Install the Cisco SNS 3515 and Cisco SNS 3595 Hardware Appliances

Install the Cisco SNS 3515 and Cisco SNS 3595 Hardware Appliances

This section describes how to install your Cisco SNS 3515 or 3595 appliance and connect it to the network. It contains:

Before you begin the installation, read the Regulatory Compliance and Safety Information for the Cisco SNS 3515 or Cisco SNS 3595 Hardware Appliance.


Warning


Warning: Only trained and qualified personnel should be allowed to install, replace, or service this equipment.

Statement 1030



Warning


Warning: This unit is intended for installation in restricted access areas. A restricted access area can be accessed only through the use of a special tool, lock and key, or other means of security.

Statement 1017


Install the Cisco SNS 3515 or 3595 Appliance in a Rack

This section describes how to install the Cisco SNS 3515 or Cisco SNS 3595 appliance in a rack.

Install the Side Rails


Warning


Warning: To prevent bodily injury when mounting or servicing this unit in a rack, you must take special precautions to ensure that the system remains stable. The following guidelines are provided to ensure your safety:

This unit should be mounted at the bottom of the rack if it is the only unit in the rack. When mounting this unit in a partially filled rack, load the rack from the bottom to the top with the heaviest component at the bottom of the rack.

If the rack is provided with stabilizing devices, install the stabilizers before mounting or servicing the unit in the rack.

Statement 1006


Procedure

Step 1

Attach the inner rails to the sides of the server:

Figure 1. Attach Inner Rail to Side of Server


1

Front side of the server

2

Locking clip on inner rail

  1. Align an inner rail with one side of the server so that the three keyed slots in the rail align with the three pegs on the side of the server (see the figure above).

  2. Set the keyed slots over the pegs, and then slide the rail toward the front to lock it in place on the pegs. The front slot has a metal clip that locks over the front peg.

  3. Install the second inner rail to the opposite side of the server.

Step 2

Open the front securing plate on both slide-rail assemblies. The front end of the slide-rail assembly has a spring-loaded securing plate that must be open before you can insert the mounting pegs into the rack-post holes.

On the outside of the assembly, push the green arrow button toward the rear to open the securing plate.

Figure 2. Front Securing Mechanism, Inside of Front End


1

Front mounting pegs

3

Securing plate shown pulled back to open position

2

Rack post

Step 3

Install the outer slide rails into the rack:

  1. Align one slide-rail assembly front end with the front rack-post holes that you want to use. The slide rail front-end wraps around the outside of the rack post and the mounting pegs enter the rack-post holes from the outside-front (see the figure above).

    Note

     

    The rack post must be between the mounting pegs and the open securing plate.

  2. Push the mounting pegs into the rack-post holes from the outside-front.

  3. Press the securing plate release button, marked PUSH. The spring-loaded securing plate closes to lock the pegs in place.

  4. Adjust the slide-rail length, and then push the rear mounting pegs into the corresponding rear rack-post holes. The slide rail must be level front-to-rear.

    The rear mounting pegs enter the rear rack-post holes from the inside of the rack post.

  5. Attach the second slide-rail assembly to the opposite side of the rack. Ensure that the two slide-rail assemblies are at the same height with each other and are level front-to-back.

  6. Pull the inner slide rails on each assembly out toward the rack front until they hit the internal stops and lock in place.

Step 4

Insert the server into the slide rails:

Caution

 

This server can weigh up to 67 pounds (59 kilograms) when fully loaded with components. We recommend that you use a minimum of two people or a mechanical lift when lifting the server. Attempting this procedure alone could result in personal injury or equipment damage.

Figure 3. Inner Rail Release Clip


1

Inner rail release clip

3

Outer rail attached to rack post

2

Inner rail attached to server and inserted into outer rail

Step 5

(Optional) Secure the server in the rack more permanently by using the two screws that are provided with the slide rails. Perform this step if you plan to move the rack with servers installed.

With the server fully pushed into the slide rails, open a hinged slam latch lever on the front of the server and insert the screw through the hole that is under the lever. The screw threads into the static part of the rail on the rack post and prevents the server from being pulled out. Repeat for the opposite slam latch.


What to do next

Install the Cable Management Arm (Optional)


Note


The CMA is reversible left to right. To reverse the CMA, see Reversing the Cable Management Arm (Optional) before installation.


Procedure

Step 1

With the server pushed fully into the rack, slide the CMA tab of the CMA arm that is farthest from the server onto the end of the stationary slide rail that is attached to the rack post (see the following figure). Slide the tab over the end of the rail until it clicks and locks.

Step 2

Slide the CMA tab that is closest to the server over the end of the inner rail that is attached to the server (see the following figure). Slide the tab over the end of the rail until it clicks and locks.

Step 3

Pull out the width-adjustment slider that is at the opposite end of the CMA assembly until it matches the width of your rack (see the following figure).

Step 4

Slide the CMA tab that is at the end of the width-adjustment slider onto the end of the stationary slide rail that is attached to the rack post (see the following figure). Slide the tab over the end of the rail until it clicks and locks.

Step 5

Open the hinged flap at the top of each plastic cable guide and route your cables through the cable guides as desired.

Figure 4. Attach the Cable Management Arm to the Rear of the Slide Rails


1

CMA tab on arm farthest from server and end of stationary outer slide rail

3

CMA tab on width-adjustment slider and end of stationary outer slide rail

2

CMA tab on arm closest to the server and end of inner slide rail attached to server

4

Rear of server


Reverse the Cable Management Arm (Optional)

Procedure

Step 1

Rotate the entire CMA assembly 180 degrees. The plastic cable guides must remain pointing upward.

Step 2

Flip the tabs at the end of each CMA arm so that they point toward the rear of the server.

Step 3

Pivot the tab that is at the end of the width-adjustment slider. Depress and hold the metal button on the outside of the tab and pivot the tab 180 degrees so that it points toward the rear of the

Figure 5. Reverse the CMA


1

CMA tab on end of width-adjustment slider

2

Metal button for rotating


Connect Cables

This section describes how to connect your Cisco SNS-3515 or Cisco SNS-3595 appliance to the network and the appliance console.

Attach cables (such as keyboard, monitor cables, if required) to the rear of the server. Route the cables properly and use the cable straps to secure the cables to the slide rails. See the Cisco SNS 3515 or SNS 3595 Appliance Back Panel View for reference on the rear view of the appliance.

Connect the Network Interface


Warning


Warning: Do not work on the system or connect or disconnect cables during periods of lightning activity.

Statement 1001


This section describes how to connect the Cisco SNS-3515 or Cisco SNS-3595 appliance Ethernet port.

The Ethernet connector supports Serial over LAN (SOL) cables. The RJ-45 port supports standard straight-through and crossover Category 5 unshielded twisted-pair (UTP) cables. Cisco does not supply Category 5 UTP cables; these cables are available commercially.

To connect the cable to the appliance Ethernet port:

Procedure

Step 1

Verify that the appliance is turned off.

Step 2

Connect one end of the cable to the GigabitEthernet 0 port on the appliance.

Step 3

Connect the other end to a switch in your network.


Ethernet Port Connector
Ethernet Port Pin-out

The Cisco SNS 3515 or Cisco SNS-3595 appliance comes with six integrated dual-port Ethernet controllers. The controllers provide an interface for connecting to 10-Mb/s, 100-Mb/s, or 1000-Mb/s networks and provide full-duplex (FDX) capability, which enables simultaneous transmission and reception of data on the Ethernet LAN. Cisco ISE supports multiple NICs.

To access the Ethernet port, connect a Category 3, 4, 5, 5E, or 6 unshielded twisted-pair (UTP) cable to the RJ-45 connector on the back of the appliance.

The following table describes the UTP cable categories.

Type Description

10BASE-T

EIA Categories 3, 4, or 5 UTP (2 or 4 pair) up to 328 ft (100 m)

100BASE-TX

EIA Category 5 UTP (2 pair) up to 328 ft (100 m)

1000BASE-T

EIA Category 6 UTP (recommended), Category 5E UTP or 5 UTP (2 pair) up to 328 ft (100 m)

The following figure shows the RJ-45 port and plug.

Figure 6. RJ-45 Port and Plug


Ethernet Port Pin

Signal

Description

1

TxD+

Transmit data +

2

TxD-

Transmit data -

3

RxD+

Receive data +

4

Termination network

No connection

5

Termination network

No connection

6

RxD-

Receive data-

7

Termination network

No connection

8

Termination network

No connection

Connect the Console


Warning


Warning: Do not work on the system or connect or disconnect cables during periods of lightning activity.

Statement 1001


Your Cisco SNS-3515 or Cisco SNS-3595 appliance has a DCE-mode console port for connecting a console terminal to your appliance. The appliance uses a DB-9 serial connector for the console port.

The console port on the Cisco SNS-3515 or Cisco SNS-3595 appliance includes an EIA/TIA-232 asynchronous serial (DB-9) connector. This serial console connector (port) allows you to access the appliance locally by connecting a terminal—either a PC running terminal-emulation software or an ASCII terminal—to the console port.

To connect a PC running terminal-emulation software to the console port, use a DB-9 female to DB-9 female straight-through cable.

To connect an ASCII terminal to the console port, use a DB-9 female to DB-25 male straight-through cable with a DB-25 female to DB-25 female gender changer.

To connect a terminal or a PC running terminal-emulation software to the console port on the Cisco SNS-3515 or Cisco SNS-3595 appliance:

Procedure

Step 1

Connect the terminal using a straight-through cable to the console port.

Step 2

Configure your terminal or terminal-emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no hardware flow control.


Connect the Keyboard and Video Monitor


Warning


Do not work on the system or connect or disconnect cables during periods of lightning activity.

Statement 1001


This section describes how to connect a keyboard and video monitor to the Cisco SNS-3515 or Cisco SNS-3595 appliance.

You can connect the keyboard and video monitor to the Cisco SNS-3515 or Cisco SNS-3595 appliance using the KVM connector available in the front panel of the Cisco SNS-3515 or Cisco SNS-3595 appliance. A KVM cable is shipped along with the appliance that provides two USB, one VGA, and one serial connector.

The Cisco SNS-3515 or Cisco SNS-3595 appliance does not provide support for a mouse.

The Cisco SNS-3515 or Cisco SNS-3595 provides USB ports on the rear of the appliance that can be used to connect a keyboard and video monitor.

To connect a keyboard and video monitor to the appliance:

Procedure

Step 1

Verify that the appliance is turned off.

Step 2

Connect the end of the keyboard cable to the PS/2 (keyboard) port which is located on the back panel of the appliance.

Step 3

Connect the end of the video monitor cable to the PS/2 (video monitor) port which is located on the back panel of the appliance.

Step 4

Power on the appliance.


Cable Management

Cable management is the most visual aspect of your appliance setup. However, cable management is often overlooked because it can be time consuming.

Equipment racks and enclosures house more equipment today than ever before. This growth has increased the need for organized cable management both inside and outside the rack. Poor cable management not only leads to damaged cables or increased time for adding or changing cables, but also blocks critical airflow or access. These problems can lead to inefficiencies in the performance of your equipment or even downtime.

There are many solutions to address cable management. They can range from simple cable management rings, to vertical or horizontal organizers, to troughs and ladders.

All Cisco SNS-3515 or Cisco SNS-3595 appliance cables should be properly dressed so as not to interfere with each other or other pieces of equipment. Use local practices to ensure that the cables attached to your appliance are properly dressed.

Proceed to the next section, Connect and Power On the Cisco SNS 3515 or 3595 Appliance, to continue the installation process.

Connect and Power On the Cisco SNS 3515 or 3595 Appliance

Connect and Power On the Server (Standalone Mode)


Note


This section describes how to power on the server, assign an IP address, and connect to server management when using the server in standalone mode.


The server is shipped with the following default settings:

  • The NIC mode is Shared LOM EXT.

    Shared LOM EXT mode enables the 1-Gb Ethernet ports and the ports on any installed Cisco virtual interface card (VIC) to access Cisco Integrated Management Interface (Cisco IMC). If you want to use the 10/100/1000 dedicated management ports to access Cisco IMC, you can connect to the server and change the NIC mode as described in Step 1 of the procedures given below.

  • The NIC redundancy is active-active.

    All Ethernet ports are utilized simultaneously.

  • DHCP is enabled.

  • IPv4 is enabled.

You can connect to the system using two methods:

  • Local setup—Use this procedure if you want to connect a keyboard and monitor to the system for setup. This procedure can use a KVM cable (Cisco PID N20-BKVM) or the ports on the rear of the server. See Local Connection Procedure.

  • Remote setup—Use this procedure if you want to perform setup through your dedicated management LAN. See Remote Connection Procedure.


Note


To configure the system remotely, you must have a DHCP server on the same network as the system. Your DHCP server must be preconfigured with the range of MAC addresses for this server node. The MAC address is printed on a label on the rear of the server node. This server node has a range of six MAC addresses assigned to the Cisco IMC. The MAC address printed on the label is the beginning of the range of six contiguous MAC addresses.


Local Connection Procedure
Procedure

Step 1

Attach a power cord to each power supply unit in your server, and then attach each power cord to a grounded AC power outlet. See Power Specifications for power specifications.

Wait for approximately two minutes to let the server boot in standby power during the first bootup.

You can verify system power status by looking at the system Power Status LED on the front panel (see LED Indicators on Cisco SNS 3515 and 3595 Appliances). The system is in standby power mode when the LED is amber.

Step 2

Connect a USB keyboard and VGA monitor to the server using one of the following methods:

Step 3

Open the Cisco IMC Configuration Utility:

  1. Press and hold the front panel power button for four seconds to boot the server.

  2. During bootup, press F8 when prompted to open the Cisco IMC Configuration Utility.

    This utility has two windows that you can switch between by pressing F1 or F2.

  3. Continue with Setup CIMC Configuration Utility.


Remote Connection Procedure
Procedure

Step 1

Attach a power cord to each power supply unit in your server, and then attach each power cord to a grounded AC power outlet. See Power Specifications for power specifications.

Wait for approximately two minutes to let the server boot in standby power during the first bootup.

You can verify system power status by looking at the system Power Status LED on the front panel (see LED Indicators on Cisco SNS 3515 and 3595 Appliances). The system is in standby power mode when the LED is amber.

Step 2

Plug your management Ethernet cable into the dedicated management port on the rear panel (see Cisco SNS 3515 or SNS 3595 Appliance Back Panel View).

Step 3

Allow your preconfigured DHCP server to assign an IP address to the server node.

Step 4

Use the assigned IP address to access and log in to the Cisco IMC for the server node. Consult with your DHCP server administrator to determine the IP address.

Note

 

The default user name for the server is admin. The default password is password.

Step 5

From the Cisco IMC Server Summary page, click Launch KVM Console. A separate KVM console window opens.

Step 6

From the Cisco IMC Summary page, click Power Cycle Server. The system reboots.

Step 7

Select the KVM console window.

Note

 

The KVM console window must be the active window for the following keyboard actions to work.

Step 8

When prompted, press F8 to enter the Cisco IMC Configuration Utility. This utility opens in the KVM console window.

This utility has two windows that you can switch between by pressing F1 or F2.

Step 9

Continue with Setup CIMC Configuration Utility.


Cisco Integrated Management Controller

You can monitor the server inventory, health, and system event logs by using the built-in Cisco Integrated Management Controller (CIMC) GUI or CLI interfaces. See the user documentation for your firmware release at the following URL:

http://www.cisco.com/c/en/us/support/servers-unified-computing/ucs-c-series-integrated-management-controller/products-installation-and-configuration-guides-list.html


Note


You must use the versions of CIMC firmware from the ISE downloads, which are qualified versions for use with the SNS appliances. Versions of CIMC for UCS are not compatible. Newer versions of CIMC are developed for SNS appliances after they are developed for UCS.

Check the download directory for release notes or upgrade instructions.

Setup CIMC Configuration Utility

The following procedure is performed after you connect to the system and open the Cisco IMC Configuration Utility.

Procedure


Step 1

Set NIC mode and NIC redundancy:

  1. Set the NIC mode to choose which ports to use to access Cisco IMC for server management:

    • Shared LOM EXT (default)—This is the shared LOM extended mode, the factory-default setting. With this mode, the Shared LOM and Cisco Card interfaces are both enabled.

      In this mode, DHCP replies are returned to both the shared LOM ports and the Cisco card ports. If the system determines that the Cisco card connection is not getting its IP address from a Cisco UCS Manager system because the server is in standalone mode, further DHCP requests from the Cisco card are disabled. Use the Cisco Card NIC mode if you want to connect to Cisco IMC through a Cisco card in standalone mode.

    • Shared LOM—The 1-Gb Ethernet ports are used to access Cisco IMC. You must select a NIC redundancy and IP setting.

    • Dedicated—The dedicated management port is used to access Cisco IMC. You must select a NIC redundancy and IP setting.

    • Cisco Card—The ports on an installed Cisco UCS virtual interface card (VIC) are used to access the Cisco IMC. You must select a NIC redundancy and IP setting.

      See also the required VIC Slot setting below.

    • VIC Slot—If you use the Cisco Card NIC mode, you must select this setting to match where your VIC is installed. The choices are Riser1, Riser2, or Flex-LOM (the mLOM slot).

      • If you select Riser1, slot 1 is used.

      • If you select Riser2, slot 2 is used.

      • If you select Flex-LOM, you must use an mLOM-style VIC in the mLOM slot.

  2. Use this utility to change the NIC redundancy to your preference. This server has three possible NIC redundancy settings:

    • None—The Ethernet ports operate independently and do not fail over if there is a problem. This setting can be used only with the Dedicated NIC mode.

    • Active-standby—If an active Ethernet port fails, traffic fails over to a standby port.

    • Active-active—All Ethernet ports are utilized simultaneously. The Shared LOM EXT mode can have only this NIC redundancy setting. Shared LOM and Cisco Card modes can have both Active-standby and Active-active settings.

Step 2

Choose whether to enable DHCP for dynamic network settings, or to enter static network settings.

Note

 

Before you enable DHCP, you must preconfigure your DHCP server with the range of MAC addresses for this server. The MAC address is printed on a label on the rear of the server. This server has a range of six MAC addresses assigned to Cisco IMC. The MAC address printed on the label is the beginning of the range of six contiguous MAC addresses.

The static IPv4 and IPv6 settings include the following:

  • The Cisco IMC IP address.

  • The prefix/subnet.

    For IPv6, valid values are 1–127.

  • The gateway.

    For IPv6, if you do not know the gateway, you can set it as none by entering :: (two colons).

  • The preferred DNS server address.

    For IPv6, you can set this as none by entering :: (two colons).

Step 3

(Optional) Use this utility to make VLAN settings.

Step 4

Press F1 to go to the second settings window, then continue with the next step.

From the second window, you can press F2 to switch back to the first window.

Step 5

(Optional) Set a hostname for the server.

Step 6

(Optional) Enable dynamic DNS and set a dynamic DNS (DDNS) domain.

Step 7

(Optional) If you check the Factory Default check box, the server reverts to the factory defaults.

Step 8

(Optional) Set a default user password.

Step 9

(Optional) Enable auto-negotiation of port settings or set the port speed and duplex mode manually.

Note

 

Auto-negotiation is applicable only when you use the Dedicated NIC mode. Auto-negotiation sets the port speed and duplex mode automatically based on the switch port to which the server is connected. If you disable auto-negotiation, you must set the port speed and duplex mode manually.

Step 10

(Optional) Reset port profiles and the port name.

Step 11

Press F5 to refresh the settings that you made. You might have to wait about 45 seconds until the new settings appear and the message, “Network settings configured” is displayed before you reboot the server in the next step.

Step 12

Press F10 to save your settings and reboot the server.

Note

 

If you chose to enable DHCP, the dynamically assigned IP and MAC addresses are displayed on the console screen during bootup.

Use a browser and the IP address of the Cisco IMC to connect to the Cisco IMC management interface. The IP address is based upon the settings that you made (either a static address or the address assigned by your DHCP server).

The default username for the server is admin. The default password is password.

To manage the server, see the Cisco UCS C-Series Rack-Mount Server Configuration Guide or the Cisco UCS C-Series Rack-Mount Server CLI Configuration Guide for instructions on using those interfaces. The links to these documents are in the C-Series documentation roadmap:

http://www.cisco.com/go/unifiedcomputing/c-series-doc


NIC Modes and NIC Redundancy Settings

NIC Modes

This server has the following NIC mode settings that you can choose from:

  • Shared LOM EXT (default)—This is the Shared LOM extended mode, the factory-default setting. With this mode, the shared LOM and Cisco Card interfaces are both enabled.

    In this mode, DHCP replies are returned to both the shared LOM ports and the Cisco card ports. If the system determines that the Cisco card connection is not getting its IP address from a Cisco UCS Manager system because the server is in standalone mode, further DHCP requests from the Cisco card are disabled. If the system determines that the Cisco card connection is getting its IP address from a Cisco UCS Manager system, the reply has parameters that automatically move the server to UCSM mode.

  • Dedicated—The dedicated management port is used to access Cisco IMC. You must select a NIC redundancy and IP setting.

  • Shared LOM—The 1-Gb Ethernet ports are used to access Cisco IMC. You must select a NIC redundancy and IP setting.

  • Cisco Card—The ports on an installed Cisco UCS virtual interface card (VIC) are used to access Cisco IMC. You must select a NIC redundancy and IP setting.

    See also the required VIC Slot setting below.

  • VIC Slot—If you use the Cisco Card NIC mode, you select this setting to match where your VIC is installed. The choices are Riser1, Riser2, or Flex-LOM (the mLOM slot).

    • If you select Riser1, slot 1 is used.

    • If you select Riser2, slot 2 is used.

    • If you select Flex-LOM, you must use an mLOM-style VIC in the mLOM sl

This server has the following NIC redundancy settings that you can choose from:

  • None—The Ethernet ports operate independently and do not fail over if there is a problem. This setting can be used only with the Dedicated NIC mode.

  • Active-standby—If an active Ethernet port fails, traffic fails over to a standby port.

  • Active-active—All Ethernet ports are utilized simultaneously. Shared LOM EXT mode can have only this NIC redundancy setting. Shared LOM and Cisco Card modes can have both Active-standby and Active-active settings.

    The active/active setting uses Mode 5 or Balance-TLB (adaptive transmit load balancing). This is channel bonding that does not require any special switch support. The outgoing traffic is distributed according to the current load (computed relative to the speed) on each standby. Incoming traffic is received by the current standby. If the receiving standby fails, another standby takes over the MAC address of the failed receiving standby.

Upgrade the BIOS and Cisco IMC Firmware

The following procedure describes how to upgrade the BIOS and Cisco IMC firmware on Cisco SNS-3515 and SNS-3595 appliances.

To check the version of BIOS and Cisco IMC that is currently running on your appliance:

  1. Launch CIMC.

  2. Click BIOS.

    The running version is listed under BIOS properties.

Cisco ISE runs on Cisco Secure Network Server 3515 and Cisco Secure Network Server 3595 hardware appliances with Cisco Secure Access Control System (Cisco Secure ACS) PIDs. Before you install Cisco ISE on an SNS-3500 server that was previously used for Cisco Secure ACS, you must upgrade the BIOS and Cisco IMC firmware to a version that supports the Cisco ISE secure boot capability.


Note


After you upgrade the BIOS, secure boot is enabled, and ACS will no longer boot on this appliance. Do not perform this BIOS upgrade procedure until you are ready to convert the appliance from ACS to ISE.

Before you begin

We recommend that you use the latest BIOS and matching Cisco IMC firmware. You can download the updated Cisco IMC and BIOS files for the Cisco SNS-3500 series appliance from Cisco Software Download. When you upgrade the BIOS firmware, you must also upgrade the Cisco IMC firmware to the same version. Otherwise, the server will not boot.

You must use the versions of Cisco IMC firmware from the ISE downloads, which are qualified versions for use with the SNS appliances. Versions of Cisco IMC for UCS are not compatible. Newer versions of Cisco IMC are developed for SNS appliances after they are developed for UCS.


Note


In the download directory, check for any release notes or upgrade instructions.

The following steps describe how to upgrade the BIOS and Cisco IMC. This procedure may change when newer firmware releases that are posted on Cisco.com.

Procedure


Step 1

Update the Cisco IMC firmware:

  1. In the Cisco IMC interface, choose Admin > Firmware Management.

  2. From the Actions pane, select the Check Install Cisco IMC Firmware through Browser Client option.

  3. In the Install Cisco IMC Firmware window, click Browse and select the firmware image to install, and then click Install Firmware to begin download and installation.

    After the installation is fully completed, the status changes to Completed Successfully. The image replaces the nonactive image.

Step 2

Update the BIOS firmware:

  1. In the Cisco IMC interface, choose Admin > Firmware Management.

  2. From the Actions pane, select the Install BIOS Firmware through Browser Client option.

  3. In the Install BIOS Firmware window, click Browse and select the BIOS firmware image to install and then click Install Firmware to begin download and installation.

    Note

     

    Since Adobe Flash Player is End of Life and not supported in any browser, use the Cisco IMC command line interface and SFTP as the remote server to download the Cisco IMC or BIOS firmware, in case a flash player is required. This can also be used to overcome the file size limit of 40MB.

    After the installation is fully completed, the status changes to Completed Successfully.

Step 3

Activate the Cisco IMC firmware:

  1. In the Cisco IMC interface, choose Admin > Firmware Management > Activate Cisco IMC Firmware.

  2. In the Activate Firmware window, select the firmware image to activate.

    Activating a firmware image makes it the running version. The management controller is rebooted immediately to complete the activation.

    Note

     
    Communication with the controller is temporarily lost and you should log in again.
  3. After Cisco IMC is restarted, refresh the browser and enter your credentials in the Cisco IMC 3.0(3S2) login page.

    Note

     
    Firmware is represented as BMC in Cisco IMC 3.0(3S2).

Step 4

Activate the BIOS firmware:

  1. Choose Host Power > Power Off to manually power off the server.

  2. In the Cisco IMC interface, click the Navigation icon at the top left corner and choose Admin > Firmware Management.

  3. Check the BIOS check box, and then click Activate.

  4. In the Activate Firmware window, select the firmware image to activate and click Activate Firmware.

    The firmware image that you activated becomes the running version after the host is powered on.

  5. Choose Host Power > Power On.

  6. Verify the firmware and BIOS version.


Access the System BIOS

To change the BIOS settings for your server, follow these steps. Detailed instructions are also printed on the BIOS screens.

Procedure

Step 1

Enter the BIOS setup utility by pressing the F2 key when prompted during bootup.

Note

 

The version and build of the current BIOS are displayed on the Main page of the utility.

Step 2

Use the arrow keys to select the BIOS menu page.

Step 3

Highlight the field to be modified by using the arrow keys.

Step 4

Press Enter to select the field that you want to change, and then modify the value in the field.

Step 5

Press the right arrow key until the Exit menu screen is displayed.

Step 6

Follow the instructions on the Exit menu screen to save your changes and exit the setup utility (or Press F10). You can exit without saving changes by pressing Esc.