Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide, Release 1.4
Configuring Communication Services
Downloads: This chapterpdf (PDF - 445.0KB) The complete bookPDF (PDF - 2.98MB) | The complete bookePub (ePub - 520.0KB) | Feedback

Configuring Communication Services

Configuring Communication Services

This chapter includes the following sections:

Configuring HTTP

Before You Begin

You must log in as a user with admin privileges to perform this task.

Procedure
    Step 1   In the Navigation pane, click the Admin tab.
    Step 2   On the Admin tab, click Communications Services.
    Step 3   In the Communications Services pane, click the Communication Services tab.
    Step 4   In the HTTP Properties area, update the following properties:
    Name Description

    HTTP/S Enabled check box

    Whether HTTP and HTTPS are enabled on the CIMC.

    Redirect HTTP to HTTPS Enabled check box

    If enabled, all attempts to communicate via HTTP are redirected to the equivalent HTTPS address.

    We strongly recommend that you enable this option if you enable HTTP.

    HTTP Port field

    The port to use for HTTP communication. The default is 80.

    HTTPS Port field

    The port to use for HTTPS communication. The default is 443

    Session Timeout field

    The number of seconds to wait between HTTP requests before the CIMC times out and terminates the session.

    Enter an integer between 60 and 10,800. The default is 1,800 seconds.

    Max Sessions field

    The maximum number of concurrent HTTP and HTTPS sessions allowed on the CIMC.

    This value may not be changed.

    Active Sessions field

    The number of HTTP and HTTPS sessions currently running on the CIMC.

    Step 5   Click Save Changes.

    Configuring SSH

    Before You Begin

    You must log in as a user with admin privileges to configure SSH.

    Procedure
      Step 1   In the Navigation pane, click the Admin tab.
      Step 2   On the Admin tab, click Communications Services.
      Step 3   In the Communications Services pane, click the Communication Services tab.
      Step 4   In the SSH Properties area, update the following properties:
      Name Description

      SSH Enabled check box

      Whether SSH is enabled on the CIMC.

      SSH Port field

      The port to use for secure shell access. The default is 22.

      SSH Timeout field

      The number of seconds to wait before the system considers an SSH request to have timed out.

      Enter an integer between 60 and 10,800. The default is 1,800 seconds.

      Max Sessions field

      The maximum number of concurrent SSH sessions allowed on the CIMC.

      This value may not be changed.

      Active Sessions field

      The number of SSH sessions currently running on the CIMC.

      Step 5   Click Save Changes.

      Configuring XML API

      XML API for CIMC

      The Cisco CIMC XML application programming interface (API) is a programmatic interface to CIMC for a C-Series Rack-Mount Server. The API accepts XML documents through HTTP or HTTPS.

      For detailed information about the XML API, see Cisco UCS Rack-Mount Servers CIMC XML API Programmer’s Guide.

      Enabling the XML API

      Before You Begin

      You must log in as a user with admin privileges to perform this task.

      Procedure
        Step 1   In the Navigation pane, click the Admin tab.
        Step 2   On the Admin tab, click Communications Services.
        Step 3   In the Communications Services pane, click the Communication Services tab.
        Step 4   In the XML API Properties area, update the following properties:
        Name Description

        XML API Enabled check box

        Whether API access is allowed on this server.

        Max Sessions field

        The maximum number of concurrent API sessions allowed on the CIMC.

        This value may not be changed.

        Active Sessions field

        The number of API sessions currently running on the CIMC.

        Step 5   Click Save Changes.

        Configuring IPMI

        IPMI Over LAN

        Intelligent Platform Management Interface (IPMI) defines the protocols for interfacing with a service processor embedded in a server platform. This service processor is called a Baseboard Management Controller (BMC) and resides on the server motherboard. The BMC links to a main processor and other on-board elements using a simple serial bus.

        During normal operations, IPMI lets a server operating system obtain information about system health and control system hardware. For example, IPMI enables the monitoring of sensors, such as temperature, fan speeds and voltages, for proactive problem detection. If server temperature rises above specified levels, the server operating system can direct the BMC to increase fan speed or reduce processor speed to address the problem.

        Configuring IPMI over LAN

        Configure IPMI over LAN when you want to manage the CIMC with IPMI messages.

        Before You Begin

        You must log in as a user with admin privileges to perform this task.

        Procedure
          Step 1   In the Navigation pane, click the Admin tab.
          Step 2   On the Admin tab, click Communications Services.
          Step 3   In the Communications Services pane, click the Communication Services tab.
          Step 4   In the IPMI over LAN Properties area, update the following properties:
          Name Description

          Enabled check box

          Whether IPMI access is allowed on this server.

          Privilege Level Limit drop-down list

          The highest privilege level that can be assigned to an IPMI session on this server. This can be one of the following:

          • read-only—IPMI users can view information but cannot make any changes. If you select this option, IPMI users with the "Administrator", "Operator", or "User" user roles can only create read-only IPMI sessions, regardless of their other IPMI privileges.
          • user—IPMI users can perform some functions but cannot perform administrative tasks. If you select this option, IPMI users with the "Administrator" or "Operator" user role can create user and read-only sessions on this server.
          • admin—IPMI users can perform all available actions. If you select this option, IPMI users with the "Administrator" user role can create admin, user, and read-only sessions on this server.

          Encryption Key field

          The IPMI encryption key to use for IPMI communications.

          Step 5   Click Save Changes.

          Configuring SNMP

          SNMP

          The Cisco UCS C-Series Rack-Mount Servers support the Simple Network Management Protocol (SNMP) for viewing server configuration and status and for sending fault and alert information by SNMP traps. For information on Management Information Base (MIB) files supported by CIMC, see the MIB Quick Reference for Cisco UCS at this URL: http://www.cisco.com/en/US/docs/unified_computing/ucs/sw/mib/reference/UCS_MIBRef.html.

          Configuring SNMP Properties

          Before You Begin

          You must log in as a user with admin privileges to perform this task.

          Procedure
            Step 1   In the Navigation pane, click the Admin tab.
            Step 2   On the Admin tab, click Communications Services.
            Step 3   In the Communications Services pane, click the SNMP tab.
            Step 4   In the SNMP Properties area, update the following properties:
            Name Description

            Enabled check box

            Whether this server sends SNMP traps to the designated host.

            Note   

            After you check this check box, you need to click Save Changes before you can configure SNMP users or traps.

            SNMP Port field

            The port the server uses to communicate with the SNMP host.

            This value cannot be changed.

            Access Community String field

            The default SNMP v1 or v2c community name or SNMP v3 username CIMC includes on any trap messages it sends to the SNMP host.

            Enter a string up to 18 characters.

            System Contact field

            The system contact person responsible for the SNMP implementation.

            Enter a string up to 64 characters, such as an email address or a name and telephone number.

            System Location field

            The location of the host on which the SNMP agent (server) runs.

            Enter a string up to 64 characters.

            Step 5   Click Save Changes.

            What to Do Next

            Configure SNMP trap settings as described in Configuring SNMP Trap Settings.

            Configuring SNMP Trap Settings

            Before You Begin

            You must log in as a user with admin privileges to perform this task.

            Procedure
              Step 1   In the Navigation pane, click the Admin tab.
              Step 2   On the Admin tab, click Communications Services.
              Step 3   In the Communications Services pane, click the SNMP tab.
              Step 4   In the Common Trap Destination Settings area, complete the following fields:
              Name Description

              Trap Community String field

              The name of the SNMP community group to which trap information should be sent.

              SNMP Version drop-down list

              The SNMP version and model used for the trap. This can be one of the following:

              Type field

              If you select V2 for the version, this is the type of trap to send. This can be one of the following:

              • Trap
              • Inform
              Step 5   In the Trap Destinations area, complete the following fields:
              Name Description

              ID column

              The trap destination ID. This value cannot be modified.

              Enabled column

              For each SNMP trap destination that you want to use, check the associated check box in this column.

              Trap Destination IP Address column

              The IP address to which SNMP trap information is sent.

              Tip   

              To change the settings for a trap or to send a test trap message, administrators can click the trap row in the table.

              Step 6   Click Save Changes.

              Sending a Test SNMP Trap Message

              Before You Begin

              You must log in as a user with admin privileges to perform this task.

              Procedure
                Step 1   In the Navigation pane, click the Admin tab.
                Step 2   On the Admin tab, click Event Management.
                Step 3   In the Event Management pane, click the Trap Settings tab.
                Step 4   In the Trap Destinations area, click the row of the desired SNMP trap destination.

                The Traps Details dialog box opens.

                Step 5   Click Send SNMP trap.

                An SNMPv1 test trap message is sent to the trap destination.

                Note   

                The trap must be configured and enabled in order to send a test message.


                Managing SNMPv3 Users

                Before You Begin
                • You must log in as a user with admin privileges to perform this task.
                • SNMP must be enabled.
                Procedure
                  Step 1   In the Navigation pane, click the Admin tab.
                  Step 2   On the Admin tab, click Communications Services.
                  Step 3   In the Communications Services pane, click the SNMP tab.
                  Step 4   In the SNMPV3 Users area, update the following properties:
                  Name Description

                  Add button

                  Click an available row in the table then click this button to add a new SNMP user.

                  Modify button

                  Select the user you want to change in the table then click this button to modify the selected SNMP user.

                  Delete button

                  Select the user you want to delete in the table then click this button to delete the selected SNMP user.

                  ID column

                  The system-assigned identifier for the SNMP user.

                  Name column

                  The SNMP user name.

                  Auth Type column

                  The user authentication type.

                  Privacy Type column

                  The user privacy type.

                  Step 5   Click Save Changes.

                  Configuring SNMPv3 Users

                  Before You Begin
                  • You must log in as a user with admin privileges to perform this task.
                  • SNMP must be enabled.
                  Procedure
                    Step 1   In the Navigation pane, click the Admin tab.
                    Step 2   On the Admin tab, click Communications Services.
                    Step 3   In the Communications Services pane, click the SNMP tab.
                    Step 4   In the SNMPV3 Users area, perform one of the following actions:
                    • Select an existing user from the table and click Modify.
                    • Click Add to create a new user.
                    Note   

                    If the buttons are disabled, enable SNMP and click Save Changes.

                    Step 5   In the SNMPV3 User Details dialog box, update the following properties:
                    Name Description

                    ID field

                    The unique identifier for the user. This field cannot be changed.

                    Name field

                    The SNMP username.

                    Enter between 1 and 31 characters or spaces.

                    Note   

                    CIMC automatically trims leading or trailing spaces.

                    Security Level drop-down list

                    The security level for this user. This can be one of the following:

                    • no auth, no priv—The user does not require an authorization or privacy password.
                    • auth, no priv—The user requires an authorization password but not a privacy password. If you select this option, CIMC enables the Auth fields described below.
                    • auth, priv—The user requires both an authorization password and a privacy password. If you select this option, CIMC enables the Auth and Privacy fields.

                    Auth Type field

                    The authorization type. This can be one of the following:

                    Auth Password field

                    The authorization password for this SNMP user.

                    Enter between 8 and 64 characters or spaces.

                    Note   

                    CIMC automatically trims leading or trailing spaces.

                    Confirm Auth Password field

                    The authorization password again for confirmation purposes.

                    Privacy Type field

                    The privacy type. This can be one of the following:

                    Privacy Password field

                    The privacy password for this SNMP user.

                    Enter between 8 and 64 characters or spaces.

                    Note   

                    CIMC automatically trims leading or trailing spaces.

                    Confirm Privacy Password field

                    The authorization password again for confirmation purposes.

                    Step 6   Click Save Changes.