- Preface
-
- Configuring the Fabric Interconnects
- Configuring Ports and Port Channels
- Configuring Communication Services
- Configuring Authentication
- Configuring Organizations
- Configuring Role-Based Access Control
- Configuring DNS Servers
- Configuring System-Related Policies
- Managing Licenses
- Managing Virtual Interfaces
- Registering Cisco UCS Domains with Cisco UCS Central
- Index
Contents
- Configuring Network-Related Policies
- Configuring vNIC Templates
- vNIC Template
- Creating a vNIC Template
- Binding a vNIC to a vNIC Template
- Unbinding a vNIC from a vNIC Template
- Deleting a vNIC Template
- Configuring Ethernet Adapter Policies
- Ethernet and Fibre Channel Adapter Policies
- Creating an Ethernet Adapter Policy
- Configuring an Ethernet Adapter Policy to Enable eNIC Support for MRQS on Linux Operating Systems
- Deleting an Ethernet Adapter Policy
- Configuring the Default vNIC Behavior Policy
- Default vNIC Behavior Policy
- Configuring a Default vNIC Behavior Policy
- Configuring LAN Connectivity Policies
- LAN and SAN Connectivity Policies
- Privileges Required for LAN and SAN Connectivity Policies
- Interactions between Service Profiles and Connectivity Policies
- Creating a LAN Connectivity Policy
- Creating a vNIC for a LAN Connectivity Policy
- Deleting a vNIC from a LAN Connectivity Policy
- Creating an iSCSI vNIC for a LAN Connectivity Policy
- Deleting an iSCSI vNIC from a LAN Connectivity Policy
- Deleting a LAN Connectivity Policy
- Configuring Network Control Policies
- Network Control Policy
- Creating a Network Control Policy
- Deleting a Network Control Policy
- Configuring Multicast Policies
- Multicast Policy
- Creating a Multicast Policy
- Modifying a Multicast Policy
- Deleting a Multicast Policy
Configuring Network-Related Policies
This chapter includes the following sections:
- Configuring vNIC Templates
- Configuring Ethernet Adapter Policies
- Configuring the Default vNIC Behavior Policy
- Configuring LAN Connectivity Policies
- Configuring Network Control Policies
- Configuring Multicast Policies
Configuring vNIC Templates
vNIC Template
This policy defines how a vNIC on a server connects to the LAN. This policy is also referred to as a vNIC LAN connectivity policy.
Cisco UCS Manager does not automatically create a VM-FEX port profile with the correct settings when you create a vNIC template. If you want to create a VM-FEX port profile, you must configure the target of the vNIC template as a VM.
You need to include this policy in a service profile for it to take effect.
![]() Note | If your server has two Emulex or QLogic NICs (Cisco UCS CNA M71KR-E or Cisco UCS CNA M71KR-Q), you must configure vNIC policies for both adapters in your service profile to get a user-defined MAC address for both NICs. If you do not configure policies for both NICs, Windows still detects both of them in the PCI bus. Then because the second eth is not part of your service profile, Windows assigns it a hardware MAC address. If you then move the service profile to a different server, Windows sees additional NICs because one NIC did not have a user-defined MAC address. |
Creating a vNIC Template
This policy requires that one or more of the following resources already exist in the system:
What to Do Next
Include the vNIC template in a service profile.
Binding a vNIC to a vNIC Template
You can bind a vNIC associated with a service profile to a vNIC template. When you bind the vNIC to a vNIC template, Cisco UCS Manager configures the vNIC with the values defined in the vNIC template. If the existing vNIC configuration does not match the vNIC template, Cisco UCS Manager reconfigures the vNIC. You can only change the configuration of a bound vNIC through the associated vNIC template. You cannot bind a vNIC to a vNIC template if the service profile that includes the vNIC is already bound to a service profile template.
If the vNIC is reconfigured when you bind it to a template, Cisco UCS Manager reboots the server associated with the service profile.
Unbinding a vNIC from a vNIC Template
Deleting a vNIC Template
Configuring Ethernet Adapter Policies
Ethernet and Fibre Channel Adapter Policies
These policies govern the host-side behavior of the adapter, including how the adapter handles traffic. For example, you can use these policies to change default settings for the following:
-
Queues
-
Interrupt handling
-
Performance enhancement
-
RSS hash
-
Failover in an cluster configuration with two fabric interconnects
Operating System Specific Adapter Policies
By default, Cisco UCS provides a set of Ethernet adapter policies and Fibre Channel adapter policies. These policies include the recommended settings for each supported server operating system. Operating systems are sensitive to the settings in these policies. Storage vendors typically require non-default adapter settings. You can find the details of these required settings on the support list provided by those vendors.
We recommend that you use the values in these policies for the applicable operating system. Do not modify any of the values in the default policies unless directed to do so by Cisco Technical Support.
However, if you are creating an Ethernet adapter policy for a Windows OS (instead of using the default Windows adapter policy), you must use the following formulas to calculate values that work with Windows:
- Completion Queues = Transmit Queues + Receive Queues
- Interrupt Count = (Completion Queues + 2) rounded up to nearest power of 2
For example, if Transmit Queues = 1 and Receive Queues = 8 then:
- Completion Queues = 1 + 8 = 9
- Interrupt Count = (9 + 2) rounded up to the nearest power of 2 = 16
Creating an Ethernet Adapter Policy
![]() Tip | If the fields in an area are not displayed, click the Expand icon to the right of the heading. |
Configuring an Ethernet Adapter Policy to Enable eNIC Support for MRQS on Linux Operating Systems
Cisco UCS Manager includes eNIC support for the Multiple Receive Queue Support (MRQS) feature on Red Hat Enterprise Linux Version 6.x and SUSE Linux Enterprise Server Version 11.x.
| Step 1 | Create an Ethernet adapter policy. |
| Step 2 | Install an eNIC driver Version 2.1.1.35 or later. See Cisco UCS Virtual Interface Card Drivers for Linux Installation Guide. |
| Step 3 | Reboot the server |
Deleting an Ethernet Adapter Policy
Configuring the Default vNIC Behavior Policy
Default vNIC Behavior Policy
Default vNIC behavior policy allow you to configure how vNICs are created for a service profile. You can choose to create vNICS manually, or you can allow them to be created automatically
You can configure the default vNIC behavior policy to define how vNICs are created. This can be one of the following:
None—Cisco UCS Manager does not create default vNICs for a service profile. All vNICs must be explicitly created.
HW Inherit—If a service profile requires vNICs and none have been explicitly defined, Cisco UCS Manager creates the required vNICs based on the adapter installed in the server associated with the service profile.
![]() Note | If you do not specify a default behavior policy for vNICs, HW Inherit is used by default. |
Configuring a Default vNIC Behavior Policy
| Step 1 | In the Navigation pane, click the LAN tab. |
| Step 2 | On the LAN tab, expand . |
| Step 3 | Expand the root node.
You can configure only the default vNIC behavior policy in the root organization. You cannot configure the default vNIC behavior policy in a sub-organization. |
| Step 4 | Click Default vNIC Behavior. |
| Step 5 | On the General Tab, in the Properties area, click one of the following radio buttons in the Action field:
|
| Step 6 | Click Save Changes. |
Configuring LAN Connectivity Policies
LAN and SAN Connectivity Policies
Connectivity policies determine the connections and the network communication resources between the server and the LAN or SAN on the network. These policies use pools to assign MAC addresses, WWNs, and WWPNs to servers and to identify the vNICs and vHBAs that the servers use to communicate with the network.
![]() Note | We do not recommend that you use static IDs in connectivity policies, because these policies are included in service profiles and service profile templates and can be used to configure multiple servers. |
Privileges Required for LAN and SAN Connectivity Policies
Connectivity policies enable users without network or storage privileges to create and modify service profiles and service profile templates with network and storage connections. However, users must have the appropriate network and storage privileges to create connectivity policies.
Privileges Required to Create Connectivity Policies
Connectivity policies require the same privileges as other network and storage configurations. For example, you must have at least one of the following privileges to create connectivity policies:
Privileges Required to Add Connectivity Policies to Service Profiles
After the connectivity policies have been created, a user with ls-compute privileges can include them in a service profile or service profile template. However, a user with only ls-compute privileges cannot create connectivity policies.
Interactions between Service Profiles and Connectivity Policies
You can configure the LAN and SAN connectivity for a service profile through either of the following methods:
LAN and SAN connectivity policies that are referenced in the service profile
Local vNICs and vHBAs that are created in the service profile
Local vNICs and a SAN connectivity policy
Local vHBAs and a LAN connectivity policy
Cisco UCS maintains mutual exclusivity between connectivity policies and local vNIC and vHBA configuration in the service profile. You cannot have a combination of connectivity policies and locally created vNICs or vHBAs. When you include a LAN connectivity policy in a service profile, all existing vNIC configuration is erased, and when you include a SAN connectivity policy, all existing vHBA configuration in that service profile is erased.
Creating a LAN Connectivity Policy
| Step 1 | In the Navigation pane, click the LAN tab. | ||||||
| Step 2 | On the LAN tab, expand . | ||||||
| Step 3 | Expand the node for the organization where you want to create the
policy.
If the system does not include multitenancy, expand the root node. | ||||||
| Step 4 | Right-click LAN Connectivity Policies and choose Create LAN Connectivity Policy. | ||||||
| Step 5 | In the Create LAN Connectivity Policy dialog box, enter a name and description for the policy in the following fields:
| ||||||
| Step 6 | Do one of the following: | ||||||
| Step 7 | To add vNICs, in the vNIC Table area, click + on the table icon bar and complete the following fields in the Create vNIC dialog box: | ||||||
| Step 8 | If you want to use iSCSI boot with the server, click the down arrows to expand the Add iSCSI vNICs bar and do the following: | ||||||
| Step 9 | After you have created all the vNICs or iSCSI vNICs you need for the policy, click OK. |
What to Do Next
Include the policy in a service profile or service profile template.
Creating a vNIC for a LAN Connectivity Policy
| Step 1 | In the Navigation pane, click the LAN tab. |
| Step 2 | On the LAN tab, expand . |
| Step 3 | Expand the LAN Connectivity Policies node. |
| Step 4 | Choose the policy to which you want to add a vNIC. |
| Step 5 | In the Work pane, click the General tab. |
| Step 6 | On the icon bar of the vNICs table, click Add. |
| Step 7 | In the Create vNIC dialog box, complete the following fields: |
| Step 8 | Click OK. |
| Step 9 | Click Save Changes. |
Deleting a vNIC from a LAN Connectivity Policy
| Step 1 | In the Navigation pane, click the LAN tab. |
| Step 2 | On the LAN tab, expand . |
| Step 3 | Expand the LAN Connectivity Policies node. |
| Step 4 | Select the policy from which you want to delete the vNIC. |
| Step 5 | In the Work pane, click the General tab. |
| Step 6 | In the vNICs table, do the following: |
| Step 7 | If the Cisco UCS Manager GUI displays a confirmation dialog box, click Yes. |
| Step 8 | Click Save Changes. |
Creating an iSCSI vNIC for a LAN Connectivity Policy
| Step 1 | In the Navigation pane, click the LAN tab. | ||||||||||||||
| Step 2 | On the LAN tab, expand . | ||||||||||||||
| Step 3 | Expand the LAN Connectivity Policies node. | ||||||||||||||
| Step 4 | Choose the policy to which you want to add an iSCSI vNIC. | ||||||||||||||
| Step 5 | In the Work pane, click the General tab. | ||||||||||||||
| Step 6 | On the icon bar of the Add iSCSI vNICs table, click Add. | ||||||||||||||
| Step 7 | In the Create iSCSI vNIC dialog box, complete the following fields:
| ||||||||||||||
| Step 8 | In the MAC Address Assignment drop-down list in the iSCSI MAC Address area, choose one of the following:
| ||||||||||||||
| Step 9 | (Optional)If you want to create a MAC pool that will be available to all service profiles, click Create MAC Pool and complete the fields in the Create MAC Pool wizard.
For more information, see Creating a MAC Pool. | ||||||||||||||
| Step 10 | Click OK. | ||||||||||||||
| Step 11 | Click Save Changes. |
Deleting an iSCSI vNIC from a LAN Connectivity Policy
| Step 1 | In the Navigation pane, click the LAN tab. |
| Step 2 | On the LAN tab, expand . |
| Step 3 | Expand the LAN Connectivity Policies node. |
| Step 4 | Chose the policy from which you want to delete the iSCSI vNIC. |
| Step 5 | In the Work pane, click the General tab. |
| Step 6 | In the Add iSCSI vNICs table, do the following: |
| Step 7 | If the Cisco UCS Manager GUI displays a confirmation dialog box, click Yes. |
| Step 8 | Click Save Changes. |
Deleting a LAN Connectivity Policy
If you delete a LAN connectivity policy that is included in a service profile, you will delete all vNICs and iSCSI vNICs from that service profile and disrupt LAN data traffic for the server associated with the service profile.
Configuring Network Control Policies
Network Control Policy
This policy configures the network control settings for the Cisco UCS domain, including the following:
-
Whether the Cisco Discovery Protocol (CDP) is enabled or disabled
-
How the virtual interface ( VIF) behaves if no uplink port is available in end-host mode
The action that Cisco UCS Manager takes on the remote Ethernet interface, vEthernet interface , or vFibre Channel interface when the associated border port fails
-
Whether the server can use different MAC addresses when sending packets to the fabric interconnect
Whether MAC registration occurs on a per-VNIC basis or for all VLANs
Action on Uplink Fail
By default, the Action on Uplink Fail property in the network control policy is configured with a value of link-down. For adapters such as the Cisco UCS M81KR Virtual Interface Card, this default behavior directs Cisco UCS Manager to bring the vEthernet or vFibre Channel interface down if the associated border port fails. For Cisco UCS systems using a non-VM-FEX capable converged network adapter that supports both Ethernet and FCoE traffic, such as Cisco UCS CNA M72KR-Q and the Cisco UCS CNA M72KR-E, this default behavior directs Cisco UCS Manager to bring the remote Ethernet interface down if the associated border port fails. In this scenario, any vFibre Channel interfaces that are bound to the remote Ethernet interface are brought down as well.
![]() Note | if your implementation includes those types of non-VM-FEX capable converged network adapters mentioned in this section and the adapter is expected to handle both Ethernet and FCoE traffic, we recommend that you configure the Action on Uplink Fail property with a value of warning. Note that this configuration might result in an Ethernet teaming driver not being able to detect a link failure when the border port goes down. |
MAC Registration Mode
MAC addresses are installed only on the native VLAN by default, which maximizes the VLAN port count in most implementations.
![]() Note | If a trunking driver is being run on the host and the interface is in promiscuous mode, we recommend that you set the Mac Registration Mode to All VLANs. |
Creating a Network Control Policy
MAC address-based port security for Emulex converged Network Adapters (N20-AE0102) is not supported. When MAC address-based port security is enabled, the fabric interconnect restricts traffic to packets that contain the MAC address that it first learns. This is either the source MAC address used in the FCoE Initialization Protocol packet, or the MAC address in an ethernet packet, whichever is sent first by the adaptor. This configuration can result in either FCoE or Ethernet packets being dropped.
| Step 1 | In the Navigation pane, click the LAN tab. | ||||||||||||
| Step 2 | On the LAN tab, expand . | ||||||||||||
| Step 3 | Expand the node for the organization where you want to create the
policy.
If the system does not include multitenancy, expand the root node. | ||||||||||||
| Step 4 | Right-click the Network Control Policies node and select Create Network Control Policy. | ||||||||||||
| Step 5 | In the Create Network Control Policy dialog box, complete the following fields:
| ||||||||||||
| Step 6 | In the MAC Security area, do the following to determine whether the server can use different MAC addresses when sending packets to the fabric interconnect: | ||||||||||||
| Step 7 | Click OK. |
Deleting a Network Control Policy
Configuring Multicast Policies
Multicast Policy
This policy is used to configure Internet Group Management Protocol (IGMP) snooping and IGMP querier. IGMP Snooping dynamically determines hosts in a VLAN that should be included in particular multicast transmissions. You can create, modify, and delete a multicast policy that can be associated to one or more VLANs. When a multicast policy is modified, all VLANs associated with that multicast policy are re-processed to apply the changes. By default, IGMP snooping is enabled and IGMP querier is disabled. In the case of a private VLANs, you can set a multicast policy for primary VLANs but not for their associated isolated VLANs due to a Cisco NX-OS forwarding implementation.
If a Cisco UCS domain includes only 6100 series fabric interconnects, only the default multicast policy is allowed for local VLANs or global VLANs.
If a Cisco UCS domain includes one 6100 series fabric interconnect and one 6200 series fabric interconnect: Only the default multicast policy is allowed for a local VLAN on a 6100 series fabric interconnect.
On a 6200 series fabric interconnect, user-defined multicast policies can also be assigned along with the default multicast policy.
Only the default multicast policy is allowed for a global VLAN (as limited by one 6100 series fabric interconnect in the cluster.
If a Cisco UCS domain includes only 6200 series fabric interconnects, any multicast policy can be assigned.
Creating a Multicast Policy
| Step 1 | In the Navigation pane, click the LAN tab. | ||||||||||
| Step 2 | On the LAN tab, expand . | ||||||||||
| Step 3 | Expand the root node. | ||||||||||
| Step 4 | Right-click the Multicast Policies node and select Create Multicast Policy. | ||||||||||
| Step 5 | In the Create Multicast Policy dialog box, complete the following fields:
| ||||||||||
| Step 6 | Click OK. |
Modifying a Multicast Policy
![]() Note | You cannot change the name of the multicast policy once it has been created. |
| Step 1 | In the Navigation pane, click the LAN tab. | ||||||||||
| Step 2 | On the LAN tab, expand . | ||||||||||
| Step 3 | Expand the root node. | ||||||||||
| Step 4 | Click the policy that you want to modify. | ||||||||||
| Step 5 | In the work pane, complete the following fields:
| ||||||||||
| Step 6 | Click Save Changes. |
Deleting a Multicast Policy
![]() Note | If you assigned a non-default (user-defined) multicast policy to a VLAN and then delete that multicast policy, the associated VLAN inherits the multicast policy settings from the default multicast policy until the deleted policy is re-created. |

