Overview
This topic explains how to establish a local serial connection to the Cisco APIC server for initial configuration, detailing methods for connecting via KVM cable, USB keyboard, and VGA monitor, and providing guidance on enabling Serial-over-LAN (SoL) for remote access.
This section describes how to establish a local serial connection to the Cisco APIC server to begin the initial basic configuration. For additional connection information, including instructions on connecting to the server remotely for setup, refer to "Initial Server Setup" in the Cisco APIC M4/L4 server installation and service guide. If you are on Cisco APIC release 6.1(4), you can refer the Cisco APIC G5 server installation and service guide.
Initial connection
The Cisco APIC server operates on a Cisco Integrated Management Controller (CIMC) platform. You can make an initial connection to the CIMC platform using one of these methods:
-
Use a KVM cable (Cisco PID N20-BKVM) to connect a keyboard and monitor to the KVM connector on the front panel of the server.
If you want to use vKVM, see Installing an OS Using the KVM Console in Cisco UCS C-Series Integrated Management Controller GUI Configuration Guide, Release 4.3.
-
Connect a USB keyboard and VGA monitor to the corresponding connectors on the rear panel of the server.
You cannot use the front panel VGA and the rear panel VGA at the same time.
You can make a serial connection using one of the following methods. Two of these methods require a configuration change in the CIMC:
You cannot use more than one of these methods simultaneously.
-
Use the DB9 connector of the KVM cable
-
Use the rear panel RJ-45 console port (after enabling in the CIMC)
-
Connect by Serial-over-LAN (SoL) (after enabling in the CIMC)
The default connection settings from the factory are:
-
The serial port baud rate is 115200
-
The RJ-45 console port located on the rear panel is disabled in the CIMC
-
SoL is disabled in the CIMC
The following are additional notes about serial access:
-
If you are using a Cisco Integrated Management Controller (CIMC) for your setup, setup the CIMC first, and then access the Cisco APIC through the CIMC KVM or continue to access the Cisco APIC locally through the rear panel USB/VGA port. If you choose the CIMC KVM access, you will have remote access available later which is required during operations.
-
If you are using the RJ-45 console port, connect to CIMC using SSH and enable the SoL port using the following commands:
scope sol set enabled yes set baud-rate 115200 commit exitAfter enabling SoL, enter the command connect host to access the APIC console.
When using SoL, physically disconnect the rear panel RJ-45 console port.
Initial Cisco APIC Setup
When the Cisco APIC is launched for the first time, the APIC console presents a series of initial setup options. For many options, you can press Enter to choose the default setting that is displayed in brackets. At any point in the setup dialog, you can restart the dialog from the beginning by pressing Ctrl-C.
Important Notes
-
If the UNIX user ID is not explicitly specified in the response from the remote authentication server, then some Cisco APIC software releases assign a default ID of 23999 to all users. If the response from the remote authentication server fails to specify a UNIX ID, all users will share the same ID of 23999 and this can result in the users being granted higher or lower privileges than the configured privileges through the RBAC policies on the Cisco APIC.
-
Cisco recommends that you assign unique UNIX user IDs in the range of 16000 to 23999 for the AV Pairs that are assigned to the users when in Bash shell (using SSH, Telnet, or Serial/KVM consoles). If a situation arises where the Cisco AV Pair does not provide a UNIX user ID, the user is assigned a user ID of 23999 or similar number from the range that also enables the user's home directories, files, and processes accessible to the remote users with a UNIX ID of 23999.
To ensure that your remote authentication server does not explicitly assign a UNIX ID in its cisco-av-pair response, open an SSH session to the Cisco APIC and log in as an administrator (using a remote user account). Once logged in, run the following commands (replace userid with the username that you logged in with):
-
admin@apic1: remoteuser-userid> cd /mit/uni/userext/remoteuser-userid
-
admin@apic1: remoteuser-userid> cat summary
-
-
Cisco recommends against modifying any parameters using CIMC. If there are any issues, ensure that the default setting for CIMC management node is Dedicated mode and not Shared. If Dedicated mode is not used, it can prevent the discovery of fabric nodes.
-
Do not upgrade software or firmware using the CIMC user interface, XML, or SSH interfaces unless the modified property and software or firmware version are supported with your specific Cisco APIC version.
-
Set the NIC mode to Dedicated, when setting up the CIMC, in the CIMC Configuration Utility. After the CIMC is configured, in the CIMC GUI, verify that you have the following parameters set.
Parameters
Settings
LLDP
Disabled on the VIC
TPM Support
Enabled on the BIOS
TPM Enabled Status
Enabled
TPM Ownership
Owned
If you log in to your Cisco APIC using https, and then attempt to log in to the same Cisco APIC using http in the same browser window without first logging out of the Cisco APIC in the https window, you might see the following error message:
Need a valid webtoken cookie (named APIC-Cookie) or a signed request with signature in the cookie.If this occurs, resolve the issue using either of the following methods:
-
Log out of the Cisco APIC in the https window, or
-
Delete the cookies in the browser window
You should be able to successfully log into the Cisco APIC using http after resolving the issue with either of the methods above.
-
-
During the initial setup, the system will prompt you to select IPv4, or IPv6, or dual stack configuration. Choosing dual stack will enable accessing the Cisco APIC and Cisco ACI fabric out-of-band management interfaces with either IPv4 or IPv6 addresses. While the examples in the table below use IPv4 addresses, you can use whatever IP address configuration options you chose to enable during the initial setup.
A minimum subnet mask of /19 is recommended.
-
Connecting the Cisco APIC to the Cisco ACI fabric requires a 10G interface on the ACI-mode leaf switch. You cannot connect the Cisco APIC directly to the Cisco Nexus 9332PQ, Cisco Nexus 93180LC, or Cisco Nexus 9336C-FX2 ACI-mode leaf switches unless you use a 40G to 10G converter (part number CVR-QSFP-SFP10G), in which case the port on the leaf switches will auto-negotiate to 10G without requiring any manual configuration.
-
The fabric ID is set during the Cisco APIC setup and it cannot be changed unless you perform a clean reload of the fabric. To change the fabric ID, export the Cisco APIC configuration, change the sam.config file, and perform a clean reload of the Cisco APIC and leaf switches. Remove the "fvFabricExtConnP" setting from the exported configuration before importing the configuration into the Cisco APIC after the Cisco APIC comes up. All Cisco APICs in a cluster must have the same fabric ID.
All logging is enabled by default.
For login and cluster operations, non-default HTTPS port (default is 443) is not supported for layer 3 physical and layer 3 virtual APICs (on ESXi and AWS). Virtual APICs on ESXi/ AWS are supported from release 6.0(2).