The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter includes the following sections:
Configuring vNIC Templates
This policy defines how a vNIC on a server connects to the LAN. This policy is also referred to as a vNIC LAN connectivity policy.
You need to include this policy in a service profile for it to take effect.
Note |
If your server has two Emulex or QLogic NICs (Cisco UCS CNA M71KR-E or Cisco UCS CNA M71KR-Q), you must configure vNIC policies for both adapters in your service profile to get a user-defined MAC address for both NICs. If you do not configure policies for both NICs, Windows still detects both of them in the PCI bus. Then because the second eth is not part of your service profile, Windows assigns it a hardware MAC address. If you then move the service profile to a different server, Windows sees additional NICs because one NIC did not have a user-defined MAC address. |
The following example configures a vNIC template and commits the transaction:
UCS-A# scope org / UCS-A /org* # create vnic template VnicTempFoo UCS-A /org/vnic-templ* # set descr "This is a vNIC template example." UCS-A /org/vnic-templ* # set fabric a UCS-A /org/vnic-templ* # set mac-pool pool137 UCS-A /org/vnic-templ* # set mtu 8900 UCS-A /org/vnic-templ* # set nw-control-policy ncp5 UCS-A /org/vnic-templ* # set pin-group PinGroup54 UCS-A /org/vnic-templ* # set qos-policy QosPol5 UCS-A /org/vnic-templ* # set stats-policy ServStatsPolicy UCS-A /org/vnic-templ* # set type updating-template UCS-A /org/vnic-templ* # commit-buffer UCS-A /org/vnic-templ #
The following example deletes the vNIC template named VnicTempFoo and commits the transaction:
UCS-A# scope org / UCS-A /org # delete vnic template VnicTempFoo UCS-A /org* # commit-buffer UCS-A /org #
Configuring Ethernet Adapter Policies
These policies govern the host-side behavior of the adapter, including how the adapter handles traffic. For example, you can use these policies to change default settings for the following:
By default, Cisco UCS provides a set of Ethernet adapter policies and Fibre Channel adapter policies. These policies include the recommended settings for each supported server operating system. Operating systems are sensitive to the settings in these policies. Storage vendors typically require non-default adapter settings. You can find the details of these required settings on the support list provided by those vendors.
We recommend that you use the values in these policies for the applicable operating system. Do not modify any of the values in the default policies unless directed to do so by Cisco Technical Support.
However, if you are creating an Ethernet adapter policy for a Windows OS (instead of using the default Windows adapter policy), you must use the following formulas to calculate values that work with Windows:
For example, if Transmit Queues = 1 and Receive Queues = 8 then:
The following example configures an Ethernet adapter policy, and commits the transaction:
UCS-A# scope org / UCS-A /org* # create eth-policy EthPolicy19 UCS-A /org/eth-policy* # set comp-queue count 16 UCS-A /org/eth-policy* # set descr "This is an Ethernet adapter policy example." UCS-A /org/eth-policy* # set failover timeout 300 UCS-A /org/eth-policy* # set interrupt count 64 UCS-A /org/eth-policy* # set offload large-receive disabled UCS-A /org/eth-policy* # set recv-queue count 32 UCS-A /org/eth-policy* # set rss receivesidescaling enabled UCS-A /org/eth-policy* # set trans-queue UCS-A /org/eth-policy* # commit-buffer UCS-A /org/eth-policy #
Command or Action | Purpose | |
---|---|---|
Step 1 | UCS-A# scope org org-name | Enters organization mode for the specified organization. To enter the root organization mode, type / as the org-name . |
Step 2 | UCS-A /org # delete eth-policy policy-name | Deletes the specified Ethernet adapter policy. |
Step 3 | UCS-A /org # commit-buffer | Commits the transaction to the system configuration. |
The following example deletes the Ethernet adapter policy named EthPolicy19 and commits the transaction:
UCS-A# scope org / UCS-A /org # delete eth-policy EthPolicy19 UCS-A /org* # commit-buffer UCS-A /org #
Configuring Network Control Policies
This policy configures the network control settings for the Cisco UCS instance, including the following:
The network control policy also determines the action that Cisco UCS Manager takes on the remote Ethernet interface, vEthernet interface , or vFibreChannel interface when the associated border port fails.
By default, the Action on Uplink Fail property in the network control policy is configured with a value of link-down. For adapters such as the Cisco UCS M81KR Virtual Interface Card, this default behavior directs Cisco UCS Manager to bring the vEthernet or vFibreChannel interface down if the associated border port fails. For Cisco UCS systems using a non-VM-FEX capable converged network adapter that supports both Ethernet and FCoE traffic , such as Cisco UCS CNA M72KR-Q and the Cisco UCS CNA M72KR-E, this default behavior directs Cisco UCS Manager to bring the remote Ethernet interface down if the associated border port fails. In this scenario, any vFibreChannel interfaces that are bound to the remote Ethernet interface are brought down as well.
Note |
Cisco UCS Manager, version 1.4(2) and earlier did not enforce the Action on Uplink Fail property for those types of non-VM-FEX capable converged network adapters mentioned above. If the Action on Uplink Fail property was set to link-down, Cisco UCS Manager would ignore this setting and instead issue a warning. Therefore, if your implementation includes one of those converged network adapters and the adapter is expected to handle both Ethernet and FCoE traffic, we recommend that you configure the Action on Uplink Fail property with a value of warning. Please note that this configuration may result in an Ethernet teaming driver not being able to detect a link failure when the border port goes down. |
Command or Action | Purpose | |
---|---|---|
Step 1 | UCS-A# scope org / | Enters the root organization mode. |
Step 2 | UCS-A /org # create nwctrl-policy policy-name | Creates the specified network control policy, and enters organization network control policy mode. |
Step 3 | UCS-A /org/nwctrl-policy # {disable | enable} cdp | Disables or enables Cisco Discovery Protocol (CDP). |
Step 4 | UCS-A /org/nwctrl-policy # set uplink-fail-action {link-down | warning} | Specifies the action to be taken when no uplink port is available in end-host mode. Use the link-down keyword to change the operational state of a vNIC to down when uplink connectivity is lost on the fabric interconnect, and facilitate fabric failover for vNICs. Use the warning keyword to maintain server-to-server connectivity even when no uplink port is available, and disable fabric failover when uplink connectivity is lost on the fabric interconnect. The default uplink failure action is link-down. |
Step 5 | UCS-A /org/nwctrl-policy # {create mac-security | Enters organization network control policy MAC security mode |
Step 6 | UCS-A /org/nwctrl-policy/mac-security # {set forged-transmit {allow | deny} | Allows or denies the forging of MAC addresses when sending traffic. MAC security is disabled when forged MAC addresses are allowed, and MAC security is enabled when forged MAC addresses are denied. By default, forged MAC addresses are allowed (MAC security is disabled). |
Step 7 | UCS-A /org/nwctrl-policy/mac-security # commit-buffer | Commits the transaction to the system configuration. |
The following example creates a network control policy named ncp5, enables CDP, sets the uplink fail action to link-down, denies forged MAC addresses (enables MAC security), and commits the transaction:
UCS-A# scope org / UCS-A /org # create nwctrl-policy ncp5 UCS-A /org/nwctrl-policy* # enable cdp UCS-A /org/nwctrl-policy* # set uplink-fail-action link-down UCS-A /org/nwctrl-policy* # create mac-security UCS-A /org/nwctrl-policy/mac-security* # set forged-transmit deny UCS-A /org/nwctrl-policy/mac-security* # commit-buffer UCS-A /org/nwctrl-policy/mac-security #
Command or Action | Purpose | |
---|---|---|
Step 1 | UCS-A# scope org / | Enters the root organization mode. |
Step 2 | UCS-A /org # delete nwctrl-policy policy-name | Deletes the specified network control policy. |
Step 3 | UCS-A /org # commit-buffer | Commits the transaction to the system configuration. |
The following example deletes the network control policy named ncp5 and commits the transaction:
UCS-A# scope org / UCS-A /org # delete nwctrl-policy ncp5 UCS-A /org* # commit-buffer UCS-A /org #