Server Utilities

Exporting Technical Support Data

Perform this task when requested by the Cisco Technical Assistance Center (TAC). This utility creates a summary report containing configuration information, logs and diagnostic data that will help TAC in troubleshooting and resolving a technical issue.


Important


If any firmware or BIOS updates are in progress, do not export the technical support data until those tasks are complete.


Procedure

  Command or Action Purpose

Step 1

From the Apps drop-down list, select Administration.

Step 2

In the Navigation pane, click Utilities menu.

Step 3

From the Actions drop-down menu, select Admin Utilities > Export Technical Support Data.

Step 4

In the Export Technical Support Data dialog box, update the following properties:

Table 1. Export Technical Support Data
Name Description

Server IP/Hostname field

The IP address or hostname of the server on which the support data file should be stored.

Note

 

Front Panel USB option is visible only if Smart Access USB is enabled and a USB storage device is connected to the server.

You can export the technical support data to a remote server or to a USB storage device connected to a server. You can choose one of the following:

  • Remote— This allows you to export the technical support data to a remote server using one of the following protocols:

    • TFTP

    • FTP

    • SFTP

    • SCP

    • HTTP

      Note

       

      If you chose SCP or SFTP as the remote server type while performing this action, a pop-up window is displayed with the message Server (RSA) key fingerprint is <server_finger_print _ID> Do you wish to continue?. Click Yes or No depending on the authenticity of the server fingerprint.

      The fingerprint is based on the host's public key and helps you to identify or verify the host you are connecting to.

  • Front Panel USB—This allows you to export the technical support data to a USB storage device connected to the server.

Path and Filename field

The path and filename Cisco IMC should use when exporting the file to the remote server.

Note

 

If the server includes any of the supported network adapter cards, the data file also includes technical support data from the adapter card.

Username field

The username the system should use to log in to the remote server. This field does not apply if the protocol is TFTP or HTTP.

Password field

The password for the remote server username. This field does not apply if the protocol is TFTP or HTTP.

Export button

Allows you to export the technical support data.

Downloading Technical Support Data to a Local File

Perform this task when requested by the Cisco Technical Assistance Center (TAC). This utility creates a summary report containing configuration information, logs and diagnostic data that will help TAC in troubleshooting and resolving a technical issue.

Procedure

  Command or Action Purpose

Step 1

From the Apps drop-down list, select Administration.

Step 2

In the Navigation pane, click Utilities menu.

Step 3

From the Actions drop-down menu, select Admin Utilities > Generate Technical Support Data for Local Download.

Step 4

In the Generate Technical Support Data for Local Download dialog box, select the following options:

Table 2. Generate Technical Support Data for Local Download
Name Description

Generate Technical Support Data radio button

Cisco IMC disables this radio button when there is no technical support data file to download.

Click Generate to create the data file.

Download to local file radio button

Cisco IMC enables this radio button when a technical support data file is available to download.

To download the existing file, select this option and click Download.

Note

 

If the server includes any of the supported network adapter cards, the data file also includes technical support data from the adapter card.

Generate and Download button

Allows you to generate and download the technical support data file.

Generate button

Allows you to generate the technical support data file.

Download button

Allows you to download the technical support data file after it is generated.

Resetting to Factory Default

On rare occasions, such as an issue with the current running firmware or troubleshooting a server, you might require to reset the server components to the factory default. When this happens, all user-configurable settings are reset.

This procedure is not part of the normal server maintenance. After you reset the server components, you are logged off and must log in again. You might also lose connectivity and might need to reconfigure the network settings. Some of the inventory information might not be available during this transition.


Important


When you move VIC adapters from other generation C-Series servers, you must reset the adapters to factory defaults.


Before you begin

You must be logged in as an admin to reset the server components to factory defaults.

Procedure

  Command or Action Purpose

Step 1

From the Apps drop-down list, select Administration.

Step 2

In the Navigation pane, click Utilities menu.

Step 3

From the Actions drop-down menu, select Admin Utilities > Reset to Factory Default.

Step 4

In the Reset to Factory Default dialog box, select the following options:

Table 3. Reset to factory default

Name

Description

Reset to Factory Default Setting of drop-down list

Expand to select the specific component that you want to reset to factory settings. This can be one of the following:

  • BMC—If checked, it resets the BMC to factory settings.

    Note

     

    After you reset the BMC to factory settings, the serial number is displayed in the Cisco IMCXXXXXX format, where XXXXXX is the serial number of the server. After factory defaults of BMC NIC Mode, Shared LOM Extended is configured by default.

  • Storage Controllers—If checked, it resets the specific storage adapters that you want to reset to factory settings.

    When you reset a storage adapter, the data on the disk is not modified but the virtual drive meta data will be erased which may result in data loss. Expand to select

  • VIC—If checked, it resets the specific VICs that you want to reset to factory settings.

    Note

     

    The host must be powered on to reset VIC adapters to factory defaults.

Reset button

Resets the selected components to the factory settings.

Note

 

When you reset to factory default settings, the network configuration mode is set to Cisco Card mode by default for C125 M5 servers.

For other C-Series servers, NIC mode is set to Shared LOM Extended by default.

A reboot of Cisco IMC powers down the host for a short amount of time while the host is performing BIOS POST (Power on Self Test) or is in EFI shell. The Cisco IMC powers on when it is ready. Upon restart, the network configuration mode is set to Cisco Card mode by default.

Exporting and Importing the Cisco IMC Configuration

Exporting the Cisco IMC Configuration


Note


For security reasons, this operation does not export user accounts or the server certificate.



Important


If any firmware or BIOS updates are in progress, do not export the Cisco IMC configuration until those tasks are complete.


Procedure


Step 1

From the Apps drop-down list, select Administration.

Step 2

In the Navigation pane, click Utilities menu.

Step 3

From the Actions drop-down menu, select Admin Utilities > Export Configuration.

Step 4

In the Export CIMC configuration dialog box, select any of the following options to export the Cisco IMC configuration:

  • Remote

  • Local

Table 4. Remote
Name Description

Remote button

Select this option to export the JSON configuration file to a remote server.

Server IP/Hostname field

The IP address or hostname of the server to which the configuration file has to be exported.

Upload Protocol button

The remote server type. This can be one of the following:

  • TFTP

  • FTP

  • SFTP

  • SCP

  • HTTP

Note

 

If you chose SCP or SFTP as the remote server type while performing this action, a pop-up window is displayed with the message Server (RSA) key fingerprint is <server_finger_print _ID> Do you wish to continue?. Click Yes or No depending on the authenticity of the server fingerprint.

The fingerprint is based on the host's public key and helps you to identify or verify the host you are connecting to.

Path and Filename field

The path and filename of the configuration file on the remote server.

Username field

The username the system should use to log in to the remote server. This field does not apply if the protocol is TFTP or HTTP.

Password field

The password for the remote server username. This field does not apply if the protocol is TFTP or HTTP.

Passphrase field

The passphrase that uses the AES256 algorithm to encrypt the LDAP and SNMP v3 user passwords in the exported configuration files. Enter a string of 6 to 127 characters. Do not enter the following characters: ! # $ & < > ? ; ' | ` ~ \ % ^ ( )"

Note

 

If you edit the encrypted sections in the configuration file and try to export it, the edits will be ignored and the export operation displays a partially successful message.

Table 5. Local
Name Description

Local button

Select this option to export the JSON configuration file to a drive that is local to the computer running Cisco IMC.

Passphrase

The passphrase that uses the AES256 algorithm to encrypt the LDAP and SNMP v3 user passwords in the exported configuration files. Enter a string of 6 to 127 characters. Do not enter the following characters: ! # $ & < > ? ; ' | ` ~ \ % ^ ( )"

Note

 

If you edit the encrypted sections in the configuration file and try to export it, the edits will be ignored and the export operation displays a partially successful message.


Importing the Cisco IMC Configuration


Important


If any firmware or BIOS updates are in progress, do not import the Cisco IMC configuration until those tasks are complete.


Before you begin

If you want to restore the SNMP configuration information when you import the configuration file, make sure that SNMP is disabled on this server before you do the import. If SNMP is enabled when you perform the import, Cisco IMC does not overwrite the current values with those saved in the configuration file.

Procedure


Step 1

From the Apps drop-down list, select Administration.

Step 2

In the Navigation pane, click Utilities menu.

Step 3

From the Actions drop-down menu, select Admin Utilities > Import Configuration.

Step 4

The Import CIMC configuration dialog box, select any of the following options to import the Cisco IMC configuration:

  • Remote

  • Local

Table 6. Remote
Name Description

Remote button

Select this option to import the JSON configuration file from a remote server.

Server IP/Hostname field

The IP address or hostname of the server on which the configuration file resides.

Upload Protocol button

The remote server type. This can be one of the following:

  • TFTP

  • FTP

  • SFTP

  • SCP

  • HTTP

Note

 

If you choose SCP or SFTP as the remote server type while performing this action, a pop-up window is displayed with the message Server (RSA) key fingerprint is <server_finger_print _ID> Do you wish to continue?. Click Yes or No depending on the authenticity of the server fingerprint.

The fingerprint is based on the host's public key and helps you to identify or verify the host you are connecting to.

Path and Filename field

The path and filename of the configuration file on the remote server.

Username field

The username the system should use to log in to the remote server. This field does not apply if the protocol is TFTP or HTTP.

Password field

The password for the remote server username. This field does not apply if the protocol is TFTP or HTTP.

Passphrase field

The passphrase that uses the AES256 algorithm to encrypt the LDAP and SNMP v3 user passwords in the imported configuration files. Enter a string of 6 to 127 characters. Do not enter the following characters: ! # $ & < > ? ; ' | ` ~ \ % ^ ( )"

Note

 

If you edit the encrypted sections in the configuration file and try to import it, the edits will be ignored and the import operation displays a partially successful message.

Table 7. Local
Name Description

Local button

Select this option to import the JSON configuration file to a drive that is local to the computer running Cisco IMC.

Click Browse and navigate to the configuration file that you want to import.

Passphrase

The passphrase that uses the AES256 algorithm to encrypt the LDAP and SNMP v3 user passwords in the imported configuration files. Enter a string of 6 to 127 characters. Do not enter the following characters: ! # $ & < > ? ; ' | ` ~ \ % ^ ( )"

Note

 

If you edit the encrypted sections in the configuration file and try to import it, the edits will be ignored and the import operation displays a partially successful message.


Generating Non Maskable Interrupts to the Host

In some situations, the server might hang and not respond to traditional debug mechanisms. By generating a non maskable interrupt (NMI) to the host, you can create and send a crash dump file of the server and use it to debug the server.

Before you begin

  • You must be logged in as an admin to perform this procedure

  • The server must be powered on.

Procedure


Step 1

From the Apps drop-down list, select Administration.

Step 2

In the Navigation pane, click Utilities menu.

Step 3

From the Actions drop-down menu, select Admin Utilities > Generate NMI to Host.

Step 4

In the Generate NMI to Host dialog box, click OK to proceed.

An NMI signal is sent to the host, which might restart the OS.

Adding or Updating the Cisco IMC Banner

Procedure


Step 1

From the Apps drop-down list, select Administration.

Step 2

In the Navigation pane, click Utilities menu.

Step 3

From the Actions drop-down menu, select Admin Utilities > Add/Update Cisco IMC Banner.

Step 4

In the Add/Update Cisco IMC Banner dialog box, update the following properties:

Name Description

Banner (80 Chars per line. Max 2K Chars.) field

Enter copyright information or messages that you want to display on the login screen, before logging on to the Cisco IMC Web UI or the command line interface.

Restart SSH toggle button

When enabled, the active SSH sessions are terminated after you click the Save Banner button.

Save banner button

Saves the banner changes. Click Ok to proceed.

Clear banner button

Clears the banner information. Click Ok to proceed.


Viewing Cisco IMC Last Reset Reason

Procedure


Step 1

In the Navigation pane, click the Admin menu.

Step 2

In the Admin menu, click Utilities.

Step 3

Under the Operations area of the Utilities pane, view the following information under the Cisco IMC Last Reset row.

Name Description

Status field

The reason why the component was last reset. This can be one of the following:

  • watchdog-reset—The watchdog timer expired due to kernel panic or hung task.

  • ac-cycle— PSU power cables are removed (no power input).

  • graceful-reboot— Cisco IMC reboot occurs.

  • OOM-reset—Cisco IMC reboots when memory reaches full capacity (without watchdog-timer).


Downloading Hardware Inventory to a Local File

Procedure


Step 1

From the Apps drop-down list, select Administration.

Step 2

In the Navigation pane, click Utilities menu.

Step 3

From the Actions drop-down menu, select Admin Utilities > Download Hardware Inventory Data to Local Download.

Step 4

In the Download inventory data to local file dialog box, select the following options:

Name Description

Generate Inventory Data radio button

Cisco IMC disables this radio button when there is no inventory data file to download.

Click Generate to create the data file. When data collection is complete, select the Download Inventory Data to Local File radio button and click Download to download the file locally.

Download Inventory Data to local file radio button

Cisco IMC enables this radio button when an inventory data file is available for download.

To download the existing file, select this option and click Download.


Exporting Hardware Inventory Data to a Remote Server

Procedure


Step 1

From the Apps drop-down list, select Administration.

Step 2

From the Actions drop-down menu, select Admin Utilities > Export Hardware Inventory Data to Remote.

Step 3

In the Export Hardware Inventory Data to Remote dialog box, update the following properties:

Table 8. Export Hardware Inventory Data to Remote
Name Description

Server IP/Hostname field

The IP address or hostname of the server to which the data file has to be exported.

Upload Protocol button

The remote server type. This can be one of the following:

  • TFTP

  • FTP

  • SFTP

  • SCP

  • HTTP

Note

 

If you chose SCP or SFTP as the remote server type while performing this action, a pop-up window is displayed with the message Server (RSA) key fingerprint is <server_finger_print _ID> Do you wish to continue?. Click Yes or No depending on the authenticity of the server fingerprint.

The fingerprint is based on the host's public key and helps you to identify or verify the host you are connecting to.

Path and Filename field

The path and filename of the data file on the remote server.

Username field

The username the system should use to log in to the remote server. This field does not apply if the protocol is TFTP or HTTP.

Password field

The password for the remote server username. This field does not apply if the protocol is TFTP or HTTP.

Export button

Click to export the data file.


PID Catalog

Uploading a PID Catalog

Before you begin

You must be logged in as an admin to perform this procedure.

Procedure


Step 1

From the Apps drop-down list, select System.

Step 2

Select the Inventory tab.

Step 3

From the Actions drop-down menu, select PID Catalog > Upload PID Catalog.

Step 4

In the Upload PID Catalog dialog box, select any of the following options to select the PID catalog:

  • Remote

  • Local

Table 9. Remote Tab

Name

Description

Server IP/Hostname field

The IP address or hostname of the server on which the PID catalog information is available.

Upload Protocol button

Select one of the following protocols.

  • FTP

  • SFTP

  • SCP

  • TFTP

  • HTTP

Note

 

If you select FTP, SCP or SFTP, you will be prompted to enter your username and password.

Path and Filename field

The path and filename of the configuration file on the remote server.

Username field

User name of the remote server.

Password field

Password of the remote server.

Upload button

Allows you to upload the PID catalog.

Note

 

If you chose SCP or SFTP as the remote server type while performing this action, a pop-up window is displayed with the message Server (RSA) key fingerprint is <server_finger_print _ID> Do you wish to continue?.

Click Yes or No depending on the authenticity of the server fingerprint.

The fingerprint is based on the host's public key and helps you to identify or verify the host you are connecting to.

Local: Click Browse and navigate to the PID catalog file that you want to update on the browser client. After you select the file, click Upload.


Activating a PID Catalog


Caution


BMC reboots automatically once a PID catalog is activated.


You must reboot the server after activating a PID catalog.

Before you begin

You must be logged in as an admin to perform this procedure.

Procedure


Step 1

From the Apps drop-down list, select System.

Step 2

Select the Inventory tab.

Step 3

From the Actions drop-down menu, select PID Catalog > Activate PID Catalog.

Step 4

In the Activate PID Catalog dialog box, click the Activate button.

Note

 

The Activate PID Catalog link is greyed out when you log on to the system for the first time. It gets activated once you upload a PID catalog to the server. After you upload the PID catalog, the link remains active and you can activate the PID catalog multiple times.


Deleting a PID Catalog


Caution


BMC reboots automatically once a PID catalog is deleted.


You must reboot the server after deleting a PID catalog.

Before you begin

You must be logged in as an admin to perform this procedure.

SUMMARY STEPS

  1. From the Apps drop-down list, select System.
  2. Select the Inventory tab.
  3. From the Actions drop-down menu, select PID Catalog > Delete PID Catalog.
  4. Click OK to confirm.

DETAILED STEPS


Step 1

From the Apps drop-down list, select System.

Step 2

Select the Inventory tab.

Step 3

From the Actions drop-down menu, select PID Catalog > Delete PID Catalog.

Step 4

Click OK to confirm.

Note

 

The Delete PID Catalog option is visible only if a PID catalog has already been uploaded and activated.


Enabling Smart Access USB

When you enable the smart access USB feature, the front panel USB devices are disconnected from the host operating system and connected to Cisco IMC. After enabling the smart access USB feature, you can use the front panel USB devices to export technical support data, import or export Cisco IMC configuration, or update Cisco IMC, BIOS, and VIC firmware.

The supported file systems for smart access USB are as follows:

  • EXT2

  • EXT3

  • EXT4

  • FAT32

  • FAT16

  • DOS


Note


Huge file support is not supported in BMC. For EXT4 file system, huge file support has to be turned off.


Before you begin

You must be logged in as an admin to perform this procedure.

Procedure


Step 1

From the Apps drop-down list, select Administration.

Step 2

In the Navigation pane, click Utilities menu.

Step 3

From the Actions drop-down menu, select Admin Utilities > Enable Smart Access USB.

Step 4

In the Enable Smart Access USB dialog box, click OK to proceed.


Device Connector Configuration

Enabling or Disabling Cisco Intersight Management

You can enable or disable the Cisco Intersight management.

When you enable the Cisco Intersight management, it establishes a bi-directional communication between the Intersight Cloud application and the server.


Note


Port numbers 8888-8889 are reserved for Intersight communication.


Procedure


Step 1

From the Apps drop-down list, select Administration.

Step 2

In the Navigation pane, click Device Connector menu.

Step 3

In the Device Connector window, click the Settings icon.

The General settings page opens.

Step 4

Enable or disable the Device Connector toggle button.

Name

Description

Enable

Enables the Intersight management. You can claim this system and leverage the capabilities of Cisco Intersight.

Disable

Disables the Intersight management. When disabled, no communication will be allowed to Cisco Intersight.


Viewing Intersight Device Connector Properties

Intersight Infrastructure Service License

Cisco IMC displays the following warning if the Device Connector does not detect a connection to Cisco Intersight Services:

The Device Connector is unable to detect a connection to Cisco Intersight. Please check your settings and ensure that the server is claimed in Intersight with an Intersight Infrastructure Services license to be in compliance.( 1/5 )

You may click OK to go to Device Connector and configure the settings or click Cancel to continue.


Note


The warning counter (1/5) continues to increment till it reaches (5/5). The prompt stops after it reaches (5/5) or if the Device Connector is configured, whichever is first. If the Device Connector is configured once, and later disabled, the warning is displayed again and the counter continues from the last count. The counter is reset only in case restore factory default is performed.


Apart from the warning, Cisco IMC also shows the following static ribbon at the top of screen:

Please note: Intersight Infrastrucutre Services license is required with this server. Learn More.

You may click Help Center to get more information from Intersight Help Center.


Note


This message is not displayed if the Device Connector is configured. If the Device Connector is configured once, and later disabled, the message is displayed again.


Procedure


Step 1

From the Apps drop-down list, select Administration.

Step 2

In the Navigation pane, click Device Connector menu.

Step 3

In the Device Connector window, review and update the following properties:

Table 10. Device Connector

Action

Description

Retry Connection or Refresh button

Allows you to retry the connection to Intersight. This option appears only when there are Intersight connection issues.

Open Settings button for Connection settings

Opens the Connection settings. Click Connection to see more details.

Open Settings button for General settings

Opens the General settings. Click General to see more details.

Settings button

Opens the following settings:

Connection Status

Displays the status of the connection to Intersight. This can be one of the following:

  • Administratively Disabled—Indicates that the Intersight management has been disabled.

  • DNS Misconfigured— Indicates that the DNS details have not been configured in BMC.

  • UCS Connect Network Error—Indicates the invalid network configurations.

  • Certification Validation Error—Indicates invalid certificate.

  • Claimed—Indicates that the device is claimed in Intersight.

  • Not Claimed—Indicates that the device is registered, but not claimed in Intersight.

Device ID

Unique identifier assigned to a device managed by the Cisco IMC.

Claim ID

Unique identifier assigned to a device that is used to register and associate the device with Cisco Intersight.

Table 11. General

Name

Description

Device Connector toggle button

Allows you to enable or disable the Intersight management. This can be one of the following:

  • On—Enables the Intersight management. You can claim this system and leverage the capabilities of Cisco Intersight.

  • Off—Disables the Intersight management. No communication will be allowed to Cisco Intersight.

Access Mode radio button

This can be one of the following:

  • Read-only — When the Read-only access mode is selected, you cannot configure the device through Intersight.

  • Allow Control — When the Allow Control mode is selected, you will have full control to configure the device through Intersight.

Configuration from Intersight only toggle button

This option is configurable only when Allow Control mode is enabled. The Configure Lockout options are as follows:

  • OFF— To manage the device both locally and from Intersight you can turn OFF the option Configuration from Intersight only . The setting will terminate all the existing sessions (webUI, XML and CLI).

  • ON — To lock out Cisco IMC configuration for Intersight you can turn ON the option Configuration from Intersight only . The setting will terminate all the existing sessions (webUI, XML and CLI).

Note

 
When you are logged in as admin in the Configuration Lock Out mode, the admin role will be mapped to the User role, so the interfaces behave as user logged in with the User role.

Tunneled vKVM toggle button

This setting enables the use of a secure tunnel to access the server's KVM interface. When enabled, the KVM traffic is routed through a secure tunnel, typically via the Device Connector, enhancing the security of remote management sessions by encrypting the data transmitted between the client and the server

Table 12. DNS Configuration

Name

Description

Domain Name field

The fully qualified domain name (FQDN) or hostname of the server for Cisco IMC.

DNS Server field

IP address of the FQDN.

Table 13. NTP Configuration
Name

Description

NTP Server field

The IP/DNS address of one of the servers that act as an NTP server.

Table 14. Proxy Configuration

Name

Description

Enable Proxy toggle button

Allows you to enable or disable the HTTPS proxy settings.

Proxy Hostname/IP field

The IP address or the host name of the proxy server.

Proxy Port field

The port number of the proxy server.

Authentication toggle button

Enabling this option allows you to provide the credentials for the proxy server.

Username field

The credentials for the proxy server.

Password field

Save button

Saves the proxy settings.
Table 15. Certificate Manager

Name

Description

Import button

Allows you to select and import a CA signed certificate.

Note

 

The imported certificates must be in the *.pem (base64 encoded) format.

Name column

Common name of the CA certificate.

In User column

Whether the certificate in the trust store was used to successfully verify the remote server.

Issued By column

The issuing authority for the certificate.

Expires column

The expiry date of the certificate.

View Certificate icon

Click to see certificate details.

Delete Certificate button

Allows you to delete a certificate.

Note

 

You cannot delete bundled certificates (certificates with the lock icon).

Table 16. View Certificate Details

Name

Description

Name

Name of the certificate.

Issued By

Name of the organization.

Expires

Expiry date of the certificate.

Fingerprints

The fingerprint is based on the host's public key and helps you to identify or verify the host you are connecting to.

Subject

Country

The country in which the company resides.

Organization

The organization requesting the certificate.

Common Name

The fully qualified (FQDN or domain name of the server) hostname of the server for which the certificate was issued.

Issuer

Country

The country in which the company that issued the certificate resides.

Organization

The organization within the company that issued the certificate.

Common Name

The fully qualified hostname of the issuing company.

Table 17. Connection

Name

Description

Check Connection

Allows you to check the connection. Click Check Connection to proceed.

View All Details

Opens the View Details window. You can view complete details of the connection under.

View Details

Allows you to view the Addresses and Latency values under DNS Resolution.

View Remediations

Allows administrators to view remediation actions that need to be taken on the server. Remediations typically include updates, patches, or configuration changes required to bring the server into compliance with security policies or operational standards.


Configuring HTTPS Proxy Settings for Device Connector

You can manually configure the HTTPS proxy settings for the server.

Procedure


Step 1

From the Apps drop-down list, select Administration.

Step 2

In the Navigation pane, click Device Connector menu.

Step 3

In the Device Connector window, click the Settings button.

Step 4

In the Settings area, select Proxy Configuration.

Step 5

In the Configure proxy settings dialog box, update the following properties:

Table 18. Proxy Configuration

Name

Description

Enable Proxy toggle button

Allows you to enable or disable the HTTPS proxy settings.

Proxy Hostname/IP field

The IP address or the host name of the proxy server.

Proxy Port field

The port number of the proxy server.

Authentication toggle button

Enabling this option allows you to provide the credentials for the proxy server.

Username field

The credentials for the proxy server.

Password field

Save button

Saves the proxy settings.