existing SNMP Users or
SNMP Traps configured previously on the managed devices are removed and replaced with users or
traps that you configure in this policy.
• Syslog Policy—Enables to configure the local logging and remote logging (minimum severity) for an
endpoint. This policy also provides configuration support to store the syslog messages in the local file
and the remote syslog server.
• Switch Control Policy (Preview)—Enables to configure and manage multiple network operations on
the Fabric Interconnects (FI) that include:
• Port Count Optimization—If the VLAN port count optimization is enabled, the Virtual Port (VP)
groups are configured on the Fabric Interconnect (FI) and if VLAN port count optimization is
disabled, the configured VP groups are removed from the FI.
• MAC Aging Time—Allows to set the MAC aging time for the MAC address table entries. The
MAC aging time specifies the time before a MAC entry expires and discards the entry from the
MAC address table.
• Link Control Global Settings—Enables configurations of message interval time in seconds and
allows to reset the recovery action of an error-disabled port.

• Flow Control Policy—Enables configurations for Priority Flow Control for ports and port channels.
• Link Control Policy—Enables configurations of Link Control administrative state and configuration
(normal or aggressive) mode for ports.

Cisco Intersight Managed Mode Configuration Guide


47
Configuring UCS Domain Policies
Creating a Port Policy

• Link Aggregation Policy— Enables to configure Link Aggregation properties. Link Aggregation
combines multiple network connections in parallel to increase throughput and to provide redundancy.

Creating a Port Policy


The port policy is used for configuring the port parameters such as unified ports that carry Ethernet or Fibre
Channel traffic, port roles and speed.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Switch Model Select any one of the following two switch models:
• Cisco UCS 64108 Fabric Interconnect
• Cisco UCS 6454 Fabric Interconnect
Note The switch models provide different
network configuration capabilities
to the policy. The switch model
cannot be changed once the policy
is created.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Unified Ports
By default, all the unconfigured ports are Ethernet ports. Use the blue slider to select and configure the
ports. The selected ports are highlighted in blue.

Fibre Channel (FC) Displays the port range selected for Fibre Channel.

Ethernet Displays the port range selected for Ethernet.

Port Roles
To configure, click on the ports within the switch. For multiple ports, hold the Shift key and the selected
ports display in blue and the port numbers appear under Selected Ports above the switch image.

Selected Ports Indicates the port number(s) selected.

Name The user determined port name.

Cisco Intersight Managed Mode Configuration Guide


48
Configuring UCS Domain Policies
Creating a Port Policy

Property Essential Information

Type The type can be Ethernet or FC.

Role Select the port role type:


The roles for an Ethernet port are:
• Unconfigured—Default
• Server—All server traffic travels through the
input or output (I/O) module to server ports on
the fabric interconnect.
Note The maximum number of server
ports allowed is 54 for Cisco UCS
6454 Fabric Interconnect and 108
for Cisco UCS 64108 Fabric
Interconnect.

• Ethernet Uplink—Ethernet traffic passes


through the unified uplink port
Note The maximum number of combined
Ethernet Uplink ports and FCoE
Uplink ports allowed is 31.

• Appliance—Allows the Network File System


to connect directly with the Fabric
Interconnects, without traffic having to pass
through the uplink ports.

The roles for an FC port are:


• FC Uplink —FC traffic passes through the FC
uplink port. To specify the role of an FC port
as an FC Uplink port the VSAN scope of the
port must have been created as Storage and
Uplink, or as Uplink in the VSAN Cofiguration
policy.
• FC Storage
—FC port acts as a storage port. To specify
the role of an FC port as an FC Storage port
the VSAN scope of the port must have been
created as Storage and Uplink, or as Storage
in the VSAN Cofiguration policy. Moreover,
the FC has to be in the switching mode.
• Unconfigured—Unconfigured is the default
role of the port.

Cisco Intersight Managed Mode Configuration Guide


49
Configuring UCS Domain Policies
Creating a Port Policy

Property Essential Information

Admin Speed The administrative port speed. The options are:


• 1GBPS
• 10GBPS
• 25GBPS
• 40GBPS
• 100GBPS

VSAN ID The VSAN ID of an FC port as specified in the


VSAN Configuration policy.

FEC The forward error correction configuration for the


port:
• Auto
• Cl91—Supported with 25GBPS and 100GBPS
Admin speed
• Cl74—Supported with 25GBPS Admin speed

Priority Select the priority of the port for routing traffic and
ensuring QoS.

Mode Select the port mode. Port mode can be Trunk or


Access.

Ethernet Network Group Select the Ethernet Network Group policy that is to
be attached to the ethernet uplink or appliance port.
The Ethernet Network Group policy specifies the
Allowed VLANs and the Native VLAN.
Note Ethernet Network Group policy applies
only for ports with ethernet uplink and
appliance roles.

Note To create Ethernet Network Groups for


configuring Disjoint VLANs, ensure that
the groups are completely disjoint.
Partial overlap of VLANs is not allowed.

Cisco Intersight Managed Mode Configuration Guide


50
Configuring UCS Domain Policies
Creating a Port Policy

Property Essential Information

Ethernet Network Control Select the Ethernet Network Control policy that is
to be attached to the appliance port. The Ethernet
Network Control policy allows you to enable or
disable CDP, specify the MAC Register Mode, the
action to be taken on uplink fail, the MAC security
details and LLDP details.
Note Ethernet Network Control policy applies
only for a port with an appliance role.

Port Select the valid port range:


• Port 1-96—Auto, 10GBPS, and 25GBPS
• Port 89-96—Auto, 1GBPS, 10GBPS, and
25GBPS
• Port 97-108—Auto, 40GBPS, and 100GBPS

Port Channels
Select the ports for configuration either by clicking on the ports within the graphic image or in the box
next to the desired port within the table.

Role The port channel role type. The role type can be:
• Ethernet Uplink Port Channel
• FC Uplink Port Channel
• FCoE Uplink Port Channel
• Appliance Port Channel

Note The maximum number allowed for:


• Ethernet Uplink Port Channel,
FCoE Uplink Port Channel, and
Appliance Port Channel (combined)
is 12
• Ethernet ports per port channel is
16
• FCoE Uplink ports per port channel
is 16

PC ID Unique Identifier of the port channel, local to this


switch.

Cisco Intersight Managed Mode Configuration Guide


51
Configuring UCS Domain Policies
Creating a Port Policy

Property Essential Information

Admin Speed The administrative port channel speed options for


Uplink, Uplink Port Channel, and FCoE Uplink Port
Channel are:
• 1GBPS
• 10GBPS
• 25GBPS
• 40GBPS
• 100GBPS

The administrative port channel speed options for


FC Uplink and FC Uplink Port Channel are:
• 8GBPS
• 16GBPS
• 32GBPS

Priority Select the priority of the port channel for routing


traffic and ensuring QoS.

Mode Select the port channel mode. Port channel mode


can be Trunk or Access.

Ethernet Network Group Select the Ethernet Network Group policy that is to
be attached to the ethernet uplink or appliance port
channel. The Ethernet Network Group policy
specifies the Allowed VLANs and the Native
VLAN.
Note Ethernet Network Group policy applies
to port channels with ethernet uplink and
appliance roles.

Note To create Ethernet Network Groups for


configuring Disjoint VLANs, ensure that
the groups are completely disjoint.
Partial overlap of VLANs is not allowed.

Cisco Intersight Managed Mode Configuration Guide


52
Configuring UCS Domain Policies
Creating an Ethernet Network Group Policy

Property Essential Information

Ethernet Network Control Select the Ethernet Network Control policy that is
to be attached to the appliance port channel. The
Ethernet Network Control policy allows you to
enable or disable CDP, specify the MAC Register
Mode, the action to be taken on uplink fail, the
MAC security details and LLDP details.
Note Ethernet Network Control policy applies
only for a port channel with an appliance
role.

Port Channel Select the valid port channel range between 1 and
256.

3. Click Create.

Creating an Ethernet Network Group Policy


Ethernet Network Group policies configure the Allowed VLANs and Native VLAN settings for the UCS
Domain.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Set Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

Description (Optional) Provide a short description

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Allowed VLANs IDs of the allowed VLANs for the interface. Enter
the VLAN IDs, or VLAN ranges as a
comma-separated list. For example, 1-10, 15.

Native VLAN Enter the native VLAN ID of the virtual interface,


or the corresponding vethernet on the peer Fabric
Interconnect to which the virtual interface is
connected. Setting the ID to 0 will not associate any
native VLAN to the traffic on the virtual interface..

3. Click Create.

Cisco Intersight Managed Mode Configuration Guide


53
Configuring UCS Domain Policies
Creating an Ethernet Network Control Policy

Creating an Ethernet Network Control Policy


Ethernet Network Control policies configure the network control settings for the UCS Domain.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Enable CDP Enables the Cisco Discovery Protocol (CDP) on an


interface.

MAC Register Mode Determines the MAC addresses to be registered


with the switch. This can be:
• Only Native VLAN—MAC addresses are only
added to the native VLAN. This option is the
default, and it maximizes the port+VLAN
count.
• All Host VLANs—MAC addresses are added
to all VLANs with which they are associated.
Select this option if your VLANs are
configured to use trunking but are not running
in Promiscuous mode.

Action on Uplink Fail Determines how the interface behaves if no uplink


port is available when the switch is in end-host
mode.
• Link Down—Changes the operational state of
a vNIC to down when uplink connectivity is
lost on the switch, and enables fabric failover
for vNICs. This is the default option.
• Warning—Maintains server-to-server
connectivity even when no uplink port is
available, and disables fabric failover when
uplink connectivity is lost on the switch.

Cisco Intersight Managed Mode Configuration Guide


54
Configuring UCS Domain Policies
Creating a VLAN Configuration Policy

Property Essential Information

MAC Security Determines whether forged MAC addresses are


allowed or denied when packets are sent from the
Forge
server to the switch. This can be:
• Allow— All server packets are accepted by
the switch, regardless of the MAC address
associated with the packets. This is the default
option.
• Deny— After the first packet has been sent to
the switch, all other packets must use the same
MAC address or they will be silently rejected
by the switch. In effect, this option enables
port security for the associated vNIC.

LLDP Determines whether interfaces can transmit or


receive LLDP packets.
• To enable or disable the transmission of LLDP
packets on an interface, click Enable
Transmit.
• To enable or disable the receipt of LLDP
packets on an interface, click Enable Receive.

3. Click Create.

Creating a VLAN Configuration Policy


VLAN policies create a connection to a specific external LAN. The VLAN isolates traffic to that external
LAN, including broadcast traffic.

Note Ensure that each VLAN is associated with a multicast policy. You can edit the existing VLANs and associate
them to a multicast policy.

1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

Cisco Intersight Managed Mode Configuration Guide


55
Configuring UCS Domain Policies
Creating a VSAN Configuration Policy

2. On the Policy Details page, click Add VLAN and configure the following policy details:

Note The maximum number of VLANs allowed per Ethernet Network Policy is 3000.

Property Essential Information

Name/Prefix For a single VLAN, this is the VLAN name. For a


range of VLANs, this is the prefix that the system
uses for each VLAN name.

VLAN IDs Enter the VLAN ID number or a number range. For


example, you can enter 2000 to 2100, or
alternatively enter 100 to 200.
The name that you assign to a VLAN ID adds a
layer of abstraction that allows you to globally
update all servers associated with service profiles
that use the named VLAN.

Auto Allow on Uplinks Used to determine whether this VLAN will be


allowed on all uplink ports and port channels in this
Fabric Interconnect.
Enable to allow this VLAN on uplink ports and
port channels.
Disable to configure disjoint VLANs.

Mulicast Policy Click Select Policy and choose a multicast policy


that needs to be associated with VLAN.
Click Create New to create a new multicast policy
that will be available to all VLANs.

3. Click Add.

Creating a VSAN Configuration Policy


Virtual San Identifier (VSAN) policy configuration allows you to partition the Fibre Channel fabric into one
or more zones. Each zone defines the set of Fibre Channel initiators and Fibre Channel targets that can
communicate with each other in a VSAN. Zoning also enables you to set up access control between hosts and
storage devices or user groups.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Cisco Intersight Managed Mode Configuration Guide


56
Configuring UCS Domain Policies
Creating a VSAN Configuration Policy

Property Essential Information

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, do the following:


• Click Trunking Mode to enable or disable Fibre Channel uplink trunking.
If you enable trunking for the named VSANs on a Fabric Interconnect, all named VSANs in the
Cisco UCS domain are allowed on all Fibre Channel uplink ports on that Fabric Interconnect. If you
configure Fabric Interconnects for Fibre Channel end-host mode, enabling Fibre Channel uplink
trunking renders all VSANs with an ID in the range from 3840 to 4079 non-operational.
• Click Add VSAN and configure the following policy details:

Property Essential Information

Name The user-defined name given to the VSAN


configuration.

VSAN Scope The scope of the VSAN. Indicate if the VSAN is


a storage and uplink VSAN, a storage VSAN, or
an uplink VSAN
VSAN Scope can be:
• Storage and Uplink
• Storage
• Uplink

VSAN ID The unique identifier for the VSAN on the switch.


The VSAN ID can be between 1 and 4093

FCoE VLAN ID The unique identifier assigned to the VLAN used


for Fibre Channel connections.
IDs of FCOE VLANs associated with the VSAN
configuration must be between 2 and 4093.
VLAN IDs from 3915-4042, 4043-4047, 4094,
and 4095 are reserved for system use.

FC Zoning If enabled, zoning allows you to set up access


control between hosts and storage devices or user
groups.
Note FC Zoning is currently not supported.

3. Click Create.

Cisco Intersight Managed Mode Configuration Guide


57
Configuring UCS Domain Policies
Creating an NTP Policy

Creating an NTP Policy


The NTP policy enables the NTP service to configure a UCS system that is managed by Cisco Intersight to
synchronize the time with an NTP server. You must enable and configure the NTP service by specifying the
IP/DNS address of at least one server or a maximum of four servers that function as NTP servers. When you
enable the NTP service, Cisco Intersight configures the NTP details on the endpoint.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Enable NTP Enables NTP policy configuration.

NTP Servers A collection of NTP Server IP addresses or


hostnames.

Time Zone A collection of time zones from which you can


select a time zone for the endpoint.
This property is applicable to switches and to Cisco
IMC (standalone) servers.

When a hostname is used for NTP configuration, DNS server information must be configured in the
Network Connectivity policy.
3. Click Create.

Creating a Network Connectivity Policy


The Network Connectivity policy enables you to configure and assign IPv4 and IPv6 addresses.
Dynamic DNS
Dynamic DNS (DDNS) is used to add or update the resource records on the DNS server. When you enable
the DDNS option, the DDNS service records the current hostname, Domain name, and the management IP
address and updates the resource records in the DNS server.
1. On the General page, configure the following parameters:

Cisco Intersight Managed Mode Configuration Guide


58
Configuring UCS Domain Policies
Creating a Network Connectivity Policy

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following properties:


Common Properties

Property Essential Information

Enable Dynamic DNS Enables Dynamic DNS.


This property is not applicable to Fabric
Interconnects.

Dynamic DNS Update Domain Specify the dynamic DNS Domain. The Domain
can be either a main Domain or a sub-Domain.
This property is not applicable to Fabric
Interconnects.

IPv4 Properties

Property Essential Information

Obtain IPv4 DNS Server Addresses from DHCP Whether the IPv4 addresses are obtained from
Dynamic Host Configuration Protocol (DHCP) or
from a specifically configured set of DNS servers.
• Enabled—Intersight uses DHCP
• Disabled—Intersight uses a configured set of
IPv4 DNS servers.

This property is not applicable to Fabric


Interconnects.

Preferred IPv4 DNS Server The IP address of the primary DNS server. This
property is displayed only when Obtain IPv4 DNS
Server Addresses from DHCP is disabled.

Alternate IPv4 DNS Server The IP address of the secondary DNS server. This
property is displayed only when Obtain IPv4 DNS
Server Addresses from DHCP is disabled.

Cisco Intersight Managed Mode Configuration Guide


59
Configuring UCS Domain Policies
Creating an SNMP Policy

Property Essential Information

Enable IPv6 Whether IPv6 is enabled. You can configure IPv6


properties only if this property is enabled.

IPv6 Properties

Property Essential Information

Obtain IPv6 DNS Server Addresses from DHCP Whether the IPv6 addresses are obtained from
Dynamic Host Configuration Protocol (DHCP) or
from a specifically configured set of DNS servers.
• Enabled—Intersight uses DHCP
• Disabled—Intersight uses a configured set of
IPv6 DNS servers.

This property is not applicable to Fabric


Interconnects.

Preferred IPv6 DNS Server The IP address of the primary DNS server. This
property is displayed only when Obtain IPv6 DNS
Server Addresses from DHCP is disabled.

Alternate IPv6 DNS Server The IP address of the secondary DNS server. This
property is displayed only when Obtain IPv6 DNS
Server Addresses from DHCP is disabled.

3. Click Create.

Creating an SNMP Policy


The SNMP policy configures the SNMP settings for sending fault and alert information by SNMP traps from
the managed devices. This policy supports SNMP versions such as SNMPv1, SNMPv2(includes v2c), and
SNMPv3. Any existing SNMP Users or SNMP Traps configured previously on the managed devices are
removed and replaced with users or traps that you configure in this policy.
Using the SNMP Policy you can enable or disable SNMP, specify the access and community strings, and
provide the SNMP user details that is used to retrieve data.
1. In the General page, configure the following parameters:

Property Essential Information

Organization Select the organization.

Name Enter a name for your policy.

Tag (optional) Enter a tag in the key value format. For example,
Org: IT or Site: APJ.

Description (optional) Enter a short description.

Cisco Intersight Managed Mode Configuration Guide


60
Configuring UCS Domain Policies
Creating an SNMP Policy

2. In the Policy Details page, configure the following parameters:

Property Essential Information

Enable SNMP Displays the state of the SNMP Policy on the


endpoint. Enable this option for the endpoint to send
SNMP traps to the designated host.

Access Community String Enter the SNMPv1, SNMPv2 community string or


the SNMPv3 username. This field allows maximum
of 18 characters.

Trap Community String Enter the SNMP community group name used for
sending SNMP trap to other devices.
Note This field is applicable only for
SNMPv2c trap host or destination.

System Contact The contact person responsible for the SNMP


implementation. Enter a string up to 64 characters,
such as an email address or a name and telephone
number.

System Location The location of host on which the SNMP agent


(server) runs.

SNMP Users

Name Enter the SNMP username. This field must have a


minimum of 1 and a maximum of 31 characters.

Security Level Select the security mechanism for communication


between the agent and the manager that include:
• AuthPriv
• AuthNoPriv

Auth Type Select SHA as the authorization protocol for


authenticating the user.
Note The MD5 authorization protocol is not
supported.

Auth Password Enter the authorization password for the user.

Auth Password Confirmation Enter the authorization password confirmation for


the user.

Privacy Type Select AES as the privacy protocol for the user.
Note The DES privacy type is deprecated to
meet security standards.

Privacy Password Enter the privacy password for the user.

Cisco Intersight Managed Mode Configuration Guide


61
Configuring UCS Domain Policies
Creating a System QoS Policy

Property Essential Information

Privacy Password Confirmation Enter the privacy password confirmation for the
user.

SNMP Trap Destinations

Enable Enable this option to use the SNMP policy.

SNMP Version Select V2 or V3 as the SNMP version for the trap.

User Select the SNMP user for the trap. You can define
maximum of 15 trap users.
Note This field is applicable only to SNMPv3.

Trap Type Select the trap type to receive a notification when


a trap is received at the destination:
• Trap
• Inform

Destination Address Provide the address to which the SNMP trap


information can be sent. You are allowed to define
maximum of 10 trap destinations.

Port Enter the port number for the server to communicate


with trap destination. The range is from 1 to 65535.
The default is 162.

3. Click Create.

Creating a System QoS Policy


A System Quality of Service (QoS) policy assigns a system class to the outgoing traffic. This system class
determines the quality of service for the outgoing traffic.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Cisco Intersight Managed Mode Configuration Guide


62
Configuring UCS Domain Policies
Creating a Syslog Policy

Property Essential Information

Platinum This option enables you to configure the associated


QoS class on the fabric interconnect and assign the
Gold
class to a QoS policy.
Silver
Note The Best Effort or Fibre Channel
Bronze system classes are enabled by default.

CoS Set the class of service (CoS) by entering an integer


value between 0 and 6, with 0 being the lowest
priority and 6 being the highest priority. Set the
value to 0 only when you require the system class
to be the default system class for traffic if the QoS
policy is deleted or the assigned system class is
disabled.

Weight An integer between 1 and 10. If you enter an integer,


Cisco UCS determines the percentage of network
bandwidth assigned to the priority level as described
in the Weight field.

Allow Packet Drops You can select to allow the packet drop for this
system class during transmission.
This field is always selected for the Best Effort
class, which allows dropped packets, and always
not selected for the Fibre Channel class, which
never allows dropped packets.

MTU The maximum transmission unit (MTU) for the


channel. You can enter an integer between 1500
and 9216. This value corresponds to the maximum
packet size.

3. Click Create.

Creating a Syslog Policy


The Syslog policy defines the minimum severity as logging level from an endpoint. The policy also defines
the target destination to store the Syslog messages, and the Hostname or the IP Address, the port information,
and the communication protocol for the Remote Logging Servers.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Cisco Intersight Managed Mode Configuration Guide


63
Configuring UCS Domain Policies
Creating a Syslog Policy

Property Essential Information

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Local Logging

Minimum Severity to Report Select the lowest severity level to report in the
remote log. The severity levels are:
• Warning
• Emergency
• Alert
• Critical
• Error
• Notice
• Informational
• Debug

Remote Logging - Syslog Server 1 and Syslog Server 2

Enable Select this option to enable or disable the Syslog


policy.

Hostname/IP Address Enter the hostname or IP address of the Syslog


server to store the Cisco IMC log. You can set an
IPv4 or IPv6 address or a domain name as the
remote system address.
Note If you have both IPv4 and IPv6 as the
remote logging addresses, ensure to
configure IPv4 and IPv6 in the Fabric
Interconnect through the command-line
interface (CLI).

Cisco Intersight Managed Mode Configuration Guide


64
Configuring UCS Domain Policies
Creating a Switch Control Policy

Property Essential Information

Minimum Severity To Report Select the lowest severity level to report in the
remote log. The severity levels are:
• Warning
• Emergency
• Alert
• Critical
• Error
• Notice
• Informational
• Debug

3. Click Create.

Creating a Switch Control Policy


The Switch Control policy supports VLAN port count optimization, configuring MAC address aging time,
and configuring Link Control Global settings.
1. In the General page, configure the following parameters:

Property Essential Information

Organization Select the organization.

Name Enter a name for your policy.

Tag (optional) Enter a tag in the key value format. For example,
Org: IT or Site: APJ.

Description (optional) Enter a short description.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Switching Mode

Cisco Intersight Managed Mode Configuration Guide


65
Configuring UCS Domain Policies
Creating a Switch Control Policy

Property Essential Information

Ethernet Specify the Ethernet switching mode. The switching


mode can be End Host or Switch.
In End Host mode, the Fabric Interconnects appear
to the upstream devices as end hosts with multiple
links. In this mode, the switch does not run
Spanning Tree Protocol and avoids loops by
following a set of rules for traffic forwarding.
In Switch mode, the switch runs Spanning Tree
Protocol to avoid loops, and broadcast and multicast
packets are handled in the conventional way.

FC Specify the FC switching mode. The switching


mode can be End Host or Switch.
In End Host mode, the Fabric Interconnects appear
to the upstream devices as end hosts with multiple
links. In this mode, the switch does not run
Spanning Tree Protocol and avoids loops by
following a set of rules for traffic forwarding.
In Switch mode, the switch runs Spanning Tree
Protocol to avoid loops, and broadcast and multicast
packets are handled in the conventional way.

VLAN Port Count

Enable VLAN Port Count Optimization Select to enable the VLAN port count optimization.
This option is disabled by default.

MAC Address Table Aging Time


Default Select this option to set the default MAC address
aging time to 14500 seconds for the End-Host mode.

Custom Select this option to allow the user to configure the


MAC address aging time on the switch.
For the switch model UCS-FI-6454 or higher
versions, the valid time range is 120 to 918000
seconds. After the time range is defined by the user,
the switch resets the defined time to its lower
multiple of 5.

Never Select this option to disable the MAC address aging


process. This option ensures the MAC entries never
expire and are not discarded from the MAC address
table.

Aging Time (Seconds) Define the MAC address aging time in seconds.
This field is valid only when the Custom option is
selected.

Cisco Intersight Managed Mode Configuration Guide


66
Configuring UCS Domain Policies
Creating a Flow Control Policy

Property Essential Information

Link Control Global Settings

Message Interval Enter the time interval between two Link Control
probe messages on ports that are in advertisement
mode and are bidirectional. Valid values are from
7 to 90 seconds.

Recovery Action Select Reset to recover an error-disabled port.


Note The option None is selected by default.

3. Click Create
.

Note On the Policy Details page, all the existing Switch Control policies show the value of Link Control Global
Settings fields as blank. These policies display the correct values on policy edit/update.

Note When you change the switching mode of a Fabric Interconnect, the Fabric Interconnect goes for a reboot.

Creating a Flow Control Policy


Enables configurations for priority flow control for ports and port channels to enable the no-drop behavior
for the CoS as defined in an active Network QoS policy.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

Description (Optional) Provide a short description

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Priority Flow Control Mode

Auto Auto receives and sends the priority flow. This field
is enabled by default.

Cisco Intersight Managed Mode Configuration Guide


67
Configuring UCS Domain Policies
Creating a Link Aggregation Policy

Property Essential Information

On Enables priority control flow on the local port.


Note You cannot enable Send and Receive
direction at the same time.

Receive When enabled, the priority flow control is


configured in the receive direction.

Send When enabled, the priority flow control is


configured in the send direction.

Note Flow Control should be enabled only on interfaces that are connected to Flow Control capable
devices. The following interface types are supported:
• Ethernet uplink ports and port channels

3. Click Create.

Creating a Link Aggregation Policy


This policy can be used to configure Link Aggregation properties.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

Description (Optional) Provide a short description

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Suspend Individual

False Select False to continue to receive PDUs from the


peer port.

True Select True to suspend a port that is not receiving


the PDUs from the peer port.

LACP Rate

Cisco Intersight Managed Mode Configuration Guide


68
Configuring UCS Domain Policies
Creating a Link Control Policy

Property Essential Information

Normal The port is expected to receive 1 PDU every 30


seconds. The timeout for this is 90 seconds.

Fast The port is expected to receive 1 PDU every 1


second from the peer port. The time out for this is
3 seconds.

Note Link Aggregation should be enabled only on interfaces that are connected to link aggregation
capable devices. The following interface types are supported:
• Ethernet uplink port channel
• FCoE uplink port channel

3. Click Create.

Creating a Link Control Policy


This policy enables configurations of link control administrative state and configuration (normal or aggressive)
mode for ports.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

Description (Optional) Provide a short description

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Link Control Administrative State


The link control state of the port configured and managed by the adminstrator.

Link Control Mode


Normal Detects unidirectional links caused by misconnected
interfaces on fiber-optic connections.

Cisco Intersight Managed Mode Configuration Guide


69
Configuring UCS Domain Policies
Creating a Multicast Policy

Property Essential Information

Aggressive Detects unidirectional links caused by to one-way


traffic on fiber-optic and twisted-pair links and by
misconnected interfaces on fiber-optic links.
Note • When Administrative State is
disabled, the policy cannot be set to
Aggressive mode
• When configuring the mode
(normal or aggressive), ensure the
same mode is configured on both
sides of the unidirectional link.
.

Note Link Control policy should be enabled only on interfaces that are connected to link control capable
devices. The following interface types are supported:
• Ethernet uplink ports
• FCoE uplink ports
• Ethernet uplink port channels
• FCoE uplink port channels

3. Click Create.

Creating a Multicast Policy


The multicast policy is used to configure Internet Group Management Protocol (IGMP) snooping and IGMP
querier.

Note Ensure that each VLAN is associated with a multicast policy. You can edit the existing VLANs and associate
them to a multicast policy.

1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Cisco Intersight Managed Mode Configuration Guide


70
Configuring UCS Domain Policies
Creating a Multicast Policy

Property Essential Information

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Snooping State Determines whether IGMP snooping examines


IGMP protocol messages within a VLAN to
discover which interfaces are connected to hosts or
other devices interested in receiving multicast
traffic. This can be one of the following:
• Enabled—IGMP snooping is used for VLANs
associated with this policy.
• Disabled—IGMP snooping is not used for
associated VLANs.

Querier State Determines whether IGMP snooping querier sends


out periodic IGMP queries that trigger IGMP report
messages from hosts that want to receive IP
multicast traffic. This can be one of the following:
• Enabled—Periodic IGMP queries are sent out.
• Disabled—No IGMP queries are sent out. This
is the default option.

Querier IP Address The IPv4 address for the IGMP snooping querier
interface.
This field appears only when Querier State is
enabled.

Querier IP Address Peer (Optional) The IPv4 address for the peer IGMP
snooping querier interface. The peer IP address is
assigned to FI-B.
This field appears only when Querier State is
enabled.

3. Click Create.

Cisco Intersight Managed Mode Configuration Guide


71
Configuring UCS Domain Policies
Creating a Multicast Policy

Cisco Intersight Managed Mode Configuration Guide


72
CHAPTER 9
Configuring Server Policies
• Server Policies, on page 74
• Creating a Policy, on page 80
• Supported UCS Server Policies, on page 80
• Creating an Adapter Configuration Policy, on page 83
• Creating a LAN Connectivity Policy, on page 85
• Creating an Ethernet Adapter Policy, on page 89
• Creating an Ethernet QoS Policy, on page 96
• Creating an Ethernet Network Policy, on page 97
• Creating an Ethernet Network Group Policy, on page 101
• Creating an Ethernet Network Control Policy, on page 102
• Creating a SAN Connectivity Policy, on page 103
• Creating a Fibre Channel Adapter Policy, on page 106
• Creating a Fibre Channel Network Policy, on page 109
• Creating a Fibre Channel QoS Policy, on page 110
• Creating a BIOS Policy, on page 111
• Creating a Boot Order Policy, on page 124
• Configuring an iSCSI Boot Policy, on page 129
• Creating an iSCSI Adapter Policy, on page 132
• Creating an iSCSI Static Target Policy, on page 133
• Creating a Device Connector Policy, on page 133
• Creating a Disk Group Policy, on page 134
• Creating an IMC Access Policy, on page 136
• Creating an IPMI Over LAN Policy, on page 137
• Creating an LDAP Policy, on page 138
• Creating a Local User Policy, on page 143
• Creating an NTP Policy, on page 145
• Creating an SD Card Policy, on page 146
• Create a Serial Over LAN Policy, on page 148
• Create SSH Policy, on page 150
• Creating a Virtual KVM Policy, on page 151
• Creating a Virtual Media Policy, on page 152
• Creating a Network Connectivity Policy, on page 155
• Creating a SMTP Policy, on page 157

Cisco Intersight Managed Mode Configuration Guide


73
Configuring Server Policies
Server Policies

• Creating an SNMP Policy, on page 158


• Creating a Storage Policy, on page 160
• Creating a Syslog Policy, on page 167
• Creating a Power Policy for Server, on page 168

Server Policies
Policies in Cisco Intersight provide different configurations for UCS servers, including BIOS settings, firmware
versions, disk group creation, Simple Mail Transfer Protocol (SMTP), Intelligent Platform Management
Interface (IPMI) settings, and more. A policy that is once configured can be assigned to any number of servers
to provide a configuration baseline. Policies in Cisco Intersight are native to the application and are not directly
imported from the UCS Systems. Policy-based configuration with Server Profiles is a Cisco Intersight Essentials
functionality.
The Server Policy creation wizard in Cisco Intersight has two pages:
• General—The general page allows you to select the organization and enter a name for your policy.
Optionally, include a short description and tag information to help identify the policy. Tags must be in
the key:value format. For example, Org: IT or Site: APJ.
• Policy Details—The policy details page has properties that are applicable to standalone UCS servers,
FI-attached UCS servers, or both. You can view these properties separately for All Platforms, UCS
Servers (Standalone), and UCS Servers (FI-Attached) Preview by clicking on these options.

Server Policies can be imported as part of importing configuration details (server profiles and policies) of a
Cisco C-Series Standalone server from Cisco IMC. For more information, see Importing a Server Profile.
The following list describes the server policies that you can configure in Cisco Intersight.
• Adapter Configuration Policy—Configures the Ethernet and Fibre-Channel settings for the VIC adapter.
• BIOS Policy—Automates the configuration of BIOS settings on the managed devices. You can create
one or more BIOS policies which contain a specific grouping of BIOS settings. If you do not specify a
BIOS policy for a server, the BIOS settings remain as they are. If a BIOS policy is specified, the values
that are specified in the policy replace any previously configured values on a server (including bare metal
server configuration settings). To apply the BIOS policy settings, you must reboot the server.
• Boot Order Policy—Configures the linear ordering of devices and enables you to change the boot order
and boot mode. You can also add multiple devices under various device types, rearrange the boot order,
and set parameters for each boot device type.
The inventory view enables you to view the actual boot order configured on a server. The boot order
displays the details that include device name, device type, configuration details such as Boot Mode
(Legacy or UEFI), and Secure Boot Mode (Enabled or Disabled).

Note A device configured in the server profile of Boot Order Policy may
not appear in the actual boot order, if the server BIOS does not detect
the device during server boot.

Intersight provides a One-Time Boot (OTB) option to set a boot device that temporarily overrides the
Boot Order Policy and the existing boot order. To set a One-Time Boot Device, select Power Cycle or
Power On from the Servers Table view or from the Server Details page and toggle ON the Set One

Cisco Intersight Managed Mode Configuration Guide


74
Configuring Server Policies
Server Policies

Time Boot Device Option. This operation attempts to boot from the One Time Boot device as part of
the power cycle or power on action. After power cycle or power on, OTB configuration will be cleared
to enable the next reboot to follow the default Boot Order.

Note • The OTB option is available for servers that have been
configured with a Boot Order Policy that is associated with a
server profile. For a successful OTB configuration, you must
deploy a server profile with a Boot Order Policy in Intersight
in advance.
• Any out-of-band- boot order change will not reflect on the
Intersight UI for OTB device configuration.

In the case of PXE Boot configuration, importing the server policy will not create the PXE device under
boot policy if either the MAC address or both the slot and port are not present for a given PXE device
under the Boot policy on the server. However, if both slot and port are present, boot order is set to ANY
for the bootable interface on a given slot on the server. For non-VIC adapters you can configure PXE
Boot with the MAC address, or both the slot and port, or slot only.
In the case of SAN Boot device configuration in the legacy mode, provide the boot target Logical Unit
Number (LUN), device slot ID, interface name, and target WWPN. For SAN Boot device configuration
in the Unified Extensible Firmware Interface (UEFI) mode, provide the bootloader name, description,
and path in addition to the fields listed in the legacy mode.
In the case of iSCSI Boot provide the target interface details, authentication mechanism, and initiator
IP source.
• In the case of Non-Volatile Memory Express (NVMe) Boot, configure the NVMe drive as bootable in
the UEFI mode. During the server profile depoloyment, this NVMe configuration setting enables selecting
the BIOS in a defined order.

• Certificate Management Policy—Allows you to specify the certificate and private key-pair details for
an external certificate.

Note Currently, Cisco Intersight supports Certificate Management of IMC


Certificates only.

• Disk Group Policy—

Note Disk Group Policy is now a part of Storage Policy.

• Device Connector Policy—Lets you choose the Configuration from Intersight only option to control
configuration changes allowed from Cisco IMC. The Configuration from Intersight only option is
enabled by default. You will observe the following changes when you deploy the Device Connector
policy in Intersight:
• Validation tasks will fail:

Cisco Intersight Managed Mode Configuration Guide


75
Configuring Server Policies
Server Policies

• If Intersight Read-only mode is enabled in the claimed device.


• If the firmware version of the Cisco UCS Standalone C-Series Servers is lower than 4.0(1).

• If Intersight Read-only mode is enabled, firmware upgrades will be successful only when performed
from Intersight. Firmware upgrade performed locally from Cisco IMC will fail.
• IPMI over LAN privileges will be reset to read-only level if Configuration from Intersight only
is enabled through the Device Connector policy, or if the same configuration is enabled in the Device
Connector in Cisco IMC.

Atention The Device Connector Policy will not be imported as part of the
Server Profile Import.

• Ethernet Adapter Policy—Governs the host-side behavior of the adapter, including how the adapter
handles traffic. For each VIC Virtual Ethernet Interface, you can configure various features such as
VXLAN, NVGRE, ARFS, Interrupt settings, and TCP Offload settings.
This policy includes the recommended default configurations for the supported server operating systems.
The policy supports 16 default configurations. During the policy creation, you can select and import a
default configuration.

Note You cannot modify the default configurations. However, the policy
that has the imported default configuration can be modified.

• Ethernet Network Policy—Determines if the port can carry single VLAN(Access) or multiple
VLANs(Trunk) traffic. You can specify the VLAN to be associated with an Ethernet packet if no tag is
found.
• Ethernet Network Control Policy—Configures the network control settings for the appliance ports,
port channels, or vNICs.
• Ethernet Network Group Policy—Configures the allowed VLAN and native VLAN for the appliance
ports, port channels, or vNICs.
• Ethernet QoS Policy—Assigns a system class to the outgoing traffic for a vNIC. This system class
determines the quality of service for the outgoing traffic. For certain adapters, you can also specify
additional controls like burst and rate on the outgoing traffic.
• Fibre Channel Adapter Policy—Governs the host-side behavior of the adapter, including how the
adapter handles traffic. You can enable FCP Error Recovery, change the default settings of Queues, and
Interrupt handling for performance enhancement.
This policy includes the recommended default configurations for the supported server operating systems.
The policy supports nine default configurations. During the policy creation, you can select and import a
default configuration.

Cisco Intersight Managed Mode Configuration Guide


76
Configuring Server Policies
Server Policies

Note You cannot modify the default configurations. However, the policy
that has the imported default configuration can be modified.

• Fibre Channel Network Policy—Governs the VSAN configuration for the virtual interfaces.
• Fibre Channel QoS Policy—Assigns a system class to the outgoing traffic for a vHBA. This system
class determines the quality of service for the outgoing traffic. For certain adapters, you can also specify
additional controls like burst and rate on the outgoing traffic.
• IPMI over LAN Policy—Defines the protocols for interfacing with a service processor that is embedded
in a server platform. The IPMI enables an operating system to obtain information about the system health
and control system hardware and directs the BMC to perform appropriate actions to address a problem.
You can create an IPMI Over LAN policy to manage the IPMI messages through Cisco Intersight. You
can assign these user roles to an IPMI user per session:

Important The encryption key to use for IPMI communication should have an
even number of hexadecimal characters and not exceed 40 characters.

• admin—IPMI users can perform all available actions. If you select this option, IPMI users with the
"Administrator" user role can create admin, user, and read-only sessions on this server.
• read-only—Can view information but cannot make any changes. IPMI users with the "Administrator",
"Operator", or "User" user roles can only create read-only IPMI sessions, regardless of their other
IPMI privileges.
• user—IPMI users can perform some functions but cannot perform administrative tasks. If you select
this option, IPMI users with the "Administrator" or "Operator" user role can create user and read-only
sessions on this server.

• LAN Connectivity Policy—Determines the connections and the network communication resources
between the server and the LAN on the network. You must create the Ethernet Adapter, Ethernet QoS,
and Ethernet Network policies as part of the LAN connectivity policy. For IMM servers, use a MAC
pool, or static MAC addresses, to assign MAC addresses to servers and to identify the vNICs that the
servers use to communicate with the network. For more information about creating Network Policies,
see Creating Network Policies.
• LDAP Policy—Specifies the LDAP configuration settings and preferences for an endpoint. The endpoints
support LDAP to store and maintain directory information in a network. The LDAP policy determines
configuration settings for LDAP Servers, DNS parameters including options to obtain a domain name
used for the DNS SRV request, Binding methods, Search parameters, and Group Authorization preferences.
Through an LDAP policy, you can also create multiple LDAP groups and add them to the LDAP server
database.
• Local User Policy—Automates the configuration of local user preferences. You can create one or more
Local User policies which contain a list of local users that need to be configured.
• Persistent Memory Policy—Persistent Memory Modules (PMem Modules) are non-volatile memory
modules that bring together the low latency of memory and the persistence of storage. PMem Modules
provide faster access to data and retain across power cycles, based on the mode. Intersight supports the
configuration of Intel® Optane™ PMem Module modules on the UCS M5 servers that are based on the

Cisco Intersight Managed Mode Configuration Guide


77
Configuring Server Policies
Server Policies

Second Generation Intel® Xeon® Scalable processors. Intel® Optane™ PMem Modules can be used only
with the Second-Generation Intel® Xeon® Scalable processors. The Persistent Memory Policy allows
the configuration of security, Goals, and Namespaces of Persistent Memory Modules:
• Security—Used to configure the secure passphrase for all the persistent memory modules.
• Goal—Used to configure volatile memory and regions in all the PMem Modules connected to all
the sockets of the server. Intersight supports only the creation and modification of a Goal as part of
the Persistent Memory policy. Some data loss occurs when a Goal is modified during the creation
or modification of a Persistent Memory Policy. For information on the data loss, see the Data Loss
during Persistent Memory Policy Configuration and Deployment table in Resources.
• Namespaces—Used to partition a region mapped to a specific socket or a PMem Module on a socket.
Intersight supports only the creation and deletion of Namespaces as part of the Persistent Memory
Policy. Modifying a Namespace is not supported. Some data loss occurs when a Namespace is
created or deleted during the creation of a Persistent Memory policy. For information on the data
loss, see the Data Loss during Persistent Memory Policy Configuration and Deployment table in
Resources.
It is important to consider the memory performance guidelines and population rules of the Persistent
Memory Modules before they are installed or replaced, and the policy is deployed. The population
guidelines for the PMem Modules can be divided into the following categories, based on the number
of CPU sockets:
• Dual CPU for UCS C220 M6, C240 M6, and B200 M6 servers
• Dual CPU for UCS C220 M5, C240 M5, and B200 M5 servers
• Quad CPU for UCS C480 M5 and B480 M5 servers
• Dual CPU for UCS S3260 M5 servers

For more information about creating a Persistent Memory policy, exceptions to the policy, and other
caveats regarding the policy, see Persistent Memory Policy in Resources.

• SAN Connectivity Policy—Determines the network storage resources and the connections between the
server and the SAN on the network. This policy enables you to configure vHBAs that the servers use to
communicate with the Storage Area Network. You can use WWNN and WWPN address pools, or static
WWNN and WWPN addresses to add vHBAs and to configure them. You must create the Fibre Channel
Adapter, Fibre Channel QoS, and Fibre Channel Network policies as part of the SAN connectivity policy.
For more information about creating Network policies, see Creating Network Policies.
• SD Card Policy—Configures the Cisco FlexFlash and FlexUtil Secure Digital (SD) cards for the Cisco
UCS C-Series Standalone M4 and M5 servers. This policy specifies details of virtual drives on the SD
cards. You can configure the SD cards in the Operating System Only, Utility Only, or Operating System
+ Utility modes.
When two cards are present in the Cisco FlexFlash controller and Operating System is chosen in the SD
card policy, the configured OS partition is mirrored. If only single card is available in the Cisco FlexFlash
controller, the configured OS partition is non-RAID. The utility partitions are always set as non-RAID.
.

Cisco Intersight Managed Mode Configuration Guide


78
Configuring Server Policies
Server Policies

Note 1. This policy is currently not supported on M6 servers.

2. You can enable up to two utility virtual drives on M5 servers,


and any number of supported utility virtual drives on M4 servers.
3. Diagnostics is supported only for the M5 servers.
4. UserPartition drives can be renamed only on the M4 servers.
5. FlexFlash configuration is not supported on C460 M4 servers.
6. For the Operating System+Utility mode, the M4 servers require
two FlexFlash cards, and the M5 servers require at least 1
FlexFlash + 1 FlexUtil card.

• SMTP Policy—Sets the state of the SMTP client in the managed device. You can specify the preferred
settings for outgoing communication and select the fault severity level to report and the mail recipients.
• SOL Policy—Enables the input and output of the serial port of a managed system to be redirected over
IP. You can create one or more Serial over LAN policies which contain a specific grouping of Serial
over LAN attributes that match the needs of a server or a set of servers.
• SSH Policy—Enables an SSH client to make a secure, encrypted connection. You can create one or more
SSH policies that contain a specific grouping of SSH properties for a server or a set of servers.
• Simple Network Management Protocol (SNMP) Policy—Configures the SNMP settings for sending
fault and alert information by SNMP traps from the managed devices. Any existing SNMP Users or
SNMP Traps configured previously on the managed devices are removed and replaced with users or
traps that you configure in this policy. If you have not added any users or traps in the policy, the existing
users or traps on the server are removed but not replaced.
• Storage Policy—A Storage policy allows you to create drive groups, virtual drives, configure the storage
capacity of a virtual drive, and configure the M.2 RAID controllers.
• Syslog Policy—Defines the logging level (minimum severity) to report for a log file collected from an
endpoint, the target destination to store the Syslog messages, and the Hostname/IP Address, port
information, and communication protocol for the Remote Logging Server(s).
• Virtual Media Policy—Enables you to install an Operating System on the server using the KVM console
and virtual media, mount files to the host from a remote file share, and enable virtual media encryption.
You can create one or more Virtual Media policies, which can contain virtual media mappings for different
OS images, and configure up to two virtual media mappings, one for ISO files (through CDD), and the
other for IMG files (through HDD).
For more information about the various mount options for the Virtual Media volumes, see Virtual Media
Mount options.
• Virtual KVM Policy—Enables specific grouping of virtual KVM properties. This policy allows you
specify the number of allowed concurrent KVM sessions, port information, and video encryption options.
• IMC Access Policy—Enables to manage and configure your network through mapping of IP pools to
the server profile. This policy allows you to configure a VLAN and associate it with an IP address through
the IP pool address.

Cisco Intersight Managed Mode Configuration Guide


79
Configuring Server Policies
Creating a Policy

• Power Policy—Enables the management of power for FI-attached servers and chassis. This policy allows
you to set the power profiling and the power restore state of the system. For more information, see
Creating a Power Policy for Server
• NTP Policy—Allows you to enable the NTP service on an Intersight Managed Cisco IMC (Standalone)
server. The NTP service synchronizes the time with an NTP server. You must enable and configure the
NTP service by specifying the IP address or DNS of a minimum of one to a maximum of four NTP
servers.
NTP policy also allows you to configure the timezone on Cisco IMC (Standalone) server. When you
enable the NTP service and select Timezone, Cisco Intersight configures the NTP details and Timezone
on the endpoint.

Creating a Policy
In Cisco Intersight, you can create a UCS Server or UCS Domain policy by using the policy wizard. To create
and configure a new policy, do the following:

Step 1 Log in to Cisco Intersight with your Cisco ID and select admin role.
Step 2 Navigate to Policies and click Create Policy.
Step 3 Select Policy Type.
You can filter the list of policies based on whether they are applicable to UCS Server, UCS Domain, or Hyperflex
Cluster.

Step 4 Click Start to begin configuring the policy.


Step 5 On the General page, enter the Name of the policy. Optionally, enter a Description and Tags.
Step 6 On the Policy Details page, configure policy properties.
Some policy properties may be applicable to specific target platforms—Standalone UCS servers, FI-attached UCS servers,
or both. You can view these properties separately for All Platforms, UCS Servers (Standalone), and UCS Servers
(FI-Attached) by clicking on these options. The properties that are applicable only to Standalone servers or FI-Attached
servers are indicated by an icon alongside the property.

Step 7 Click Create.

Supported UCS Server Policies


The following table provides a list of UCS server policies and the managed devices on which they are supported.
All the server policies listed in this table are available with a Cisco Intersight Essentials license.

Cisco Intersight Managed Mode Configuration Guide


80
Configuring Server Policies
Supported UCS Server Policies

Supported Servers

Cisco UCS C-Series Cisco UCS B-Series Cisco


UCS
X-Series

Standalone IMM IMM IMM


UCS Server
Policy M4 M5 M6 M5 M6 M5 M6 M6

Certificate — — — Yes Yes Yes Yes Yes


Management
Policy

Device Yes Yes Yes — — — — —


Connector
Policy

IPMI Over Yes Yes Yes Yes Yes Yes Yes Yes
LAN Policy

LDAP Yes Yes Yes — — — — —


Policy

Local User Yes Yes Yes Yes Yes Yes Yes Yes
Policy

NTP Policy Yes Yes Yes — — — — —

Network Yes Yes Yes — — — — —


Connectivity
Policy

Persistent — Yes Yes — — — — —


Memory
Policy

SD Card Yes Yes — Yes — — — —


Policy

SMTP Yes Yes Yes — — — — —


Policy

SNMP Yes Yes Yes Yes Yes Yes Yes Yes


Policy

SSH Policy Yes Yes Yes — — — — —

SoL Policy Yes Yes Yes Yes Yes Yes Yes Yes

Syslog Yes Yes Yes Yes Yes Yes Yes Yes


Policy

Cisco Intersight Managed Mode Configuration Guide


81
Configuring Server Policies
Supported UCS Server Policies

Supported Servers

Cisco UCS C-Series Cisco UCS B-Series Cisco


UCS
X-Series

Standalone IMM IMM IMM


UCS Server
Policy M4 M5 M6 M5 M6 M5 M6 M6

Virtual Yes Yes Yes Yes Yes Yes Yes Yes


KVM
Policy

BIOS Yes Yes Yes Yes Yes Yes Yes Yes


Token
Policy

Virtual Yes Yes Yes Yes Yes Yes Yes Yes


Media
Policy

LAN Yes Yes Yes Yes Yes Yes Yes Yes


Connectivity
Policy

SAN Yes Yes Yes Yes Yes Yes Yes Yes


Connectivity
Policy

Boot Order Yes Yes Yes Yes Yes Yes Yes Yes
Policy

Adapter Yes Yes Yes — — — — —


Configuration
Policy

Storage Yes Yes Yes Yes Yes Yes Yes Yes


Policy

IMC Access — — — Yes Yes Yes Yes Yes


Policy

Ethernet Yes Yes Yes Yes Yes Yes Yes Yes


Adapter
Policy

Fibre Yes Yes Yes Yes Yes Yes Yes Yes


Channel
Adapter
Policy

Ethernet Yes Yes Yes Yes Yes Yes Yes Yes


QoS Policy

Cisco Intersight Managed Mode Configuration Guide


82
Configuring Server Policies
Creating an Adapter Configuration Policy

Supported Servers

Cisco UCS C-Series Cisco UCS B-Series Cisco


UCS
X-Series

Standalone IMM IMM IMM


UCS Server
Policy M4 M5 M6 M5 M6 M5 M6 M6

Fibre Yes Yes Yes Yes Yes Yes Yes Yes


Channel
QoS Policy

Ethernet — — — Yes Yes Yes Yes Yes


Network
Control
Policy

Ethernet — — — Yes Yes Yes Yes Yes


Network
Group
Policy

iSCSI Boot — — — Yes Yes Yes Yes Yes


Policy

iSCSI — — — Yes Yes Yes Yes Yes


Adapter
Policy

iSCSI Static — — — Yes Yes Yes Yes Yes


Target
Policy

Creating an Adapter Configuration Policy


An Adapter Configuration Policy configures the Ethernet and Fibre-Channel settings for the Virtual Interface
Card (VIC) adapter.

Note This policy, if attached to a server profile that is assigned to an Intersight Managed Fabric Attached server,
will be ignored.

1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Cisco Intersight Managed Mode Configuration Guide


83
Configuring Server Policies
Creating an Adapter Configuration Policy

Property Essential Information

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, click Add VIC Adapter Configuration and configure the following
parameters:

Property Essential Information

Add VIC Adapter Configuration

PCI Slot The PCI slot in which the adapter is installed.


The range is from 1 to 15 and MLOM.

LLDP The LLDP protocol status on the adapter interface.


If checked, then Link Layer Discovery Protocol
(LLDP) enables all the Data Center Bridging
Capability Exchange protocol (DCBX)
functionality, which includes FCoE, priority based
flow control.
Note LLDP is available only on some UCS
C-Series servers.
We recommend that you do not disable
LLDP option, as it disables all the DCBX
functionality.

FIP The FIP protocol status on the adapter interface.


If checked, then FCoE Initialization Protocol (FIP)
mode is enabled. FIP mode ensures that the adapter
is compatible with current FCoE standards.
Note We recommend that you use FIP option
only when explicitly directed to do so by
a technical support representative.

Port Channel The port channel status on the adapter interface.


When Port Channel is enabled, two vNICs and two
vHBAs are available for use on the adapter card.
When disabled, four vNICs and four vHBAs are
available for use on the adapter card. Disabling port
channel reboots the server.
Note Port Channel is supported only for Cisco
VIC 1455/1457 adapters.

Cisco Intersight Managed Mode Configuration Guide


84
Configuring Server Policies
Creating a LAN Connectivity Policy

Property Essential Information

DCE Interface The Forward Error Correction (FEC) mode setting


for the DCE interfaces of the adapter.
Note FEC mode setting is supported only for
Cisco VIC 14xx adapters. FEC mode
'cl74' is unsupported for Cisco VIC
1495/1497. This setting will be ignored
for unsupported adapters and for
unavailable DCE interfaces

3. Click Add.
4. Click Create.

Creating a LAN Connectivity Policy


A LAN Connectivity Policy determines the connections and the network communication resources between
the server and the LAN on the network. You can specify MAC address pools, or static MAC addresses, to
assign MAC addresses to servers and to identify the vNICs that the servers use to communicate with the
network.
Prerequisites
Choose the following sub-policies or pool as per your requirement to create the LAN Connectivity policy
• Ethernet Network Policy—Specify if the port should carry single VLAN (Access) or multiple VLANs
(Trunk) traffic. You can specify the VLAN to be associated with an Ethernet packet if no tag is found.
• Ethernet QoS Policy—Configure the maximum size for a Fibre Channel frame payload that the virtual
interface supports, limit the data rate on the virtual interface, associate a Class of Service to the traffic
on the virtual interface.
• Ethernet Adapter Policy—Configure features like VXLAN, NVGRE, ARFS, Interrupt settings, RoCE,
and TCP Offload settings to govern the host side behavior of the adapter.
• IQN Pool—You can configure the Prefix and Suffix for the IQN block, the first suffix number in the
block and the number of identifiers the block can hold .

1. On the General page, enter the following information:


• Name of your policy.
• Target Platform for which the policy is applicable. This can be Standalone servers or FI Attached
servers.
A LAN Connectivity Policy created for Standalone servers cannot be deployed on FI Attached servers.
Similarly, a LAN Connectivity Policy created for FI Attached servers cannot be deployed on
Standalone servers.
• Description to help identify the policy.
• Tag for the policy. Tags must be in the key:value format. For example, Org: IT or Site: APJ.

Cisco Intersight Managed Mode Configuration Guide


85
Configuring Server Policies
Creating a LAN Connectivity Policy

2. On the Policy Details page, configure the following:


• For a FI-attached server, turn the Enable Azure Stack Host QoS button ON, to deploy the Azure
Stack QoS capability on the adapter with RDMA enabled.
Enabled—Enabling AzureStack-Host QoS on an adapter allows the user to carve out traffic classes
for RDMA traffic and ensure a desired portion of the bandwidth is allocated to it.
Disabled—Disables the Azure Stack Host QoS feature on the adapter.
• Specify whether no IQN, an IQN pool, or a unique IQN identifier is to be associated with the policy
by selecting None, Pool, or Static.
• None—If you select this option, you do not have to specify any IQN details.
• Pool—If you select this option, select the IQN pool that you want to associate with the LAN
Connectivity policy.
• Static—If you select this option, enter a static IQN for use as initiator identifiers by iSCSI
vNICs in a Fabric Interconnect domain.

• Select the placement option for each vNIC—Manual or Auto


• Manual vNIC Placement—If you select this option, you must manually specify the placement
for each vNIC. You can also use the Graphic vNICs Editor to create and specify the placement
for each vNIC manually by adding vNICs and slots, and defining the connection between them.

Note For manual placement, PCI Link is not supported on UCS VIC
1400 Series adapters.

• Auto vNIC Placement—If you select this option, vNIC placement will be done automatically
during profile deployment. This option is available only for Cisco Intersight Managed FI Attached
servers.

• Click Add vNIC and configure the following parameters:

Property Essential Information

Add vNIC
Ensure that you configure eth0 and eth1 interfaces for each VIC adapter you configure. You can
add additional vNICs depending on your network requirements.

Name vNIC name.

MAC Address Pool Click Select Pool and choose a MAC address
pool for MAC address assigment.

Static Click Static and enter a static MAC address for


MAC address assigment. This option is available
only for Cisco Intersight managed Fabric
Interconnect-attached servers.

Placement

Cisco Intersight Managed Mode Configuration Guide


86
Configuring Server Policies
Creating a LAN Connectivity Policy

Property Essential Information

Slot ID PCIe slot ID where the VIC adapter is installed.

Switch ID The fabric port to which the vNICs are associated.

PCI Link The PCIe link used as transport for the virtual
interface. All VIC adapters have a single PCI link
except VIC 1385 which has two.

PCI Order The order in which the virtual interface is brought


up. The order assigned to an interface should be
unique for all the Ethernet and Fibre-Channel
interfaces on each PCI link on a VIC adapter. The
maximum value of PCI order is limited by the
number of virtual interfaces (Ethernet and
Fibre-Channel) on each PCI link on a VIC
adapter.

Consistent Device Naming (CDN)


Consistent Device Naming configuration for the virtual NIC.

Source Whether the source of the CDN name is the name


of the vNIC instance or a user-defined name.

Failover
Enabling failover ensures that traffic automatically fails over from one uplink to another in case of
an uplink failure.

Ethernet Network Group Policy Select the Ethernet Network Group policy

Ethernet Network Control Policy Select the Ethernet Network Control policy.

Ethernet QoS Select the Ethernet QoS policy.

Ethernet Adapter Select the Ethernet Adapter policy.

iSCSI Boot Policy Select the iSCSI Boot policy.

Connection

Disabled Does not configure a connection policy.

usNIC
User Space NIC Settings that enable low-latency and higher throughput by bypassing the kernel
layer when sending/receiving packets.

Number of usNICs Number of usNIC interfaces to be created.

usNIC Adapter Policy Select the Ethernet Adapter policy to be


associated with the usNICs.

Cisco Intersight Managed Mode Configuration Guide


87
Configuring Server Policies
Creating a LAN Connectivity Policy

Property Essential Information

Class of Service Class of service to be used for traffic on the


usNIC.

VMQ
Virtual Machine Queue Settings for the virtual interface that allow efficient transfer of network
traffic to the guest operating system.

Enable Multi Queue Support Whether Virtual Machine Multi-Queue (VMMQ)


is enabled in the policy. With VMMQ, multiple
queues are allocated to a single VM.

Number of Sub vNICs Number of sub vNICs that are available for Multi
Queue.

Enable RoCE Settings Whether Remote Direct Memory Access


(RDMA) over Converged Ethernet (RoCE) is
enabled over this virtual interface.

Memory Regions The number of memory regions per adapter.


Enter an integer between 1 and 524288. It is
recommended that this number be an integer
power of 2.

Queue Pairs The number of queue pairs per adapter.


Enter an integer between 1 and 8192. It is
recommended that this number be an integer
power of 2.

Resource Groups The number of resource groups per adapter.


Enter an integer between 1 and 128.
It is recommended that this number be an integer
power of 2 greater than or equal to the number
of CPU cores on the system for optimum
performance.

Version Version of the RDMA protocol


Version 1 is a link layer protocol. It allows
communication between any two hosts in the
same Ethernet broadcast domain.
RoCEv2 is an internet layer protocol. RoCEv2
packets can be routed. This is possible because
RoCEv2 packets now include an IP and UDP
header.

• Click Add.

3. Click Create.

Cisco Intersight Managed Mode Configuration Guide


88
Configuring Server Policies
Creating an Ethernet Adapter Policy

Creating an Ethernet Adapter Policy


An Ethernet adapter policy governs the host-side behavior of the adapter, including how the adapter handles
traffic. For each VIC Virtual Ethernet Interface, you can configure various features like Virtual Extensible
LAN (VXLAN), Network Virtualization using Generic Routing Encapsulation (NVGRE), Accelerated Receive
Flow Steering (ARFS), Interrupt settings, and TCP Offload settings.
The Ethernet Adapter policy include the recommended settings for the virtual Ethernet interface, for each
supported server operating system. Operating systems are sensitive to the settings in these policies. In general,
the storage vendors require non-default adapter settings. You can find the details of these required settings
on the support list provided by those vendors.
GENEVE Offload
Cisco Intersight now supports Generic Network Virtualization Encapsulation (GENEVE) Offload on the ESXi
platform, which allows essentially any information to be encoded in a packet and passed between tunnel
endpoints. GENEVE provides the overlay capability to create isolated, multi-tenant broadcast domains across
data center fabrics on 1400 Series adapters. Using the GENEVE protocol allows you to create logical networks
that span physical network boundaries.
GENEVE offload is present in all Ethernet adapter policies and is disabled by default. It is the recommended
setting if using VMWare ESXi GENEVE.
Refer to the NSX-T documentation for how to implement GENEVE offload end to end configuration.
Cisco recommends configuring the following values in the Ethernet adapter policy when GENEVE offload
is enabled:
• Transmit Queues :1
• TX Ring Size: 4096
• Receive Queues: 8
• RX Ring Size: 4096
• Completion Queues : 16
• Interrupts : 32

The following features are not supported when GENEVE offload is enabled on any interface:
• Azure Stack QoS
• RoCEv2 - you cannot have GENEVE enabled on one vNIC and RoCEv2 enabled on another.
• Advanced Filters
• usNIC
• VMQ

Cisco Intersight Managed Mode Configuration Guide


89
Configuring Server Policies
Creating an Ethernet Adapter Policy

Note On switching from GENEVE offload feature to Azure Stack QoS feature or vice versa, please do the following:
1. Disable the current feature
2. Reboot the server
3. Enable the required feature

Other limitations with GENEVE offload include:


• External outer IPV6 is NOT supported with GENEVE offload.
• GENEVE offload is supported with ESX 7.0 (NSX-T 3.0) and ESX 6.7U3(NSX-T 2.5).
• GENEVE offload is supported only with 14xx Series adapters. It is not supported on 13xx Series or 12xx
Series adapters.
• Cisco recommends that you remove the GENEVE offload configuration before downgrading to any
non-supported release.

For details on supported features matrix with GENEVE offload, refer the table below.

Table 1: GENEVE Offload Supported Features Matrix

KVM VXLAN NVGRE RoCEv2 usNIC Netflow Advanced VMQ/ arfs Azure QoS
VM - Filters VMMQ/
FEX netqueue

GENE No Yes Yes No No No No No No No


VE
offload
enabled
on the
interface
vnic1
and
feature
is
enabled
on
vnic1

Cisco Intersight Managed Mode Configuration Guide


90
Configuring Server Policies
Creating an Ethernet Adapter Policy

KVM VXLAN NVGRE RoCEv2 usNIC Netflow Advanced VMQ/ arfs Azure QoS
VM - Filters VMMQ/
FEX netqueue

GENE Yes Yes Yes No Yes Yes Yes Yes Yes No


VE
offload
enabled
on the
interface
vnic1
and
feature
is
enabled
on
vnic2

Note We recommend that you use the values in these policies for the applicable operating system. Do not modify
any of the values in the default policies unless directed to do so by Cisco Technical Support.

1. In the General page, configure the following parameters:

Property Essential Information

Organization Select the organization.

Name Enter a name for your policy.

Tag (optional) Enter a tag in the key value format. For example,
Org: IT or Site: APJ.

Description (optional) Enter a short description.

Ethernet Adapter Default Configuration

Select a default configuration Click to view and import a default configuration.


The policy currently supports 16 default
configurations.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Enable Virtual Extensible LAN Enables the Virtual Extensible LAN protocol on the
virtual Ethernet interface.

Cisco Intersight Managed Mode Configuration Guide


91
Configuring Server Policies
Creating an Ethernet Adapter Policy

Property Essential Information

Enable Network Virtualization using Generic Enables Network Virtualization using Generic
Routing Encapsulation Routing Encapsulation on the virtual Ethernet
interface.
Note The Transmit checksum offload and TSO
must be enabled for the NVGRE
offloading to be effective.

Enable Accelerated Receive Flow Steering Enables Accelerated Receive Flow Steering (ARFS)
on the virtual Ethernet interface. ARFS is
hardware-assisted receive flow steering that can
increase CPU data cache hit rate by steering kernel
level processing of packets to the CPU where the
application thread consuming the packet is running.

Enable Advanced Filter Enables advanced filtering on the virtual Ethernet


interface.

Enable Interrupt Scaling Enables Interrupt Scaling of resources on the virtual


Ethernet interface.

Enable Geneve Offload Enables GENEVE overlay hardware offloads.

RoCE Settings
Intersight supports RDMA over Converged Ethernet (RoCE) for Microsoft SMB Direct. It sends additional
configuration information to the adapter while creating or modifying an Ethernet adapter policy.

Enable RDMA over converged Ethernet Enables RDMA over Converged Ethernet (RoCE)
on the virtual Ethernet interface.
RoCE allows direct memory access over an Ethernet
network. RoCE is a link layer protocol, and hence,
it allows communication between any two hosts in
the same Ethernet broadcast domain. RoCE delivers
superior performance compared to traditional
network socket implementations because of lower
latency, lower CPU utilization, and higher utilization
of network bandwidth.

Queue Pairs The number of queue pairs per adapter.


Enter an integer between 0 and 8192. It is
recommended that this number be an integer power
of 2.
Note This property is displayed only when
Enable RDMA over converged
Ethernet is enabled.

Cisco Intersight Managed Mode Configuration Guide


92
Configuring Server Policies
Creating an Ethernet Adapter Policy

Property Essential Information

Memory Regions The number of memory regions per adapter.


Enter an integer between 0 and 524288. It is
recommended that this number be an integer power
of 2.
Note This property is displayed only when
Enable RDMA over converged
Ethernet is enabled.

Resource Groups The number of resource groups per adapter. It is


recommended that this number be an integer power
of 2 greater than or equal to the number of CPU
cores on the system for optimum performance.
Enter an integer between 0 and 128.
Note This property is displayed only when
Enable RDMA over converged
Ethernet is enabled.

Version Version of the RDMA protocol


Version 1 is a link layer protocol. It allows
communication between any two hosts in the same
Ethernet broadcast domain.
Note This property is displayed only when
Enable RDMA over converged
Ethernet is enabled.

Interrupt Settings

Interrupts Enter the number of interrupt resources to allocate.


Typically this value is equal to the number of
completion queue resources.
Enter an integer between 1 and 1024.

Interrupt Mode Select the preferred driver interrupt mode that


include:
• MSIx—Message Signaled Interrupts (MSI)
with the optional extension. This is the
recommended option.
• MSI—Message Signaled Interrupts (MSI) only
• INTx—PCI INTx interrupts

Cisco Intersight Managed Mode Configuration Guide


93
Configuring Server Policies
Creating an Ethernet Adapter Policy

Property Essential Information

Interrupt Timer, us The time to wait between interrupts or the idle


period that must be encountered before an interrupt
is sent. To turn off interrupt coalescing, enter 0
(zero) in this field.
Enter an integer between 0 and 65535.

Interrupt Coalescing Type Select the Interrupt Coalescing Type:


• Min - The system waits for the time specified
in the Coalescing Time field before sending
another interrupt event.
• Idle - The system does not send an interrupt
until there is a period of no activity lasting as
least the time specified in the Coalescing Time
field.

Receive
Receive Queue resource settings.

Receive Queue Count The number of queue resources to allocate.


Enter an integer between 1 and 1000.

Receive Ring Size The number of descriptors in each queue.


Enter an integer between 64 and 4096.

Transmit
Transmit Queue resource settings

Transmit Queue Count The number of queue resources to allocate.


Enter an integer between 1 and 1000.

Transmit Ring Size The number of descriptors in each queue.


Enter an integer between 64 and 4096.

Completion
Completion Queue resources settings

Completion Queue Count The number of completion queue resources to


allocate. In general, the number of completion queue
resources to allocate is equal to the number of
transmit queue resources plus the number of receive
queue resources.
Enter an integer between 1 and 2000.

Cisco Intersight Managed Mode Configuration Guide


94
Configuring Server Policies
Creating an Ethernet Adapter Policy

Property Essential Information

Completion Ring Size The number of descriptors in each queue.


Enter an integer between 1 and 256.
Note This property is displayed only when
Enable RDMA over converged
Ethernet is enabled.

Uplink Failback Timeout (seconds) Uplink Failback Timeout in seconds when uplink
failover is enabled for a vNIC. After a vNIC has
started using its secondary interface, this setting
controls how long the primary interface must be
available before the system resumes using the
primary interface for the vNIC.
Enter an integer between 0 and 600.

TCP Offload
The TCP offload settings decide whether to offload the TCP related network functions from the CPU
to the network hardware or not. These options help reduce the CPU overhead and increase the network
throughput.

Enable Tx Checksum Offload Enables the CPU to send all packets to the hardware
so that the checksum can be calculated.

Enable Rx Checksum Offload Enables the CPU to send all packet checksums to
the hardware for validation.

Enable Large Send Offload Enables the CPU to send large packets to the
hardware for segmentation.

Enable Large Receive Offload Enables the CPU to reassemble the segmented
packets in hardware before sending them to the
CPU.

Receive Side Scaling

Enable Receive Side Scaling Enables to receive side scaling and allows the
incoming traffic to be spread across multiple CPU
cores.

Enable IPv4 Hash Enables the IPv4 address for traffic distribution.

Enable IPv6 Extension Hash Enables the IPv6 extensions for traffic distribution.

Enable IPv6 Hash Enables the IPv6 address for traffic distribution.

Enable TCP and IPv4 Hash Enables both the IPv4 address and TCP port number
for traffic distribution.

Enable TCP and IPv6 Extensions Hash Enables both the IPv6 extensions and TCP port
number for traffic distribution.

Cisco Intersight Managed Mode Configuration Guide


95
Configuring Server Policies
Creating an Ethernet QoS Policy

Property Essential Information

Enable TCP and IPv6 Hash Enables both the IPv6 address and TCP port number
for traffic distribution.

Enable UDP and IPv4 Hash Enables both the IPv4 address and UDP port number
for traffic distribution.

Enable UDP and IPv6 Hash Enables both the IPv6 address and UDP port number
for traffic distribution.

3. Click Create.

Creating an Ethernet QoS Policy


An Ethernet Quality of Service (QoS) policy assigns a system class to the outgoing traffic for a vNIC. This
system class determines the quality of service for the outgoing traffic. For certain adapters, you can also
specify additional controls like burst and rate on the outgoing traffic.
1. In the General page, configure the following parameters:

Property Essential Information

Organization Select the organization.

Name Enter a name for your policy.

Tag (optional) Enter a tag in the key value format. For example,
Org: IT or Site: APJ.

Description (optional) Enter a short description.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

MTU, Bytes The Maximum Transmission Unit (MTU) or packet


size that the virtual interface accepts.
The valid range is between 1500 and 9000. The
default value is 1500.

Rate Limit, Mbps The value in Mbps (0-100000) to use for limiting
the data rate on the virtual interface. Setting this to
zero will turn rate limiting off.

Cisco Intersight Managed Mode Configuration Guide


96
Configuring Server Policies
Creating an Ethernet Network Policy

Property Essential Information

Class of Service The Class of Service to be associated to the traffic


on the virtual interface.
The valid range is between 0 and 6. The default
value is 3.
Note This property is supported only on
Standalone servers.

Burst The burst traffic allowed on the vNIC in bytes.


The valid range is between 1024 and 1000000. The
default value is 1024.
Note This property is supported only on
FI-attached servers.

Priority Select the priority matching the System QoS defined


in the domain profile that include:
• Best-effort
• Fibre Channel (FC)
• Platinum
• Gold
• Silver
• Bronze

Note • The Best-effort system class is


enabled by default.
• This property is supported only on
FI-attached servers.

Enable Trust Host CoS Select to enable the usage of the Class of Service
to be associated to the traffic on the virtual interface.

3. Click Create.

Creating an Ethernet Network Policy


VLAN Configuration settings for the virtual interface.

Attention This procedure is not appliable for FI-attached servers.

Cisco Intersight Managed Mode Configuration Guide


97
Configuring Server Policies
Creating an Ethernet Network Policy

An Ethernet Network policy determines if the port can carry single VLAN (Access) or multiple VLANs
(Trunk) traffic. You can specify the VLAN to be associated with an Ethernet packet if no tag is found.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Cisco Intersight Managed Mode Configuration Guide


98
Configuring Server Policies
Creating an Ethernet Network Policy

Property Essential Information

VLAN Mode

Cisco Intersight Managed Mode Configuration Guide


99
Configuring Server Policies
Creating an Ethernet Network Policy

Property Essential Information


Assign traffic flow to the VLAN to determine if the
port can carry single VLAN (Access) or multiple
VLANs (Trunk) traffic.
• Access Mode—Traffic is received and sent in
native formats with no VLAN tagging.
Anything arriving on an access port is assumed
to belong to the VLAN assigned to the port.
You can configure a port in access mode and
specify the VLAN to carry the traffic for that
interface. If you do not configure the VLAN
for a port in access mode, or an access port,
the interface carries the traffic for the default
VLAN, which is VLAN 1. You can change the
access port membership in a VLAN by
configuring the VLAN. You must create the
VLAN before you can assign it as an access
VLAN for an access port. If you change the
access VLAN on an access port to a VLAN
that is not yet created, the UCS Manager shuts
down that access port.
If an access port receives a packet with an
802.1Q tag in the header other than the access
VLAN value, that port drops the packet
without learning its MAC source address. If
you assign an access VLAN that is also a
primary VLAN for a private VLAN, all access
ports with that access VLAN receives all the
broadcast traffic for the primary VLAN in the
private VLAN mode.
• Trunk Mode—Trunk ports allow multiple
VLANs to transport between switches over
that trunk link. A trunk port can carry untagged
packets simultaneously with the 802.1Q tagged
packets. When you assign a default port VLAN
ID to the trunk port, all untagged traffic travels
on the default port VLAN ID for the trunk port,
and all untagged traffic is assumed to belong
to this VLAN. This VLAN is referred to as the
native VLAN ID for a trunk port. The native
VLAN ID is the VLAN that carries untagged
traffic on trunk ports.
The trunk port sends an egressing packet with
a VLAN that is equal to the default port VLAN
ID as untagged; all the other egressing packets
are tagged by the trunk port. If you do not
configure a native VLAN ID, the trunk port
uses the default VLAN.

Cisco Intersight Managed Mode Configuration Guide


100
Configuring Server Policies
Creating an Ethernet Network Group Policy

Property Essential Information


This property is applicable only to Standalone
servers, and not to FI Attached servers. For FI
Attached mode, VLAN Mode is configured as
Trunk.

Default VLAN Default VLAN ID of the virtual interface. Setting


the ID to 0 will not associate any default VLAN to
the traffic on the virtual interface.

Allowed VLAN Allowed VLAN IDs of the virtual interface.

Ethernet Network Control Select or create an Ethernet Network Control policy.

3. Click Create.

Creating an Ethernet Network Group Policy


Ethernet Network Group policies configure the Allowed VLANs and Native VLAN settings for the UCS
Domain.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Set Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

Description (Optional) Provide a short description

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Allowed VLANs IDs of the allowed VLANs for the interface. Enter
the VLAN IDs, or VLAN ranges as a
comma-separated list. For example, 1-10, 15.

Native VLAN Enter the native VLAN ID of the virtual interface,


or the corresponding vethernet on the peer Fabric
Interconnect to which the virtual interface is
connected. Setting the ID to 0 will not associate any
native VLAN to the traffic on the virtual interface..

3. Click Create.

Cisco Intersight Managed Mode Configuration Guide


101
Configuring Server Policies
Creating an Ethernet Network Control Policy

Creating an Ethernet Network Control Policy


Ethernet Network Control policies configure the network control settings for the UCS Domain.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Enable CDP Enables the Cisco Discovery Protocol (CDP) on an


interface.

MAC Register Mode Determines the MAC addresses to be registered


with the switch. This can be:
• Only Native VLAN—MAC addresses are only
added to the native VLAN. This option is the
default, and it maximizes the port+VLAN
count.
• All Host VLANs—MAC addresses are added
to all VLANs with which they are associated.
Select this option if your VLANs are
configured to use trunking but are not running
in Promiscuous mode.

Action on Uplink Fail Determines how the interface behaves if no uplink


port is available when the switch is in end-host
mode.
• Link Down—Changes the operational state of
a vNIC to down when uplink connectivity is
lost on the switch, and enables fabric failover
for vNICs. This is the default option.
• Warning—Maintains server-to-server
connectivity even when no uplink port is
available, and disables fabric failover when
uplink connectivity is lost on the switch.

Cisco Intersight Managed Mode Configuration Guide


102
Configuring Server Policies
Creating a SAN Connectivity Policy

Property Essential Information

MAC Security Determines whether forged MAC addresses are


allowed or denied when packets are sent from the
Forge
server to the switch. This can be:
• Allow— All server packets are accepted by
the switch, regardless of the MAC address
associated with the packets. This is the default
option.
• Deny— After the first packet has been sent to
the switch, all other packets must use the same
MAC address or they will be silently rejected
by the switch. In effect, this option enables
port security for the associated vNIC.

LLDP Determines whether interfaces can transmit or


receive LLDP packets.
• To enable or disable the transmission of LLDP
packets on an interface, click Enable
Transmit.
• To enable or disable the receipt of LLDP
packets on an interface, click Enable Receive.

3. Click Create.

Creating a SAN Connectivity Policy


A Storage Area Network (SAN) connectivity policy determines the network storage resources and the
connections between the server and the storage device on the network. This policy enables you to specify
WWPN address pools, or a static WWPN address to add a vHBA. Similarly, you can specify a WWNN pool,
or a static WWNN address to configure vHBAs that the servers use to communicate with the SAN.
Prerequisites
The following sub-policies are required to create the SAN Connectivity policy:
• Fibre Channel Network Policy—Configure the VSAN ID on the virtual interfaces.
• Fibre Channel QoS Policy—Limit the data rate on the virtual interface, configure the maximum size
for a Fibre Channel frame payload bytes that the virtual interface supports, associate a Class of Service
to the traffic on the virtual interface.
• Fibre Channel Adapter Policy—Govern the host side behavior of the adapter. You can enable FCP
Error Recovery, change the default settings of Queues, and change Interrupt handling for performance
enhancement.
• WWNN Pool—A World Wide Name (WWN) pool that contains only WW node names for use by the
Fibre Channel vHBAs in a Cisco UCS Domain. You can also assign a static WWNN to a Fibre Channel
vHBA in a Cisco UCS Domain.

Cisco Intersight Managed Mode Configuration Guide


103
Configuring Server Policies
Creating a SAN Connectivity Policy

• WWPN Pool—A World Wide Name (WWN) pool that contains only WW port names for use by the
Fibre Channel vHBAs in a Cisco UCS Domain. You can also assign a static WWPN to a Fibre Channel
vHBA in a Cisco UCS Domain.

1. On the General page, enter the following information:


• Name of your policy.
• Target Platform for which the policy is applicable. This can be Standalone servers or FI Attached
servers.
A SAN Connectivity Policy created for Standalone servers cannot be deployed on FI Attached servers.
Similarly, a SAN Connectivity Policy created for FI Attached servers cannot be deployed on
Standalone servers.
• Description to help identify the policy.
• Tag for the policy. Tags must be in the key:value format. For example, Org: IT or Site: APJ.

2. On the Policy Details page, configure the following:


• Select the placement option—Manual or Auto
• Manual vHBAs Placement—If you select this option, you must manually specify the PCI slot
and PCI order for each vHBA. You can also use the Graphic vHBAs Editor to create and
specify the placement for each vHBA manually by adding vHBAs and slots, and defining the
connection between them.

Note For manual placement, PCI Link is not supported on UCS VIC
1400 Series adapters

• Auto vHBAs Placement—If you select this option, vHBA placement will be done automatically
during profile deployment. This option is available only for Cisco Intersight Managed FI Attached
servers.

• Create or select a WWNN Address Pool, or select Static and enter a WWNN address. The Static
option is available only for Cisco Intersight Managed FI Attached servers.
• Click Add vHBA and configure the following parameters:

Property Essential Information

Add vHBA

Name Name of the virtual Fibre Channel interface.

Cisco Intersight Managed Mode Configuration Guide


104
Configuring Server Policies
Creating a SAN Connectivity Policy

Property Essential Information

vHBA Type Typeof vHBA configuration for SAN Connectivity


Policy.
• fc-initiator—The type of Fibre Channel zoning
to be configured for the vHBA is of the
initiator type.
• fc-target—The type of Fibre Channel zoning
to be configured for the vHBA is of the target
type.
• fc-nvme-initiator—The vHBA type is initiator
and applies the NVMe interface to Fibre
Channel.
• fc-nvme-target—The vHBA type is target and
applies the NVMe interface to Fibre Channel.
The NVM Express (NVMe) interface allows
host software to communicate with a
non-volatile memory subsystem. It is optimized
for Enterprise non-volatile storage, which is
typically attached as a register level interface
to the PCI Express (PCIe) interface.

Note • This configuration is supported only


on Cisco VIC 14XX series and
higher series of adapters.
• 13xx series adapters support only
fc-initiator, and fc-nvme-initiator.
• Prior to connection, association
with adapter should be fine.
• After connection with adapter,
check vhba_type in the vnic.cfg file.
For fc-nvme-initiator type,
vhba_type should read the name.
For fc-initiator type, vhba_type
should not be present.

WWPN Address Pool Click Select Pool and choose a WWPN address
pool.

Static Click Static and enter a static WWPN address. This


option is available only for Cisco Intersight
managed FI-attached servers.

Placement
Placement Settings for the virtual interface.

Cisco Intersight Managed Mode Configuration Guide


105
Configuring Server Policies
Creating a Fibre Channel Adapter Policy

Property Essential Information

Slot ID PCIe slot ID where the VIC adapter is installed.

Switch ID The fabric port to which the vHBAs will be


associated.

PCI Link The PCIe link used as transport for the virtual
interface. All VIC adapters have a single PCI link
except VIC 1385 which has two.

PCI Order The order in which the virtual interface is brought


up. The order assigned to an interface should be
unique for all the Ethernet and Fibre-Channel
interfaces on each PCI link on a VIC adapter. The
maximum value of PCI order is limited by the
number of virtual interfaces (Ethernet and
Fibre-Channel) on each PCI link on a VIC adapter.

Persistent LUN Bindings

Enable Persistent LUN Bindings Enables retention of LUN ID associations in


memory until they are manually cleared.

Fibre Channel Network Select or create a Fibre Channel Network policy.

Fibre Channel QoS Select or create a Fibre Channel QoS policy.

Fibre Channel Adapter Select or create a Fibre Channel Adapter policy.

• Click Add.

3. Click Create.

Creating a Fibre Channel Adapter Policy


A Fibre Channel adapter policy governs the host-side behavior of the adapter, including how the adapter
handles traffic. You can enable FCP Error Recovery, change the default settings of Queues, and Interrupt
handling for performance enhancement.

Note We recommend that you use the values in these policies for the applicable operating system. Do not modify
any of the values in the default policies unless directed to do so by Cisco Technical Support.

1. In the General page, configure the following parameters:

Property Essential Information

Organization Select the organization.

Name Enter a name for your policy.

Cisco Intersight Managed Mode Configuration Guide


106
Configuring Server Policies
Creating a Fibre Channel Adapter Policy

Property Essential Information

Tag (optional) Enter a tag in the key value format. For example,
Org: IT or Site: APJ.

Description (optional) Enter a short description.

Fibre Channel Adapter Default Configuration

Select a default configuration Click to view and import a default configuration.


The policy currently supports nine (9) default
configurations.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Error Recovery

FCP Error Recovery Enables the use of FCP Sequence Level Error
Recovery protocol (FC-TAPE) on the virtual
interface.

Port Down Timeout, ms The number of milliseconds a remote Fibre Channel


port should be offline before informing the SCSI
upper layer that the port is unavailable.
Enter an integer between 0 and 240000.

I/O Retry Timeout, Seconds The number of seconds the adapter waits before
aborting the pending command and resending the
same I/O request.
Enter an integer between 1 and 59.

Link Down Timeout, ms The number of milliseconds the uplink port should
be offline before it informs the system that the
uplink port is down and fabric connectivity has been
lost.
Enter an integer between 0 and 240000.

Port Down IO Retry, ms The number of times an IO request to a port is


returned because the port is busy before the system
decides the port is unavailable.
Enter an integer between 0 and 255.

Error Detection

Error Detection Timeout Error Detection Timeout, also referred to as


EDTOV, is the number of milliseconds to wait
before the system assumes that an error has
occurred.
Enter an integer between 1000 and 10000.

Cisco Intersight Managed Mode Configuration Guide


107
Configuring Server Policies
Creating a Fibre Channel Adapter Policy

Property Essential Information

Resource Allocation

Resource Allocation Timeout The number of milliseconds to wait before the


system assumes that a resource cannot be properly
allocated.
Enter an integer between 5000 and 100000.

Flogi

Flogi Retries The number of times that the system tries to log in
to the fabric after the first failure.

Flogi Timeout, ms The number of milliseconds that the system waits


before it tries to log in again.
Enter an integer between 1000 and 255000.

Plogi

Plogi Retries The number of times that the system tries to log into
a port after the first failure.
Enter an integer between 0 and 255.

Plogi Timeout, ms The number of milliseconds that the system waits


before it tries to log in again.
Enter an integer between 1000 and 255000

Interrupt

Mode Select the preferred driver interrupt mode:


• MSIx—Message Signaled Interrupts (MSI)
with the optional extension. This is the
recommended option.
• MSI—Message Signaled Interrupts (MSI) only
• INTx—PCI INTx interrupts

IO Throttle

I/O Throttle Count The number of I/O operations that can be pending
in the vHBA at one time.
Enter an integer between 1 and 1024.

LUN

Maximum LUNs Per Target The maximum number of LUNs that the driver will
export. This is usually an operating system platform
limitation.
Enter an integer between 1 and 1024.

Cisco Intersight Managed Mode Configuration Guide


108
Configuring Server Policies
Creating a Fibre Channel Network Policy

Property Essential Information

LUN Queue Depth The number of commands that the HBA can send
and receive in a single transmission per LUN.
Enter an integer between 1 and 254.

Receive

Receive Ring Size The number of descriptors in each queue.


Enter an integer between 64 and 2048.

Transmit

Transmit Ring Size The number of descriptors in each queue.


Enter an integer between 64 and 2048.

SCSI I/O

SCSI I/O Queues The number of SCSI I/O queue resources the system
should allocate.
Enter an integer between 1 and 245.

SCSI I/O Ring Size The number of descriptors in each SCSI I/O queue.
Enter an integer between 64 and 512.

3. Click Create.

Creating a Fibre Channel Network Policy


A Fibre Channel Network policy governs the Virtual Storage Area Network (VSAN) configuration for the
virtual interfaces.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Cisco Intersight Managed Mode Configuration Guide


109
Configuring Server Policies
Creating a Fibre Channel QoS Policy

Property Essential Information

Default VLAN Default VLAN of the virtual interface in Standalone


Rack server. Setting the value to 0 is equivalent to
None and will not associate any default VLAN to
the traffic on the virtual interface. Valid values are
0 to 4094.

VSAN ID Default VSAN ID of the virtual interface. Setting


the ID to 0 will not associate any default VSAN to
the traffic on the virtual interface.

3. Click Create.

Creating a Fibre Channel QoS Policy


The Fibre Channel QoS policy assigns a system class to the outgoing traffic for a vHBA. This system class
determines the quality of service for the outgoing traffic. For certain adapters, you can also specify additional
controls like burst and rate on the outgoing traffic.
1. In the General page, configure the following parameters:

Property Essential Information

Organization Select the organization.

Name Enter a name for your policy.

Tag (optional) Enter a tag in the key value format. For example,
Org: IT or Site: APJ.

Description (optional) Enter a short description.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Rate Limit, Mbps Used for limiting the data rate on the virtual
interface.
The valid range is between 0 and 100000. The
default value is Zero.

Maximum Data Field Size, Bytes The maximum size of the Fibre Channel frame
payload bytes that the virtual interface supports.
The valid range is between 256 and 2112. The
default value is 2112.

Cisco Intersight Managed Mode Configuration Guide


110
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

Class of Service The Class of Service to be associated to the traffic


on the virtual interface.
The valid range is between 0 and 6. The default
value is 3.
Note • FCoE traffic has a reserved QoS
system class that should not be used
by any other type of traffic. If any
other type of traffic has a CoS value
that is used by FCoE, the value is
remarked to 0.
• This property is supported only on
Standalone servers.

Burst The burst traffic allowed on the vNIC in bytes.


The valid range is between 1024 and 1000000. The
default value is 1024.
Note This property is supported only on
FI-attached servers.

Priority The priority matching the System QoS defined in


the domain profile. The Fibre Channel (FC) is
enabled by default.
Note This property is supported only on
FI-attached servers.

3. Click Create.

Creating a BIOS Policy


A BIOS policy automates the configuration of BIOS settings on servers. You can create one or more BIOS
policies that contain a specific grouping of BIOS settings, matching the needs of a server or a set of servers.
If you do not specify a BIOS policy for a server, the BIOS settings will default to set of values for a brand
new baremetal server or to a set of values previously configured using Cisco IMC. If a BIOS policy is specified,
its values replace any previously configured values on the server.
All BIOS tokens are not applicable to all servers. If unsupported tokens are pushed to a server, those tokens
are ignored.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Cisco Intersight Managed Mode Configuration Guide


111
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following BIOS policy options:

Property Essential Information

LOM and PCIe Slots

ACS Control GPU-n Access Control Services (ACS) allow the processor
to enable or disable peer-to-peer communication
n= 1-8
between multiple devices for GPUs.

ACS Control Slot n Access Control Services (ACS) allow the processor
to enable or disable peer-to-peer communication
n= 11-14
between multiple devices for Control Slot n.

CDN Support for LOM Whether the Ethernet Networking Identifier naming
convention is according to Consistent Device
Naming (CDN) or the traditional way of naming
conventions.

LOM Port n OptionROM Whether Option ROM is available on the LOM port
n
n= 0-3

All Onboard LOM Ports Whether all onboard LOM ports are enabled or
disabled

All PCIe Slots OptionROM Whether Option ROM is available on all PCIe slots

PCI ROM CLP PCI ROM Command Line Protocol (CLP) controls
the execution of different Option ROMs such as
PxE and iSCSI that are present in the card.

PCIe Slot:n Link Speed This option allows you to restrict the maximum
speed of an adapter card installed in PCIe slot n.
n= 1-12

Slot n state The state of the adapter card installed in PCIe slot
n.
n= 1-12

PCIe Slot:FLOM Link Speed This option allows you to restrict the maximum
speed of an adapter card installed in PCIe FLOM
slot.

PCIe Slot:Front Nvmen Link Speed This option allows you to restrict the maximum
speed of an NVMe card installed in the front PCIe
n= 1-2
slot n.

Cisco Intersight Managed Mode Configuration Guide


112
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

PCIe Slot:Frontn Link Speed This option allows you to restrict the maximum
speed of an adapter card installed in the front PCIe
n= 1-2
slot n.

GPUn OptionROM Whether the Option ROM is enabled on GPU slot


n.
n= 1-8

PCIe Slot:HBA Link Speed This option allows you to restrict the maximum
speed of an adapter card installed in PCIe HBA slot.

PCIe Slot:HBA OptionROM Whether the Option ROM is enabled on the HBA
slot.

PCIe LOM:n Link Whether Option ROM is available on the LOM port.
n= 1-2

Slot Mezz state State of the Mezzanine card slot.

PCIe Slot:MLOM Link Speed This option allows you to restrict the maximum
speed of an MLOM adapter card installed in a PCIe
slot.

PCIe Slot MLOM OptionROM Whether the Option ROM is enabled on the MLOM
slot.

MRAID Link Speed This option allows you to restrict the maximum
speed of MRAID.

PCIe Slot MRAID OptionROM Whether Option ROM is available on the MRAID
port.

PCIe Slot Nn OptionROM Whether the Option ROM is enabled on the PCIe
slot.
n= 1-24

RAID Link Speed This option allows you to restrict the maximum
speed of MRAID.

PCIe Slot RAID OptionROM Whether the Option ROM is enabled on the RAID
slot.

PCIe Slot:Rear Nvmen Link Speed This option allows you to restrict the maximum
speed of an NVMe card installed in the rear PCIe
n= 1-2
slot n.

PCIe Slot:Rear NVME n OptionRom Whether the Option ROM is enabled on the rear
NVMe slot n.
n= 1-8

PCIe Slot:Risern Link Speed This option allows you to restrict the maximum
speed of Riser card n installed in the PCIe slot.
n= 1-2

Cisco Intersight Managed Mode Configuration Guide


113
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

PCIe Slot:Riser1 Slotn Link Speed This option allows you to restrict the maximum
speed of slot n on Riser card1 installed in the PCIe
n= 1-3
slot.

PCIe Slot:Riser2 Slotn Link Speed This option allows you to restrict the maximum
speed of slot n on Riser card2 installed in the PCIe
n= 4-6
slot.

PCIe Slot:SAS OptionROM Whether the Option ROM is enabled on the SAS
slot.

PCIe Slot:FrontPcien Link Speed This option allows you to restrict the maximum
speed of the front PCIe n.
n= 1-2

Processor

Adjacent Cache Line Prefetcher Whether the processor fetches cache lines in
even/odd pairs instead of fetching just the required
line.

Altitude The approximate number of meters above sea level


at which the physical server is installed.

Autonomous Core C-state When the Operating System requests CPU core C1
state, system hardware automatically changes the
request to core C6 state.

CPU Autonomous Cstate Enables CPU Autonomous C-State, which converts


the HALT instructions to the MWAIT instructions.

Boot Performance Mode Allows the user to select the BIOS performance
state that is set before the operating system handoff.

Downcore control Allows AMD processors to disable cores and, thus,


select how many cores to enable.

Channel Interleaving Whether the CPU divides memory blocks and


spreads contiguous portions of data across
interleaved channels to enable simultaneous read
operations.

Closed Loop Therm Throt Allows for the support of Closed-Loop Thermal
Throttling, which improves reliability and reduces
CPU power consumption through the automatic
voltage control while the CPUs are in the idle state.

Processor CMCI Enables CMCI generation.

Config TDP Allows you to configure the Thermal Design Power


(TDP) settings for the system. TDP is the maximum
amount of power allowed for running applications
without triggering an overheating event.

Cisco Intersight Managed Mode Configuration Guide


114
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

Core MultiProcessing Sets the state of logical processor cores per CPU in
a package. If you disable this setting, Intel Hyper
Threading technology is also disabled.

Energy Performance Allows you to determine whether system


performance or energy efficiency is more important
on this server.

Frequency Floor Override Whether the CPU is allowed to drop below the
maximum non-turbo frequency when idle.

CPU Performance Sets the CPU performance profile for the server.

Power Technology Enables you to configure the CPU power


management settings.

Demand Scrub Whether the system corrects single bit memory


errors encountered when the CPU or I/O makes a
demand read.

Direct Cache Access Support Allows processors to increase I/O performance by


placing data from I/O devices directly into the
processor cache. This setting helps to reduce cache
misses.

DRAM Clock Throttling Allows you to tune the system settings between the
memory bandwidth and power consumption.

Energy Efficient Turbo Allows the processor to switch to a minimum


performance state when it is idle.

Energy Performance Tuning Determines if the BIOS or Operating System can


turn on the energy performance bias tuning.

Enhanced Intel Speedstep(R) Technology Whether the processor uses Enhanced Intel
SpeedStep Technology, which allows the system to
dynamically adjust processor voltage and core
frequency. This technology can result in decreased
average power consumption and decreased average
heat production.

EPP Profile Determines the processor Enhanced Performance


Profile.

Local X2 Apic Allows you to set the type of Application Policy


Infrastructure Controller (APIC) architecture.

Hardware Prefetcher Whether the processor allows the Intel hardware


prefetcher to fetch streams of data and instruction
from memory into the unified second-level cache
when necessary.

Cisco Intersight Managed Mode Configuration Guide


115
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

CPU Hardware Power Management Enables processor Hardware Power Management


(HWPM).

IMC Interleaving This BIOS option controls the interleaving between


the Integrated Memory Controllers (IMCs).

Intel HyperThreading Tech Whether the processor uses Intel Hyper-Threading


Technology, which allows multithreaded software
applications to execute threads in parallel within
each processor.

Intel Speed Select Allows improved CPU performance by using Intel


Speed Select technology to tune the CPU to run at
one of three operating profiles, based on number of
logical processor cores, frequency, and TDP thread
setting, to improve performance over the basic
Platform Default setting. These profiles correspond
to High, Medium, and Low Core settings

Intel Turbo Boost Tech Whether the processor uses Intel Turbo Boost
Technology, which allows the processor to
automatically increase its frequency if it is running
below power, temperature, or voltage specifications.

Intel(R) VT Whether the processor uses Intel Virtualization


Technology, which allows a platform to run multiple
operating systems and applications in independent
partitions.

IIO Error Enable Allows you to generate the IIO-related errors.

DCU IP Prefetcher Whether the processor uses the DCU IP Prefetch


mechanism to analyze historical cache access
patterns and preload the most relevant lines in the
L1 cache.

KTI Prefetch KTI prefetch is a mechanism to get the memory


read started early on a DDR bus.

LLC Prefetch Whether the processor uses the LLC Prefetch


mechanism to fetch the date into the LLC.

Memory Interleaving Whether the CPU interleaves the physical memory


so that the memory can be accessed while another
is being refreshed.

Package C State Limit The amount of power available to the server


components when they are idle.

Patrol Scrub Whether the system actively searches for, and


corrects, single bit memory errors even in unused
portions of the memory on the server.

Cisco Intersight Managed Mode Configuration Guide


116
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

Patrol Scrub Interval Controls the time interval between each patrol scrub
memory access. A lower interval scrubs the memory
more often but requires more memory bandwidth.
Select a value between 5 and 23. The default value
is 8.
This option is used only if Patrol Scrub is enabled.

Processor C1E Allows the processor to transition to its minimum


frequency upon entering C1. This setting does not
take effect until after you have rebooted the server.

Processor C3 Report Whether the BIOS sends the C3 reports to the


operating system. When the OS receives the report,
it can transition the processor into the lower C3
power state to decrease energy usage while
maintaining optimal processor performance.

Processor C6 Report Whether the BIOS sends the C6 reports to the


operating system. When the OS receives the report,
it can transition the processor into the lower C6
power state to decrease energy usage while
maintaining optimal processor performance.

CPU C State Whether the system can enter a power savings mode
during idle periods.

P-STATE Coordination Allows you to define how BIOS communicates the


P-state support model to the operating system. There
are 3 models as defined by the Advanced
Configuration and Power Interface (ACPI)
specification.

Power Performance Tuning Determines if the BIOS or Operating System can


turn on the energy performance bias tuning.

Rank Interleaving Whether the CPU interleaves physical ranks of


memory so that one rank can be accessed while
another is being refreshed.

Single PCTL Facilitates single PCTL support for better processor


power management.

SMT Mode Whether the processor uses AMD Simultaneous


MultiThreading Technology, which allows
multithreaded software applications to execute
threads in parallel within each processor.

Sub Numa Clustering Whether the CPU supports sub NUMA clustering,
in which the tag directory and the memory channel
are always in the same region.

Cisco Intersight Managed Mode Configuration Guide


117
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

DCU Streamer Prefetch Whether the processor uses the DCU Streamer
Prefetch mechanism to analyze historical cache
access patterns and preload the most relevant lines
in the L1 cache.

SVM Mode Whether the processor uses AMD Secure Virtual


Machine Technology.

Workload Configuration This feature allows for workload optimization.

XPT Prefetch Whether XPT prefetch is used to enable a read


request sent to the last level cache to issue a copy
of that request to the memory controller prefetcher.

USB

All USB Devices Whether all physical and virtual USB devices are
enabled or disabled.

Legacy USB Support Whether the system supports legacy USB devices.

Make Device Non Bootable Whether the server can boot from a USB device.

xHCI Mode Whether xHCI mode is enabled or disabled.

Port 60/64 Emulation Whether the system supports 60h/64h emulation for
complete USB keyboard legacy support.

USB Port Front Whether the front panel USB devices are enabled
or disabled.

USB Port Internal Whether the internal USB devices are enabled or
disabled.

USB Port KVM Whether the KVM ports are enabled or disabled.

USB Port Rear Whether the rear panel USB devices are enabled or
disabled.

USB Port SD Card Whether the SD card drives are enabled or disabled.

USB Port VMedia Whether the virtual media devices are enabled or
disabled.

XHCI Legacy Support Whether the legacy xHCI mode is enabled or


disabled.

Property

ASPM Support Allows you to set the level of ASPM (Active Power
State Management) support in the BIOS.

Cisco Intersight Managed Mode Configuration Guide


118
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

IOH Resource Allocation Enables you to distribute 64KB of 16-bit IO


resources between IOH0 and IOH1 as per system
requirement.

Memory mapped IO above 4GB Whether to enable or disable memory mapped I/O
of 64-bit PCI devices to 4GB or greater address
space. Legacy option ROMs are not able to access
addresses above 4GB. PCI devices that are 64-bit
compliant but use a legacy option ROM may not
function correctly with this setting enabled.

MMCFG BASE Sets the low base address for PCIe adapters within
4GB.

Onboard 10Gbit LOM Whether 10Gbit LOM is enabled or disabled on the


server.

Onboard Gbit LOM Whether Gbit LOM is enabled or disabled on the


server.

NVMe SSD Hot-Plug Support Allows you to replace an NVMe SSD without
powering down the server.

SR-IOV Support Whether SR-IOV (Single Root I/O Virtualization)


is enabled or disabled on the server.

VGA Priority Allows you to set the priority for VGA graphics
devices if multiple VGA devices are found in the
system.

Server Management

Assert NMI on PERR Whether the BIOS generates a non-maskable


interrupt (NMI) and logs an error when a processor
bus parity error (PERR) occurs.

Assert NMI on SERR Whether the BIOS generates a non-maskable


interrupt (NMI) and logs an error when a system
error (SERR) occurs.

Baud rate What Baud rate is used for the serial port
transmission speed. If you disable Console
Redirection, this option is not available.

Consistent Device Naming Whether the Ethernet Network naming convention


is according to Consistent Device Naming (CDN)
or the traditional way of naming conventions.

Cisco Intersight Managed Mode Configuration Guide


119
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

Adaptive Memory Training The BIOS saves the memory training results
(optimized timing/voltage values) along with
CPU/memory configuration information and reuses
them on subsequent reboots to save boot time. The
saved memory training results are used only if the
reboot happens within 24 hours of the last save
operation.

BIOS Techlog Level The BIOS Tech log output to be controlled at more
a granular level. This reduces the number of BIOS
Tech log messages that are redundant, or of little
use.

OptionROM Launch Optimization The Option ROM launch is controlled at the PCI
Slot level, and is enabled by default. In
configurations that consist of a large number of
network controllers and storage HBAs having
Option ROMs, all the Option ROMs may get
launched if the PCI Slot Option ROM Control is
enabled for all. However, only a subset of
controllers may be used in the boot process. When
this token is enabled, Option ROMs are launched
only for those controllers that are present in boot
policy.

Console redirection Allows a serial port to be used for console


redirection during POST and BIOS booting. After
the BIOS has booted and the operating system is
responsible for the server, console redirection is
irrelevant and has no effect.

Flow Control Whether a handshake protocol is used for flow


control. Request to Send / Clear to Send (RTS/CTS)
helps to reduce frame collisions that can be
introduced by a hidden terminal problem.

FRB-2 Timer Whether the FRB-2 timer is used to recover the


system if it hangs during POST.

Legacy OS redirection Whether redirection from a legacy operating system,


such as DOS, is enabled on the serial port.

OS Boot Watchdog Timer Whether the BIOS programs the watchdog timer
with a predefined timeout value. If the Operating
System does not complete booting before the timer
expires, the CIMC resets the system and an error is
logged.
Note The OS Boot Watchdog Timer value
must not exceed 5 minutes.

Cisco Intersight Managed Mode Configuration Guide


120
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

OS Boot Watchdog Timer Policy What action the system takes if the watchdog timer
expires.

OS Boot Watchdog Timer Timeout What timeout value the BIOS uses to configure the
watchdog timer.

Out-of-Band Mgmt Port Used for Windows Special Administration Control


(SAC). This option allows you to configure the
COM port 0 that can be used for Windows
Emergency Management services. ACPI SPCR table
is reported based on this setup option.

Putty KeyPad Allows you to change the action of the PuTTY


function keys and the top row of the numeric
keypad.

Redirection After BIOS POST Whether BIOS console redirection should be active
after BIOS POST is complete and control given to
the OS bootloader.

Terminal Type What type of character formatting is used for


console redirection.

Boot Order Rules How the server changes the boot order list defined
when there are no devices of a particular device type
available or when the user defines a different boot
order using the server's BIOS Setup Utility.

Memory

BME DMA Mitigation Allows you to disable the PCI BME bit to mitigate
the threat from an unauthorized external DMA.

IOMMU Input Output Memory Management Unit (IOMMU)


allows AMD processors to map virtual addresses
to physical addresses.

Bank Group Swap Determines how physical addresses are assigned to


applications.

Chipselect Interleaving Whether memory blocks across the DRAM chip


selects for node 0 are interleaved.

Memory interleaving Whether the CPU interleaves the physical memory


so that the memory can be accessed while another
is being refreshed. This controls fabric level memory
interleaving. Channel, die and socket have
requirements based on memory populations and
will be ignored if the memory does not support the
selected option.

Cisco Intersight Managed Mode Configuration Guide


121
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

Memory interleaving size Determines the size of the memory blocks to be


interleaved. It also determines the starting address
of the interleave (bit 8,9,10 or 11).

DCPMM Firmware Downgrade Whether DCPMM firmware downgrade is enabled.

SMEE Whether the processor uses the Secure Memory


Encryption Enable (SMEE) function, which
provides memory encryption support.

Boot Options

Number of Retries Number of attempts to boot.

Cool Down Time (sec) The time to wait (in seconds) before the next boot
attempt.

Boot option retry Whether the BIOS retries NON-EFI based boot
options without waiting for user input.

IPV6 PXE Support Enables or disables IPV6 support for PXE.

Onboard SCU Storage Support Whether the onboard software RAID controller is
available to the server.

Onboard SCU Storage SW Stack Whether the onboard software stack is available to
the server.

Power ON Password This token requires that you set a BIOS password
before using the F2 BIOS configuration. If enabled,
password needs to be validated before you access
BIOS functions such as IO configuration, BIOS set
up, and booting to an operating system using BIOS.

P-SATA mode This options allows you to select the P-SATA mode.

SATA mode This options allows you to select the SATA mode.

VMD Enablement Whether NVMe SSDs that are connected to the PCIe
bus can be hot swapped. It also standardizes the
LED status light on these drives. LED status lights
can be optionally programmed to display specific
Failure indicator patterns.

Power and Performance

Core Performance Boost Whether the AMD processor increases its frequency
on some cores when it is idle or not being used
much.

Global C-state Control Whether the AMD processors control IO-based


C-state generation and DF C-states

Cisco Intersight Managed Mode Configuration Guide


122
Configuring Server Policies
Creating a BIOS Policy

Property Essential Information

L1 Stream HW Prefetcher Whether the processor allows the AMD hardware


prefetcher to speculatively fetch streams of data and
instruction from memory into the L1 cache when
necessary.

L2 Stream HW Prefetcher Whether the processor allows the AMD hardware


prefetcher to speculatively fetch streams of data and
instruction from memory into the L2 cache when
necessary.

Determinism Slider Allows AMD processors to determine how to


operate - Performance or Power.

cTDP Control Allows you to set customized value for Thermal


Design Power (TDP).

RAS Memory

CKE Low Policy Controls the DIMM power savings mode policy.

DRAM Refresh Rate The refresh interval rate for internal memory.

Low Voltage DDR Mode Whether the system prioritizes low voltage or high
frequency memory operations.

Mirroring Mode Memory mirroring enhances system reliability by


keeping two identical data images in memory.
This option is only available if you choose the
mirroring option for Memory RAS Config.

NUMA optimized Whether the BIOS supports NUMA.

Select Memory RAS configuration How the memory reliability, availability, and
serviceability (RAS) is configured for the server.

Sparing Mode Sparing optimizes reliability by holding memory in


reserve so that it can be used in case other DIMMs
fail. This option provides some memory redundancy,
but does not provide as much redundancy as
mirroring. The available sparing modes depend on
the current memory population.
This option is only available if you choose sparing
option for Memory RAS Config.

Intel Directed IO

Intel VT for directed IO Whether the processor uses Intel Virtualization


Technology for Directed I/O (VT-d).

Intel(R) VT-d Coherency Support Whether the processor supports Intel VT-d
Coherency.

Cisco Intersight Managed Mode Configuration Guide


123
Configuring Server Policies
Creating a Boot Order Policy

Property Essential Information

Intel(R) VT-d Interrupt Remapping Whether the processor supports Intel VT-d Interrupt
Remapping.

Intel(R) VT-d PassThrough DMA support Whether the processor supports Intel VT-d
Pass-through DMA.

Intel VTD ATS support Whether the processor supports Intel VT-d Address
Translation Services (ATS).

Main

POST Error Pause What happens when the server encounters a critical
error during POST.

TPM Support Trusted Platform Module (TPM) is a microchip


designed to provide basic security-related functions
primarily involving encryption keys. This option
allows you to control the TPM Security Device
support for the system.

QPI

QPI Link Frequency Select The Intel QuickPath Interconnect (QPI) link
frequency, in megatransfers per second (MT/s).

QPI Snoop Mode The Intel QuickPath Interconnect (QPI) snoop


mode.

Serial Port

Serial A Enable Whether serial port A is enabled or disabled.

Trusted Platform

Trusted Platform Module State Determines whether the TPM has been initiatlized
and attached to the Operating System.

Intel Trusted Execution Technology Support Intel Trusted Execution Technology (TXT) provides
greater protection for information that is used and
stored on the business server. This option allows
you to control the TXT support for the system.

3. Click Create.

Creating a Boot Order Policy


The Boot Order policy configures the linear ordering of devices and enables you to change the boot order and
boot mode. You can also add multiple devices under various device types, rearrange the boot order, and set
parameters for each boot device type.

Cisco Intersight Managed Mode Configuration Guide


124
Configuring Server Policies
Creating a Boot Order Policy

1. In the General page, configure the following parameters:

Property Essential Information

Organization Select the organization.

Name Enter a name for your policy.

Tag (optional) Enter a tag in the key value format. For example,
Org: IT or Site: APJ.

Description (optional) Enter a short description.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

BootMode The type of boot mode that is enabled. This can be


one of the following:
• Legacy—Uses the Master Boot Record (MBR)
partitioning scheme.
Select if the system is not UEFI-enabled.
• UEFI—Uses the GUID Partition Table (GPT).
Select Unified Extensible Firmware Interface
(UEFI) if the system is UEFI-enabled.

Note The Legacy boot mode is currently not


supported on Cisco UCS C225 and UCS
C245 M6 servers.

Enable Secure Boot Mode If UEFI secure boot is enabled, the boot mode is set
to UEFI by default.
Secure boot mode enforces that a device boots using
the software that is trusted by the Original
Equipment Manufacturer (OEM).

Cisco Intersight Managed Mode Configuration Guide


125
Configuring Server Policies
Creating a Boot Order Policy

Property Essential Information

Add Boot Device

Cisco Intersight Managed Mode Configuration Guide


126
Configuring Server Policies
Creating a Boot Order Policy

Property Essential Information


Select to add and configure a boot device. The
configuration options vary with boot device types.
The supported boot devices and its configuration
options for UCS standalone and FI-attached servers
are listed below:
• iSCSI Boot
• Device Name—Name of the boot device.
• Slot—The slot id of the boot device.
• Port—The port id of the boot device.

• Local CDD
• Device Name—Name of the boot device.

• Local Disk
Note This device allows the host to use
the virtual drive as a bootable
device.

• Device Name—Name of the boot device.


• Slot—The slot id of the boot device.

• NVMe
• Device Name—Name of the boot device.
• Bootloader Name—Name of the
bootloader image.
• Bootloader Description—Description
of the bootloader.
• Bootloader Path—Path to the boatloader
image.

Note The NVMe device can be


configured only on UEFI mode.

• PCH Storage
• Device Name—Name of the boot device.
• LUN—The Logical Unit Number (LUN)
of the boot device (0-255).

• PXE Boot
• Device Name—Name of the boot device.

Cisco Intersight Managed Mode Configuration Guide


127
Configuring Server Policies
Creating a Boot Order Policy

Property Essential Information


• IP Type—The IP address family type to
use during the PXE boot process.
• Slot—The slot ID of the adapter on which
the virtual ethernet interface is present.
• Interface Name/Port/ MAC Address—
The name or address of the underlying
virtual ethernet interface used by the PXE
boot device.

• SAN Boot
• Device Name—Name of the boot device.
• LUN—The Logical Unit Number (LUN)
of the boot device (0-255).
• Slot—The slot id of the boot device.
• Interface Name—The name of the
underlying vHBA interface.
• Target WWPN—The WWPN Address
of the underlying fiber channel interface

• SD Card
• Device Name—Name of the boot device.
• LUN—The Logical Unit Number (LUN)
of the boot device (0-255).
• Sub-Type— The sub-type for the selected
device:
• FlexUtil
• FlexFlash
• SDCard

• UEFI Shell
• Device Name—Name of the boot device.

Cisco Intersight Managed Mode Configuration Guide


128
Configuring Server Policies
Configuring an iSCSI Boot Policy

Property Essential Information


• USB
• Device Name—Name of the boot device.
• Sub-Type— The sub-type for the selected
device:
• CD
• FDD
• HDD

• Virtual Media
• Device Name—Name of the boot device.
• Sub-Type— The sub-type for the selected
device:
• None
Note This option is not
supported on UCS
FI-attached servers.

• CIMC Mapped DVD


• CIMC Mapped HDD
• KVM Mapped DVD
• KVM Mapped HDD
• KVM Mapped FDD

Note The device name of the boot devices can


be any string that adheres to the
following constraints. It should start and
end with an alphanumeric character. It
can have underscores and hyphens. It
cannot be more than 30 characters.

3. Click Create.

Configuring an iSCSI Boot Policy


iSCSI boot support allows you to initialize the Operating System on FI-attached blade and rack servers from
a remote disk across a Storage Area Network. The remote disk, known as the target, is accessed using TCP/IP
and iSCSI boot firmware.

Cisco Intersight Managed Mode Configuration Guide


129
Configuring Server Policies
Configuring an iSCSI Boot Policy

Prerequisites
The following are required to configure the iSCSI boot device:
• iSCSI Static Target Policy—When you select Static as the mode for configuring the iSCSI boot policy,
you can use the iSCSI Static Target policy to specify the primary target details. You can also specify the
details of a secondary target, if required.
• iSCSI Adapter Policy—Using this policy you can specify the TCP and DHCP Connection Timeout and
the retry count when the logical unit number of the boot device is busy.
• Creating an IQN Pool—Using this policy you can specify the TCP and DHCP Connection Timeout
and the retry count when the logical unit number of the boot device is busy.

Configure the following parameters

Property Essential Information

Target Interface
Target interface can be Auto or Static.

DHCP Vendor ID/IQN If you select Auto for the target interface, specify the
Initiator name, or the DHCP vendor ID. The vendor
ID can be up to 32 alphanumeric characters.

Static
If the target interface is Static specify the following parameters.

Primary Target Select the Primary Target policy. iSCSI target is the
remote disk in the storage area network from which
the operating system is initialized. This policy
specifies the Target Name, the IP Address of the
target, the Port, and the LUN ID.

Secondary Target Select the Secondary Target policy. Secondary Target


is optional

Adapter Policy Select the Adapter Policy for the iSCSI boot device.
The Adapter Policy specifies the TCP and DHCP
Timeouts, and the Retry Count if the LUN ID is busy.

Authentication
You can select CHAP or Mutual CHAP as the authentication method and specify the parameters. If you
have selected CHAP, specify the CHAP authentication parameters for iSCSI Target. Mutual CHAP is a
two-way DHCP mechanism and is more secure.

Cisco Intersight Managed Mode Configuration Guide


130
Configuring Server Policies
Configuring an iSCSI Boot Policy

Property Essential Information

CHAP For CHAP authentication, enter:


• Username: The user Id of the Initiator/Target
Interface. Enter between 1 and 128 characters,
spaces, or special characters.
• Password: Password of Initiator orTarget
Interface. Enter between 12 and 16 characters,
including special characters except spaces, tabs,
line breaks.
• Password Confirmation: Re-enter the password
that you entered. Both the password and
password confirmation have to match.

Mutual CHAP Mutual CHAP is a two-way CHAP mechanism. For


Mutual CHAP authentication, enter:
• Username: The user Id of the Initiator or Target
Interface. Enter between 1 and 128 characters,
spaces, or special characters.
• Password: Password of Initiator or Target
Interface. Enter between 12 and 16 characters,
including special characters except spaces, tabs,
line breaks.
• Password Confirmation: Re-enter the password
that you entered. Both the password and
password confirmation have to match.

Cisco Intersight Managed Mode Configuration Guide


131
Configuring Server Policies
Creating an iSCSI Adapter Policy

Property Essential Information

Initiator IP Source Select the method that determines the Initiator IP


Source. The methods to determine the Initiator IP
Source are:
• Pool: You can select an IP pool
• Auto: The IP is automatically determined
• Static:You can specify a static IP address as the
Initiator IP. Select Static and specify:
• IP Address: Enter the Static IP address
provided for iSCSI Initiator.
• Subnet Mask: Enter the 32-bit number that
masks an IP address and divides the IP
address into network address and host
address..
• Default Gateway: Enter the IP address of
the default IPv4 gateway.
• Primary DNS: Enter the IP address of the
primary Domain Name System server.
• Secondary DNS: Enter the IP address of
the secondary Domain Name System server.

Click Create.

Creating an iSCSI Adapter Policy


The iSCSI Adapter policy allows you to configure values for TCP Connection Timeout, DHCP Timeout, and
the Retry Count if the specified LUN ID is busy.
For the iSCSI Adapter policy configure the following parameters

Property Essential Information

TCP Connection Timeout Enter the number of seconds after which the TCP
connection times out.

DHCP Timeout Enter the number of seconds after which the DHCP
times out.

LUN Busy Retry Count Enter the number of times connection is to be


attempted when the LUN ID is busy.

Click Create.

Cisco Intersight Managed Mode Configuration Guide


132
Configuring Server Policies
Creating an iSCSI Static Target Policy

Creating an iSCSI Static Target Policy


The iSCSI Static Target policy allows you to specify the name, IP address, port, and logical unit number of
the primary target for iSCSI boot. You can optionally specify these details for a secondary target as well.
For the iSCSI Static Target policy, configure the following parameters

Property Essential Information

Target Name Enter the name of the target.

IP Address Enter the target IP address.

Port Enter the port number of the target.

LUN ID Enter the ID of the boot logical unit number.

Click Create.

Creating a Device Connector Policy


Device Connector Policy lets you choose the Configuration from Intersight only option to control
configuration changes allowed from Cisco IMC. The Configuration from Intersight only option is enabled
by default. You will observe the following changes when you deploy the Device Connector policy in Intersight:
• Validation tasks will fail:
• If Intersight Read-only mode is enabled in the claimed device.
• If the firmware version of the Cisco UCS Standalone C-Series Servers is lower than 4.0(1).

• If Intersight Read-only mode is enabled, firmware upgrades will be successful only when performed
from Intersight. Firmware upgrade performed locally from Cisco IMC will fail.
• IPMI over LAN privileges will be reset to read-only level if Configuration from Intersight only is enabled
through the Device Connector policy, or if the same configuration is enabled in the Device Connector
in Cisco IMC.

1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

Cisco Intersight Managed Mode Configuration Guide


133
Configuring Server Policies
Creating a Disk Group Policy

2. In the Policy Details page, enable or disable Configuration from Intersight only. This option is enabled
by default.
3. Click Create.

Creating a Disk Group Policy


The Disk Group policy defines how a disk group (a group of physical disks that are used for creating virtual
drives) is created and configured, and specifies the RAID level to be used for the disk group. With this policy,
you can select the physical disks that have to be part of a disk group. When a Disk Group policy is associated
with multiple virtual drives in a Storage policy, the virtual drives share the same disk group space.

Note This policy is not applicable for virtual drives for a Cisco Boot Optimised M.2 RAID Controller.

1. In the General page, configure the following parameters:

Property Essential Information

Organization Select the organization.

Name Enter a name for your policy.

Tag (optional) Enter a tag in the key value format. For example,
Org: IT or Site: APJ.

Description (optional) Enter a short description.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Virtual Drive Configuration

Cisco Intersight Managed Mode Configuration Guide


134
Configuring Server Policies
Creating a Disk Group Policy

Property Essential Information

RAID Level Set the Redundant Array of Inexpensive Disks


(RAID) level to ensure availability and redundancy
of data, and I/O performance.
The supported RAID levels for the disk group are:
• RAID0—Data is striped across all disks in the
array, providing fast throughput. There is no
data redundancy, and all data is lost if any disk
fails.
• RAID1—Data is written to two disks,
providing complete data redundancy if one
disk fails. The maximum array size is equal to
the available space on the smaller of the two
drives.
• RAID5—Data is striped across all disks in the
array. Part of the capacity of each disk stores
parity information that can be used to
reconstruct data if a disk fails. RAID 5
provides good data throughput for applications
with high read request rates.
• RAID6—Data is striped across all disks in the
array and two sets of parity data are used to
provide protection against failure of up to two
physical disks. In each row of data blocks, two
sets of parity data are stored.
• RAID10—This RAID uses mirrored pairs of
disks to provide complete data redundancy and
high throughput rates through block-level
striping. RAID 10 is mirroring without parity
and block-level striping. A minimum of four
disks are required for RAID 10.
• RAID50—Data is striped across multiple
striped parity disk sets to provide high
throughput and multiple disk failure tolerance.
• RAID60—Data is striped across multiple
striped dual parity disk sets to provide high
throughput and greater disk failure tolerance.

Local Disk Configuration - Disk Group (Span 0)

Drive Number Specify the drive number for the disk group
associated with the RAID controller.

Dedicated Hot Spares

Cisco Intersight Managed Mode Configuration Guide


135
Configuring Server Policies
Creating an IMC Access Policy

Property Essential Information

Dedicated Hot Spares Select Enable to use a hot spare drive in the case
of disk failure in the disk group.

Drive Number Specify the identified drive number to act as a


dedicated hot spare for the disk group.

Set Disks in JBOD state to Unconfigured good Select to allow users to convert any disks in JBOD
to be un-configured good disks so that they can be
used in the RAID group.

Atention All virtual drives in a disk group should be managed by using the same disk group policy.

3. Click Create.

Creating an IMC Access Policy


IMC Access policy allows to provide a VLAN ID and enables to associate it with an IP address of the server
mapped to the server profile.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

In-Band Configuration Enable, to have the server management services


made available using the uplink port.

VLAN ID Enter the VLAN ID to be used for server access


over the inband network. The field value can be
between 4 and 4093.

Cisco Intersight Managed Mode Configuration Guide


136
Configuring Server Policies
Creating an IPMI Over LAN Policy

Property Essential Information

IPv4 address configuration Select to determine the type of network for this
policy.
Note You can select only IPv4 address
configuration or both IPv4 and IPv6
configuraitons.

IPv6 address Configuration Select to determine the type of network for this
policy.
Note You can select only IPv6 address
configuration or both IPv4 and IPv6
configuraitons.

IP Pool

Select IP Pool Click to view the list of IP Pools available and select
an IP pool for In-Band configuration.

Out-Of-Band Configuration Enable, to have the server management services


made available using the management port.

IP Pool

Select IP Pool Click to view the list of IP Pools available and select
an IP pool for Out-Of-Band configuration.
Note Only IPv4 addresses are supported for
Out-Of-Band configuration.

Creating an IPMI Over LAN Policy


The IPMI over LAN policy defines the protocols for interfacing with a service processor that is embedded in
a server platform. The IPMI enables an operating system to obtain information about the system health and
control system hardware and directs the BMC to perform appropriate actions to address a problem. You can
create an IPMI Over LAN policy to manage the IPMI messages through Cisco Intersight. You can assign
these privileges to the IPMI sessions on the server:
• admin—You can create admin, user, and read-only sessions on servers with the "Administrator" user
role.
• read-only—You can only create read-only IPMI sessions on servers with the "Read-only" user role.
• user—You can create user and read-only sessions, but not admin sessions on servers with the "User"
role.

1. On the General page, configure the following parameters:

Cisco Intersight Managed Mode Configuration Guide


137
Configuring Server Policies
Creating an LDAP Policy

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Enable IPMI Over LAN The state of the IPMI Over LAN service on the
endpoint.

Privilege Level The highest privilege level that can be assigned to


an IPMI session on a server.
Note • This is applicable to Cisco UCS
C-Series Standalone M4, M5, and
M6 servers only.
• The value of the Privilege field
must match exactly the role
assigned to the user attempting to
log in. For example, if this field is
set to readonly and a user with the
admin role attempts to log in
through IPMI, that login attempt
will fail.

Encryption Key Used for IPMI communication. The key should have
an even number of hexadecimal characters and not
exceed 40 characters.
Note This is applicable to Cisco UCS C-Series
Standalone M4, M5 and M6 servers only.

3. Click Create.

Creating an LDAP Policy


Lightweight Directory Access Protocol (LDAP) stores and maintains directory information in a network.
When LDAP is enabled in the Cisco IMC, user authentication and role authorization is performed by the
LDAP server for user accounts not found in the local user database. You can enable and configure LDAP,
and configure LDAP servers and LDAP groups.

Cisco Intersight Managed Mode Configuration Guide


138
Configuring Server Policies
Creating an LDAP Policy

Note This policy, if attached to a server profile that is assigned to an Intersight Managed FI-attached UCS server,
will be ignored.

Property Essential Information

1. Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Enable LDAP The state of the LDAP service on the endpoint.

Base Settings

Base DN Base Distinguished Name. This field describes


where to load users and groups from.
It must be in the dc=domain,dc=com format for
Active Directory servers.

Domain The IPv4 domain that all users must be in.


This field is required unless you specify at least one
Global Catalog server address.

Timeout The number of seconds that Intersight waits until


the LDAP search operation times out.
If the search operation times out, Intersight tries to
connect to the next server listed on this tab, if one
is available.
Note The value you specify for this field could
impact the overall time.

Enable Encryption If enabled, the server encrypts all information it


sends to the LDAP server.

Binding Parameters

Cisco Intersight Managed Mode Configuration Guide


139
Configuring Server Policies
Creating an LDAP Policy

Property Essential Information

Bind Method It can be one of the following:


Anonymous—requires NULL username and
password. If this option is selected and the LDAP
server is configured for Anonymous logins, then
the user can gain access.
Configured Credentials—requires a known set of
credentials to be specified for the initial bind
process. If the initial bind process succeeds, then
the distinguished name (DN) of the user name is
queried and re-used for the re-binding process. If
the re-binding process fails, then the user is denied
access.
Login Credentials—requires the user credentials.
If the bind process fails, the user is denied access.
By default, the Login Credentials option is selected.

Bind DN The distinguished name (DN) of the user. This field


is editable only if you have selected Configured
Credentials option as the binding method.

Bind Password The password of the user. This field is editable only
if you have selected Configured Credentials option
as the binding method.

Search Parameters

Filter This field must match the configured attribute in


the schema on the LDAP server.
By default, this field displays sAMAccountName.

Group Attribute This field must match the configured attribute in


the schema on the LDAP server.
By default, this field displays memberOf.

Cisco Intersight Managed Mode Configuration Guide


140
Configuring Server Policies
Creating an LDAP Policy

Property Essential Information

Attribute An LDAP attribute that contains the role and locale


information for the user. This property is always a
name-value pair. The system queries the user record
for the value that matches this attribute name.
The LDAP attribute can use an existing LDAP
attribute that is mapped to the Cisco IMC user roles
and locales, or can modify the schema such that a
new LDAP attribute can be created. For example,
CiscoAvPair.
Note If you do not specify this property, the
user cannot login. Although the object
is located on the LDAP server, it should
be an exact match of the attribute that is
specified in this field.

Group Authorization

Group Authorization If enabled, user authentication is also done on the


group level for LDAP users that are not found in
the local user database.

Nested Group Search Depth Parameter to search for an LDAP group nested
within another defined group in an LDAP group
map. The parameter defines the depth of a nested
group search.

Configure LDAP Servers

Enable DNS If enabled, you can use DNS to configure access to


the LDAP servers.

Source Specifies how to obtain the domain name used for


the DNS SRV request. It can be one of the
following:
• Extracted—specifies using domain name
extracted-domain from the login ID
• Configured—specifies using the
configured-search domain.
• Configured-Extracted—specifies using the
domain name extracted from the login ID than
the configured-search domain.

Server The IP address or host name of the LDAP server.

Port The LDAP server port numbers.

Cisco Intersight Managed Mode Configuration Guide


141
Configuring Server Policies
Creating an LDAP Policy

Property Essential Information

User Search Precedence The order of search between the local user database
and LDAP user database. This can be one of the
following:
• Local User Database (Default setting)
• LDAP User Database

Add New LDAP Group

Name The name of the group in the LDAP server database


that is authorized to access the server.

Domain The LDAP server domain the group must reside in.

Role The role assigned to all users in this LDAP server


group. This can be one of the following:
• read-only—A user with this role can view
information but cannot make any changes.
• user—A user with this role can perform the
following tasks:
• View all information
• Manage the power control options such
as power on, power cycle, and power off
• Launch the KVM console and virtual
media
• Clear all logs
• Toggle the locator LED
• Set time zone
• Ping

• admin—A user with this role can perform all


actions available through the GUI, CLI, and
IPMI.

Port The LDAP server port numbers.

User Search Precedence The order of search between the local user database
and LDAP user database. This can be one of the
following:
• Local User Database (Default setting)
• LDAP User Database

Cisco Intersight Managed Mode Configuration Guide


142
Configuring Server Policies
Creating a Local User Policy

3. Click Create.

Creating a Local User Policy


The Local User policy automates the configuration of local user preferences. You can create one or more
Local User policies which contain a list of local users that need to be configured.

Note By default, IPMI support is enabled for all users

1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Password Properties Password properties apply only to Rack servers and


not to Blade Servers.

Enforce Strong Password Enables strong password policy.

Enable Password Expiry Enables password expiryon the endpoint.


Note Password expiry once set by the admin
is applicable for all users that are
subsequently created. The valid
Password Expiry Duration must be
greater than the Notification Period and
the Grace Period. If otherwise, you will
see an User Password Expiry Policy
configuration error.

Password Expiry Duration The time period that you can set for the existing
password to expire (from the time you set a new
password or modify an existing one). The range is
between 1 to 3650 days.

Notification Period Notifies the time by when the password expires.


Enter a value between 0 to 15 days. Entering 0
disables this field.

Cisco Intersight Managed Mode Configuration Guide


143
Configuring Server Policies
Creating a Local User Policy

Property Essential Information

Grace Period Time period till when the existing password can
still be used, after it expires. Enter a value between
0 to 5 days. Entering 0 disables this field.

Password History The number of occurrences when a password was


entered. When this is enabled, you cannot repeat a
password. Enter a value between 0 to 5. Entering 0
disables this field.

Always Send User Password When enabled, the user password is always sent to
the endpoint device. When not enabled, the user
password is sent to the endpoint device for new
users and when the password is changed for existing
users.

Add New User

Enable Account Enables the user account on the endpoint.

New User Enables new user configuration.

Username The username for the user.


Enter between 1 and 16 characters.

Role The role associated with the user on the endpoint.


• read-only—A user with this role can view
information but cannot make any changes.
• user—The user role type is supported only in
racks. A user with this role can perform the
following tasks:
• View all information
• Manage the power control options such
as power on, power cycle, and power off
• Launch the KVM console and virtual
media
• Clear all logs
• Ping

• admin—A user with this role can perform all


actions available through the GUI, CLI, and
IPMI.

Cisco Intersight Managed Mode Configuration Guide


144
Configuring Server Policies
Creating an NTP Policy

Property Essential Information

Password The password for this user name. When you move
the mouse over the help icon beside the field, the
following guidelines to set the password are
displayed:
• The password must have a minimum of 8 and
a maximum of 14 characters.
• The password must not contain the User Name.
• The password must contain characters from
three of the following four categories:
• English uppercase characters (A through
Z).
• English lowercase characters (a through
z).
• Base 10 digits (0 through 9).
• Non-alphabetic characters (!, @, #, $, %,
^, &, *, -, _, , =, '').

These rules are meant to define a strong password


for the user, for security reasons. However, if you
want to set a password of your choice ignoring these
guidelines, click theDisable Strong Password
button on the Local Users tab. While setting a
password when the strong password option is
disabled, you can use between 1- 20 characters.

Password Confirmation The password repeated for confirmation purposes.

3. Click Create.

Creating an NTP Policy


The NTP policy enables the NTP service to configure a UCS system that is managed by Cisco Intersight to
synchronize the time with an NTP server. You must enable and configure the NTP service by specifying the
IP/DNS address of at least one server or a maximum of four servers that function as NTP servers. When you
enable the NTP service, Cisco Intersight configures the NTP details on the endpoint.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Cisco Intersight Managed Mode Configuration Guide


145
Configuring Server Policies
Creating an SD Card Policy

Property Essential Information

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Enable NTP Enables NTP policy configuration.

NTP Servers A collection of NTP Server IP addresses or


hostnames.

Time Zone A collection of time zones from which you can


select a time zone for the endpoint.
This property is applicable to switches and to Cisco
IMC (standalone) servers.

When a hostname is used for NTP configuration, DNS server information must be configured in the
Network Connectivity policy.
3. Click Create.

Creating an SD Card Policy


The SD Card policy in Cisco Intersight configures the Cisco FlexFlash and FlexUtil Secure Digital (SD) cards
for the Cisco UCS C-Series Standalone M4, M5 servers, and Cisco UCS C-Series M5 servers in a Cisco
Intersight-Managed Fabric Interconnect Domain. This policy specifies details of virtual drives on the SD
cards. You can configure the SD cards in the Operating System Only, Utility Only, or Operating System +
Utility modes.
When two cards are present in the Cisco FlexFlash controller and Operating System is chosen in the SD card
policy, the configured OS partition is mirrored. If only single card is available in the Cisco FlexFlash controller,
the configured OS partition is non-RAID. The utility partitions are always set as non-RAID.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Cisco Intersight Managed Mode Configuration Guide


146
Configuring Server Policies
Creating an SD Card Policy

Property Essential Information

Operating System Only

Operating System Enables the Operating System partition.

Operating System Partition Name The name for the Operating System partition.

Utility Only

Diagnostics Enables the Operating System health diagnostics


utility.

Drivers Enables virtual driver utility.

Host Upgrade Utility Enables Host Upgrade Utility (HUU).

Server Configuration Utility Enables Server Configuration Utility (SCU).

User Partition Enables user partition.

User Partition Name The user partition name.

Operating System + Utility

Diagnostics Enables the operating system health diagnostics


utility.

Drivers Enables virtual driver utility.

Host Upgrade Utility Enables Host Upgrade Utility (HUU).

Server Configuration Utility Enables Server Configuration Utility (SCU).

User Partition Enables user partition.

User Partition Name The user partition name.

Operating System Partition Enables the Operating System partition.

Operating System Partition Name The name for the Operating System partition.

3. Click Create.

Exceptions
• SD Card Policy is not supported on M6 servers.
• SD Card Policy is not imported with a Server Profile when the SD Cards are not present in the server.
• Diagnostics is applicable for M5 Series only.
• For the Operating System+Utility mode the M5 servers require at least 1 FlexFlash + 1 FlexUtil card.

Cisco Intersight Managed Mode Configuration Guide


147
Configuring Server Policies
Create a Serial Over LAN Policy

Create a Serial Over LAN Policy


The Serial Over LAN policy enables the input and output of the serial port of a managed system to be redirected
over IP. You can create one or more Serial over LAN policies which contain a specific grouping of Serial
over LAN attributes that match the needs of a server or a set of servers.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Enable Serial Over LAN The state of Serial Over LAN service on the
endpoint.

Cisco Intersight Managed Mode Configuration Guide


148
Configuring Server Policies
Create a Serial Over LAN Policy

Property Essential Information

COM Port The serial port through which the system routes
Serial Over LAN communication.
• com0—SoL communication is routed through
COM port 0, an externally accessible serial
port that supports either a physical RJ45
connection to an external device or a virtual
SoL connection to a network device.
If you select this option, the system enables
SoL and disables the RJ45 connection, which
means that the server can no longer support an
external serial device.
• com1—SoL communication is routed through
COM port 1, an internal port accessible only
through SoL.
If you select this option, you can use SoL on
COM port 1 and the physical RJ45 connection
on COM port 0.

Note • This is applicable to Cisco UCS


C-Series Standalone M4, M5, and
M6 servers only.
• Serial Port is available only on
some Cisco UCS C-Series servers.
If it is unavailable, the server uses
COM port 0 by default. Changing
the Com Port setting disconnects
any existing SoL sessions.

Baud Rate The Baud Rate used for Serial Over LAN
communication. The rate can be:
• 9600 bps
• 19.2 kbps
• 38.4 kbps
• 57.6 kbps
• 115.2 kbps

Note The baud rate must match the baud rate


configured in the server serial console.

Cisco Intersight Managed Mode Configuration Guide


149
Configuring Server Policies
Create SSH Policy

Property Essential Information

SSH Port The SSH port used to access Serial Over LAN
directly. Enables bypassing Cisco IMC shell to
provide direct access to Serial Over LAN.
The valid range is 1024 to 65535. The default value
is 2400.
Note • This is applicable to Cisco UCS
C-Series Standalone M4, M5 and
M6 servers only.
• Changing the SSH Port setting
disconnects any existing SSH
sessions.

3. Click Create.

Create SSH Policy


The SSH policy enables an SSH client to make a secure, encrypted connection. You can create one or more
SSH policies that contain a specific grouping of SSH properties for a server or a set of servers.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Enable SSH Policy Enables SSH.

SSH Port The port used for secure shell access.

SSH Timeout (seconds) The number of seconds to wait before the system
considers a SSH request to have timed out.
Enter an integer between 60 and 10,800. The default
is 1,800 seconds.

3. Click Create.

Cisco Intersight Managed Mode Configuration Guide


150
Configuring Server Policies
Creating a Virtual KVM Policy

Creating a Virtual KVM Policy


The KVM console is an interface that emulates a direct keyboard, video, and mouse (KVM) connection to
the server. It allows you to control the server from a remote location and to map physical locations to virtual
drives that can by accessed by the server during this KVM session.
Enables specific grouping of virtual KVM properties. This policy lets you specify the number of allowed
concurrent KVM sessions, port information, and video encryption options.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Enable Virtual KVM The state of the vKVM service on the endpoint.

Max Sessions The maximum number of concurrent KVM sessions


allowed.

Remote Port The port for remote KVM communication. The port
range is from 1024 to 49151. The default is 2068.

Enable Video Encryption Enables encryption on all video information sent


through KVM. The Video Encryption is enabled by
default.
Note For firmware versions 4.2(1a) or higher,
this encryption parameter is deprecated
and disabling the encryption will further
result in validation failure during the
server profile deployment.

Enable Local Server Video Enables KVM session displays on any monitor
attached to the server.
Note This is applicable to Cisco UCS C-Series
Standalone M4, M5, and M6 servers
only.

3. Click Create.

Cisco Intersight Managed Mode Configuration Guide


151
Configuring Server Policies
Creating a Virtual Media Policy

Exceptions
• The virtual media viewer is accessed through the KVM. If you disable the KVM console, Cisco IMC
also disables access to all virtual media devices attached to the host.
• After a KVM vMedia session is mapped, if you change the KVM management policy, it will result in a
loss of the vMedia session. You must re-map the KVM vMedia session again.

Creating a Virtual Media Policy


The Virtual Media policy enables you to install an operating system on the server using the KVM console
and virtual media, mount files to the host from a remote file share, and enable virtual media encryption. You
can create one or more virtual media policies, which could contain virtual media mappings for different OS
images, and configure up to two virtual media mappings, one for ISO files through CDD and the other for
IMG files through HDD.
1. In the General page, configure the following parameters:

Property Essential Information

Organization Select the organization.

Name Enter a name for your policy.

Tag (optional) Enter a tag in the key value format. For example,
Org: IT or Site: APJ.

Description (optional) Enter a short description.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Enable Virtual Media Select this option to enable the virtual media policy.
This property is enabled by default.

Enable Virtual Media Encryption Select this option to enable encryption of the virtual
media communications. This property is enabled
by default.
Note For firmware versions 4.2(1a) or higher,
this encryption parameter is deprecated
and disabling the encryption will further
result in validation failure during the
server profile deployment.

Enable Low Power USB Select this option to enable the appearance of virtual
drives on the boot selection menu after mapping the
image and rebooting the host. This property is
enabled by default.

Add Virtual Media

Cisco Intersight Managed Mode Configuration Guide


152
Configuring Server Policies
Creating a Virtual Media Policy

Property Essential Information

Virtual Media Type Select the remote virtual media type:


• CDD
• HDD

NFS/CIFS/HTTP/HTTPS
The properties below vary depending on the tab that is selected.

Name The identity of the image for virtual media mapping.

File Location Provide the remote file location path: Host Name
or IP address/file path/file name
• IP Address—The IP address or the hostname
of the remote server.
• File Path—The path to the location of the
image on the remote server.
• File Name—The name of the remote file in
.iso or .img format.

The remote file location path for virtual media


mapping, the options include:
• HDD Virtual Media: hostname or IP address
/filePath/fileName.img
• CDD Virtual Media: hostname or IP address
/filePath/fileName.iso
• HDD Virtual media for HTTP:
http://server-hostname-or-ip/filePath/fileName.img
• CDD Virtual media for HTTP:
http://server-hostname-or-ip/filePath/fileName.iso
• HDD Virtual media for HTTPS:
https://server-hostname-or-ip/filePath/fileName.img
• CDD Virtual media for HTTPS:
https://server-hostname-or-ip/filePath/fileName.iso

Username The username to log in to the remote server. This


field is displayed on selecting CIFS, HTTP, or
HTTPS.

Password The password associated with the username. This


field is displayed on selecting CIFS, HTTP, or
HTTPS.

Cisco Intersight Managed Mode Configuration Guide


153
Configuring Server Policies
Creating a Virtual Media Policy

Property Essential Information

Mount Options The mount options for the virtual media mapping.
The field can be left blank or filled in a comma
separated list using the following options:
• For NFS, supported options are ro, rw, nolock,
noexec, soft, port=VALUE, timeo=VALUE,
retry=VALUE.
• For CIFS, supported options are soft, nounix,
noserverino, guest, ver=3.0, or ver=2.0.
Note If the firmware version is 4.1 or
higher, and the CIFS version is
lower than 3.0, the mount option
field must be entered with the
version value (vers=VALUE). For
example, vers=2.0.

• For HTTP and HTTPS, the only supported


option is noauto.

Authentication Protocol Select the authentication protocol when CIFS is


used for communication with the remote server.
This field is displayed on selecting CIFS.
• None—No authentication is used
• ntlm—NT LAN Manager (NTLM) security
protocol. Use this option only with Windows
2008 R2 and Windows 2012 R2.
• ntlmi—NTLMi security protocol. Use this
option only when you enable Digital Signing
in the CIFS Windows server.
• ntlmv2—NTLMv2 security protocol. Use this
option only with Samba Linux.
• ntlmv2i—NTLMv2i security protocol. Use
this option only with Samba Linux.
• ntlmssp—NT LAN Manager Security Support
Provider (NTLMSSP) protocol. Use this option
only with Windows 2008 R2 and Windows
2012 R2.
• ntlmsspi—NT LAN Manager Security Support
Provider (NTLMSSPI) protocol. Use this
option only when you enable Digital Signing
in the CIFS Windows server.

Add Click Add to confirm adding the virtual media.

Cisco Intersight Managed Mode Configuration Guide


154
Configuring Server Policies
Creating a Network Connectivity Policy

3. Click Create.

Exceptions
• When an answer file is embedded in the OS ISO, it fails to boot from vMedia when the bootmode is set
to UEFI, and the OS installation fails on Cisco UCS C-Series Standalone M4 servers.
• vMedia mapping of the OS image for HTTPS based share fails to mount.

Creating a Network Connectivity Policy


The Network Connectivity policy enables you to configure and assign IPv4 and IPv6 addresses.
Dynamic DNS
Dynamic DNS (DDNS) is used to add or update the resource records on the DNS server. When you enable
the DDNS option, the DDNS service records the current hostname, Domain name, and the management IP
address and updates the resource records in the DNS server.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following properties:


Common Properties

Property Essential Information

Enable Dynamic DNS Enables Dynamic DNS.


This property is not applicable to Fabric
Interconnects.

Dynamic DNS Update Domain Specify the dynamic DNS Domain. The Domain
can be either a main Domain or a sub-Domain.
This property is not applicable to Fabric
Interconnects.

IPv4 Properties

Cisco Intersight Managed Mode Configuration Guide


155
Configuring Server Policies
Creating a Network Connectivity Policy

Property Essential Information

Obtain IPv4 DNS Server Addresses from DHCP Whether the IPv4 addresses are obtained from
Dynamic Host Configuration Protocol (DHCP) or
from a specifically configured set of DNS servers.
• Enabled—Intersight uses DHCP
• Disabled—Intersight uses a configured set of
IPv4 DNS servers.

This property is not applicable to Fabric


Interconnects.

Preferred IPv4 DNS Server The IP address of the primary DNS server. This
property is displayed only when Obtain IPv4 DNS
Server Addresses from DHCP is disabled.

Alternate IPv4 DNS Server The IP address of the secondary DNS server. This
property is displayed only when Obtain IPv4 DNS
Server Addresses from DHCP is disabled.

Property Essential Information

Enable IPv6 Whether IPv6 is enabled. You can configure IPv6


properties only if this property is enabled.

IPv6 Properties

Property Essential Information

Obtain IPv6 DNS Server Addresses from DHCP Whether the IPv6 addresses are obtained from
Dynamic Host Configuration Protocol (DHCP) or
from a specifically configured set of DNS servers.
• Enabled—Intersight uses DHCP
• Disabled—Intersight uses a configured set of
IPv6 DNS servers.

This property is not applicable to Fabric


Interconnects.

Preferred IPv6 DNS Server The IP address of the primary DNS server. This
property is displayed only when Obtain IPv6 DNS
Server Addresses from DHCP is disabled.

Alternate IPv6 DNS Server The IP address of the secondary DNS server. This
property is displayed only when Obtain IPv6 DNS
Server Addresses from DHCP is disabled.

3. Click Create.

Cisco Intersight Managed Mode Configuration Guide


156
Configuring Server Policies
Creating a SMTP Policy

Creating a SMTP Policy


Simple Mail Transfer Protocol (SMTP) sends server faults as email alerts to the configured SMTP server.
Sets the state of the SMTP client in the managed device. You can specify the preferred settings for outgoing
communication and select the fault severity level to report and the mail recipients.

Note This policy, if attached to a server profile that is assigned to an Intersight Managed FI-attached UCS server,
will be ignored.

1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. In the Policy Details page, configure the following parameters:

Property Essential Information

Enable SMTP Enables or disables the SMTP policy.

SMTP Server Address The IP address or host name of the SMTP server.

SMTP Port The port number used by the SMTP server for
outgoing SMTP communication.
The range is from 1 to 65535. The default is 25.

Minimum Severity The minimum fault severity level to receive email


notifications. Email notifications are sent for all
faults whose severity is equal to or greater than the
chosen level.

SMTP Alert Sender Address The sender IP address or hostname of all the SMTP
mail alerts.

Mail Alert Recipients A list of email addresses that will receive


notifications for faults.

3. Click Create.

Cisco Intersight Managed Mode Configuration Guide


157
Configuring Server Policies
Creating an SNMP Policy

Creating an SNMP Policy


The SNMP policy configures the SNMP settings for sending fault and alert information by SNMP traps from
the managed devices. This policy supports SNMP versions such as SNMPv1, SNMPv2(includes v2c), and
SNMPv3. Any existing SNMP Users or SNMP Traps configured previously on the managed devices are
removed and replaced with users or traps that you configure in this policy. If you have not added any users
or traps in the policy, the existing users or traps on the server are removed.
Using the SNMP Policy you can enable or disable SNMP, specify the access and community strings, and
provide the SNMP user details that is used to retrieve data.
1. In the General page, configure the following parameters:

Property Essential Information

Organization Select the organization.

Name Enter a name for your policy.

Tag (optional) Enter a tag in the key value format.

Description (optional) Enter a short description.

2. In the Policy Details page, configure the following parameters:

Property Essential Information

Enable SNMP Displays the state of the SNMP Policy on the


endpoint. Enable this option for the endpoint to send
SNMP traps to the designated host.

SNMP Port The port on which Cisco IMC SNMP agent runs.

Access Community String Enter the SNMPv1, SNMPv2 community string or


the SNMPv3 username. This field allows maximum
of 18 characters.
Note If the field is empty, it indicates that the
SNMPv1 and SNMPv2c users are
disabled.

SNMP Community Access The controls access to the information in the


inventory tables. Applicable only for SNMPv1 and
SNMPv2c users.
Note This property is supported only in UCS
Standalone C-Series M4, M5, and M6
servers.

Cisco Intersight Managed Mode Configuration Guide


158
Configuring Server Policies
Creating an SNMP Policy

Property Essential Information

Trap Community String Enter the SNMP community group name used for
sending SNMP trap to other devices.
Note This field is applicable only for
SNMPv2c trap host or destination.

System Contact The contact person responsible for the SNMP


implementation. Enter a string up to 64 characters,
such as an email address or a name and telephone
number.
Note This property is supported only in UCS
Standalone C-Series M4, M5, and M6
servers.

System Location The location of host on which the SNMP agent


(server) runs.
Note This property is supported only in UCS
Standalone C-Series M4, M5, and M6
servers.

SNMP Engine Input ID The user-defined unique identification of the static


engine.
Note This property is supported only in UCS
Standalone C-Series M4, M5, and M6
servers.

SNMP Users

Name Enter the SNMP username. This field must have a


minimum of 1 and a maximum of 31 characters.

Security Level Select the security mechanism for communication


between the agent and the manager that include:
• AuthPriv
• AuthNoPriv

Auth Type Select SHA as the authorization protocol for


authenticating the user.
Note The MD5 authorization protocol is not
supported.

Auth Password Enter the authorization password for the user.

Auth Password Confirmation Enter the authorization password confirmation for


the user.

Cisco Intersight Managed Mode Configuration Guide


159
Configuring Server Policies
Creating a Storage Policy

Property Essential Information

Privacy Type Select AES as the privacy protocol for the user.
Note The DES privacy type is deprecated to
meet security standards.

Privacy Password Enter the privacy password for the user.

Privacy Password Confirmation Enter the privacy password confirmation for the
user.

SNMP Trap Destinations

Enable Enable this option to use the SNMP policy.

SNMP Version Select v2 or v3 as the SNMP version for the trap.

User Select the SNMP user for the trap. You can define
maximum of 15 trap users.
Note This field is applicable only to SNMPv3.

Trap Type Select the trap type to receive a notification when


a trap is received at the destination:
• Trap
• Inform

Destination Address Provide the address to which the SNMP trap


information can be sent. You are allowed to define
maximum of 15 trap destinations.

Port Enter the port number for the server to communicate


with trap destination. The range is from 1 to 65535.
The default is 162.

3. Click Create.

Creating a Storage Policy


The Storage policy allows you to create drive groups, virtual drives, configure the storage capacity of a virtual
drive, and configure the M.2 RAID controllers.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Cisco Intersight Managed Mode Configuration Guide


160
Configuring Server Policies
Creating a Storage Policy

Property Essential Information

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

General Configuration

Use JBOD Drives for Virtual Drive creation Enable this option to use disks in JBOD state for
creating virtual drives.

Unused Disks State Select the state to which unused disks in this policy
are to be moved. The state can be any one of
UnconfiguredGood, or JBOD.
Selecting No Change leaves the state unchanged.

M.2 Configuration Enable to specify the slot of the M.2 RAID


controller. The slot is required for virtual drive
creation.
This is the only configuration that is needed to
create virtual drives on M.2 drives. The disk slots
used by the M.2 controller are automatically added.

Slot of the M.2 RAID Controller for Virtual Select the slot of the M.2 RAID controller for virtual
Drive Creation drive creation. The slots that can be selected are:
• MSTOR-RAID-1 — Select this option if there
is only one M.2 RAID controller slot, or if
there are two slots for the M.2 RAID controller
and the virtual drive has to be created on the
controller in the first slot.
• MSTOR-RAID-2 — Select this option if there
are two slots for the M.2 RAID controller and
the virtual drive has to be created on the
controller in the second slot.
• MSTOR-RAID-1,MSTOR-RAID-2 — Select
this option to create virtual drives on
controllers in either or both slots.

Drive Group Configuration Enable to add RAID drive groups that can be used
to create virtual drives. You can also specify the
Global Hot Spares information.
This configuration is not applicable for M.2 RAID
controllers.

Cisco Intersight Managed Mode Configuration Guide


161
Configuring Server Policies
Creating a Storage Policy

Property Essential Information

Global Hot Spares Specify the disks that are to be used as hot spares,
globally for all the RAID groups.
The allowed value is a number range separated by
a comma or a hyphen.

Add Drive Group Click to add a drive group

Drive Group Name Enter the name of the drive group


The name can be 1 to 15 characters long and can
contain alphanumeric characters, and special
characters '-' (hyphen), '_' (underscore, ':' (colon),
and '.' (period).

Cisco Intersight Managed Mode Configuration Guide


162
Configuring Server Policies
Creating a Storage Policy

Property Essential Information

RAID Level The RAID level of a disk group describes how the
data is organized on the disk group for the purpose
of ensuring availability, redundancy of data, and
I/O performance. The levels are:
• RAID0—Data is striped across all disks in the
array, providing fast throughput. There is no
data redundancy, and all data is lost if any disk
fails.
• RAID1—Data is written to two disks,
providing complete data redundancy if one
disk fails. The maximum array size is equal to
the available space on the smaller of the two
drives.
• RAID5—Data is striped across all disks in the
array. Part of the capacity of each disk stores
parity information that can be used to
reconstruct data if a disk fails. RAID 5
provides good data throughput for applications
with high read request rates.
• RAID6—Data is striped across all disks in the
array and two sets of parity data are used to
provide protection against failure of up to two
physical disks. In each row of data blocks, two
sets of parity data are stored.
• RAID10—RAID 10 uses mirrored pairs of
disks to provide complete data redundancy and
high throughput rates through block-level
striping. RAID 10 is mirroring without parity
and block-level striping. A minimum of four
disks are required for RAID 10.
• RAID50—Data is striped across multiple
striped parity disk sets to provide high
throughput and multiple disk failure tolerance.
• RAID60—Data is striped across multiple
striped dual parity disk sets to provide high
throughput and greater disk failure tolerance.

Number of Spans Number of span groups to be created for the RAID


group. RAID levels with no nesting have a single
span.
Note Number of spans appears only when a
RAID level with spans is selected.

Drive Selection

Cisco Intersight Managed Mode Configuration Guide


163
Configuring Server Policies
Creating a Storage Policy

Property Essential Information

Drive Array Span 0 Enter the drive array span. RAID levels RAID0,
RAID1, RAID5, and RAID6 that do not have spans
have only one disk group. RAID levels with spans
have multiple disk groups with each disk group
representing a span.
RAID levels without spans have one span group
and RAID levels with spans have two to eight span
groups.
Note If you have selected a RAID level
without spans, then the field Drive Array
Span 0 alone appears. If you have
selected a RAID level with spans, you
would have had to specify the number
of spans. In this scenario, as many Drive
Array Span fields as there are spans
appear for you to specify the details.

Dedicated Hot Spares Specify the collection of drives to be used as hot


spares for this drive group.
The allowed value is a number range separated by
a comma or a hyphen.

Add Click Add to add the drive group.

Add Virtual Drive

Drive Groups Select the drive groups on which the virtual drive
is to be created.

Number of Copies Enter the number of copies of the virtual drive that
is to be created. You can create a maximum of 10
copies.

Virtual Drive Configuration

Virtual Drive Name Enter the name of the virtual drive.


The name can be 1 to 15 characters long and can
contain alphanumeric characters, and special
characters '-' (hyphen), '_' (underscore, ':' (colon),
and '.' (period).

Size (MiB) Virtual drive size in MebiBytes. Size is mandatory


except when the Expand to Available option is
enabled.

Expand to Available Enable for the virtual drive to use all the space
available in the disk group. When this flag is
enabled, the size property is ignored.

Cisco Intersight Managed Mode Configuration Guide


164
Configuring Server Policies
Creating a Storage Policy

Property Essential Information

Set as Boot Drive Select to use this virtual drive as a boot drive.

Strip Size Select the strip size required. Allowed values are
64KiB, 128KiB, 256KiB, 512KiB, 1 MiB.

Access Policy Select the type of access the host has to this virtual
drive:
• Read Write—Enables host to perform
read-write on the virtual drive
• Read Only—Host can only read from the
virtual drive.
• Blocked—Host can neither read nor write to
the virtual drive.

Read Policy Select the read ahead mode for this virtual drive:
• Always Read Ahead
• No Read Ahead

Write Policy Select the mode to be used to write to this virtual


drive:
• Write Through—Data is written through the
cache and to the physical drives. Performance
is improved, because subsequent reads of that
data can be satisfied from the cache.
• Write Back Good BBU—With this policy,
write caching remains Write Back even if the
battery backup unit is in good condition.
• Always Write Back—Data is stored in the
cache, and is only written to the physical drives
when space in the cache is needed.

Disk Cache Select the disk cache policy for this virtual drive.
The values are:
• Unchanged
• Enabled
• Disabled

Add Click Add to add the virtual drive.

Single Drive RAID Configuration Enable to create RAID0 virtual drives on each
physical drive.

Cisco Intersight Managed Mode Configuration Guide


165
Configuring Server Policies
Creating a Storage Policy

Property Essential Information

Drive Slots Specify the set of drive slots where RAID0 virtual
drives are to be created.
Note Single drive RAID allows you to add
slots only where disks are planned to be
inserted in future.

Strip Size Select the strip size required. Allowed values are
64KiB, 128KiB, 256KiB, 512KiB, 1MiB.

Access Policy Select the type of access the host has to this virtual
drive:
• Read Write—Enables host to perform
read-write on the virtual drive
• Read Only—Host can only read from the
virtual drive.
• Blocked—Host can neither read nor write to
the virtual drive.

Read Policy Select the read ahead mode for this virtual drive:
• Always Read Ahead
• No Read Ahead

Write Policy Select the mode to be used to write to this virtual


drive:
• Write Through—Data is written through the
cache and to the physical drives. Performance
is improved, because subsequent reads of that
data can be satisfied from the cache.
• Write Back Good BBU—With this policy,
write caching remains Write Back even if the
battery backup unit is in good condition.
• Always Write Back—Data is stored in the
cache, and is only written to the physical drives
when space in the cache is needed.

Disk Cache Select the disk cache policy for this virtual drive.
The values are:
• Unchanged
• Enabled
• Disabled

Cisco Intersight Managed Mode Configuration Guide


166
Configuring Server Policies
Creating a Syslog Policy

3. Click Create.

Note The Delete Virtual Drives option is not available in Storage Policy. Use the Storage Controllers page to delete
virtual drives

Creating a Syslog Policy


The Syslog policy defines the logging level (minimum severity) to report for a log file collected from an
endpoint, the target destination to store the Syslog messages, and the Hostname/IP Address, port information,
and communication protocol for the Remote Logging Server(s).
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Description (Optional) Provide a short description

Add Tag (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Local Logging

Minimum Severity to Report Select the lowest severity level to report in the
remote log. The severity levels are:
• Warning
• Emergency
• Alert
• Critical
• Error
• Notice
• Informational
• Debug

Remote Logging - Syslog Server 1 and Syslog Server 2

Cisco Intersight Managed Mode Configuration Guide


167
Configuring Server Policies
Creating a Power Policy for Server

Property Essential Information

Enable Select this option to enable or disable the Syslog


policy.

Hostname/IP Address Enter the hostname or IP address of the Syslog


server to store the Cisco IMC log. You can set an
IPv4 or IPv6 address or a domain name as the
remote system address.

Port Enter the destination port number of the Syslog


server between 1 and 65535. The default port
number is 514.

Protocol Select the transport layer protocol for transmission


of log messages to the syslog server. The options
are:
• TCP
• UDP

Minimum Severity To Report Select the lowest severity level to report in the
remote log. The severity levels are:
• Warning
• Emergency
• Alert
• Critical
• Error
• Notice
• Informational
• Debug

3. Click Create.

Creating a Power Policy for Server


This policy enables configuration of power redundancy, power profiling, and power restore for servers.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Cisco Intersight Managed Mode Configuration Guide


168
Configuring Server Policies
Creating a Power Policy for Server

Property Essential Information

Set Tags (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

Description (Optional) Provide a short description

2. On the Policy Details page, navigate to All Platforms tab.


3. Configure the following parameters:

Property Essential Information

Power Profiling Enables/disables the power profiling of the system


Enabled—When enabled, it allows the CIMC to
run power profiling utility during BIOS boot to
determine the power needs of the server.
Disabled—When disabled, power profiling is not
run.

Power Restore
Allows the user to configure the power restore state of the server on the CIMC. In the absence of IMM
connectivity, the CIMC will use this policy to recover the host power after a power loss event.

Last State Sets the host power to whatever state it was in


before the power loss event.

Always On Always power on the host after a power loss event.

Always Off Always keep the host power off after a power loss
event.

4. Click Create.

Cisco Intersight Managed Mode Configuration Guide


169
Configuring Server Policies
Creating a Power Policy for Server

Cisco Intersight Managed Mode Configuration Guide


170
CHAPTER 10
Configuring UCS Chassis Policies
• Chassis Policies, on page 171
• Creating an IMC Access Policy, on page 172
• Creating an SNMP Policy, on page 173
• Creating a Power Policy for Chassis, on page 175
• Creating a Thermal Policy, on page 176

Chassis Policies
Chassis policies in Cisco Intersight allow you to configure various parameters for chassis, including IP pool
configuration, VLAN settings, SNMP authentication, and SNMP trap settings. A chassis policy can be assigned
to any number of chassis profiles to provide a configuration baseline for a chassis.
The Chassis Policy creation wizard in Cisco Intersight has two pages:
• General—The general page allows you to select the organization and enter a name for your policy.
Optionally, include a short description and tag information to help identify the policy. Tags must be in
the key:value format. For example, Org:IT or Site APJ
• Policy Details—The policy details page has properties that are applicable to UCS Chassis Policies.

The following list describes the chassis policies that you can configure in Cisco Intersight.
• IMC Access Policy—Enables to configure and manage your network through mapping of IP pools to
the chassis profile. This policy allows you to configure a VLAN and associate it with an IP address
through the IP pool.

Note Only In-Band configuration is supported for Chassis IMC Access


Policy.

• SNMP Policy—Configures the SNMP settings for sending fault and alert information by SNMP traps
from the managed devices. Any existing SNMP Users or SNMP Traps configured previously on the
managed devices are removed and replaced with users or traps that you configure in this policy. If you
have not added any users or traps in the policy, the existing users or traps on the input/output module
(IOM) are removed.

Cisco Intersight Managed Mode Configuration Guide


171
Configuring UCS Chassis Policies
Creating an IMC Access Policy

• Power Policy—Enables the management of power for chassis. This policy allows you to configure
redundancy mode of the Chassis Power Supplies (PSUs) and allocate power to the chassis. You can view
the redundancy state, mode, qualifier, and power details of the chassis in the properties section of the
General tab on the Chassis details view page. The policy is currently applicable only for B-Series chassis.
For details, see Creating a Power Policy for Chassis
• Thermal Policy—Allows the user to set the value of the Fan Control Mode for the chassis. The Fan
Control Mode controls the speed of the chassis fan to maintain optimal server cooling. The policy is
currently applicable only for B-Series chassis. For details, see Creating a Thermal Policy.

Creating an IMC Access Policy


IMC Access policy allows to provide a VLAN ID and enables to associate it with an IP address from the
selected IP pool.
1. In the General page, configure the following parameters:

Property Essential Information

Organization Select the organization.

Name Enter a name for your policy.

Tag (optional) Enter a tag in the key value format.

Description (optional) Enter a short description.

2. On the Policy Details page, configure the following parameters:

Property Essential Information

VLAN ID Enter the VLAN ID to be used for server access


over the inband network. The field value can be
between 4 and 4093.

IPv4 address configuration Select to determine the type of network for this
policy.
Note You can select only IPv4 address
configuration or both IPv4 and IPv6
configurations.

IPv6 address Configuration Select to determine the type of network for this
policy. You can select only IPv6 address
configuration or both IPv4 and IPv6 configurations.
Important IPv6 is supported only on
UCS-IOM-2408

IP Pool

Cisco Intersight Managed Mode Configuration Guide


172
Configuring UCS Chassis Policies
Creating an SNMP Policy

Property Essential Information

Select IP Pool Click to view and select the IP pool list on the right
pane.

3. Click Create.

Creating an SNMP Policy


The SNMP policy configures the SNMP settings for sending fault and alert information by SNMP traps from
the managed devices. This policy supports SNMP versions such as SNMPv1, SNMPv2(includes v2c), and
SNMPv3. Any existing SNMP Users or SNMP Traps configured previously on the managed devices are
removed and replaced with users or traps that you configure in this policy. If you have not added any users
or traps in the policy, the existing users or traps on the input/output module (IOM) are removed.
Using the SNMP Policy you can enable or disable SNMP, specify the access and community strings, and
provide the SNMP user details that is used to retrieve data.
1. In the General page, configure the following parameters:

Property Essential Information

Organization Select the organization.

Name Enter a name for your policy.

Tag (optional) Enter a tag in the key value format.

Description (optional) Enter a short description.

2. In the Policy Details page, configure the following parameters:

Property Essential Information

Enable SNMP Displays the state of the SNMP Policy on the


endpoint. Enable this option for the endpoint to send
SNMP traps to the designated host.

Access Community String Enter the SNMPv1, SNMPv2 community string or


the SNMPv3 username. This field allows maximum
of 18 characters.
Note If the field is empty, it indicates that the
SNMPv1 and SNMPv2c users are
disabled.

Trap Community String Enter the SNMP community group name used for
sending SNMP trap to other devices.
Note This field is applicable only for
SNMPv2c trap host or destination.

Cisco Intersight Managed Mode Configuration Guide


173
Configuring UCS Chassis Policies
Creating an SNMP Policy

Property Essential Information

SNMP Users

Name Enter the SNMP username. This field must have a


minimum of 1 and a maximum of 31 characters.

Security Level Select the security mechanism for communication


between the agent and the manager that include:
• AuthPriv
• AuthNoPriv

Auth Type Select SHA as the authorization protocol for


authenticating the user
Note The MD5 authorization protocol is not
supported.

Auth Password Enter the authorization password for the user.

Auth Password Confirmation Enter the authorization password confirmation for


the user.

Privacy Type Select AES as the privacy protocol for the user.

Privacy Password Enter the privacy password for the user.

Privacy Password Confirmation Enter the privacy password confirmation for the
user.

SNMP Trap Destinations

Enable Enable this option to allow and deploy the SNMP


policy.

SNMP Version Select v2 or v3 as the SNMP version for the trap.

User Select the SNMP user for the trap. You can define
maximum of 15 trap users.
Note This field is applicable only to SNMPv3.

Trap Type Select the trap type to receive a notification when


a trap is received at the destination:
• Trap
• Inform

Destination Address Provide the address to which the SNMP trap


information can be sent. You are allowed to define
maximum of 15 trap destinations.

Cisco Intersight Managed Mode Configuration Guide


174
Configuring UCS Chassis Policies
Creating a Power Policy for Chassis

Property Essential Information

Port Enter the port number for the server to communicate


with trap destination. The range is from 1 to 65535.
The default is 162.

3. Click Create.

Creating a Power Policy for Chassis


This policy enables configuration of power redundancy and power allocation for chassis.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Set Tags (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

Description (Optional) Provide a short description

2. On the Policy Details page, navigate to UCS Chassis tab.


3. Configure the following parameters:

Property Essential Information

Power Redundancy
sets the redundancy mode of the chassis power supplies.

Grid Grid mode requires two power sources. If one


source fails, the surviving power supplies on the
other source provides power to the chassis.

Not Redundant Power Manager turns on the minimum number of


PSUs required to support chaasis power
requirement. No redundant PSUs are maintained.

N+1 Power Manager turns on the minimum number of


PSUs required to support chassis power
requirements and one additional PSU for
redundancy.

Cisco Intersight Managed Mode Configuration Guide


175
Configuring UCS Chassis Policies
Creating a Thermal Policy

Property Essential Information

N+2 Power Manager turns on the minimum number of


PSUs required to support chassis power
requirements and two additional PSUs for
redundancy.
Note This mode is supported only for UCS X
series chassis.

Power Allocation (Watts) Allows the user to set the maximum power a chassis
can consume.
The value can range from minimum of system
requirement to maximum of available power.
Note This feature is supported only for UCS
X series chassis.

4. Click Create.

Creating a Thermal Policy


This policy enables controlling the speed of the chassis fan.
1. On the General page, configure the following parameters:

Property Essential Information

Organization Select the Organization.

Name Enter a name for your policy.

Set Tags (Optional) Enter a tag in the key:value format. For example,
Org: IT or Site: APJ.

Description (Optional) Provide a short description

2. On the Policy Details page, configure the following parameters:

Property Essential Information

Fan Control Mode


controls the fan speed of the chassis.

Balanced The fans run faster when needed based on the heat
generated by the server. When possible, the fans
return to the minimum required speed.

Low Power The fans run at slightly lower minimum speeds than
the Balanced mode, to consume less power when
possible.

Cisco Intersight Managed Mode Configuration Guide


176
Configuring UCS Chassis Policies
Creating a Thermal Policy

Property Essential Information

High Power The fans are kept at higher speed to emphasize


performance over power consumption.
Note This mode is supported only for UCS
X-Series chassis.

Maximum Power The fan are always kept at the maximum speed. This
option provides the most cooling and consumes
most power.
Note This mode is supported only for UCS
X-Series chassis.

Acoustic The fan speed is reduced to reduce noise levels in


acoustic-sensitive environments.
Note This mode is supported only for UCS
X-Series chassis.

3. Click Create.

Cisco Intersight Managed Mode Configuration Guide


177
Configuring UCS Chassis Policies
Creating a Thermal Policy

Cisco Intersight Managed Mode Configuration Guide


178
CHAPTER 11
Configuring Pools
• Pools, on page 179
• IP Pools, on page 179
• MAC Pools, on page 181
• UUID Pools, on page 182
• WWN Pools, on page 184
• IQN Pools, on page 187
• Resource Pools, on page 189
• Virtual Routing and Forwarding, on page 192

Pools
Pools are the basic building blocks for uniquely identifying hardware resources. As the basis for the UCS
management model, they allow Service Profiles to be associated with any blade server, while still providing
the exact same ID and presentation to the upstream LAN or SAN. If a pool is actively associated with a profile,
the pool cannot be deleted.
The following list are the pool types that you can configure in Cisco Intersight:
• IP pools—Provide the flexibility of assigning IP addresses dynamically for services running on a network
element.
• MAC address pools—Provide unique IDs for network interface ports.
• WWNN and WWPN pools—Provide unique IDs for Fibre Channel resources on a server (Fibre Channel
nodes and ports).
• IQN pools—Provide collection of iSCSI Qualified Names (IQNs) for use as initiator identifiers by iSCSI
vNICs.

IP Pools
An IP pool is a sequential range of IP addresses within a certain network. You can have multiple pool
configurations. Each pool can have a priority and can be assigned to a group. IP addresses can be assigned
dynamically from a single pool or from a group of pools. The Least Recently Used (LRU) method is used to
assign IP addresses. In each pool, the addresses are placed in a queue. At the time of assigning, the address

Cisco Intersight Managed Mode Configuration Guide


179
Configuring Pools
Creating an IP Pool

at the head of the queue is assigned, and when released is placed at the end of the queue. IP Pools are
VRF-aware. IP pools support both IPv4 and IPv6 addresses.

Creating an IP Pool
IP Pools represent a collection of IP addresses that can be allocated to configuration entities such as server
profiles. You can create IPv4 pool or IPv6 pool or both.

Step 1 From the left navigation panel, click Create Pools > IP > Start.
The IP Pool wizard appears.

Step 2 Add the following information on the General page:


• Organization—The organization of the IP pool.
• Name—Name of the IP pool.
• Add Tag—The tag to identify and search for the IP pool.
• Description—The description the IP pool.

Step 3 Click Next. The IPv4 Pool Details page appears.


a) Add the following configuration information for IPv4 pools in the Configuration area:
• Configure IPv4 Pool—Enable this option to configure IPv4 pool before configuring IPv6 pool.
• Netmask—The netmask associated with the IP pool.
• Gateway—The IP address of the gateway for the IP pool.
• Primary DNS—The primary DNS server that this block of IP addresses for the IP pool should access.
• Secondary DNS—The secondary DNS server that this block of IP addresses for the IP pool should access.
a) Add the following configuration information in the IP Blocks area:
• From—Indicates the IP address in the block.
• Size—Indicates the number of identifiers this block can hold.
• Add (+)—Allows to add the starting IP address and total number of IP addresses in the new block.

Step 4 Click Next. The IPv6 Pool Details page appears.


a) Add the following configuration information for IPv6 pools in the Configuration area:
• Prefix—The prefix associated with the IP pool.
• Gateway—The IP address of the gateway for the IP pool.
• Primary DNS—The primary DNS server that this block of IP addresses for the IP pool should access.
• Secondary DNS—The secondary DNS server that this block of IP addresses for the IP pool should access.
a) Add the following configuration information in the IP Blocks area:
• From—Indicates the IP address in the block.
• Size—Indicates the number of identifiers this block can hold.
• Add (+)—Allows to add the starting IP address and total number of IP addresses in the new block.

Step 5 Click Create.

The newly created IP pool appears in the list of IP pools.

Cisco Intersight Managed Mode Configuration Guide


180
Configuring Pools
IP Pool Details

IP Pool Details
Details
Displays the list of IP pools.

Property Essential Information

Configuration

Name Displays the name of the IP pool.

Type Displays the type of the pool.

Size Displays the total number of identifiers the IP pool


contains.

Description A description of the IP pool.

Last Updated on The date and time when the IP pool was last updated.

Organization Users in a Default Organization automatically has


access to all the resources available for the user
account.

Usage

IP, VRFs, and Server Profile Displays the IP address, VRF instances, and associated
server profiles.

Actions

Edit Allows to add or modify the configuration details of


the IP pool.

Delete Allows to delete the IP pool.

MAC Pools
A MAC pool is a collection of network identities, or MAC addresses, that are unique in their Layer 2
environment and are available to be assigned to vNICs on a server. If you use MAC pools in server profiles,
you do not have to manually configure the MAC addresses to be used by the server associated with the server
profile.
To assign a MAC address to a server, you must include the MAC pool while adding a vNIC to a LAN
Connectivity policy. The LAN Connectivity policy is then included in the server profile assigned to that server.

Creating a MAC Pool


MAC Pools represent a collection of MAC addresses that can be allocated to vNICs of a server profile.

Cisco Intersight Managed Mode Configuration Guide


181
Configuring Pools
MAC Pool Details

Step 1 From the left navigation panel, click Pools > MAC > Create MAC Pool.
The MAC Pool wizard appears.

Step 2 Add the following information on the General page:


• Name—Name of the MAC pool
• Description—An optional description of the MAC pool.
• Organization—The organization to which the MAC pool belongs.
• Add Tag—An optional tag to identify and search for the MAC pool.

Step 3 Click Next. The Pool Details page appears.


Step 4 Add the following configuration information in the MAC Blocks area:
• From—Indicates the first MAC address in the block.
• Size—Indicates the number of MAC addresses in the block.

Step 5 To add more blocks, click + and then add the starting MAC address and total number of MAC addresses in the new block.
Step 6 Click Create.

The newly created MAC pool appears in the list of MAC pools.

MAC Pool Details


Details
Displays the list of MAC pools.

Property Essential Information

Name The name of the MAC pool.

Size The number of MAC addresses in the pool.

Used The number of MAC addresses in the pool that have


been used, and are no longer available.

Description A description of the MAC pool.

Last Update When the MAC pool was last updated.

UUID Pools
A Universally Unique Identifier (UUID) pool is a collection of UUIDs that are assigned to servers. The prefix
and suffix of the UUID are variable values. A UUID pool ensures that these variable values are unique for
each server associated with a server profile that uses a particular pool to avoid conflicts.

Cisco Intersight Managed Mode Configuration Guide


182
Configuring Pools
Creating a UUID Pool

Note • The supported servers and its minimum firmware or Cisco IMC versions required for UUID pool are
mentioned below:

Servers Minimum firmware versions

Cisco UCS-B200-M5, UCS-B480-M5, Cisco UCS 4.2(1b)


UCS-B200-M6

Cisco UCS-C220-M6, UCS-C240-M6 4.2(1b)

Cisco UCS-C225-M6, UCS-C245-M6 4.2(1i)

Cisco UCSX-210C-M6 5.0(1a)

• For more information on the server profile association using UUID pool, see Configuring Server Profiles.

Creating a UUID Pool


UUID Pools represent a collection of UUID items that can be allocated to server profiles.

Step 1 From the left navigation panel, click Pools > UUID > Create UUID Pool.
The UUID Pool wizard appears.

Step 2 Add the following information on the General page:


• Organization—An organization to which the UUID pool belongs.
• Name—Name of the UUID pool.
• Set Tags—An optional tag to identify and search for the UUID pool.
• Description—An optional description of the UUID pool.

Step 3 Click Next. The Pool Details page appears.


Step 4 In the Configuration section, add the UUID Prefix number in hexadecimal format. Example, 1728E8C7-7B40-47E8
Step 5 In the UUID Blocks section, add the following configuration details:
• From—Indicates the UUID suffix number of the block in hexadecimal format. Example, 9EDE-0E52924AC87A
• Size—Indicates the number of UUID identifiers in the block. The size ranges from 1 to 1000.

Step 6 To add more blocks, click + and then add the starting UUID suffix and total number of UUID identifiers in the new block.
Step 7 Click Create.

The newly created UUID pool appears in the list of UUID pools.

Cisco Intersight Managed Mode Configuration Guide


183
Configuring Pools
UUID Pool Details

UUID Pool Details


Details
Displays the list of UUID pools.

Property Essential Information

Details

Name Displays the name of the UUID pool.

Type Displays the type of the pool.

Size Displays the total number of identifiers the UUID


pool contains.

Used Displays the number of UUID already in use from the


pool.

Available Displays the number of UUID available for usage.

Last Updated on The date and time when the UUID pool was last
updated.

Description Description of the UUID Pool.

Organization Displays the organization under which the UUID Pool


is created.

Configuration

UUID Prefix Displays the UUID prefix value of the pool.

From Displays the UUID suffix value of the pool.

To Displays the range of the block size.


Note This value is dependent on the UUID pool
size property.

Size Displays UUID pool size.

Usage

UUID Displays the UUID assigned to the server profile.

Server Profile Displays the server profile associated with the pool.

WWN Pools
A World Wide Name (WWN) pool is a collection of WWNs for use by the Fibre Channel vHBAs in a Cisco
UCS Domain. You create separate pools for the following:

Cisco Intersight Managed Mode Configuration Guide


184
Configuring Pools
Creating a WWNN Pool

• WW node names assigned to the server


• WW port names assigned to the server

Important To ensure the uniqueness of the Cisco UCS WWNNs and WWPNs in the SAN fabric, Cisco Intersight uses
the following WWN prefix for all blocks in a pool: 20:00:00:25:B5:xx:xx:xx.

If you use WWN pools in server profiles, you do not have to manually configure the WWNs that will be used
by the server associated with the server profile. In a system that implements multi-tenancy, you can use a
WWN pool to control the WWNs used by each organization.
You assign WWNs to pools in blocks.

WWNN Pools
A WWNN pool is a WWN pool that contains only WW node names. If you include a pool of WWNNs in a
server profile, the associated server is assigned a WWNN from that pool.

WWPN Pools
A WWPN pool is a WWN pool that contains only WW port names. If you include a pool of WWPNs in a
server profile, the port on each vHBA of the associated server is assigned a WWPN from that pool.

Creating a WWNN Pool


To ensure the uniqueness of the Cisco UCS WWNNs and WWPNs in the SAN fabric, Cisco Intersight uses
the following WWN prefix for all blocks in a pool: 20:00:00:25:B5:xx:xx:xx.

Step 1 From the left navigation panel, click Pools > WWNN > Create WWNN Pool.
The WWNN Pool wizard appears.

Step 2 Add the following information on the General page:


• Name—Name of the WWNN pool
• Description—An optional description of the WWNN pool.
• Organization—An optional entry of the organization to which the WWNN pool belongs.
• Add Tag—An optional tag to identify and search for the WWNN pool.

Step 3 Click Next. The Pool Details page appears.


Step 4 Add the following configuration information in the Initiator Blocks area:
• From—Indicates the first WWN identifier of the block.
• Size—Indicates the maximum number of identifiers that the block can contain.

Step 5 To add more blocks, click + and then add the starting WWN identifier and maximum number of identifiers that the block
can contain.
Step 6 Click Create.

Cisco Intersight Managed Mode Configuration Guide


185
Configuring Pools
WWNN Pool Details

The newly created WWNN pool appears in the list of WWNN pools.

WWNN Pool Details


Details
Displays the list of WWNN pools. To ensure the uniqueness of the Cisco UCS WWNNs in the SAN fabric,
Cisco recommends using the following WWN prefix 20:00:00:25:b5:00:00:01

Property Essential Information

Name The name of the World Wide Node Name pool.

Size The total number of WWNNs in the pool.

Used The number of WWNNs in the pool that have been


used, and are no longer available.

Description A description of the WWNN pool.

Last Update When the WWNN pool was last updated.

Creating a WWPN Pool


To ensure the uniqueness of the Cisco UCS WWNNs and WWPNs in the SAN fabric, Cisco Intersight uses
the following WWN prefix for all blocks in a pool: 20:00:00:25:B5:xx:xx:xx.

Step 1 From the left navigation panel, click Pools > WWNN > Create WWPN Pool.
The WWPN Pool wizard appears.

Step 2 Add the following information on the General page:


• Name—Name of the WWPN pool
• Description—An optional description of the WWPN pool.
• Organization—An optional entry of the organization to which the WWPN pool belongs.
• Add Tag—An optional tag to identify and search for the WWPN pool.

Step 3 Click Next. The Pool Details page appears.


Step 4 Add the following configuration information in the Initiator Blocks area:
• From—Indicates the first WWN identifier of the block.
• Size—Indicates the maximum number of identifiers that the block can contain.

Step 5 To add more blocks, click + and then add the starting WWN identifier and maximum number of identifiers that the block
can contain.
Step 6 Click Create.

The newly created WWPN pool appears in the list of WWPN pools.

Cisco Intersight Managed Mode Configuration Guide


186
Configuring Pools
WWPN Pool Details

WWPN Pool Details


Details
Displays the list of WWPN pools. To ensure the uniqueness of the Cisco UCS WWPNs in the SAN fabric,
Cisco recommends using the following WWN prefix 20:00:00:25:b5:00:00:01

Property Essential Information

Name The name of the World Wide Port Name pool.

Size The total number of WWPNs in the pool.

Used The number of WWPNs in the pool that have been


used, and are no longer available.

Description A description of the WWPN pool.

Last Update When the WWPN pool was last updated.

IQN Pools
An IQN pool is a collection of iSCSI Qualified Names (IQNs) for use as initiator identifiers by iSCSI vNICs.
IQN pool members are of the form prefix: suffix: number, where you can specify the prefix, suffix, and a
block (range) of numbers.
An IQN pool can contain more than one IQN block, with different number ranges and different suffixes, but
sharing the same prefix.

Creating an IQN Pool


An IQN pool is a collection of iSCSI Qualified Names (IQNs) for use as initiator identifiers. The IQN pool
details are used for configuring blocks of IQN identifiers.

SUMMARY STEPS
1. From the left navigation panel, click Create Pools > IQN > Start.
2. Add the following information on the General page:
• Organization—The organization of the IQN pool.
• Name—Name of the IQN pool.
• Add Tag—The tag to identify and search for the IQN pool.
• Description—The description the IQN pool.
3. Click Next. The Pool Details page appears.
4. Add the following configuration information for IQN pools in the Configuration area:
• Prefix—The prefix for any IQN blocks created for this pool. IQN prefix must have the following
format "iqn-yyyy-mm.naming-authority", where the naming authority is usually the reverse syntax
of the internet domain of the naming authority. Example, iqn1.2021-01.alpha.com
• Suffix—The suffix for this block of IQNs.

Cisco Intersight Managed Mode Configuration Guide


187
Configuring Pools
IQN Pool Details

Enter from 1 to 64 characters. You can use any letter or number, as well as the special characters .
(period), : (colon), and - (hyphen).
• From—The first iSCSI Qualified Name (IQN) suffix in the block.
• Size—The number of identifiers this block can hold.

DETAILED STEPS

Command or Action Purpose


Step 1 From the left navigation panel, click Create Pools > IQN > The IQN Pool wizard appears.
Start.
Step 2 Add the following information on the General page:
• Organization—The organization of the IQN pool.
• Name—Name of the IQN pool.
• Add Tag—The tag to identify and search for the IQN
pool.
• Description—The description the IQN pool.

Step 3 Click Next. The Pool Details page appears.


Step 4 Add the following configuration information for IQN pools
in the Configuration area:
• Prefix—The prefix for any IQN blocks created for
this pool. IQN prefix must have the following format
"iqn-yyyy-mm.naming-authority", where the naming
authority is usually the reverse syntax of the internet
domain of the naming authority. Example,
iqn1.2021-01.alpha.com
• Suffix—The suffix for this block of IQNs.
Enter from 1 to 64 characters. You can use any letter
or number, as well as the special characters . (period),
: (colon), and - (hyphen).
• From—The first iSCSI Qualified Name (IQN) suffix
in the block.
• Size—The number of identifiers this block can hold.

The newly created IQN pool appears in the list of IQN pools.

IQN Pool Details


Details
Displays the list of IQN pools.

Property Essential Information

Details

Cisco Intersight Managed Mode Configuration Guide


188
Configuring Pools
Resource Pools

Property Essential Information

Name Displays the name of the IQN pool.

Type Displays the type of the pool.

Size Displays the total number of identifiers the IQN pool


contains.

Description A description of the IQN pool.

Last Updated on The date and time when the IQN pool was last
updated.

Organization Users in a Default Organization automatically has


access to all the resources available for the user
account.

Tags Displays the tags for the pools.

Configuration

Prefix Displays the prefix for IQN blocks created for this
pool.

Suffix Displays the suffix for this block of IQNs.

From The first suffix number in the block.

To The number of identifiers that the block can hold.

Usage

IQN Address and Server Profile Displays the IQN address and associated server
profiles.

Actions

Edit Allows to add or modify the configuration details of


the IQN pool.

Delete Allows to delete the IQN pool.

Resource Pools
A resource pool is an aggregation of homogeneous resources that are managed in Intersight. A resource pool
enables you to manage the utilization of resources for certain Intersight features like Server Profile. Currently,
Intersight supports only server type as a resource for the resource pool.
Currently, Cisco Intersight supports only adding a server as a resource. Resource pool enables you to logically
group and manage resources (servers) more effeciently. You can assign servers to a resource pool and can
continue with the automated server profile assignment.

Cisco Intersight Managed Mode Configuration Guide


189
Configuring Pools
Creating a Resource Pool

Note For more information on the server profile association using resource pool, see Configuring Server Profile.

Creating a Resource Pool


A resource pool represents a collection of resources that can be associated to the configuration entities such
as server profiles.

Step 1 From the left navigation panel, click Create Pools > Resource > Start.
The Resource Pool wizard is displayed.

Step 2 Add the following information on the General page:


• Organization—The organization of the Resource pool.
• Name—Name of the Resource pool.
• Target Platform—The target platform type as UCS Standalone server or UCS FI-Attached server.
• Set Tags—The tag to identify and search for the Resource pool.
• Description—The description of the Resource pool.

Step 3 Click Next. The Resource Pool Details page is displayed with the list of discovered servers based on the target platform
type.
Step 4 Select the servers from the Resource Selection table.
Step 5 Click Create.

The newly created Resource pool appears in the list of Resource pools.

Resource Pool Details


Details - Displays the details of the resource pools.

Property Essential Information

Details

Name Displays the name of the resource pool.

Type Displays the type of the pool.

Size Displays the total number of resources that the


Resource pool contains.

Used Displays the number of resources that are already


used, and are unavailable for use.

Available Displays the number resource pool available for usage.

Cisco Intersight Managed Mode Configuration Guide


190
Configuring Pools
Resource Pool Details

Property Essential Information

Last Updated on The date and time of the resource pool that was last
updated.

Resource

Type Displays the resource pool type.


Note Currently, Intersight supports only server
type as a resource for the resource pool.

Selection Displays the resource pool selection type. Currently,


only manual (Static) selection is supported.

Target Platform Displays the target platform. This could any of the
following:
• Standalone
• FI-Attached

Description Description of the resource pool.

Organization Displays the organization under which the Resource


Pool is created

Configuration
Note The configuration properties of the resource pool differs with the resource type associated.

Status Displays the status of the resource. This can be any


of the following:
• Available—Indicates the resource is available
for use.
• Used—Indicates the resource is already used in
a resource pool.

Usage

Resource Name Displays the resource name.

Leasing Entity Displays the configuration entity.


Note A resource can be part of different pools
but are allowed to be associated to only
one leasing entity.

Use Case Displays the consumer of the resource. Example,


Server Profile.

Cisco Intersight Managed Mode Configuration Guide


191
Configuring Pools
Virtual Routing and Forwarding

Property Essential Information

Resource Usage Displays the resource consumption types. The types


can be:
• Current—The resource is associated and used
in the current resource pool.
• Other Pool—The resource is associated and used
in an other pool.
• Direct—The resource is directly associated with
the server profile without using resource pool.

Note Using an edit resource pool option, a resource with an active lease cannot be removed from the resource pool.

Virtual Routing and Forwarding


Virtual Routing and Forwarding (VRF) is an IP technology that allows multiple instances of a routing table
to coexist on the same router at the same time. Because the routing instances are independent, the same or
overlapping IP addresses can be used without conflict. A VRF creates a namespace for IP address management.
IP pools are VRF-aware in Cisco Intersight.

VRF Guidelines
The following guidelines and limitations apply for VRF instances:
• Intersight creates a default VRF for an account, and manages IP address allocation within the context of
this default VRF.
• Within a single VRF instance, IP addresses must be unique. Between different VRF instances, you can
have overlapping IP addresses.
• If IP Pools are shared between VRF instances, ensure that there are no overlapping IP addresses.

Creating a VRF Instance


Virtual Routing and Forwarding (VRF) is a networking technology that creates multiple virtual networks
within a single network entity.

Step 1 From the left navigation panel, click Virtual Routing And Forwarding > VRFs > Create VRF.
The VRF wizard appears.

Step 2 Add the following information on the General page:


• Name—Name of the VRF instance
• Description—An optional description of the VRF instance.

Cisco Intersight Managed Mode Configuration Guide


192
Configuring Pools
Creating a VRF Instance

• Organization—An optional entry of the organization to which the VRF instance belongs.
• Add Tag—An optional tag to identify and search for the VRF instance.

Step 3 Click Create.

The newly created VRF instance appears in the list of VRFs.

Cisco Intersight Managed Mode Configuration Guide


193
Configuring Pools
Creating a VRF Instance

Cisco Intersight Managed Mode Configuration Guide


194
CHAPTER 12
Managing the Device Console
• Device Console, on page 195
• Device Console CLI Commands, on page 199

Device Console
The Device Console, which is installed on the Fabric Interconnect, allows you to monitor the health of your
devices, and the status of their connection to Intersight. You can use the Device Console GUI or CLI interface
if you want to troubleshoot your devices, or if your devices are not connecting to Cisco Intersight.
To access the Device Console user interface, log in to the Fabric Interconnect.
Device Connector
This page shows the status of the Device Connector’s connection to Intersight. You can also configure the
parameters for the Device Connector through Settings.

Property Essential Information

Device Connector Graphically shows the following:


• Status of the connection between the Device
Connector, Internet, and Intersight
• The Access Mode of the Device Connector
• Claim status of the device.

Cisco Intersight Managed Mode Configuration Guide


195
Managing the Device Console
Device Console

Property Essential Information

Settings

Cisco Intersight Managed Mode Configuration Guide


196
Managing the Device Console
Device Console

Property Essential Information


Allows you to configure the following Device
Connector settings:
• General—Allows you to enable or disable Cisco
Intersight management. This can be one of the
following:
• On—Enables Cisco Intersight management.
You can claim this system and leverage the
capabilities of Cisco Intersight.
This is the default connection status.
• Off—Disables Cisco Intersight
management. No communication will be
allowed to Cisco Intersight.

Access Mode—Allows you to configure access


as Read-only or Allow Control.
• Read-only—When the Read-only access
mode is selected, you cannot configure the
device through Intersight.
• Allow Control—When the Allow Control
access mode is selected, you have full
control to configure the device through
Intersight.

• Proxy Configuration—Allows you to configure


whether HTTPS proxy settings are disabled or
manually configured. This can be one of the
following:
• Off—Select this option if you want to
disable the HTTPS proxy settings
configuration.
This is the default HTTPS proxy setting.
• On—Select this option if you want to enable
the HTTPS proxy settings configuration.
• Proxy Hostname/IP—Enter the proxy
hostname or IP address.
• Proxy Port— Enter the proxy port
number.
• Authentication—Enable this option to
authenticate access to the proxy server.
Enter the Username and Password to
authenticate access.
The device connector does not

Cisco Intersight Managed Mode Configuration Guide


197
Managing the Device Console
Device Console

Property Essential Information


mandate the format of the login
credentials, they are passed as-is to the
configured HTTP proxy server.
Whether or not the username must be
qualified with a domain name will
depend on the configuration of the
HTTP proxy server.

• Certificate Manager—Allows you to view a


list of trusted certificates and import a valid
trusted certificate.

Device ID The unique serial number of the device.

Claimed to Account ID of the Intersight user who claimed the device.

Unclaim Unclaim a claimed device.

Getting Started provides detailed information about configuring Device Connector settings, and about
unclaiming a device.
Servers
This page provides detailed information about all the servers connected through the Fabric Interconnect. This
information is based on the data stored in the local database on the Fabric Interconnect.

Details Description

Name Name of the server. This name is a combination of the


chassis number and the server model. Displays Not
Connected when the server is not connected.

Cisco Intersight Managed Mode Configuration Guide


198
Managing the Device Console
Device Console CLI Commands

Details Description

Health Status of the server health corresponds to the alarms on


the servers. The status could be:
• Healthy
• Critical—Indicates service-affecting condition
requires an immediate corrective action. Could be
caused by server failure due to power outage or
incorrect configuration. For example, the severity
could indicate that the managed object is out of
service and its capability must be restored
immediately.
• Warning—Advisory status about the server
component. Could be caused by connection status,
power status, or faults.

Status of the server health. Status corresponds to the


alarms on the servers. Could be Healthy, Critical, or
Warning.
A Critical alarm is raised when a service-affecting
condition requires an immediate corrective action. For
example, the severity could indicate that the managed
object is out of service and its capability must be restored
immediately.
A Warning alarm is raised when a potential or
impending service-affecting fault occurs. This fault could
have no significant or immediate effects on the system.
A warning status indicates that you must take the
appropriate action to diagnose the fault and correct the
problem to prevent it from becoming a more serious
service-affecting fault. Click on a specific alarm to view
the fault code, the source type and name, component on
which the fault occurred, and a description of the fault.

PID Displays the PID of the server.

Serial Displays the host ID/serial number of the server.

User Label A user label usually contains the serial number, PID,
and the VID. This serial number is displayed in the
management software of the server.

Device Console CLI Commands


You can use the Device Console CLI interface if you want to troubleshoot your devices, or if your devices
are not connecting to Cisco Intersight. Here are the commands that you can use:

Cisco Intersight Managed Mode Configuration Guide


199
Managing the Device Console
Device Console CLI Commands

Device Connector
You can perform the following operations on the Device Connector:
• Connect to the Device Connector—To connect to the Device Connector through the Intersight CLI shell,
use the connect device-connector command.

connect device-connector
• Show the Device Connector version—To show the Device Connector version, use the show version
command.

show version
• Update the Device Connector—To update the Device Connector image on the Fabric Interconnect-B
and then Fabric Interconnect-A, use the update-device-connector command.

update-device-connector workspace:/| volatile:/filename

System Information
You can perform the following operations to view system information:
• Show the system clock—To display the system date and time, use the show clock command.

show clock
• Show CLI history—To display the history of CLI commands run in the session, use the show cli history
command.

show cli history


• Show SSH key—To display the list of SSH public key of the host, use the show sshkey command.

show sshkey
• Show IP debug information—To display IP information for management interfaces, use the show
mgmt-ip-debug command.

show mgmt-ip-debug
• Show the contents of a file—To display the contents of a file, use the show file command.

show file file-path


• Show processes—To display a list of all processes that are currently running, use the show processes
command.

show processes
• Show audit log—To display the audit log of the Fabric Interconnect, use the show audit command.

show audit

Servers
You can perform the following operations on the servers:
• Connect to the IO module—To connect to an IO module, use the connect iom command.

connect iom chassis-id

Cisco Intersight Managed Mode Configuration Guide


200
Managing the Device Console
Device Console CLI Commands

• Connect to the CIMC—To connect to the CIMC (Cisco Integrated Management Controller), use the
connect cimc command.

connect cimc chassis-id/blade-id| rack-id

Syntax Description chassis-id/blade-id Chassis and blade identification numbers.

rack-id Rack identification number.

PMON Processes
You can perform the following operations to view pmon processes on the Fabric Interconnect:
• Manage pmon processes—To start, stop, and view the status of the pmon or connector processes, use
the pmon command.

pmon {start | stop | state} [connector]

Technical Support
You can perform the following operations on the technical support bundle:
• Show tech-support—To download the contents of the tech-support bundle for a specific blade server,
use the show tech-support command.

show tech-support server chassis-id/blade-id

Directory Operations
You can perform the following directory operations:
• Change directory—To change directories, use the cd command.

cd workspace:/[path] | volatile:/[path] | [path] | usbdrive1:/ | usbdrive2:/


• View current directory—To view the current working directory, use the pwd command.

pwd
• List contents of a directory—To list the contents of the current working directory, use the ls command.

ls
• Create a directory—To create a directory under allowed directories, use the mkdir command.

mkdir workspace:/[path] | volatile:/[path] | [path] | usbdrive1:/ | usbdrive2:/


• Delete a directory—To remove a directory, use the rmdir command.

rmdir workspace:/[path] | volatile:/[path] | [path] | usbdrive1:/ | usbdrive2:/


• Copy a file—To copy a file from one directory to another, use the cp command.

cp [from-filesystem:][from-path]filename [to-filesystem:]to-path[dest-filename]
• Move a file—To move a file from one directory to another, use the mv command.

Cisco Intersight Managed Mode Configuration Guide


201
Managing the Device Console
Device Console CLI Commands

mv [from-filesystem:][from-path]filename [to-filesystem:]to-path[dest-filename]
• Delete a file—To remove a file from a directory, use the rm command.

rm workspace:/[path] | volatile:/[path] | [path] | usbdrive1:/ | usbdrive2:/

Other Operations
These are the other operations that you can perform:
• Set Management IP—To configure the management IP address, network mask, and gateway address on
a Fabric Interconnect, use the set management-network command.

set management-network ip-address netmask/preix_length gateway


• Show management log—To display the management log of the services running on a Fabric Interconnect,
use the tail-mgmt-log command.

tail-mgmt-log module_name
• Use SSH to connect—To log in to a host that supports SSH, use the ssh command.

ssh host-name
• Use Telnet to connect—To log in to a host that supports Telnet, use the telnet command.

telnet host-name [port-num]


• Display IPv4 network routes—To view the route to an IPv4 network host, use the traceroute command.

traceroute [-s source-address] address


• Display IPv6 network routes—To view the route to an IPv6 network host, use the traceroute6 command.

traceroute6 [-s source-address] address


• Diagnose network connectivity—To diagnose basic network connectivity for IPv4 addresses, use the
ping command.

ping [-c count][-s packet-size][-i interval] [-w timeout]host-ip-address | host-name


• Diagnose network connectivity—To diagnose basic network connectivity for IPv6 addresses, use the
ping6 command.

ping6 [-c count][-s packet-size][-i interval] [-w timeout]host-ip-address | host-name


• Reboot—To reboot the system, use the reboot command.

reboot
• Connect to NX-OS—To connect to NX-OS, use the connect nxos command.

connect nxos
• Erase configuration—To erase configuration on the Fabric Interconnect, use the erase-configuration
command.

erase-configuration
• Change the Password—To update the administrator password on the Fabric Interconnect, use the
change-password command.

Cisco Intersight Managed Mode Configuration Guide


202
Managing the Device Console
Device Console CLI Commands

change-password

Note For more information, see Fabric Interconnect Password Guidelines,


on page 9

• Reset administrator password—To reset the administrator password on the Fabric Interconnect, use the
reset-password command.

reset-password
• Clear the SSH public key—To clear from cache the SSH public key of a remote host, use the clear-sshkey
command.

clear-sshkey host-name

Cisco Intersight Managed Mode Configuration Guide


203
Managing the Device Console
Device Console CLI Commands

Cisco Intersight Managed Mode Configuration Guide


204
CHAPTER 13
Managing Firmware
• Firmware Upgrade in a Cisco UCS Domain through Intersight, on page 205
• Upgrading Fabric Interconnect Firmware, on page 207
• Upgrading Server Firmware, on page 209
• Upgrades and Replacement of RMA Servers and Fabric Interconnects, on page 210

Firmware Upgrade in a Cisco UCS Domain through Intersight


You can upgrade the firmware for various components in a Cisco UCS Domain through Cisco Intersight by
choosing one of the following upgrade options:

Fabric Firmware Upgrade


Through this process, you can upgrade all the fabric components in a Cisco UCS Domain, including the two
Fabric Interconnects and I/O modules. These components are upgraded to the firmware version included in
the selected fabric firmware bundle. Fabric firmware upgrade does not support a partial upgrade to only some
components in a Cisco UCS Domain. The fabric firmware upgrade process is valid only for Cisco UCS 6400
Series Fabric Interconnects.
Fabric firmware bundles are available in the Cisco Intersight repository and have two component images:
• NXOS image
• CMC image

The following workflow illustrates the fabric firmware upgrade process:


1. Fabric Selection: You can initiate the fabric firmware upgrade process by selecting a Fabric Interconnect
and performing an Upgrade Firmware action on it. Fabric Interconnects are always upgraded as a pair,
in which Fabric Interconnect-B is upgraded before Fabric Interconnect-A.
2. Bundle Selection: After you select the Fabric Interconnect pair to be upgraded, you must select the fabric
firmware bundle to which the Fabric Interconnects need to be upgraded. The firmware selection screen
displays a list of available firmware bundles and information about their firmware version, size, release
date, and description. The selected firmware bundle is downloaded from the Cisco Intersight repository.
3. Impact Estimation: The Summary screen shows a summary of the selected switches, the firmware version
running on them, and the firmware version to which they will be upgraded. You can choose to upgrade
by clicking Upgrade, or change the configuration by clicking Back.

Cisco Intersight Managed Mode Configuration Guide


205
Managing Firmware
Firmware Upgrade in a Cisco UCS Domain through Intersight

4. Upgrade Request Submission: After you click Upgrade, confirm the upgrade request.

The following workflow illustrates the tasks that occur automatically after you submit an upgrade request:
1. The system validates whether there is enough storage space for the firmware bundle. If the space on the
Fabric Interconnect is insufficient, the upgrade fails.
2. The system checks whether the selected firmware bundle is already in the Fabric Interconnect cache. If
the firmware bundle is not present, it is downloaded to the Fabric Interconnect cache.
3. Both the IO modules are updated and activated on all the connected chassis. IO module upgrade is
completed when the IO modules are rebooted.
4. Click Continue to acknowledge and begin firmware upgrade on Fabric Interconnect-B. After Fabric
Interconnect-B upgrade is complete, the Fabric Interconnect reboots and comes up with the new image.
IOM-B is rebooted along with the Fabric Interconnect-B, and comes up with the upgraded image.
5. Click Continue to acknowledge and begin firmware upgrade on Fabric Interconnect-A. After Fabric
Interconnect-A upgrade is complete, the Fabric Interconnect reboots and comes up with the new image.
IOM-A is rebooted along with the Fabric Interconnect-A, and comes up with the upgraded image.

Host Firmware Upgrade


Through this process, you can upgrade all the server components for Cisco UCS B-Series and C-Series
FI-Attached servers that are in Intersight Managed Mode. These components are upgraded to the firmware
version included in the selected host firmware bundle.
Server firmware bundles are available in the Cisco Intersight repository, and have the following component
images:
• CIMC image
• BIOS image
• Network adapter image

Note Only UCS VIC 1400 Series adapters are supported.

• Storage controller image


• Board controller image
• Disk image
• GPU image
• Memory card image
• M-Switch and PLX images

The following workflow illustrates the host firmware upgrade process.


1. Server Selection: You can initiate the host firmware upgrade process by selecting a server and performing
an Upgrade Firmware action on it.

Cisco Intersight Managed Mode Configuration Guide


206
Managing Firmware
Upgrading Fabric Interconnect Firmware

2. Bundle Selection: After you confirm the server to be upgraded, you must select the host firmware bundle
to which the server needs to be upgraded. The firmware selection screen displays a list of available
firmware bundles and information about their firmware version, size, release date, and description. The
selected firmware bundle will be downloaded from the Cisco Intersight repository.
3. Impact Estimation: The Summary screen shows a summary of the selected server, the firmware version
running on it, and the firmware version to which it will be upgraded. You can choose to upgrade by
clicking Upgrade, or change the firmware version by clicking Back.
4. Upgrade Request Submission: After you click Upgrade, select whether you want the firmware to be
installed immediately or when the device reboots. Confirm the upgrade request.
By default, firmware will be installed on next boot of the device.

The following workflow illustrates the tasks that occur automatically after you submit an upgrade request:
1. The system validates whether there is enough storage space for the firmware bundle. If the space on the
Fabric Interconnect is insufficient, the upgrade fails.
2. The system checks whether the selected firmware bundle is already in the Fabric Interconnect cache. If
the firmware bundle is not present, it is downloaded to the Fabric Interconnect cache.
3. Server firmware is upgraded as follows:
• For B-Series servers:
a. Adapter firmware is updated and activated. Adapter upgrade is completed when the server is
rebooted.
b. The Host Service Utility (HSU) is upgraded immediately or when the server reboots.
c. All server components are upgraded.

• For C-Series servers:


a. The HSU is upgraded immediately or when the server reboots.
b. All server components are upgraded.

4. Click Continue to acknowledge and begin firmware upgrade.

Upgrading Fabric Interconnect Firmware


You can upgrade Intersight managed Fabric Interconnect using Cisco Intersight.

Before you begin


Before you upgrade your Intersight managed Fabric Interconnect firmware, consider the following prerequisites:
• Only Cisco UCS 6400 Series Fabric Interconnects in a Cisco UCS Domain may be upgraded.
• You must have at least the following available storage in the Fabric Interconnect partitions for the
firmware bundle to be downloaded:
• 90 percent free space in /var/tmp

Cisco Intersight Managed Mode Configuration Guide


207
Managing Firmware
Upgrading Fabric Interconnect Firmware

• 20 percent free space in /var/sysmgr


• 30 percent free space in /mnt/pss
• 18 percent free space in /bootflash

• Only Cisco UCS Domains that are claimed through Intersight may be upgraded.
• All servers in the Cisco UCS Domain must be at license tier Essentials or above.

Step 1 From the left navigation pane, click Fabric Interconnects, select a Fabric Interconnect, and perform an Upgrade
Firmware action on it.
Step 2 On the Upgrade Firmware page, click Start.
Step 3 On the General page, confirm selection of the switch Domain and click Next.
Step 4 On the Version page, select the fabric firmware bundle to which the Fabric Interconnects need to be upgraded, and click
Next.
This page displays a list of available firmware bundles and information about their firmware version, size, release date,
and description. The selected firmware bundle will be downloaded from the Intersight repository.
During upgrade of Intersight Managed Fabric Interconnect, the Fabric Interconnect traffic evacuation is enabled by
default. Fabric Interconnect traffic evacuation evacuates all traffic that flows through the Fabric Interconnect from all
servers attached to it, while upgrading the system. The traffic will fail over to the peer Fabric Interconnect for fail over
vNICs. Before the traffic evacuation on a Fabric Interconnect, the user must acknowledge that replay on peer Fabric
Interconnect is completed and all vEths are up. Use the show interface virtual status command to check the vEth status
for respective veths from NXOS.
Before the traffic evacuation, you can check the traffic flowing through the Fabric Interconnect by viewing the Transmit
(Tx) and Receive (Rx) stats of Host Interfaces (HIFs). After the traffic evacuation, you can check the traffic flowing
through the Fabric Interconnect (FI) by viewing the Transmit (Tx) and Receive (Rx) stats of Network Interfaces (NIFs).
Note For Fabric Interconnect traffic evacuation to be functional, vNIC failover must be enabled in the LAN
Connectivity Policy

Select Advanced Mode to disable the Fabric Interconnect traffic evacuation.

Step 5 On the Summary screen, verify the summary of the selected switches, the firmware version running on them, and the
firmware version to which they will be upgraded, and click Upgrade.
You can choose to change the firmware version by clicking Back.

Step 6 Confirm the upgrade request.


The firmware upgrade workflow begins. You can check the status of the upgrade workflow in the Execution Flow pane.
Acknowledge any messages in the Execution Flow pane and click Continue to proceed with the upgrade.

Cisco Intersight Managed Mode Configuration Guide


208
Managing Firmware
Upgrading Server Firmware

Upgrading Server Firmware


Before you begin
Before you upgrade your server, consider the following prerequisites:
• Only Cisco UCS B-Series M5, M6, C-Series M5, M6, and X-Series M6 servers that are claimed through
Intersight may be upgraded.
• Servers may be upgraded from a minimum of Cisco UCS HSU bundle release version 4.1(2a).
• All servers in the Cisco UCS Domain must be at license tier Essentials or higher.

Step 1 From the left navigation pane, click Servers, select a server, and perform an Upgrade Firmware action on it.
Note To upgrade more than one server, ensure that the selected servers are of the same model and management mode.
Following are examples of valid selections:
• One or more B200 M5 servers
• One or more C220 M5 servers

Following are examples of invalid selections:


• C220 M5 and C240 M5 servers
• C220 M5 and B200 M5 servers

Step 2 On the Upgrade Firmware page, click Start.


Step 3 On the General page, confirm selection of the server and click Next.
Step 4 On the Version page, select the Cisco UCS HSU bundle to which the server must be upgraded, and click Next.
This page displays a list of available firmware bundles and information about their firmware version, size, release date,
and description. The selected firmware bundle will be downloaded from the Cisco repository. By default, all the server
components will be upgraded, including drives and storage controllers.
Select Advanced Mode to exclude drives and storage controllers from the upgrade.

Step 5 On the Summary screen, verify the summary of the selected servers, the firmware version running on them, and the
firmware version to which they will be upgraded.
You can choose to change the configuration by clicking Back.

Step 6 Click Upgrade.


Step 7 In the Upgrade Firmware dialog box, choose one the following options:
a) Reboot Immediately To Begin Upgrade—By default, server firmware is upgraded on next boot. Enable this option
if you choose to reboot immediately to begin firmware upgrade.
b) Click Upgrade to confirm the upgrade request.

Cisco Intersight Managed Mode Configuration Guide


209
Managing Firmware
Upgrades and Replacement of RMA Servers and Fabric Interconnects

The firmware upgrade workflow begins. You can check the status of the upgrade workflow in the Execution Flow pane.
Acknowledge any messages in the Execution Flow pane and click Continue to proceed with the upgrade.

Upgrades and Replacement of RMA Servers and Fabric


Interconnects
RMA is a Return Material Authorization process that enhances customer experience.

Upgrade of RMA Server


The RMA process triggers an automatic discovery workflow when you insert a new blade server, or when
you replace an old blade server. The discovery workflow raises an alarm if the firmware of the blade server
is outdated, and you will be asked to trigger an upgrade workflow.
Go to Chassis > Inventory > Servers Below Minimum Version, select the server that you want to upgrade
and click Upgrade. Select the firmware version to which you want to upgrade the server. Relevant endpoints
like Cisco IMC and Adaptor are upgraded to ensure that the server comes up in the Intersight Managed Mode,
is available in the server list page, and is ready for use. You can upgrade the rest of the endpoints using the
standard firmware upgrade method

Note The CMC version must be 4.1(3b), or later.

Replacement of RMA Fabric Interconnect


When a single Fabric Interconnect, or a Fabric Interconnect cluster is faulty, and the Fabric Interconnects
have been replaced, you can use the Replace option for migrating the configuration of the old Fabric
Interconnects to the new ones. The workflows for replacing both a single Fabric Interconnect and a Fabric
Interconnect cluster are detailed in the subsequent paragraphs.
Replacement of Single Fabric Interconnect
Remove the old Fabric Interconnect and connect the new Fabric Interconnect. Move all the cable connections,
including servers, FEX fabrics, and blade chassis, from the old Fabric Interconnect to the new Fabric
Interconnect.
Go to Operate > Fabric Interconnects to view the Fabric Interconnects that have been replaced and for
which the Replace option is enabled. Select the Replace Fabric Interconnect option and click Replace in the
confirmation page to trigger the replacement workflow.
As part of the workflow:
• The disconnected Fabric Interconnect is removed from inventory
• The domain profile is reassigned to the new Fabric Interconnect and deployed
• The servers, chassis, and FEX are inventoried and discovered under the new Fabric Interconnect
• The server and chassis profiles are redeployed with Fabric Interconnect related policies

Cisco Intersight Managed Mode Configuration Guide


210
Managing Firmware
Upgrades and Replacement of RMA Servers and Fabric Interconnects

Replacement of Fabric Interconnect Cluster


Remove the old Fabric Interconnect cluster and connect the new Fabric Interconnect cluster. Move all the
cable connections, including servers, FEX fabrics, and blade chassis, from the old Fabric Interconnects to the
new Fabric Interconnects. Claim the new Fabric Interconnects in Intersight. Select the Replace UCS Domain
option that is displayed against the old cluster in Fabric Interconnects page and choose the new Fabric
Interconnect cluster that will replace the old Fabric Interconnect cluster.
As part of the workflow
• The old device registration is merged with the new device registration
• The disconnected Fabric Interconnect cluster is removed from inventory
• The domain profile is reassigned to the new Fabric Interconnect cluster and deployed
• The servers, chassis, and FEX are inventoried and discovered under the new Fabric Interconnect cluster.
• The server and chassis profiles are redeployed with Fabric Interconnect related policies

Cisco Intersight Support for Auto Upgrade of IOM


You do not have to manually update the firmware of IOMs that have CMC lower than 4.1(3b). When the
chassis is connected to the Fabric Interconnect, the firmware is automatically updated, the server port is
configured in the Port Policy, the port policy is associated with the domain profile, and the domain profile is
deployed.

Cisco Intersight Managed Mode Configuration Guide


211
Managing Firmware
Upgrades and Replacement of RMA Servers and Fabric Interconnects

Cisco Intersight Managed Mode Configuration Guide


212
CHAPTER 14
Managing Technical Support
• Integration with Cisco TAC, on page 213
• Tech Support Diagnostic File Collection, on page 214

Integration with Cisco TAC

Important • Tech Support diagnostic files are generated locally at the endpoints and you cannot access them at any
point. Intersight does not currently send any notifications about the Tech Support files or other case-related
activities.
• Connected TAC is available only for cases opened directly with Cisco TAC.
• For partner support cases Connected TAC works as expected only if:
• The partner opens a case on behalf of the Intersight user.
(Or)
• The partner has authorized Intersight users to open a case directly with Cisco TAC.

You can create a Cisco TAC Service Request (SR) directly from Intersight by launching Cisco Support Case
Manager for the following:
• HyperFlex Clusters from the table view and details view.
• IWE Clusters from the table view and details view.
• Servers from the table view and details view.
• Fabric Interconnects from the table view.

You can also open a Cisco TAC case from the Intersight Mobile App.
Before you open a case, please ensure that the following requirements are met:
• A valid service contract (entitlement) exists for the hardware.
• Your Cisco ID is associated with the service contract.

To open a Cisco TAC case:

Cisco Intersight Managed Mode Configuration Guide


213
Managing Technical Support
Tech Support Diagnostic File Collection

1. Select a HyperFlex Cluster, or a IWE Cluster, or a Server, or a Fabric Interconnect from the
corresponding table view and click the ellipsis (…) in the actions column on the right. You can also Open
a TAC Case from the Actions menu on the HyperFlex Cluster, or IWE Cluster, or the Server Details
page.
2. Select Open TAC Case. The Open a TAC Case window displays with the name and serial number of the
selected HyperFlex cluster or server or Fabric Interconnect.
3. Click Continue to launch Cisco Support Case Manager. On the Cisco Support Case Manager UI,
verify the auto-populated details of your case, add a description and a title for your TAC Case, and click
Submit.

For detailed information about the Proactive Support workflow, configuring the advanced options, and opting
out of proactive RMA, see Proactive RMA for Intersight Connected Devices.
For the requirements and benefits of proactive RMA, see Proactive Support Enable Through Intersight.

Tech Support Diagnostic File Collection


When you open a case with Cisco TAC, Intersight collects Tech Support diagnostic files to assist with an
open support case. The data collected could include (but is not limited to) hardware telemetry, system
configuration, and any other details that aid in active troubleshooting of the TAC case. Tech Support collection
is allowed to occur regardless of data collection options you specify. However, this information is not collected
arbitrarily, but only when you open a case against a system, requiring assistance with the system support.

Note The Tech Support diagnostic file collection is not supported for unclaimed Intersight managed device.

To initiate the Tech Support diagnostic file collection for Intersight Managed FI attached devices, enter PID
and serial number of the device, and then choose Intersight Managed Domain as the platform type in the
Add Tech Support Bundle window.
The following table provides the combination of input that are required to initiate the Tech Support diagnostic
file collection.

Tech Support Bundle Type PID & Serial Number

Chassis IOM-1, or IOM-2, or chassis

Fabric Interconnect (FI) FI-A or FI-B

Blade Server Blade or adapters connected to blade

For Intersight Managed FI Attached devices, Tech Support diagnostic file collection is supported on the
following endpoints:
• Blade BMC
• Blade adapter
• Blade chassis
• Fabric Interconnect

Cisco Intersight Managed Mode Configuration Guide


214
Managing Technical Support
Tech Support Diagnostic File Collection

• IO modules
• Rack servers
• Rack server adapters
• Server Bundle

Cisco Intersight Managed Mode Configuration Guide


215
Managing Technical Support
Tech Support Diagnostic File Collection

Cisco Intersight Managed Mode Configuration Guide


216

You might also like