The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter contains the following topics:
The Policies menu contains the following menu options:
Tab |
Description |
---|---|
Credential Policies |
You can create a credential policy specifying a user name, password, protocol, and port. You can reuse the credentials specified in this policy for example, while creating a rack account. You can perform various tasks such as adding, editing, and deleting credential policies from this page. For information on performing these tasks, see Creating a Credential Policy. |
Manage Hardware Policies |
A policy helps in categorically grouping and classifying the various characteristics of a server. You can create hardware policies by configuring various properties such as BIOS, LDAP, Users and so on. These policies can then be applied to a server or server groups. You can perform various tasks such as adding, editing, and deleting hardware policies from this page. For information on performing these tasks, see Configuring Server Policies. |
Manage Hardware Profiles |
A combination of existing set of policies make up a profile. You can apply configuration details of a rack hardware profile for example, to multiple servers. You can associate this hardware profile to specific servers. You can perform various tasks such as adding, editing, and deleting hardware profiles from this page. For information on performing these tasks, see Creating a Server Profile. |
Tagging is when you assign a label to an object. As an administrator, you can decide to tag objects such as resource groups and user groups in Cisco IMC Supervisor. You can assign tags to a category such as a rack account. You can also apply a tag to a specific type of account in the selected category.
Field |
Description |
---|---|
Name |
User defined name of the tag library. |
Description |
User defined brief description of the tag library. |
Type |
String or an integer. |
Possible Tag Values |
User defined tag values. |
Applies To |
Rack mount servers or users. |
Credential Policies
Perform this procedure when you want to create a credential policy.
Perform this procedure when you want to edit a credential policy.
The policy has already been created under Credential Policies.
Step 1 | From the menu bar, choose . | ||||||||||||||
Step 2 | From the list of policies, select the policy you want to edit. | ||||||||||||||
Step 3 | Click
Edit.
| ||||||||||||||
Step 4 | In the
Modify
Credential Policy dialog box, edit the following fields:
| ||||||||||||||
Step 5 | Click Submit. | ||||||||||||||
Step 6 | In the confirmation dialog box, click OK. |
Perform this procedure when you want to create a new credential policy based on another policy.
The policy has already been created under Credential Policies.
Step 1 | From the menu bar, choose . | ||||||||||||||
Step 2 | From the list of policies, select the policy you want to clone. | ||||||||||||||
Step 3 | Click
Clone.
| ||||||||||||||
Step 4 | In the
Clone
Credential Policy dialog box, complete the following fields:
| ||||||||||||||
Step 5 | Click Submit. | ||||||||||||||
Step 6 | In the confirmation dialog box, click OK. |
Perform this procedure when you want to delete a credential policy.
The policy has already been created under Credential Policies.
Step 1 | From the menu bar, choose . | ||
Step 2 | From the list of policies, select the policy you want to delete. | ||
Step 3 | Click
Delete.
| ||
Step 4 | In the Delete Credential Policy dialog box, click Delete. | ||
Step 5 | In the confirmation dialog box, click OK. |
Perform this procedure when you want to view a credential policy details.
The policy has already been created under Credential Policies.
Step 1 | From the menu bar, choose . | ||
Step 2 | From the list of policies, select the policy you want to view. | ||
Step 3 | Click
View.
| ||
Step 4 | You can view the details in the Credential Policy Details dialog box. | ||
Step 5 | Click Close to go back to the previous screen. |
Policies are a primary mechanism for defining configuration of various attributes on Cisco IMC. Policies help ensure consistency and repeatability of configurations across servers. Defining and using a comprehensive set of policies enables greater consistency, control, predictability, and automation as similar configurations are applied across many servers.
The following workflow indicates how you can work with hardware policies in Cisco IMC Supervisor:
Create a hardware policy such as BIOS policy or an NTP policy. You can create a policy in one of the following methods:
Create a new policy. For more information about the various policy types and creating a new policy, see Creating Hardware Policies.
Create a policy from the configuration existing on a server. For more information about creating a policy from the configuration existing on a server, see Creating a Policy from an Existing Configuration.
Apply the policy on a server. For more information about applying a policy, see Applying a Policy.
You can also view the list of servers that are mapped to a specific policy. For more information on performing these tasks, see General Tasks Under Hardware Policies.
You can apply profiles to servers after creating various policies and grouping them into profiles. For more information about applying profiles, see Applying a Hardware Profile.
Perform this procedure when you want to create a new hardware policy.
Step 1 | From the menu bar, choose . | ||||||||||||||||||||||||||||||||||
Step 2 | Choose Manage Hardware Policies tab. | ||||||||||||||||||||||||||||||||||
Step 3 | Click Add. | ||||||||||||||||||||||||||||||||||
Step 4 | In the
Add
Policy dialog box, choose a policy type from the drop-down list.
For more information about creating a policy based on the policy type, select the policy type listed in the table below. The various properties required to configure these policies are available in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide. The respective sections in this guide are listed against each policy type.
|
Apply the policy to a server. For more information about applying a policy, see Applying a Policy.
A BIOS policy automates the configuration of BIOS settings on servers. You can create one or more BIOS policies which contain a specific grouping of BIOS settings that match the needs of a server or a set of servers. If you do not specify a BIOS policy for a server, the BIOS settings will remain as they are, either a default set of values for a brand new bare metal server or a set of values which were configured using Cisco IMC. If a BIOS policy is specified, the values specified in the policy replace any previously configured values on the server.
For details about configuring the various BIOS properties, see section Configuring BIOS Settings in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create a BIOS policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. | ||
Step 2 | In the Add dialog box, choose BIOS Policy from the drop-down list and click Submit. | ||
Step 3 | Enter a name
in the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration.
| ||
Step 4 | In the Main dialog box, select values for the main BIOS properties such as Boot Option Retry, Post Error Pause, and TPM Support drop-down lists. | ||
Step 5 | In the Advanced dialog box, choose the BIOS property values from the drop-down lists and click Next. | ||
Step 6 | In the Server Management dialog box, choose the server property values from the drop-down lists and click Submit. | ||
Step 7 | In the Submit Result dialog box, click OK. |
Using a Disk Group policy, you can select the physical disks used for Virtual Drives and also configure various attributes associated with a virtual drive. A group of physical disks used for creating a virtual drive is called a Disk Group.
A disk group policy defines how a disk group is created and configured. The policy specifies the RAID level to be used for the virtual drive. You can use a disk group policy to manage multiple disk groups. A single Disk Group policy can be associated with multiple virtual drives. If so, the virtual drives share the same Virtual Drive group space. Disk Group policies associated with different virtual drives in a RAID policy do not have any physical disk repeated across different Disk Group policies. For more information about RAID policy, see RAID Policy.
For details about configuring the various disk group properties, see section Managing Storage Adapters in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create a Disk Group policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. | ||
Step 2 | In the Add dialog box, choose Disk Group Policy from the drop-down list and click Submit. | ||
Step 3 | Enter a name in the Policy Name field and click Next. | ||
Step 4 | In the Virtual Drive Configuration dialog box, choose the virtual drive properties and click Next. | ||
Step 5 | In the Local Disk Configuration dialog box, click + to add an entry to reference a local disk configuration and click Submit. | ||
Step 6 | In the Submit Result dialog box, click OK. | ||
Step 7 | Click Submit in the Main dialog box. | ||
Step 8 | In the
Submit
Result dialog box, click
OK.
|
Intelligent Platform Management Interface (IPMI) defines the protocols for interfacing with a service processor embedded in a server platform. This service processor is called a Baseboard Management Controller (BMC) and resides on the server motherboard. The BMC links to a main processor and other on-board elements using a simple serial bus. Configure an IPMI over LAN policy when you want to manage Cisco IMC with IPMI messages.
For details about configuring the various properties, see section Configuring IPMI in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create an IPMI Over LAN policy.Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. | ||||||||||
Step 2 | In the Add dialog box, choose IPMI Over LAN Policy from the drop-down list and click Submit. | ||||||||||
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. | ||||||||||
Step 4 | In the
Main dialog box, complete the following fields.
| ||||||||||
Step 5 | Click Submit. | ||||||||||
Step 6 | In the Submit Result dialog box, click OK. |
Cisco C-series and E series servers support LDAP and Cisco IMC Supervisor supports the LDAP configuration settings on the servers using an LDAP policy. You can create one or more LDAP policies which contain a specific grouping of LDAP settings that match the needs of a server or a set of servers.
For details about configuring the various LDAP properties, see section Configuring LDAP Server in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create a LDAP policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. | ||
Step 2 | In the Add dialog box, choose LDAP Policy from the drop-down list and click Submit. | ||
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. | ||
Step 4 | In the Main dialog box, fill in the LDAP properties. | ||
Step 5 | Click Next. | ||
Step 6 | In the LDAP Servers dialog box, fill in the LDAP server details. | ||
Step 7 | Click Next. | ||
Step 8 | In the Group Authorization dialog box, fill in the group authorization details and click + to add an LDAP group entry to the table. | ||
Step 9 | In the Add Entry to LDAP Groups dialog box, fill in the group details. | ||
Step 10 | Click Submit. | ||
Step 11 | In the Submit Result dialog box, click OK. | ||
Step 12 | Click Submit in the Group Authorization dialog box. | ||
Step 13 | In the
Submit
Result dialog box, click
OK.
|
A Legacy Boot Order Policy automates the configuration of boot order settings. You can create one or more Legacy Boot Order policies which contain a specific grouping of boot order settings that match the needs of a server or a set of servers. Using Cisco IMC Supervisor, you can configure the order in which the server attempts to boot from available boot device types. You can also configure the precision boot order which allows linear ordering of the devices. For more information about precision boot order, see Precision Boot Order Policy.
For details about configuring the various server boot order properties, see section Server Boot Order in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create a Legacy Boot Order policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. | ||
Step 2 | In the Add dialog box, choose Legacy Boot Order Policy from the drop-down list and click Submit. | ||
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. | ||
Step 4 | In the
Main dialog box, click
+ and select the device type from the drop-down
list. The table lists the devices you have added.
In the Select Devices table, select an existing device and click x to delete a device. Use the up and down arrow icons to re-order the entries. The order of entries in the table determines the boot order. You cannot add the same device type again. | ||
Step 5 | Click Submit in the Add Entry to Select Devices dialog box. | ||
Step 6 | In the Submit Result dialog box, click OK. | ||
Step 7 | Click Submit in the Main dialog box. | ||
Step 8 | In the
Submit
Result dialog box, click
OK.
|
Cisco IMC Supervisor uses IP blocking as network security. IP blocking prevents the connection between a server or a website and certain IP addresses or a range of addresses. IP blocking effectively bans undesired connections from those computers to a website, mail server, or other Internet servers. You can create one or more Network Security policies which contain a specific grouping of IP properties that match the needs of a server or a set of servers.
For details about configuring the various network security properties, see section Network Security Configuration in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create a Network Security policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. |
Step 2 | In the Add dialog box, choose Network Security from the drop-down list and click Submit. |
Step 3 | Enter a name
in the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. |
Step 4 | In the Main dialog box, check Enable IP Blocking checkbox to block the IP, and enter attributes to set IP Blocking properties. |
Step 5 | Click Submit. |
Step 6 | In the Submit Result dialog box, click OK. |
With an NTP service, you can configure a server managed by Cisco IMC Supervisor to synchronize the time with an NTP server. By default, the NTP server does not run in Cisco IMC Supervisor. You must enable and configure the NTP service by specifying the IP/DNS address of at least one server or a maximum of four servers that function as NTP servers. When you enable the NTP service, Cisco IMC Supervisor synchronizes the time on the managed server with the configured NTP server.
For details about configuring the various NTP properties, see section Configuring Network Time Protocol Settings in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create a NTP policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. | ||
Step 2 | In the Add dialog box, choose NTP Policy from the drop-down list and click Submit. | ||
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. | ||
Step 4 | In the Main dialog box, check Enable NTP check box to enable alternate servers and specify up to 4 NTP servers. | ||
Step 5 | Click Submit. | ||
Step 6 | In the
Submit
Result dialog box, click
OK.
|
For details about configuring the various boot order properties, see section Configuring the Precision Boot Order in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
You can create this policy for servers that are running Cisco IMC version 2.x and above. For servers that are running versions prior to 2.x, you must configure the Legacy Boot Order policy instead.
Perform the following procedure to create a Precision Boot Order policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. |
Step 2 | In the Add dialog box, choose Precision Boot Order Policy from the drop-down list and click Submit. |
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. |
Step 4 | In the Main dialog box, check UEFI Secure Boot check box or select the boot mode from the Configure Boot Mode drop-down list. |
Step 5 | Click
+ and select or enter device details. The table
lists the devices you have added.
You can also select an existing device in the Select Devices table and click x to delete or click edit icon to edit a device. Use the up and down arrow icons to re-order the entries. The order of entries in the table determines the boot order. |
Step 6 | Click Submit in the Add Entry to Select Devices dialog box. |
Step 7 | In the Submit Result dialog box, click OK. |
Step 8 | Click Submit in the Main dialog box. |
Step 9 | In the Submit Result dialog box, click OK. |
You can use a RAID policy to create virtual drives on a server. You can also configure the storage capacity of a virtual drive. Each virtual drive in a RAID policy is associated with a disk group policy. Using a disk group policy you can select and configure the disks to be used for a particular virtual drive.
For details about configuring the various properties, see section Managing Storage Adapters in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create a RAID policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. | ||
Step 2 | In the Add dialog box, choose RAID Policy from the drop-down list and click Submit. | ||
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. | ||
Step 4 | In the Main dialog box, click + to add virtual drives that you want to configure on the server to the Virtual Drives list. | ||
Step 5 | In the
Add
Entry to Virtual Drives dialog box, enter or select the virtual
drive details.
You can either
select an existing Disk Group policy from the drop-down list and edit or add a
new Disk Group policy to specify local disks. To create a Disk Group policy,
refer
Disk Group Policy.
| ||
Step 6 | Click Submit in the Add Entry dialog box. | ||
Step 7 | In the Submit Result dialog box, click OK. | ||
Step 8 | Check the Erase existing Virtual Drives check box to delete all existing virtual drives on the server. If you select this check box, all existing virtual drives on the server will be deleted when the policy is applied. This results in loss of existing data. | ||
Step 9 | Check the
Configure remaining disks as JBOD check box to
configure the remaining disks as JBOD.
This option is applicable only on storage controllers that support JBOD. The disks that are not used for virtual drives or hotspares are configured as JBOD. | ||
Step 10 | Click Submit in the Main dialog box. | ||
Step 11 | In the Submit Result dialog box, click OK. |
Serial over LAN enables the input and output of the serial port of a managed system to be redirected over IP. Configure and use a serial over LAN on your server when you want to reach the host console with Cisco IMC Supervisor. You can create one or more Serial over LAN policies which contain a specific grouping of Serial Over LAN attributes that match the needs of a server or a set of servers.
For details about configuring the various Serial Over LAN properties, see section Configuring Serial Over LAN in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create a Serial Over LAN policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. |
Step 2 | In the Add dialog box, choose Serial Over LAN Policy from the drop-down list and click Submit. |
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. |
Step 4 | In the Main dialog box, check the Enable SoL check box and select the CoM Port and Baud Rate values from the drop-down list or use the existing values. |
Step 5 | Click Submit. |
Step 6 | In the Submit Result dialog box, click OK. |
Cisco IMC Supervisor supports configuration of the Simple Network Management Protocol (SNMP) settings and for sending fault and alert information by SNMP traps from the managed server.
For details about configuring the various SNMP properties, see section Configuring SNMP in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create a SNMP policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. | ||
Step 2 | In the Add dialog box, choose SNMP Policy from the drop-down list and click Submit. | ||
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. | ||
Step 4 | In the
SNMP
Users dialog box, click
+ to add a SNMP user and fill in the user details.
You can use the
+ icon to add up to 15 SNMP Users.
Select an existing SNMP entry to edit or delete an entry from the table. | ||
Step 5 | Click Next. | ||
Step 6 | In the
SNMP
Traps dialog box, click
+ to add a SNMP trap and fill in the trap details.
You can use the
+ icon to add up to 15 SNMP Traps.
Select an existing SNMP entry to edit or delete an entry from the table. | ||
Step 7 | Click Next. | ||
Step 8 | In the SNMP Settings dialog box, configure the SNMP properties. | ||
Step 9 | Click Submit. | ||
Step 10 | In the
Submit
Result dialog box, click
OK.
|
The SSH server enables a SSH client to make a secure, encrypted connection and the SSH client is an application running over the SSH protocol to provide device authentication and encryption. You can create one or more SSH policies which contain a specific grouping of SSH properties that match the needs of a server or a set of servers.
For details about configuring the various SSH properties, see section Configuring SSH in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create an SSH policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. |
Step 2 | In the Add dialog box, choose SSH Policy from the drop-down list and click Submit. |
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. |
Step 4 | In the Main dialog box, check Enable SSH check box, and enter SSH properties or use the existing properties. |
Step 5 | Click Submit. |
Step 6 | In the Submit Result dialog box, click OK. |
A User policy automates the configuration of local user settings. You can create one or more User policies which contain a list of local users that need to be configured on a server or a group of servers.
For details about configuring the various properties, see section Configuring Local Users in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create a User policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. | ||||||||||||
Step 2 | In the Add dialog box, choose User Policy from the drop-down list and click Submit. | ||||||||||||
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. | ||||||||||||
Step 4 | In the Main dialog box, you can add users that need to be configured on the server to the Users list. | ||||||||||||
Step 5 | Click + to add a user. | ||||||||||||
Step 6 | In the
Add
Entry to Users dialog box, complete the following fields:
| ||||||||||||
Step 7 | Click Submit. | ||||||||||||
Step 8 | In the
Submit
Result dialog box, click
OK.
You can also select an existing user from the Users table in the Main dialog box and click Edit or Delete icons to edit or delete a user.
|
The KVM console is an interface accessible from Cisco IMC Supervisor that emulates a direct keyboard, video, and mouse (KVM) connection to the server. The KVM console allows you to connect to the server from a remote location. You can create one or more KVM policies which contain a specific grouping of virtual KVM properties that match the needs of a server or a set of servers.
For details about configuring the various KVM properties, see section Configuring the Virtual KVM in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform this procedure when you want to create a Virtual KVM policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. |
Step 2 | In the Add dialog box, choose Virtual KVM Policy from the drop-down list and click Submit. |
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. |
Step 4 | Check the Enable vKVM check box. |
Step 5 | Choose or enter the virtual server properties or use the existing properties. |
Step 6 | Click Submit. |
Step 7 | In the Submit Result dialog box, click OK. |
For details about configuring the various properties, see section Viewing VIC Adapter Properties in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create a VIC Adapter policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. |
Step 2 | In the Add dialog box, choose VIC Adapter Policy from the drop-down list and click Submit. |
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. |
Step 4 | In the Main dialog box, click + to add a VIC adapter entry in the table. |
Step 5 | In the Add Entry to VIC Adapters dialog box and enter or select the adapter details. |
Step 6 | Click Submit. |
Step 7 | In the Submit Result dialog box, click OK. |
Step 8 | Click Submit in the Main dialog box. |
Step 9 | In the Submit Result dialog box, click OK. |
You can use Cisco IMC Supervisor to install an OS on the server using the KVM console and VMedia. You can create one or more vMedia policies which contain vMedia mappings for different OS images that match the needs of a server or a set of servers. You can configure upto two vMedia mappings in Cisco IMC Supervisor - one for ISO files (through CDD) and the other for IMG files (through HDD).
For details about configuring the various vMedia properties, see section Configuring Virtual Media in the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Perform the following procedure to create a VMedia policy.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. | ||
Step 2 | In the Add dialog box, choose vMedia Policy from the drop-down list and click Submit. | ||
Step 3 | Enter a name in
the
Policy
Name field and click
Next.
You can also check the Create policy from current configuration of the server check box and click Next. This takes you to the Server Details dialog box. For information on performing tasks in this dialog box, refer Creating a Policy from an Existing Configuration. | ||
Step 4 | In the Main dialog box, check the Enable vMedia check box to enable vMedia and check the Enable Virtual Media Encryption for enabling vMedia encryption. | ||
Step 5 | Click Next. | ||
Step 6 | Check the Add CDD vMedia Mapping check box and complete the CDD mapping details. | ||
Step 7 | Click Next. | ||
Step 8 | Check the Add HDD vMedia Mapping check box and complete the HDD mapping details. | ||
Step 9 | Click Submit. | ||
Step 10 | In the
Submit
Result dialog box, click
OK.
|
You can choose to create a policy using a server that you have previously configured. By re-using the existing configuration on a server, you can reduce the time and effort involved in creating similar configurations.
Note | When you create a policy from current configuration of a server, the password fields are not retrieved from the server. |
Perform the following procedure when you want to create a policy from current configuration of a server.
Step 1 | Click Add in the Manage Hardware Policies page. For more information about how to go to this page, see Creating Hardware Policies. |
Step 2 | Check Create policy from current configuration of the server check box and click Next. |
Step 3 | In the
Server
Details dialog box, check the
Create
policy from current configuration of the server check box. You can
use the server details in the following two methods:
|
Step 4 | Click
Next.
You will go to the Main dialog box. Continue creating a policy. |
Perform this procedure when you want to apply an existing policy to a server.
Step 1 | From the menu bar, choose . |
Step 2 | Choose the Manage Hardware Policies tab. |
Step 3 | Select a policy you want to apply from the left pane. |
Step 4 | Click Apply from the options available at the top. |
Step 5 | In the Apply Policy dialog box, choose the server or server group from the drop-down list based on whether you want to apply the policy to individual servers or an entire rack server group. |
Step 6 | Click Select to select the server groups or servers to which you want to apply the policy. |
Step 7 | Click Submit. |
Step 8 | In the
Submit
Result dialog box, click
OK.
The process of applying the policy to the specified set of servers begins. This process can take a few minutes depending on the policy type and network connectivity to server(s) to which the policy is being applied. |
Perform the following procedure when you want to edit, delete, clone, or view server mapping details of an existing policy.
Step 1 | From the menu bar, choose . |
Step 2 | Choose the Manage Hardware Policies tab. |
Step 3 | Expand a policy
from the left pane and select a policy in the
Manage
Hardware Policies page. Perform the following optional steps:
|
Step 4 | To apply a policy to a server or server group, click Apply. For more information about applying a profile, see Applying a Policy. |
Step 5 | Click Submit and/or Close if applicable. |
Multiple policies combined together form a hardware profile. You can apply configuration details of a rack hardware profile for example, to multiple rack-mount servers. You can associate this hardware profile to specific rack-mount servers. This helps ensure consistency and repeatability of configurations across servers. Defining and using a profile enables greater consistency, control, predictability, and automation as similar configurations are applied across many servers.
The following workflow indicates how you can work with a hardware profile in Cisco IMC Supervisor:
Create a hardware profile. You can create a policy in one of the following methods:
Create a new profile. For more information about creating a new profile, see Creating a Hardware Profile.
Create a profile from the configuration existing on a server. For more information about creating a profile from the configuration existing on a server, see Creating a Profile from an Existing Configuration.
Apply the profile on a server. For more information about applying a profile, see Applying a Hardware Profile.
You can also view the list of servers that are mapped to a specific profile and view details of policies tied to this profile. For more information on performing these tasks, see General Tasks Under Hardware Profiles.
Perform this procedure when you want to create a hardware profile.
Step 1 | From the menu bar, choose . |
Step 2 | Choose the Manage Hardware Profiles tab. |
Step 3 | Click Add. |
Step 4 | In the Create Hardware Profile dialog box, enter a name for the profile you want to create in the Profile Name field. |
Step 5 | Click
Next or check
Create
profile from current configuration of the server check box and
click
Next.
To perform the tasks in the Server Details window, see Server Details. |
Step 6 | In the
Profile Entities dialog box, click
+ to add a profile entry.
You can also click the edit and delete icons to edit and delete the existing entries. |
Step 7 | In the Add Entry to Profile Name dialog box, choose the Policy Type. |
Step 8 | Select the
policy name from the
Policy
Name drop-down list which lists the names of policies you have
already created.
You can click the + next to Policy Name to create a new policy based on the policy type you have selected earlier. For more information about creating policies, see Creating Hardware Policies |
Step 9 | Click Submit. |
Step 10 | In the Submit Result confirmation dialog box, click OK. |
Step 11 | Click Submit in the Profile Entities dialog box. |
Step 12 | In the Submit Result confirmation dialog box, click OK. |
You can also edit, delete, clone a profile and also view the server mapped to a selected profile. For performing these tasks, see General Tasks Under Hardware Profiles
You can choose to create a profile using a server that you have previously configured. By re-using the existing configuration on a server, you can reduce the time and effort involved in creating similar configurations.
Note | When you create a profile from current configuration of a server, the password fields are not retrieved from the server. |
Perform the following procedure when you want to create a profile from current configuration of a server.
Step 1 | From the menu bar, choose . |
Step 2 | Choose the Manage Hardware Profiles tab. |
Step 3 | Click Add. |
Step 4 | Enter a name for the profile in the Profile Name field. |
Step 5 | Check the
Create
profile from current configuration of the server check box. You can
use the server details in the following methods:
|
Step 6 | Click Next. |
Step 7 | In the
Profile Entities dialog box, click
+ to add an entry to the profile name.
Click x to delete an existing entry from the Profile Name table. |
Step 8 | Click Submit. |
Step 9 | In the Submit Result dialog box, click OK. |
Perform this procedure when you want to apply a hardware profile to a rack server.
Step 1 | From the menu bar, choose . |
Step 2 | Choose the Manage Hardware Profiles tab. |
Step 3 | Select an existing hardware profile and click Apply from the options listed above. |
Step 4 | In the Apply Profile dialog box, choose the server or server group from the drop-down list, based on whether you want to apply the profile to individual servers or an entire rack server group. |
Step 5 | Click Select to select the server groups or servers to which you want to apply the profile. |
Step 6 | Click Submit. |
Step 7 | In the
Submit
Result confirmation dialog box, click
OK.
The process of applying a profile to the specified set of servers begins. This process can take a few minutes depending on the profile type and network connectivity to server(s) to which the profile is being applied. |
Perform the following procedure when you want to edit, delete, clone, or view server mapping details of an existing profile.
Tagging Task Under Tag Library
Perform this procedure when you want to create a tag library.
Step 1 | From the menu bar, choose . | ||||||||||
Step 2 | Click Create. | ||||||||||
Step 3 | In the
Create
Tag dialog box, complete the following fields for
Tag
Details:
| ||||||||||
Step 4 | Click Next. | ||||||||||
Step 5 | In the
Applicability Rules screen, complete the following:
| ||||||||||
Step 6 | In the confirmation dialog box, click OK. | ||||||||||
Step 7 | In the Create Tag dialog box, click Submit. | ||||||||||
Step 8 | Click OK. |
Perform this procedure when you want to create a new tag library based on another tag library.
The tag library has already been created under Tag Library.
Step 1 | From the menu bar, choose . | ||||||||||
Step 2 | From the list of tag libraries, select the tag library you want to clone. | ||||||||||
Step 3 | Click
Clone.
| ||||||||||
Step 4 | In the
Clone
Tag dialog box, complete the following fields for
Tag
Details:
| ||||||||||
Step 5 | Click Next. | ||||||||||
Step 6 | In the
Applicability Rules screen, complete the following:
| ||||||||||
Step 7 | In the confirmation dialog box, click OK. | ||||||||||
Step 8 | Click Submit. | ||||||||||
Step 9 | Click OK. |
Perform this procedure when you want to edit a tag library.
The tag library has already been created under Tag Library.
Step 1 | From the menu bar, choose . | ||||||||||
Step 2 | From the list of tag libraries, select the tag library you want to edit. | ||||||||||
Step 3 | Click
Edit.
You cannot see the Edit button till you select the tag library from the list. | ||||||||||
Step 4 | In the
Edit
Tag dialog box, complete the following fields for
Tag
Details:
| ||||||||||
Step 5 | Click Next. | ||||||||||
Step 6 | In the
Applicability Rules screen, complete the following:
| ||||||||||
Step 7 | In the confirmation dialog box, click OK. | ||||||||||
Step 8 | Click Submit. | ||||||||||
Step 9 | Click OK. |
Perform this procedure when you want to delete a tag library.
The tag library has already been created under Tag Library.
Step 1 | From the menu bar, choose . | ||
Step 2 | From the list of tag libraries, select the tag library you want to delete. | ||
Step 3 | Click
Delete.
| ||
Step 4 | In the Tag dialog box, click Delete. | ||
Step 5 | In the confirmation dialog box, click OK. |
Perform this procedure when you want to view a tag library details.
Step 1 | From the menu bar, choose . | ||
Step 2 | From the list of tag libraries, select the tag library you want to view. | ||
Step 3 | Click
View.
| ||
Step 4 | You can view the details in the Tag Details dialog box. | ||
Step 5 | Click Close to go back to previous screen. |
Perform this procedure when you want to view a tag library association details.
The tag library has already been created under Tag Library and has been associated with an entity.
Step 1 | From the menu bar, choose . | ||||||||||||
Step 2 | From the list of tag libraries, select the tag library you want to view. | ||||||||||||
Step 3 | Double-click the
tag library from the list or click the tag library from the list and click
View
Details.
| ||||||||||||
Step 4 | Click Close to go back to previous screen. |