- Preface
- New and Changed Information
- Overview of Cisco Unified Computing System
- Overview of Cisco UCS Manager
- Overview of Cisco UCS Manager GUI
- Configuring the Fabric Interconnects
- Configuring Ports and Port Channels
- Configuring Communication Services
- Configuring Authentication
- Configuring Organizations
- Configuring Role-Based Access Control
- Configuring DNS Servers
- Configuring System-Related Policies
- Managing Licenses
- Managing Virtual Interfaces
- Registering Cisco UCS Domains with Cisco UCS Central
- LAN Uplinks Manager
- VLANs
- Configuring LAN Pin Groups
- Configuring MAC Pools
- Configuring Quality of Service
- Configuring Network-Related Policies
- Configuring Upstream Disjoint Layer-2 Networks
- Configuring Named VSANs
- Configuring SAN Pin Groups
- Configuring WWN Pools
- Configuring Storage-Related Policies
- Configuring Fibre Channel Zoning
- Configuring Server-Related Pools
- Setting the Management IP Address
- Configuring Server-Related Policies
- Configuring Server Boot
- Deferring Deployment of Service Profile Updates
- Service Profiles
- Configuring Storage Profiles
- Managing Power in Cisco UCS
- Managing Time Zones
- Managing the Chassis
- Managing Blade Servers
- Managing Rack-Mount Servers
- Starting the KVM Console
- CIMC Session Management
- Managing the I/O Modules
- Backing Up and Restoring the Configuration
- Recovering a Lost Password
- Configuring BIOS Settings
- Local Disk Configuration Policy
- Guidelines for all Local Disk Configuration Policies
- Guidelines for Local Disk Configuration Policies Configured for RAID
- Creating a Local Disk Configuration Policy
- Changing a Local Disk Configuration Policy
- Deleting a Local Disk Configuration Policy
- FlexFlash Support
Configuring Server-Related Policies
This chapter includes the following sections:
- Configuring BIOS Settings
- Consistent Device Naming
- CIMC Security Policies
- Configuring Local Disk Configuration Policies
- Configuring Scrub Policies
- Configuring DIMM Error Management
- Configuring Serial over LAN Policies
- Configuring Server Autoconfiguration Policies
- Configuring Server Discovery Policies
- Configuring Server Inheritance Policies
- Configuring Server Pool Policies
- Configuring Server Pool Policy Qualifications
- Configuring vNIC/vHBA Placement Policies
- CIMC Mounted vMedia
Configuring BIOS Settings
Server BIOS Settings
Cisco UCS provides two methods for making global modifications to the BIOS settings on servers in an Cisco UCS domain. You can create one or more BIOS policies that include a specific grouping of BIOS settings that match the needs of a server or set of servers, or you can use the default BIOS settings for a specific server platform.
Both the BIOS policy and the default BIOS settings for a server platform enable you to fine tune the BIOS settings for a server managed by Cisco UCS Manager.
Depending upon the needs of the data center, you can configure BIOS policies for some service profiles and use the BIOS defaults in other service profiles in the same Cisco UCS domain, or you can use only one of them. You can also use Cisco UCS Manager to view the actual BIOS settings on a server and determine whether they are meeting current needs.
- Main BIOS Settings
- Processor BIOS Settings
- Intel Directed I/O BIOS Settings
- RAS Memory BIOS Settings
- Serial Port BIOS Settings
- USB BIOS Settings
- PCI Configuration BIOS Settings
- QPI BIOS Settings
- LOM and PCIe Slots BIOS Settings
- Boot Options BIOS Settings
- Server Management BIOS Settings
Main BIOS Settings
The following table lists the main server BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
Processor BIOS Settings
The following table lists the processor BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
Intel Directed I/O BIOS Settings
The following table lists the Intel Directed I/O BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
| Name | Description | ||
|---|---|---|---|
|
VT for Directed IO |
Whether the processor uses Intel Virtualization Technology for Directed I/O (VT-d). This can be one of the following:
|
||
|
Interrupt Remap |
Whether the processor supports Intel VT-d Interrupt Remapping. This can be one of the following: |
||
|
Coherency Support |
Whether the processor supports Intel VT-d Coherency. This can be one of the following: |
||
|
ATS Support |
Whether the processor supports Intel VT-d Address Translation Services (ATS). This can be one of the following: |
||
|
Pass Through DMA Support |
Whether the processor supports Intel VT-d Pass-through DMA. This can be one of the following: |
RAS Memory BIOS Settings
The following table lists the RAS memory BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
| Name | Description |
|---|---|
|
Memory RAS Config |
How the memory reliability, availability, and serviceability (RAS) is configured for the server. This can be one of the following:
|
|
NUMA |
Whether the BIOS supports NUMA. This can be one of the following:
|
|
Mirroring Mode |
Memory mirroring enhances system reliability by keeping two identical data images in memory. This option is only available if you choose the mirroring option for Memory RAS Config. It can be one of the following: |
|
Sparing Mode |
Sparing optimizes reliability by holding memory in reserve so that it can be used in case other DIMMs fail. This option provides some memory redundancy, but does not provide as much redundancy as mirroring. The available sparing modes depend on the current memory population. This option is only available if you choose sparing option for Memory RAS Config. It can be one of the following:
|
|
LV DDR Mode |
Whether the system prioritizes low voltage or high frequency memory operations. This can be one of the following:
|
|
DRAM Refresh Rate |
The refresh interval rate for internal memory. This can be one of the following: |
|
DDR3 Voltage Selection |
The voltage to be used by the dual-voltage RAM. This can be one of the following: |
Serial Port BIOS Settings
The following table lists the serial port BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
| Name | Description |
|---|---|
|
Serial Port A |
Whether serial port A is enabled or disabled. This can be one of the following: |
USB BIOS Settings
The following table lists the USB BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
| Name | Description |
|---|---|
|
Make Device Non Bootable |
Whether the server can boot from a USB device. This can be one of the following: |
|
Legacy USB Support |
Whether the system supports legacy USB devices. This can be one of the following: |
|
USB System Idle Power Optimizing Setting |
Whether the USB System Idle Power Optimizing setting is used to reduce USB EHCI idle power consumption. Depending upon the value you choose, this setting can have an impact on performance. This can be one of the following:
|
|
USB Front Panel Access Lock |
USB front panel lock is configured to enable or disable the front panel access to USB ports. This can be one of the following: |
|
Port 60/64 Emulation |
Whether the system supports 60h/64h emulation for complete USB keyboard legacy support. This can be one of the following:
|
|
USB Port:Front |
Whether the front panel USB devices are enabled or disabled. This can be one of the following:
|
|
USB Port:Internal |
Whether the internal USB devices are enabled or disabled. This can be one of the following:
|
|
USB Port:KVM |
Whether the KVM ports are enabled or disabled. This can be one of the following: |
|
USB Port:Rear |
Whether the rear panel USB devices are enabled or disabled. This can be one of the following:
|
|
USB Port:SD Card |
Whether the SD card drives are enabled or disabled. This can be one of the following: |
|
USB Port:VMedia |
Whether the virtual media devices are enabled or disabled. This can be one of the following: |
|
All USB Devices |
Whether all physical and virtual USB devices are enabled or disabled. This can be one of the following: |
PCI Configuration BIOS Settings
The following table lists the PCI configuration BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
| Name | Description | ||||
|---|---|---|---|---|---|
|
Max Memory Below 4G |
Whether the BIOS maximizes memory usage below 4GB for an operating system without PAE support, depending on the system configuration. This can be one of the following:
|
||||
|
Memory Mapped IO Above 4Gb Config |
Whether to enable or disable memory mapped I/O of 64-bit PCI devices to 4GB or greater address space. Legacy option ROMs are not able to access addresses above 4GB. PCI devices that are 64-bit compliant but use a legacy option ROM may not function correctly with this setting enabled. This can be one of the following: |
||||
|
VGA Priority |
Allows you to set the priority for VGA graphics devices if multiple VGA devices are found in the system. This can be one of the following:
|
||||
|
Allows you to set the level of ASPM (Active Power State Management) support in the BIOS. This can be one of the following: |
QPI BIOS Settings
The following table lists the QPI BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
| Name | Description |
|---|---|
|
QPI Link Frequency |
The Intel QuickPath Interconnect (QPI) link frequency, in megatransfers per second (MT/s). This can be one of the following: |
|
QPI Snoop Mode |
This can be one of the following:
|
LOM and PCIe Slots BIOS Settings
The following table lists the USB BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
| Name | Description |
|---|---|
|
PCIe Slot:SAS OptionROM |
Whether Option ROM is available on the SAS port. This can be one of the following:
|
|
PCIe Slot:n Link Speed |
This option allows you to restrict the maximum speed of an adapter card installed in PCIe slot n. This can be one of the following:
|
|
PCIe Slot:n OptionROM |
Whether Option ROM is available on the port. This can be one of the following: |
|
PCIe Slot:HBA OptionROM |
Whether Option ROM is available on the HBA port. This can be one of the following:
|
|
PCIe Slot:MLOM OptionROM |
Whether Option ROM is available on the MLOM port. This can be one of the following:
|
|
PCIe Slot:N1 OptionROM |
Whether Option ROM is available on the port. This can be one of the following:
|
|
PCIe Slot:N2 OptionROM |
Whether Option ROM is available on the port. This can be one of the following:
|
|
PCIe OptionROMs |
Whether Option ROM is available on all expansion ports. This can be one of the following:
|
|
PCIe Mezz OptionRom |
Whether all mezzanine PCIe ports are enabled or disabled. This can be one of the following: |
|
All PCI Onboard LOM Ports |
Whether all LOM ports are enabled or disabled. This can be one of the following: |
|
PCIe 1G LOM 1 Link |
Whether Option ROM is available on the 1G LOM port. This can be one of the following: |
|
PCIe 10G LOM 2 Link |
Whether Option ROM is available on the 10G LOM port. This can be one of the following: |
Boot Options BIOS Settings
The following table lists the boot options BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
| Name | Description |
|---|---|
|
Boot Option Retry |
Whether the BIOS retries NON-EFI based boot options without waiting for user input. This can be one of the following: |
|
Intel Entry SAS RAID |
Whether the Intel SAS Entry RAID Module is enabled. This can be one of the following: |
|
Intel Entry SAS RAID Module |
How the Intel SAS Entry RAID Module is configured. This can be one of the following: |
|
Onboard SCU Storage Support |
Whether the onboard software RAID controller is available to the server. This can be one of the following: |
Server Management BIOS Settings
The following tables list the server management BIOS settings that you can configure through a BIOS policy or the default BIOS settings:
General Settings
| Name | Description |
|---|---|
|
Assert Nmi on Serr |
Whether the BIOS generates a non-maskable interrupt (NMI) and logs an error when a system error (SERR) occurs. This can be one of the following:
|
|
Assert Nmi on Perr |
Whether the BIOS generates a non-maskable interrupt (NMI) and logs an error when a processor bus parity error (PERR) occurs. This can be one of the following:
|
|
OS Boot Watchdog Timer |
Whether the BIOS programs the watchdog timer with a predefined timeout value. If the operating system does not complete booting before the timer expires, the CIMC resets the system and an error is logged. This can be one of the following:
This feature requires either operating system support or Intel Management software. |
|
OS Boot Watchdog Timer Timeout Policy |
What action the system takes if the watchdog timer expires. This can be one of the following:
This option is only available if you enable the OS Boot Watchdog Timer. |
|
OS Boot Watchdog Timer Timeout |
What timeout value the BIOS uses to configure the watchdog timer. This can be one of the following:
This option is only available if you enable the OS Boot Watchdog Timer. |
|
FRB-2 Timer |
Whether the FRB-2 timer is used to recover the system if it hangs during POST. This can be one of the following: |
Console Redirection Settings
| Name | Description | ||
|---|---|---|---|
|
Console Redirection |
Allows a serial port to be used for console redirection during POST and BIOS booting. After the BIOS has booted and the operating system is responsible for the server, console redirection is irrelevant and has no effect. This can be one of the following:
|
||
|
Flow Control |
Whether a handshake protocol is used for flow control. Request to Send / Clear to Send (RTS/CTS) helps to reduce frame collisions that can be introduced by a hidden terminal problem. This can be one of the following:
|
||
|
BAUD Rate |
What BAUD rate is used for the serial port transmission speed. If you disable Console Redirection, this option is not available. This can be one of the following:
|
||
|
Terminal Type |
What type of character formatting is used for console redirection. This can be one of the following:
|
||
|
Legacy OS Redirect |
Whether redirection from a legacy operating system, such as DOS, is enabled on the serial port. This can be one of the following:
|
||
|
Allows you to change the action of the PuTTY function keys and the top row of the numeric keypad. This can be one of the following:
|
BIOS Policy
The BIOS policy is a policy that automates the configuration of BIOS settings for a server or group of servers. You can create global BIOS policies available to all servers in the root organization, or you can create BIOS policies in sub-organizations that are only available to that hierarchy.
To use a BIOS policy, do the following:
-
Create the BIOS policy in Cisco UCS Manager.
-
Assign the BIOS policy to one or more service profiles.
-
Associate the service profile with a server.
During service profile association, Cisco UCS Manager modifies the BIOS settings on the server to match the configuration in the BIOS policy. If you do not create and assign a BIOS policy to a service profile, the server uses the default BIOS settings for that server platform.
Default BIOS Settings
Cisco UCS Manager includes a set of default BIOS settings for each type of server supported by Cisco UCS. The default BIOS settings are available only in the root organization and are global. Only one set of default BIOS settings can exist for each server platform supported by Cisco UCS. You can modify the default BIOS settings, but you cannot create an additional set of default BIOS settings.
Each set of default BIOS settings are designed for a particular type of supported server and are applied to all servers of that specific type which do not have a BIOS policy included in their service profiles.
Unless a Cisco UCS implementation has specific needs that are not met by the server-specific settings, we recommend that you use the default BIOS settings that are designed for each type of server in the Cisco UCS domain.
Cisco UCS Manager applies these server platform-specific BIOS settings as follows:
-
The service profile associated with a server does not include a BIOS policy.
-
The BIOS policy is configured with the platform-default option for a specific setting.
You can modify the default BIOS settings provided by Cisco UCS Manager. However, any changes to the default BIOS settings apply to all servers of that particular type or platform. If you want to modify the BIOS settings for only certain servers, we recommend that you use a BIOS policy.
Creating a BIOS Policy
![]() Note | Cisco UCS Manager pushes BIOS configuration changes through a BIOS policy or default BIOS settings to the Cisco Integrated Management Controller (CIMC) buffer. These changes remain in the buffer and do not take effect until the server is rebooted. We recommend that you verify the support for BIOS settings in the server that you want to configure. Some settings, such as Mirroring Mode for RAS Memory, are not supported by all Cisco UCS servers. |
| Step 1 | In the Navigation pane, click the Servers tab. |
| Step 2 | On the Servers tab, expand . |
| Step 3 | Expand the
node for the organization where you want to create the policy.
If the system does not include multitenancy, expand the root node. |
| Step 4 | Right-click BIOS Policies and select Create BIOS Policy. |
| Step 5 | On the Main page of the Create BIOS Policy wizard, enter a name for the BIOS policy in the Name field.
This name can be between 1 and 16 alphanumeric characters. You cannot use spaces or any special characters other than - (hyphen), _ (underscore), : (colon), and . (period), and you cannot change this name after the object has been saved. |
| Step 6 | In the Create BIOS Policy wizard, do the following to configure the BIOS settings: |
| Step 7 | After you have configured all of the BIOS settings for the policy, click Finish. |
Modifying the BIOS Defaults
We recommend that you verify the support for BIOS settings in the server that you want to configure. Some settings, such as Mirroring Mode for RAS Memory, are not supported by all Cisco UCS servers.
Unless a Cisco UCS implementation has specific needs that are not met by the server-specific settings, we recommend that you use the default BIOS settings that are designed for each type of server in the Cisco UCS domain.
| Step 1 | In the Navigation pane, click the Servers tab. |
| Step 2 | On the Servers tab, expand . |
| Step 3 | Expand the
node for the organization where you want to create the policy.
If the system does not include multitenancy, expand the root node. |
| Step 4 | Expand BIOS Defaults and select the server model number for which you want to modify the default BIOS settings. |
| Step 5 | In the Work pane, click the appropriate tab and then click the desired radio button or make a choice from the drop-down list to modify the default BIOS settings:
For descriptions and information about the options for each BIOS setting, see the following topics. Not all BIOS settings are available for each type of server.
|
| Step 6 | Click Save Changes. |
Viewing the Actual BIOS Settings for a Server
Follow this procedure to see the actual BIOS settings on a server.
| Step 1 | In the Navigation pane, click the Equipment tab. |
| Step 2 | On the Equipment tab, expand . |
| Step 3 | Choose the server for which you want to view the actual BIOS settings. |
| Step 4 | On the Work pane, click the Inventory tab. |
| Step 5 | Click the Motherboard subtab. |
| Step 6 | In the BIOS Settings area, click the Expand icon to the right of the heading to open that area.
Each tab in the BIOS Settings area displays the settings for that server platform. Some of the tabs contain subtabs with additional information. |
Configuring Trusted Platform Module
Trusted Platform Module
The Trusted Platform Module (TPM) is a component that can securely store artifacts that are used to authenticate the server. These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measurements that help ensure that the platform remains trustworthy. Authentication (ensuring that the platform can prove that it is what it claims to be) and attestation (a process helping to prove that a platform is trustworthy and has not been breached) are necessary steps to ensure safer computing in all environments. It is a requirement for the Intel Trusted Execution Technology (TXT) security feature, which must be enabled in the BIOS settings for a server equipped with a TPM. Cisco UCS M4 blade and rack-mount servers include support for TPM. TPM is enabled by default on these servers.
Intel Trusted Execution Technology
Intel Trusted Execution Technology (TXT) provides greater protection for information that is used and stored on the business server. A key aspect of that protection is the provision of an isolated execution environment and associated sections of memory where operations can be conducted on sensitive data, invisible to the rest of the system. Intel TXT provides for a sealed portion of storage where sensitive data such as encryption keys can be kept, helping to shield them from being compromised during an attack by malicious code. Cisco UCS M4 blade and rack-mount servers include support for TXT. TXT is disabled by default on these servers.
TXT can be enabled only after TPM, Intel Virtualization technology (VT) and Intel Virtualization Technology for Directed I/O (VTDio) are enabled. When you only enable TXT, it implicitly enables TPM, VT, and VTDio also.
Configuring Trusted Platform
Cisco UCS M4 blade and rack-mount servers include support for TPM and TXT. UCS Manager Release 2.2(4) allows you to perform the following operations on TPM and TXT:
![]() Note | For Cisco UCS M3 blade servers, press F2 to enter the BIOS setup menu and change the settings. |
Configuring Trusted Platform
| Step 1 | In the Navigation pane, click the Servers tab. | ||||||||
| Step 2 | On the Servers tab, expand . | ||||||||
| Step 3 | Expand the node for the organization where you want to configure TPM. | ||||||||
| Step 4 | Expand BIOS Policies and select the BIOS policy for which you want to configure TPM. | ||||||||
| Step 5 | In the Work pane, click the Advanced tab. | ||||||||
| Step 6 | Click the Trusted Platform subtab. | ||||||||
| Step 7 | To configure TPM, click one of the following:
| ||||||||
| Step 8 | To configure TXT, click one of the following:
| ||||||||
| Step 9 | Click Save Changes. |
Consistent Device Naming
When there is no mechanism for the Operating System to label Ethernet interfaces in a consistent manner, it becomes difficult to manage network connections with server configuration changes. Consistent Device Naming (CDN), introduced in Cisco UCS Manager Release 2.2(4), allows Ethernet interfaces to be named in a consistent manner. This makes Ethernet interface names more persistent when adapter or other configuration changes are made.
To configure CDN for a vNIC, do the following:
- Guidelines and Limitations for Consistent Device Naming
- Configuring Consistent Device Naming in a BIOS Policy
- Configuring a CDN Name for a vNIC
Guidelines and Limitations for Consistent Device Naming
-
CDN is supported only on Windows 2012 R2. It is not supported on any other Operating System.
-
Consistent device naming (CDN) is supported on all M3 and higher blade and rack-mount servers.
-
BIOS and adapter firmware must be part of the Release 2.2(4) bundle to support CDN.
-
In Cisco UCS Manager Release 2.2(4), CDN is supported only on the following adapters:
-
Cisco UCS VIC 1225 (UCSC-PCIE-CSC-02)
-
Cisco UCS MLOM 1227 (UCSC-MLOM-CSC-02)
-
Cisco UCS VIC 1225T (UCSC-PCIE-C10T-02)
-
Cisco UCS MLOM 1227T (UCSC-MLOM-C10T-02)
-
Cisco UCS VIC 1240 (UCSB-MLOM-40G-01)
-
Cisco UCS VIC 1280 (UCS-VIC-M82-8P)
-
Cisco UCS VIC 1340 (UCSB-MLOM-40G-03)
-
Cisco UCS VIC 1380 (UCSB-VIC-M83-8P)
-
-
CDN is not supported for vNIC template and dynamic vNIC.
-
Multiple vNICs within the same service profile cannot have the same CDN name.
-
When a CDN name is not specified for a vNIC, the vNIC name is used as the CDN name.
-
The CDN name that you configure for a vNIC appears as Admin CDN Name. The CDN name that is finally applied to the vNIC appears as Oper CDN Name. For example, if the Admin CDN Name for a vNIC called "vnic0" is cdn0, then the Oper CDN Name for this vNIC will be cdn0, but if the Admin CDN Name for the same vNIC is not specified, the Oper CDN Name will be vnic0.
-
In Cisco UCS Manager Release 2.2(4), downgrade of Cisco UCS Manager is prevented if CDN is enabled in a BIOS policy that is assigned to an associated server.
-
In Cisco UCS Manager Release 2.2(4), downgrade of the BIOS firmware is prevented if a CDN-enabled BIOS policy is assigned to a server.
-
In Cisco UCS Manager Release 2.2(4), downgrade of the adapter firmware is prevented if a CDN-enabled BIOS policy is assigned to a server.
-
When the applied BIOS policy is changed from CDN-disabled to CDN-enabled or from CDN-enabled to CDN-disabled, the host reboots with a warning, irrespective of whether reboot on BIOS update is enabled or not.
-
It is recommended that you enable CDN in the BIOS policy and add CDN names to the vNICS before the Windows Operating System is installed.
-
If the Windows Operating System is already installed on the server and CDN is then enabled in the BIOS policy, do the following:
-
Uninstall the network drivers.
-
Scan the system for hidden devices and uninstall them.
-
Rescan the system for new hardware and install the network drivers again.
If this is not done, the vNICs will not come up with the configured CDN names.
-
-
When the applied BIOS policy is changed from CDN-disabled to CDN-enabled or from CDN-enabled to CDN-disabled on a service profile, do the following:
-
Uninstall the network drivers.
-
Scan the system for hidden devices and delete them.
-
Rescan the system for new hardware and install the network drivers again.

Note
When the BIOS policy is changed from CDN-enabled to CDN-disabled, ensure that the CDN names are removed from all the vNICs on the system.
-
-
If any change is made to the vNICs, the BDF of all the devices on the system also changes. Following are some of the scenarios that trigger a change in the BDF of all the vNICs present on the system:
-
When a vNIC is added or deleted
-
When a vNIC is moved from one adapter on the system to another adapter on the system
When these changes are made to the system, do the following:
-
Uninstall the network driver from all the present network interfaces.
-
Scan the system for hidden devices and uninstall them.
-
Rescan the system for new hardware and install the network driver on the network controllers again.
If the hidden devices are not deleted, the CDN names of the network adapters will not appear as configured on Cisco UCS Manager.
-
CDN with a Mixed Set of Adapters
When a CDN name is configured for a vNIC in a system with a mixed set of CDN-supported adapters and CDN-unsupported adapters, then system placement may not place CDN-configured vNICs on adapters that support CDN.
If CDN is enabled in the BIOS policy, and system placement places a CDN-configured vNIC (Admin CDN configured) on an adapter that does not support CDN, an info fault will be raised, but the configuration issue for the service profile will be ignored.
If CDN is enabled in the BIOS policy, and system placement places a vNIC (Admin CDN not configured) on an adapter that does not support CDN, an info fault will be raised, but the configuration issue for the service profile will be ignored. The Oper CDN Name in this case will be empty and will not be derived from the vNIC name.
If you want to deploy the CDN name as the host network interface name for a server, you must manually place a vNIC on a supported adapter.
Configuring Consistent Device Naming in a BIOS Policy
| Step 1 | In the Navigation pane, click the Servers tab. | ||||||||
| Step 2 | On the Servers tab, expand . | ||||||||
| Step 3 | Expand the node for the organization where you want to configure Consistent Device Naming (CDN). | ||||||||
| Step 4 | Expand BIOS Policies and select the BIOS policy for which you want to configure CDN. | ||||||||
| Step 5 | In the Work pane, click the Main tab. | ||||||||
| Step 6 | In the
Properties area, click one of the following in
the
Consistent Device Naming field to configure
CDN:
| ||||||||
| Step 7 | Click Save Changes. |
Configuring a CDN Name for a vNIC
When a CDN name is not specified for a vNIC, the vNIC name is used as the CDN name.
| Step 1 | In the Navigation pane, click the Servers tab. | ||
| Step 2 | On the Servers tab, expand . | ||
| Step 3 | Expand the node for the organization that contains the vNIC for which you want to configure a CDN name. | ||
| Step 4 | Expand the service profile and vNICs node that contain the vNIC for which you want to configure a CDN name. | ||
| Step 5 | Select the vNIC. | ||
| Step 6 | In the Work pane, click the General tab. | ||
| Step 7 | In the
Properties area, enter the CDN name for the vNIC in
theAdmin CDN
Name field.
| ||
| Step 8 | Click Save Changes. |
CIMC Security Policies
Cisco UCS Manager provides the following policies to increase security:
- IPMI Access Profile
- Creating an IPMI Access Profile
- Deleting an IPMI Access Profile
- KVM Management Policy
- Creating a KVM Management Policy
IPMI Access Profile
This policy allows you to determine whether IPMI commands can be sent directly to the server, using the IP address. For example, you can send commands to retrieve sensor data from the CIMC. This policy defines the IPMI access, including a username and password that can be authenticated locally on the server, and whether the access is read-only or read-write.
You can also restrict remote connectivity by disabling or enabling IPMI over LAN in the IPMI access profile. IPMI over LAN is disabled by default on all unassociated servers, and on all servers without an IPMI access policy. When an IPMI access policy is created, the IPMI over LAN is set to enabled by default. If you do not change the value to disabled, IPMI over LAN will be enabled on all associated servers.
You must include this policy in a service profile and that service profile must be associated with a server for it to take effect.
Creating an IPMI Access Profile
An IPMI profile requires that one or more of the following resources already exist in the system:
| Step 1 | In the Navigation pane, click the Servers tab. |
| Step 2 | On the Servers tab, expand . |
| Step 3 | Expand the
node for the organization where you want to create the policy.
If the system does not include multitenancy, expand the root node. |
| Step 4 | Right-click IPMI Access Profiles and select Create IPMI Access Profile. |
| Step 5 | In the Create IPMI Access Profile dialog box: |
| Step 6 | In the IPMI Users area of the navigator, click +. |
| Step 7 | In the
Create
IPMI User dialog box:
|
| Step 8 | Repeat Steps 6 and 7 to add another user. |
| Step 9 | Click OK to return to the IPMI profiles in the Work pane. |
What to Do Next
Include the IPMI profile in a service profile and/or template.
Deleting an IPMI Access Profile
KVM Management Policy
This policy allows you to determine whether vMedia encryption is enabled when you access a server via KVM.
You must include this policy in a service profile and that service profile must be associated with a server for it to take effect.
![]() Note | After a KVM vMedia session is mapped, if you change the KVM management policy, it will result in a loss of the vMedia session. You must re-map the KVM vMedia session again. |
Creating a KVM Management Policy
| Step 1 | In the Navigation pane, click the Servers tab. | ||
| Step 2 | On the Servers tab, expand . | ||
| Step 3 | Expand the
node for the organization where you want to create the policy.
If the system does not include multitenancy, expand the root node. | ||
| Step 4 | Right-click KVM Management Policies and select Create KVM Management Policy. | ||
| Step 5 | In the
Create
KVM Management Policy dialog box:
|
Configuring Local Disk Configuration Policies
Local Disk Configuration Policy
This policy configures any optional SAS local drives that have been installed on a server through the onboard RAID controller of the local drive. This policy enables you to set a local disk mode for all servers that are associated with a service profile that includes the local disk configuration policy.
The local disk modes include the following:
-
No Local Storage—For a diskless server or a SAN only configuration. If you select this option, you cannot associate any service profile which uses this policy with a server that has a local disk.
-
RAID 0 Striped—Data is striped across all disks in the array, providing fast throughput. There is no data redundancy, and all data is lost if any disk fails.
-
RAID 1 Mirrored—Data is written to two disks, providing complete data redundancy if one disk fails. The maximum array size is equal to the available space on the smaller of the two drives.
-
Any Configuration—For a server configuration that carries forward the local disk configuration without any changes.
-
No RAID—For a server configuration that removes the RAID and leaves the disk MBR and payload unaltered.
If you choose No RAID and you apply this policy to a server that already has an operating system with RAID storage configured, the system does not remove the disk contents. Therefore, there may be no visible differences on the server after you apply the No RAID mode. This can lead to a mismatch between the RAID configuration in the policy and the actual disk configuration shown in the tab for the server.
To make sure that any previous RAID configuration information is removed from a disk, apply a scrub policy that removes all disk information after you apply the No RAID configuration mode.
-
RAID 5 Striped Parity—Data is striped across all disks in the array. Part of the capacity of each disk stores parity information that can be used to reconstruct data if a disk fails. RAID 5 provides good data throughput for applications with high read request rates.
-
RAID 6 Striped Dual Parity—Data is striped across all disks in the array and two parity disks are used to provide protection against the failure of up to two physical disks. In each row of data blocks, two sets of parity data are stored.
-
RAID 10 Mirrored and Striped—RAID 10 uses mirrored pairs of disks to provide complete data redundancy and high throughput rates.
-
RAID 50 Striped Parity and Striped —Data is striped across multiple striped parity disk sets to provide high throughput and multiple disk failure tolerance.
-
RAID 60 Striped Dual Parity and Striped —Data is striped across multiple striped dual parity disk sets to provide high throughput and greater disk failure tolerance.
You must include this policy in a service profile and that service profile must be associated with a server for the policy to take effect.
![]() Note | For a Cisco UCS C-Series server integrated with Cisco UCS Manager, with an embedded on-board RAID controller, the local disk mode should always be Any Configuration, and the RAID must be configured directly on the controller. |
Guidelines for all Local Disk Configuration Policies
Before you create a local disk configuration policy, consider the following guidelines:
No Mixed HDDs and SSDs
Do not include HDDs and SSDs in a single server or RAID configuration.
Do Not Assign a Service Profile with the Default Local Disk Configuration Policy from a B200 M1 or M2 to a B200 M3
Due to the differences in the RAID/JBOD support provided by the storage controllers of B200 M1 and M2 servers and those of the B200 M3 server, you cannot assign or re-assign a service profile that includes the default local disk configuration policy from a B200M1 or M2 server to a B200 M3 server. The default local disk configuration policy includes those with Any Configuration or JBOD configuration.
JBOD Mode Support
![]() Note | Only B200 M1, B200 M2, B200 M3, B250 M1, B250 M2 and B22 M3 blade servers support the JBOD mode for local disks. |
Guidelines for Local Disk Configuration Policies Configured for RAID
Configure RAID Settings in Local Disk Configuration Policy for Servers with MegaRAID Storage Controllers
If a blade server or integrated rack-mount server has a MegaRAID controller, you must configure RAID settings for the drives in the Local Disk Configuration policy included in the service profile for that server. You can do this either by configuring the local disk configuration policy in the service profile using one of the defined RAID modes for that server, or you can use the Any Configuration mode with the LSI Utilities toolset to create the RAID volumes.
If you do not configure your RAID LUNs before installing the OS, disk discovery failures might occur during the installation and you might see error messages such as “No Device Found.”
Server May Not Boot After RAID1 Cluster Migration if Any Configuration Mode Specified in Service Profile
After RAID1 clusters are migrated, you need to associate a service profile with the server. If the local disk configuration policy in the service profile is configured with Any Configuration mode rather than RAID1, the RAID LUN remains in "inactive" state during and after association. As a result, the server cannot boot.
To avoid this issue, ensure that the service profile you associate with the server contains the identical local disk configuration policy as the original service profile before the migration and does not include the Any Configuration mode.
Do Not Use JBOD Mode on Servers with MegaRAID Storage Controllers
Do not configure or use JBOD mode or JBOD operations on any blade server or integrated rack-mount server with a MegaRAID storage controllers. JBOD mode and operations are not intended for nor are they fully functional on these servers.
Maximum of One RAID Volume and One RAID Controller in Integrated Rack-Mount Servers
A rack-mount server that has been integrated with Cisco UCS Manager can have a maximum of one RAID volume irrespective of how many hard drives are present on the server.
All the local hard drives in an integrated rack-mount server must be connected to only one RAID Controller. Integration with Cisco UCS Manager does not support the connection of local hard drives to multiple RAID Controllers in a single rack-mount server. We therefore recommend that you request a single RAID Controller configuration when you order rack-mount servers to be integrated with Cisco UCS Manager.
In addition, do not use third party tools to create multiple RAID LUNs on rack-mount servers. Cisco UCS Manager does not support that configuration.
Maximum of One RAID Volume and One RAID Controller in Blade Servers
A blade server can have a maximum of one RAID volume irrespective of how many drives are present in the server. All the local hard drives must be connected to only one RAID controller. For example, a B200 M3 server has an LSI controller and an Intel Patsburg controller, but only the LSI controller can be used as a RAID controller.
In addition, do not use third party tools to create multiple RAID LUNs on blade servers. Cisco UCS Manager does not support that configuration.
Number of Disks Selected in Mirrored RAID Should Not Exceed Two
If the number of disks selected in the Mirrored RAID exceed two, RAID 1 is created as a RAID 10 LUN. This issue can occur with the Cisco UCS B440 M1 and B440 M2 servers.
License Required for Certain RAID Configuration Options on Some Servers
Some Cisco UCS servers require a license for certain RAID configuration options. When Cisco UCS Manager associates a service profile containing this local disk policy with a server, Cisco UCS Manager verifies that the selected RAID option is properly licensed. If there are issues, Cisco UCS Manager displays a configuration error during the service profile association.
For RAID license information for a specific Cisco UCS server, see the Hardware Installation Guide for that server.
B420 M3 Server Does Not Support All Configuration Modes
The B420 M3 server does not support the following configuration modes in a local disk configuration policy:
In addition, the B420 M3 does not support JBOD modes or operations.
Single-Disk RAID 0 Configurations Not Supported on Some Blade Servers
A single-disk RAID 0 configuration is not supported in the following blade servers:
Creating a Local Disk Configuration Policy
| Step 1 | In the Navigation pane, click the Servers tab. | ||||||||||||||||||||||||
| Step 2 | On the Servers tab, expand . | ||||||||||||||||||||||||
| Step 3 | Expand the
node for the organization where you want to create the policy.
If the system does not include multitenancy, expand the root node. | ||||||||||||||||||||||||
| Step 4 | Right-click Local Disk Config Policies and choose Create Local Disk Configuration Policy. | ||||||||||||||||||||||||
| Step 5 | In the
Create
Local Disk Configuration Policy dialog box, complete the following
fields:
| ||||||||||||||||||||||||
| Step 6 | Click OK. |
Changing a Local Disk Configuration Policy
This procedure describes how to change a local disk configuration policy from an associated service profile. You can also change a local disk configuration policy from the Policies node of the Servers tab.
| Step 1 | In the Navigation pane, click the Servers tab. | ||||||||
| Step 2 | On the Servers tab, expand . | ||||||||
| Step 3 | Expand the organization that includes the service profile
with the local disk configuration policy you want to change.
If the system does not include multitenancy, expand the root node. | ||||||||
| Step 4 | Click the service profile that contains the local disk configuration policy you want to change. | ||||||||
| Step 5 | In the Work pane, click the Storage tab. | ||||||||
| Step 6 | In the Actions area, click Change Local Disk Configuration Policy. | ||||||||
| Step 7 | In the
Change Local Disk Configuration Policy dialog
box, choose one of the following options from the
Select the Local Disk Configuration Policy
drop-down list.
| ||||||||
| Step 8 | Click OK. | ||||||||
| Step 9 | (Optional)Expand the Local Disk Configuration Policy area to confirm that the change has been made. |
Deleting a Local Disk Configuration Policy
FlexFlash Support
Overview
Cisco UCS B-Series and C-Series M3 and M4 servers support internal Secure Digital (SD) memory cards. The SD cards are hosted by the Cisco Flexible Flash storage controller, a PCI-based controller which has two slots for SD cards. The cards contain a single partition called HV. When FlexFlash is enabled, Cisco UCS Manager displays the HV partition as a USB drive to both the BIOS and the host operating system.
FlexFlash is disabled by default. You can enable FlexFlash in a local disk policy used in a service profile. When FlexFlash is enabled in a local disk policy, and the server is capable of supporting SD cards, the FlexFlash controller is enabled during service profile association. If a server is not capable of supporting SD cards or has an older CIMC version, a config failure message is displayed.
If you disable FlexFlash in a supported server, the Hypervisor or HV partition is immediately disconnected from the host. The FlexFlash controller will also be disabled as part of a related service profile disassociation.
The FlexFlash controller supports RAID-1 for dual SD cards. You can configure new SD cards in a RAID pair by creating a FlexFlash scrub policy and reacknowledging the server. The FlexFlash scrub policy erases the HV partition in both cards, and brings the cards to a healthy RAID state.
![]() Note | Disable the scrub policy as soon as the pairing is complete. |
To boot from the HV partition, the SD card must be present in the boot policy used in the service profile.
FlexFlash Firmware Management
The FlexFlash controller firmware is bundled as part of the CIMC image. When you upgrade the CIMC, if a newer firmware version is available for the FlexFlash controller, the controller can no longer be managed, and the FlexFlash inventory displays the Controller State as Waiting For User Action and the Controller Health as Old Firmware Running. To upgrade the FlexFlash controller firmware, you need to perform a board controller update. For more information, see the appropriate Cisco UCS B-Series Firmware Management Guide, available at the following URL: http://www.cisco.com/en/US/products/ps10281/products_installation_and_configuration_guides_list.html.
Limitations for the Cisco Flexible Flash Storage Controller:
-
The Cisco Flexible Flash storage controller only supports 16 GB, 32 GB, and 64 GB SD cards. 
Note
16 GB and 32 GB cards are supported only on the B200-M3 blade servers, and the 64 GB SD cards are supported only on the B200-M4 blade servers.
-
We do not recommend using an SD card from a rack server in a blade server, or using an SD card from a blade server in a rack server. Switching SD cards between server types might result in data loss from the SD card.
-
Some Cisco UCS C-Series rack-mount servers have SD cards with four partitions: HV, HUU, SCU, and Drivers. Only the HV partition is visible in Cisco UCS Manager. You can migrate a four-partition SD card to a single HV partition card with a FlexFlash scrub policy.
-
The FlexFlash controller does not support RAID-1 sync (mirror rebuild). If the SD cards are in a degraded RAID state, or if any metadata errors are reported by the controller, you must run the FlexFlash scrub policy to pair the cards for RAID. For more information about the FlexFlash scrub policy, see Scrub Policy. The following conditions might result in degraded RAID or metadata errors:
-
The server firmware version must be at 2.2(1a) or higher.
- FlexFlash FX3S Support
- Enabling FlexFlash SD Card Support
- Enabling Auto-Sync
- Formatting the SD Cards
- Resetting the FlexFlash Controller
FlexFlash FX3S Support
Beginning with Release 2.2(3), Cisco UCS Manager allows additional FlexFlash support with the FX3S controller. The FX3S controller is present on the following servers:
FlexFlash operations with the FX3S control are similar to those with the Cisco Flexible Flash storage controller. FlexFlash is disabled by default, and is enabled using a local disk policy. You can also reset the controller, format the SD cards, and enable automatic synchronization of your paired SD cards.
The SD cards for the FX3S controller contain a single partition called Hypervisor.
Limitations for the Cisco FX3S Controller:
-
The FX3S controller supports only 32 GB and 64 GB SD cards. 16 GB cards are not supported.
-
We do not recommend using an SD card from a rack server in a blade server, or using an SD card from a blade server in a rack server. Switching SD cards between server types might result in data loss from the SD card.
-
The server firmware version must be at 2.2(3a) or higher.
Enabling FlexFlash SD Card Support
| Step 1 | In the Navigation pane, click the Servers tab. |
| Step 2 | On the Servers tab, expand . |
| Step 3 | Expand the
node for the organization where you want to create the policy.
If the system does not include multitenancy, expand the root node. |
| Step 4 | Expand Local Disk Config Policies and choose the local disk config policy for which you want to enable FlexFlash support. |
| Step 5 | In the Work pane, click the General tab. |
| Step 6 | In the FlexFlash State field, click the Enable radio button. |
| Step 7 | In the FlexFlash RAID Reporting State field, click the Enable radio button. |
| Step 8 | Click Save Changes. |
Enabling Auto-Sync
| Step 1 | In the Navigation pane, click the Equipment tab. |
| Step 2 | On the Equipment tab, expand . |
| Step 3 | Click the server for which you want to enable auto-sync. |
| Step 4 | In the Work pane, click the Inventory tab. |
| Step 5 | Click the Storage subtab. |
| Step 6 | In the Actions area, click Enable Auto-sync. |
| Step 7 | In the Enable Auto-sync dialog box, choose the Admin Slot Number for the SD card that you want to use as the primary. |
| Step 8 | Click OK. |
Formatting the SD Cards
| Step 1 | In the Navigation pane, click the Equipment tab. |
| Step 2 | On the Equipment tab, expand . |
| Step 3 | Click the server for which you want to format the SD cards. |
| Step 4 | In the Work pane, click the Inventory tab. |
| Step 5 | Click the Storage subtab. |
| Step 6 | In the Actions area, click Format SD Cards. |
| Step 7 | Click Yes to format the SD cards. |
Resetting the FlexFlash Controller
| Step 1 | In the Navigation pane, click the Equipment tab. |
| Step 2 | On the Equipment tab, expand . |
| Step 3 | Click the server for which you want to reset the FlexFlash controller. |
| Step 4 | In the Work pane, click the Inventory tab. |
| Step 5 | Click the Storage subtab. |
| Step 6 | In the Actions area, click Reset FlexFlash Controller. |
| Step 7 | Click Yes to reset the FlexFlash controller. |
Configuring Scrub Policies
Scrub Policy
This policy determines what happens to local data and to the BIOS settings on a server during the discovery process, when the server is reacknowledged, or when the server is disassociated from a service profile.
![]() Note | Local disk scrub policies only apply to hard drives that are managed by Cisco UCS Manager and do not apply to other devices such as USB drives. |
Depending upon how you configure a scrub policy, the following can occur at those times:
Disk scrub
One of the following occurs to the data on any local drives on disassociation:
BIOS Settings Scrub
One of the following occurs to the BIOS settings when a service profile containing the scrub policy is disassociated from a server:
FlexFlash Scrub
FlexFlash Scrub enables you to pair new or degraded SD cards, resolve FlexFlash metadata configuration failures, and migrate older SD cards with 4 partitions to single partition SD cards. One of the following occurs to the SD card when a service profile containing the scrub policy is disassociated from a server, or when the server is reacknowledged:
-
If enabled, the HV partition on the SD card is formatted using the PNUOS formatting utility. If two SD cards are present, the cards are RAID-1 paired, and the HV partitions in both cards are marked as valid. The card in slot 1 is marked as primary, and the card in slot 2 is marked as secondary.
-
If disabled, preserves the existing SD card settings.
![]() Note |
|
Creating a Scrub Policy
| Step 1 | In the Navigation pane, click the Servers tab. | ||||||||||||
| Step 2 | On the Servers tab, expand . | ||||||||||||
| Step 3 | Expand the
node for the organization where you want to create the policy.
If the system does not include multitenancy, expand the root node. | ||||||||||||
| Step 4 | Right-click Scrub Policies and select Create Scrub Policy. | ||||||||||||
| Step 5 | In the
Create Scrub Policy wizard, complete the
following fields:
| ||||||||||||
| Step 6 | Click OK. |
Deleting a Scrub Policy
Configuring DIMM Error Management
DIMM Correctable Error Handling
In Cisco UCS Manager, when a DIMM encounters a significant correctable error in a given predefined window, it is stated as degraded and considered as a non-functional device.
The DIMM correctable error handling feature enables you to reset all the correctable and uncorrectable memory errors on all the DIMMs in a server. When you reset the error configuration, the error count of a given DIMM is cleared, the status changes to operable, and it resets the sensor state of the given DIMM.
Resetting Memory Errors
Use this procedure to reset all correctable and uncorrectable memory errors encountered by Cisco UCS Manager and the baseboard management controller (BMC).
| Step 1 | In the Navigation pane, click the Equipment tab. |
| Step 2 | On the Equipment tab, expand . |
| Step 3 | Click the server for which you want to reset the error configuration. |
| Step 4 | In the Work pane, click the Inventory tab. |
| Step 5 | Click the Memory subtab. |
| Step 6 | Right-click the component and select Reset Memory Errors. |
| Step 7 | If the Cisco UCS Manager GUI displays a confirmation dialog box, click Yes. |
DIMM Blacklisting
In Cisco UCS Manager, the state of the Dual In-line Memory Module (DIMM) is based on SEL event records. When the BIOS encounters a noncorrectable memory error during memory test execution, the DIMM is marked as faulty. A faulty DIMM is a considered a nonfunctional device.
If you enable DIMM blacklisting, Cisco UCS Manager monitors the memory test execution messages and blacklists any DIMMs that encounter memory errors in the DIMM SPD data. To allow the host to map out any DIMMs that encounter uncorrectable ECC errors.
Enabling DIMM Blacklisting
The memory policy is a global policy that you can apply to existing servers on a Cisco UCS domain and also to the servers that are added after you set the memory policy.
![]() Note |
|
| Step 1 | In the Navigation pane, click the Servers tab. |
| Step 2 | On the Servers tab, expand . |
| Step 3 | Expand the node for the organization where you want to enable the blacklisting. If the system does not include multitenancy, expand the root node. |
| Step 4 | Expand Memory Policy and choose default. |
| Step 5 | In the Blacklisting area, click the Enabled radio button. |
The DIMM blacklisting is enabled for the domain level policy and these changes apply to all the servers on that particular domain.
![]() Note | If the Cisco IMC of a server does not support DIMM blacklisting, an information level fault is generated. |
Configuring Serial over LAN Policies
Serial over LAN Policy
This policy sets the configuration for the serial over LAN connection for all servers associated with service profiles that use the policy. By default, the serial over LAN connection is disabled.
If you implement a serial over LAN policy, we recommend that you also create an IPMI profile.
You must include this policy in a service profile and that service profile must be associated with a server for it to take effect.
Creating a Serial over LAN Policy
| Step 1 | In the Navigation pane, click the Servers tab. | ||||||||||||
| Step 2 | On the Servers tab, expand . | ||||||||||||
| Step 3 | Expand the
node for the organization where you want to create the policy.
If the system does not include multitenancy, expand the root node. | ||||||||||||
| Step 4 | Right-click Serial over LAN Policies and select Create Serial over LAN Policy. | ||||||||||||
| Step 5 | In the
Create Serial over LAN Policy wizard, complete
the following fields:
| ||||||||||||
| Step 6 | Click OK. |
Deleting a Serial over LAN Policy
Configuring Server Autoconfiguration Policies
Server Autoconfiguration Policy
Cisco UCS Manager uses this policy to determine how to configure a new server. If you create a server autoconfiguration policy, the following occurs when a new server starts:
-
The qualification in the server autoconfiguration policy is executed against the server.
-
If the server meets the required qualifications, the server is associated with a service profile created from the service profile template configured in the server autoconfiguration policy. The name of that service profile is based on the name given to the server by Cisco UCS Manager.
-
The service profile is assigned to the organization configured in the server autoconfiguration policy.
Creating an Autoconfiguration Policy
This policy requires that one or more of the following resources already exist in the system:
| Step 1 | In the Navigation pane, click the Equipment tab. | ||||||||||||
| Step 2 | On the Equipment tab, click the Equipment node. | ||||||||||||
| Step 3 | In the Work pane, click the Policies tab. | ||||||||||||
| Step 4 | Click the Autoconfig Policies subtab. | ||||||||||||
| Step 5 | On the icon
bar to the right of the table, click
+.
If the + icon is disabled, click an entry in the table to enable it. | ||||||||||||
| Step 6 | In the
Create Autoconfiguration Policy dialog box,
complete the following fields:
| ||||||||||||
| Step 7 | Click OK. |
Deleting an Autoconfiguration Policy
| Step 1 | In the Navigation pane, click the Equipment tab. |
| Step 2 | On the Equipment tab, click the Equipment node. |
| Step 3 | In the Work pane, click the Policies tab. |
| Step 4 | Click the Autoconfig Policies subtab. |
| Step 5 | Right-click the autoconfiguration policy that you want to delete and choose Delete. |
| Step 6 | If the Cisco UCS Manager GUI displays a confirmation dialog box, click Yes. |
Configuring Server Discovery Policies
Server Discovery Policy
This discovery policy determines how the system reacts when you add a new server. If you create a server discovery policy, you can control whether the system conducts a deep discovery when a server is added to a chassis, or whether a user must first acknowledge the new server. By default, the system conducts a full discovery.
If you create a server discovery policy, the following occurs when a new server starts:
-
The qualification in the server discovery policy is executed against the server.
-
If the server meets the required qualifications, Cisco UCS Manager applies the following to the server:
In Cisco UCS Manager Release 2.2(4), blade servers do not support drives with a block size of 4K, but rack-mount servers support such drives. If a drive with a block size of 4K is inserted into a blade server, discovery fails and the following error message appears:
Unable to get Scsi Device Information from the systemIf this error occurs, do the following:
Note: Reacknowledging the server causes the server to reboot and results in loss of service.
Creating a Server Discovery Policy
If you plan to associate this policy with a server pool, create server pool policy qualifications.
| Step 1 | In the Navigation pane, click the Equipment tab. |
| Step 2 | On the Equipment tab, click the Equipment node. |
| Step 3 | In the Work pane, click the Policies tab. |
| Step 4 | Click the Server Discovery Policies subtab. |
| Step 5 | Click the + icon on the table icon bar to open the Create Server Discovery Policy dialog box. |
| Step 6 | In the Description field, enter a description for the discovery policy. |
| Step 7 | In the Action field, select one of the following options: |
| Step 8 | (Optional)To associate this policy with a server pool, select server pool policy qualifications from the Qualification drop-down list. |
| Step 9 | (Optional)To include a scrub policy, select a policy from the Scrub Policy drop-down list. |
| Step 10 | Click OK. |
What to Do Next
Include the server discovery policy in a service profile and/or template.
Deleting a Server Discovery Policy
| Step 1 | In the Navigation pane, click the Equipment tab. |
| Step 2 | On the Equipment tab, click the Equipment node. |
| Step 3 | In the Work pane, click the Policies tab. |
| Step 4 | Click the Server Discovery Policies subtab. |
| Step 5 | Right-click the server discover policy that you want to delete and choose Delete. |
| Step 6 | If the Cisco UCS Manager GUI displays a confirmation dialog box, click Yes. |
Configuring Server Inheritance Policies
Server Inheritance Policy
This policy is invoked during the server discovery process to create a service profile for the server. All service profiles created from this policy use the values burned into the blade at manufacture. The policy performs the following:
-
Analyzes the inventory of the server
-
If configured, assigns the server to the selected organization
-
Creates a service profile for the server with the identity burned into the server at manufacture
You cannot migrate a service profile created with this policy to another server.
Creating a Server Inheritance Policy
A blade server or rack-mount server with a VIC adapter, such as the Cisco UCS M81KR Virtual Interface Card, does not have server identity values burned into the server hardware at manufacture. As a result, the identity of the adapter must be derived from default pools. If the default pools do not include sufficient entries for one to be assigned to the server, service profile association fails with a configuration error.
| Step 1 | In the Navigation pane, click the Equipment tab. | ||||||||||
| Step 2 | On the Equipment tab, click the Equipment node. | ||||||||||
| Step 3 | In the Work pane, click the Policies tab. | ||||||||||
| Step 4 | Click the Server Inheritance Policies subtab. | ||||||||||
| Step 5 | On the icon
bar to the right of the table, click
+.
If the + icon is disabled, click an entry in the table to enable it. | ||||||||||
| Step 6 | In the
Create Server Inheritance Policy dialog box,
complete the following fields:
| ||||||||||
| Step 7 | Click OK. |
Deleting a Server Inheritance Policy
| Step 1 | In the Navigation pane, click the Equipment tab. |
| Step 2 | On the Equipment tab, click the Equipment node. |
| Step 3 | In the Work pane, click the Policies tab. |
| Step 4 | Click the Server Inheritance Policies subtab. |
| Step 5 | Right-click the server inheritance policy that you want to delete and choose Delete. |
| Step 6 | If the Cisco UCS Manager GUI displays a confirmation dialog box, click Yes. |
Configuring Server Pool Policies
Server Pool Policy
This policy is invoked during the server discovery process. It determines what happens if server pool policy qualifications match a server to the target pool specified in the policy.
If a server qualifies for more than one pool and those pools have server pool policies, the server is added to all those pools.
Creating a Server Pool Policy
This policy requires that one or more of the following resources already exist in the system:
| Step 1 | In the Navigation pane, click the Servers tab. | ||||||||||
| Step 2 | On the Servers tab, expand . | ||||||||||
| Step 3 | Expand the
node for the organization where you want to create the policy.
If the system does not include multitenancy, expand the root node. | ||||||||||
| Step 4 | Right-click Server Pool Policies and select Create Server Pool Policy. | ||||||||||
| Step 5 | In the
Create Server Pool Policy dialog box, complete
the following fields:
| ||||||||||
| Step 6 | Click OK. |
Deleting a Server Pool Policy
Configuring Server Pool Policy Qualifications
Server Pool Policy Qualifications
This policy qualifies servers based on the inventory of a server conducted during the discovery process. The qualifications are individual rules that you configure in the policy to determine whether a server meets the selection criteria. For example, you can create a rule that specifies the minimum memory capacity for servers in a data center pool.
Qualifications are used in other policies to place servers, not just by the server pool policies. For example, if a server meets the criteria in a qualification policy, it can be added to one or more server pools or have a service profile automatically associated with it.
You can use the server pool policy qualifications to qualify servers according to the following criteria:
-
Adapter type
-
Chassis location
-
Memory type and configuration
-
Power group
-
CPU cores, type, and configuration
-
Storage configuration and capacity
-
Server model
Depending upon the implementation, you might need to configure several policies with server pool policy qualifications including the following:
Creating Server Pool Policy Qualifications
| Step 1 | In the Navigation pane, click the Servers tab. |
| Step 2 | On the Servers tab, expand . |
| Step 3 | Expand the
node for the organization where you want to create the policy.
If the system does not include multitenancy, expand the root node. |
| Step 4 | Right-click the Server Pool Policy Qualifications node and select Create Server Pool Policy Qualification. |
| Step 5 | In the Create Server Pool Policy Qualification dialog box, enter a unique name and description for the policy. |
| Step 6 | (Optional)To use this
policy to qualify servers according to their adapter configuration, do the
following:
|
| Step 7 | (Optional)To use this
policy to qualify servers according to the chassis in which they physically
reside, do the following:
|
| Step 8 | (Optional)To use this
policy to qualify servers according to both the chassis and slot in which they
physically reside, do the following:
|
| Step 9 | (Optional)To use this
policy to qualify servers according to their memory configuration, do the
following:
|
| Step 10 | (Optional)To use this
policy to qualify servers according to their CPU/Cores configuration, do the
following:
|
| Step 11 | (Optional)To use this
policy to qualify servers according to their storage configuration and
capacity, do the following:
|
| Step 12 | To use this policy to qualify servers according to the model of the server, do the following: |
| Step 13 | (Optional)To use this policy to qualify servers according to power group, do the following: |
| Step 14 | (Optional)To use this
policy to qualify the rack-mount servers that can be added to the associated
server pool, do the following:
|
| Step 15 | Verify the qualifications in the table and correct if necessary. |
| Step 16 | Click OK. |
Deleting Server Pool Policy Qualifications
| Step 1 | In the Navigation pane, click the Servers tab. |
| Step 2 | On the Servers tab, expand . |
| Step 3 | Expand the Server Pool Policy Qualifications node. |
| Step 4 | Right-click the policy qualifications you want to delete and select Delete. |
| Step 5 | If the Cisco UCS Manager GUI displays a confirmation dialog box, click Yes. |
Deleting Qualifications from Server Pool Policy Qualifications
Use this procedure to modify Server Pool Policy Qualifications by deleting one or more sets of qualifications.
| Step 1 | In the Navigation pane, click the Servers tab. |
| Step 2 | On the Servers tab, expand . |
| Step 3 | Expand the Server Pool Policy Qualifications node. |
| Step 4 | Choose the policy you want to modify. |
| Step 5 | In the Work pane, choose the Qualifications tab. |
| Step 6 | To delete a set of qualifications: |
| Step 7 | Click Save Changes. |
Configuring vNIC/vHBA Placement Policies
vNIC/vHBA Placement Policies
vNIC/vHBA placement policies are used to determine the following:
-
How the virtual network interface connections (vCons) are mapped to the physical adapters on a server.
-
What types of vNICs or vHBAs can be assigned to each vCon.
Each vNIC/vHBA placement policy contains four vCons that are virtual representations of the physical adapters. When a vNIC/vHBA placement policy is assigned to a service profile, and the service profile is associated with a server, the vCons in the vNIC/vHBA placement policy are assigned to the physical adapters and the vNICs and vHBAs are assigned to those vCons.
For blade or rack servers that contain one adapter, Cisco UCS assigns all vCons to that adapter. For servers that contain four adapters, Cisco UCS assigns vCon1 to Adapter1, vCon2 to Adapter2, vCon3 to Adapter3, and vCon4 to Adapter4.
For blade or rack servers that contain two or three adapters, Cisco UCS assigns the vCons based on the type of server and the selected virtual slot mapping scheme, which can be Round Robin or Linear Ordered. For details about the available mapping schemes, see vCon to Adapter Placement.
After Cisco UCS assigns the vCons, it assigns the vNICs and vHBAs based on the Selection Preference for each vCon. This can be one of the following:
-
All—All configured vNICs and vHBAs can be assigned to the vCon, whether they are explicitly assigned to it, unassigned, or dynamic. This is the default.
-
Assigned Only—vNICs and vHBAs must be explicitly assigned to the vCon. You can assign them explicitly through the service profile or the properties of the vNIC or vHBA.
-
Exclude Dynamic—Dynamic vNICs and vHBAs cannot be assigned to the vCon. The vCon can be used for all static vNICs and vHBAs, whether they are unassigned or explicitly assigned to it.
-
Exclude Unassigned—Unassigned vNICs and vHBAs cannot be assigned to the vCon. The vCon can be used for dynamic vNICs and vHBAs and for static vNICs and vHBAs that are explicitly assigned to it.
-
Exclude usNIC—Cisco usNICs cannot be assigned to the vCon. The vCon can be used for all other configured vNICs and vHBAs, whether they are explicitly assigned to it, unassigned, or dynamic.

Note
An SRIOV usNIC that is explicitly assigned to a vCon set to Exclude usNIC will remain assigned to that vCon.
If you do not include a vNIC/vHBA placement policy in the service profile, Cisco UCS Manager defaults to the Round Robin vCon mapping scheme and the All vNIC/vHBA selection preference, distributing the vNICs and vHBAs between the adapters based on the capabilities and relative capacities of each adapter.
vCon to Adapter Placement
Cisco UCS maps every vCon in a service profile to a physical adapter on the server. How that mapping occurs and how the vCons are assigned to a specific adapter in a server depends on the following:
-
The type of server. N20-B6620-2 and N20-B6625-2 blade servers with two adapter cards use a different mapping scheme than other supported rack or blade servers.
-
The number of adapters in the server.
-
The setting of the virtual slot mapping scheme in the vNIC/vHBA placement policy, if applicable.
You must consider this placement when you configure the vNIC/vHBA selection preference to assign vNICs and vHBAs to vCons.
![]() Note | vCon to adapter placement is not dependent upon the PCIE slot number of the adapter. The adapter numbers used for the purpose of vCon placement are not the PCIE slot numbers of the adapters, but the ID assigned to them during server discovery. |
- vCon to Adapter Placement for N20-B6620-2 and N20-B6625-2 Blade Servers
- vCon to Adapter Placement for All Other Supported Servers
vCon to Adapter Placement for N20-B6620-2 and N20-B6625-2 Blade Servers
In N20-B6620-2 and N20-B6625-2 blade servers, the two adapters are numbered left to right while vCons are numbered right to left. If one of these blade servers has a single adapter, Cisco UCS assigns all vCons to that adapter. If the server has two adapters, the vCon assignment depends upon the virtual slot mapping scheme:
vCon to Adapter Placement for All Other Supported Servers
For all other servers supported by Cisco UCS in addition to the N20-B6620-2 and N20-B6625-2 blade servers, the vCon assignment depends on the number of adapters in the server and the virtual slot mapping scheme.
For blade or rack servers that contain one adapter, Cisco UCS assigns all vCons to that adapter. For servers that contain four adapters, Cisco UCS assigns vCon1 to Adapter1, vCon2 to Adapter2, vCon3 to Adapter3, and vCon4 to Adapter4.
For blade or rack servers that contain two or three adapters, Cisco UCS assigns the vCons based on the selected virtual slot mapping scheme: Round Robin or Linear Ordered.
| Number of Adapters | vCon1 Assignment | vCon2 Assignment | vCon3 Assignment | vCon4 Assignment |
|---|---|---|---|---|
|
1 |
Adapter1 |
Adapter1 |
Adapter1 |
Adapter1 |
|
2 |
Adapter1 |
Adapter2 |
Adapter1 |
Adapter2 |
|
3 |
Adapter1 |
Adapter2 |
Adapter3 |
Adapter2 |
|
4 |
Adapter1 |
Adapter2 |
Adapter3 |
Adapter4 |
Round Robin is the default mapping scheme.
| Number of Adapters | vCon1 Assignment | vCon2 Assignment | vCon3 Assignment | vCon4 Assignment |
|---|---|---|---|---|
|
1 |
Adapter1 |
Adapter1 |
Adapter1 |
Adapter1 |
|
2 |
Adapter1 |
Adapter1 |
Adapter2 |
Adapter2 |
|
3 |
Adapter1 |
Adapter2 |
Adapter3 |
Adapter3 |
|
4 |
Adapter1 |
Adapter2 |
Adapter3 |
Adapter4 |
![]() Note | If you are using a vCon policy with two adapters in the Cisco UCS B440 M2 Blade Server, be aware of the following mapping. |
vNIC/vHBA to vCon Assignment
Cisco UCS Manager provides two options for assigning vNICs and vHBAs to vCons through the vNIC/vHBA placement policy: explicit assignment and implicit assignment.
Explicit Assignment of vNICs and vHBAs
With explicit assignment, you specify the vCon and, therefore, the adapter to which a vNIC or vHBA is assigned. Use this assignment option when you need to determine how the vNICs and vHBAs are distributed between the adapters on a server.
-
Set the vCon configuration to any of the available options. You can configure the vCons through a vNIC/vHBA placement policy or in the service profile associated with the server. If a vCon is configured for All, you can still explicitly assign a vNIC or vHBA to that vCon.
-
Assign the vNICs and vHBAs to a vCon. You can make this assignment through the virtual host interface placement properties of the vNIC or vHBA or in the service profile associated with the server.
If you attempt to assign a vNIC or vHBA to a vCon that is not configured for that type of vNIC or vHBA, Cisco UCS Manager displays a message advising you of the configuration error.
During service profile association, Cisco UCS Manager validates the configured placement of the vNICs and vHBAs against the number and capabilities of the physical adapters in the server before assigning the vNICs and vHBAs according to the configuration in the policy. Load distribution is based upon the explicit assignments to the vCons and adapters configured in this policy.
If the adapters do not support the assignment of one or more vNICs or vHBAs, Cisco UCS Manager raises a fault against the service profile.
Implicit Assignment of vNICs and vHBAs
With implicit assignment, Cisco UCS Manager determines the vCon and, therefore, the adapter to which a vNIC or vHBA is assigned according to the capability of the adapters and their relative capacity. Use this assignment option if the adapter to which a vNIC or vHBA is assigned is not important to your system configuration.
To configure a vCon for implicit assignment, do the following:
-
Set the vCon configuration to All, Exclude Dynamic, or Exclude Unassigned. You can configure the vCons through a vNIC/vHBA placement policy or in the service profile associated with the server.
-
Do not set the vCon configuration to Assigned Only. Implicit assignment cannot be performed with this setting.
-
Do not assign any vNICs or vHBAs to a vCon.
During service profile association, Cisco UCS Manager verifies the number and capabilities of the physical adapters in the server and assigns the vNICs and vHBAs accordingly. Load distribution is based upon the capabilities of the adapters, and placement of the vNICs and vHBAs is performed according to the actual order determined by the system. For example, if one adapter can accommodate more vNICs than another, that adapter is assigned more vNICs.
If the adapters cannot support the number of vNICs and vHBAs configured for that server, Cisco UCS Manager raises a fault against the service profile.
Implicit Assignment of vNICs in a Dual Adapter Environment
When you use implicit vNIC assignment for a dual slot server with an adapter card in each slot, Cisco UCS Manager typically assigns the vNICs/vHBAs as follows:
-
If the server has the same adapter in both slots, Cisco UCS Manager assigns half the vNICs and half the vHBAs to each adapter.
-
If the server has one non-VIC adapter and one VIC adapter, Cisco UCS Manager assigns two vNICs and two vHBAs to the non-VIC adapter and the remaining vNICs and vHBAs to the VIC adapter.
-
If the server has two different VIC adapters, Cisco UCS Manager assigns the vNICs and vHBAs proportionally, based on the relative capabilities of the two adapters.
The following examples show how Cisco UCS Manager would typically assign the vNICs and vHBAs with different combinations of supported adapter cards:
-
If you want to configure four vNICs and the server contains two Cisco UCS M51KR-B Broadcom BCM57711 adapters (with two vNICs each), Cisco UCS Manager assigns two vNICs to each adapter.
-
If you want to configure 50 vNICs and the server contains a Cisco UCS CNA M72KR-E adapter (2 vNICs) and a Cisco UCS M81KR Virtual Interface Card adapter (128 vNICs), Cisco UCS Manager assigns two vNICs to the Cisco UCS CNA M72KR-E adapter and 48 vNICs to the Cisco UCS M81KR Virtual Interface Card adapter.
-
If you want to configure 150 vNICs and the server contains a Cisco UCS M81KR Virtual Interface Card adapter (128 vNICs) and a Cisco UCS VIC-1240 Virtual Interface Card adapter (256 vNICs), Cisco UCS Manager assigns 50 vNICs to the Cisco UCS M81KR Virtual Interface Card adapter and 100 vNICs to the Cisco UCS VIC-1240 Virtual Interface Card adapter.
![]() Note | Exceptions to this implicit assignment occur if you configure the vNICs for fabric failover and if you configure dynamic vNICs for the server. |
For a configuration that includes vNIC fabric failover where one adapter does not support vNIC failover, Cisco UCS Manager implicitly assigns all vNICs that have fabric failover enabled to the adapter that supports them. If the configuration includes only vNICs that are configured for fabric failover, no vNICs are implicitly assigned to the adapter that does not support them. If some vNICs are configured for fabric failover and some are not, Cisco UCS Manager assigns all failover vNICs to the adapter that supports them and a minimum of one nonfailover vNIC to the adapter that does not support them, according to the ratio above.
For a configuration that includes dynamic vNICs, the same implicit assignment would occur. Cisco UCS Manager assigns all dynamic vNICs to the adapter that supports them. However, with a combination of dynamic vNICs and static vNICs, at least one static vNIC is assigned to the adapter that does not support dynamic vNICs.
Creating a vNIC/vHBA Placement Policy
| Step 1 | In the Navigation pane, click the Servers tab. |
| Step 2 | On the Servers tab, expand . |
| Step 3 | Expand the
node for the organization where you want to create the policy.
If the system does not include multitenancy, expand the root node. |
| Step 4 | Right-click vNIC/vHBA Placement Policies and choose Create Placement Policy. |
| Step 5 | In the Create Placement Policy dialog box, do the following: |
Deleting a vNIC/vHBA Placement Policy
Explicitly Assigning a vNIC to a vCon
Configure the vCons through a vNIC/vHBA placement policy or in the service profile with one of the following values:
If a vCon is configured for All, you can still explicitly assign a vNIC or vHBA to that vCon. However, you have less control with this configuration.
| Step 1 | In the Navigation pane, click the Servers tab. | ||||||
| Step 2 | On the Servers tab, expand . | ||||||
| Step 3 | Expand the node for the organization which contains the service profile whose vNICs you want to explicitly assign to a vCon. If the system does not include multitenancy, expand the root node. | ||||||
| Step 4 | Expand . | ||||||
| Step 5 | Click on the vNIC that you want to explicitly assign to a vCon. | ||||||
| Step 6 | In the Work pane, click the General tab. | ||||||
| Step 7 | In the Virtual Host Interface Placement section, complete the following fields:
If you attempt to assign a vNIC to a vCon that is not configured for that type of vNIC, Cisco UCS Manager displays a message box to advise you of the configuration error. You must either assign the vNIC to another vCon or change the vCon configuration in the service profile. | ||||||
| Step 8 | In the Order section, complete the following fields:
| ||||||
| Step 9 | Click Save Changes. |
Explicitly Assigning a vHBA to a vCon
Configure the vCons through a vNIC/vHBA placement policy or in the service profile with one of the following values:
If a vCon is configured for All, you can still explicitly assign a vNIC or vHBA to that vCon. However, you have less control with this configuration.
| Step 1 | In the Navigation pane, click the Servers tab. | ||||||
| Step 2 | On the Servers tab, expand . | ||||||
| Step 3 | Expand the node for the organization which contains the service profile whose vHBAs you want to explicitly assign to a vCon. If the system does not include multitenancy, expand the root node. | ||||||
| Step 4 | Expand . | ||||||
| Step 5 | Click on the vHBA that you want to explicitly assign to a vCon. | ||||||
| Step 6 | In the Work pane, click the General tab. | ||||||
| Step 7 | In the Virtual Host Interface Placement section, complete the following fields:
If you attempt to assign a vHBA to a vCon that is not configured for that type of vHBA, Cisco UCS Manager displays a message box to advise you of the configuration error. You must either assign the vHBA to another vCon or change the vCon configuration in the service profile. | ||||||
| Step 8 | In the Order section, complete the following fields:
| ||||||
| Step 9 | Click Save Changes. |
Placing Static vNICs Before Dynamic vNICs
For optimal performance, static vNICs and vHBAs should be placed before dynamic vNICs on the PCIe bus. Static vNICs refer to both static vNICs and vHBAs. Cisco UCS Manager Release 2.1 provides the following functionality regarding the order of static and dynamic vNICs:
After upgrading to Cisco UCS Manager Release 2.1, if no change is made to existing service profiles (profiles that are defined in releases prior to Cisco UCS Manager Release 2.1), the vNIC order does not change.
After an upgrade to Cisco UCS Manager Release 2.1, any vNIC-related change would reorder the vNIC map. As a result, all dynamic vNICs would be placed after the static vNICs.
For newly created service profiles in Cisco UCS Manager Release 2.1, static vNICs are always ordered before dynamic vNICs.
The above behavior is independent of the sequence of creating or deleting static or dynamic vNICs.
For SRIOV-enabled service profiles, UCSM places the vNIC Physical Function(PF) before the corresponding Virtual Functions (VFs). This scheme guarantees that the VFs are placed close to the parent PF vNIC on the PCIe bus and BDFs are in successive incremental order for the VFs.
Example
dyn-vNIC-1 1 dyn-vNIC-2 2
dyn-vNIC-1 1 dyn-vNIC-2 2 eth-vNIC-1 3 eth-vNIC-2 4
dyn-vNIC-1 1 dyn-vNIC-2 2 eth-vNIC-1 3 eth-vNIC-2 4
dyn-vNIC-1 3
dyn-vNIC-2 4
eth-vNIC-1 1
eth-vNIC-2 2
dyn-vNIC-3 5
dyn-vNIC-4 6
Dynamic vNICs as Multifunction PCIe Devices
Cisco UCS Manager Version 2.1 provisions static vNICs as 0-function devices (new BUS for every static vNIC). Multifunction dynamic vNICs are placed from the new Bus-slot after the last static vNIC/vHBA.
![]() Note | Cisco UCS Manager Version 2.1 supports the new StaticZero mode. |
| Cisco UCS Manager | ||
|---|---|---|
| Version 1.4 Scheme: ZeroFunction |
Version 2.0 Scheme: ZeroFunction / MultiFunction |
Version 2.1 Scheme: ZeroFunction / MultiFunction / StaticZero |
Static and Dynamic vNICs are all on Bus [0-57], Function [0] < ZeroFunction Mode > |
Static vNICs and Dynamic vNICs are on Bus [0-57], Function [0-7]. Bus 0, Function 0 Bus 0, Function 7 Bus 1, Function 0 < MultiFunction Mode > |
Static vNICs or PFs will be on Bus [0-57], Function [0]. SRIOV: Corresponding VFs will be on the same Bus and Functions [1-255] No-SRIOV: Dynamic vNICs are on Bus [0-57], Function [0-7] < StaticZero Mode > |
| Upgrade from Balboa will not renumber BDFs (remain in ZeroFunction mode) until Bus <= 57. Once devices exceed 58, switch to MultiFunction mode. |
Upgrade from Balboa will not renumber BDFs (remain in ZeroFunction mode) until Bus <=57. Once devices exceed 58 or Platform specific maximum PCIe Bus number or change to SRIOV configuration, switch to StaticZero mode. | |
| Upgrade from Cisco UCS Manager Version 2.0 will not renumber BDFs (remain in ZeroFunction / MultiFunction mode). Once devices exceed 58 or Platfor specific maximum PCIe Bus number OR Change to SRIOV configuration, switch to StaticZero mode. | ||
CIMC Mounted vMedia
Using Scriptable vMedia
Cisco UCS Manager allows provisioning of vMedia devices iso images for remote UCS servers. Using Scriptable vMedia, you can programmatically mount an IMG or an ISO image on a remote server. CIMC mounted vMedia provide communications between other mounted media inside your datacenter with no additional requirements media connection. Scriptable vMedia allows you to control virtual media devices without using a browser to manually map each UCS server individually.
Scriptable vMedia supports multiple share types including NFS, CIFS, HTTP, and HTTPS shares. Scriptable vMedia is enabled through BIOS configuration and configured through a Web GUI and CLI interface.
Cisco UCS Manager Scriptable vMedia supports the following functionality:
-
Booting from a specific vMedia device
-
Copying files from a mounted share to a local disk
-
Installation and updating OS drivers
![]() Note | Cisco UCS Manager support for Scriptable vMedia is applicable for CIMC mapped devices only. Existing KVM based vMedia devices are not supported. |
vMedia mount fails when the following conditions are met:
-
The remote vMedia image filename in the vMedia policy is set to Service-Profile-Name.
-
The service profile is renamed.
This is because the change in the name of the service profile does not change the remote vMedia image filename in the vMedia policy. The image filename still points to the older image on the remote device, which cannot be found.
Creating a vMedia Policy
A vMedia policy is used to configure the mapping information for remote vMedia devices. Two vMedia devices and mappings for CD and HDD are allowed in a vMedia policy. You can configure one ISO and one IMG at a time. ISO configurations maps to a CD drive and IMG configurations maps to a HDD device.
![]() Note | If you want to map a device to a remote folder, you must create an IMG and map it as a HDD device. |
| Step 1 | In the Navigation pane, click the Servers tab. | ||||||||||||||||||||||||||
| Step 2 | On the Servers tab, expand . | ||||||||||||||||||||||||||
| Step 3 | Expand the
node for the organization where you want to create the policy.
If the system does not include multitenancy, expand the root node. | ||||||||||||||||||||||||||
| Step 4 | Right-click vMedia Policies and select Create vMedia Policy. | ||||||||||||||||||||||||||
| Step 5 | In the
Create
vMedia Policy dialog box, complete the following fields:
| ||||||||||||||||||||||||||
| Step 6 | On the icon bar to the right of the table, click +. | ||||||||||||||||||||||||||
| Step 7 | In the
Create
vMedia Mount
dialog box, complete the following fields:
| ||||||||||||||||||||||||||
| Step 8 | Click OK. The remote server details are listed in the vMedia Mounts area of the Create vMedia Mount dialog box. |
What to Do Next
Create a vMedia boot policy.
Adding a vMedia Policy to a Service Profile
Before you can use Scriptable vMedia, you must add the vMedia and Boot Policies to a Service Profile. After the vMedia and Boot Policies are added to a service profile you can associate the service profile with a Cisco UCS server. The following procedure describes how to add a vMedia policy to a Service Profile.
| Step 1 | In the Navigation pane, click the Servers tab. | ||||||||||
| Step 2 | On the Servers tab, expand . | ||||||||||
| Step 3 | Expand the
node for the organization where you want to create the service profile.
If the system does not include multitenancy, expand the root node. | ||||||||||
| Step 4 | Right-click the organization and select Create Service Profile (expert). The Unified Computing System Manager pane displays. | ||||||||||
| Step 5 | In the
Name field, enter a unique name that you can use
to identify the service profile.
This name can be between 2 and 32 alphanumeric characters. You cannot use spaces or any special characters other than - (hyphen), _ (underscore), : (colon), and . (period), and this name must be unique across all service profiles and service profile templates within the same organization. This name must be unique within the organization or sub-organization in which you are creating the service profile. | ||||||||||
| Step 6 | From the
UUID Assignment drop-down list, do one of the following:
| ||||||||||
| Step 7 | (Optional)If you selected the XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX option, do the following: | ||||||||||
| Step 8 | (Optional)If you want to
create a new UUID Suffix pool to use to use in this service profile, click
Create
UUID Suffix Pool and complete the fields in the
Create
UUID Suffix Pool wizard.
For more information, see Creating a UUID Suffix Pool. | ||||||||||
| Step 9 | (Optional)In the text
box, enter a description of this service profile.
The user-defined description for this service profile. Enter up to 256 characters. You can use any characters or spaces except ` (accent mark), \ (backslash), ^ (carat), " (double quote), = (equal sign), > (greater than), < (less than), or ' (single quote). | ||||||||||
| Step 10 | Click Next. | ||||||||||
| Step 11 | From the
vMedia drop
down list, choose one of the following:
| ||||||||||
| Step 12 | If you created a new vmedia policy accessible to all service profiles and template, choose that policy from the vMedia drop down list . | ||||||||||
| Step 13 | Click Next. |
Viewing CIMC vMedia Policy
vMedia Policies are configured.
| Step 1 | In the Navigation pane, click the Servers tab. |
| Step 2 | On the Servers tab, expand . |
| Step 3 | Expand the vMedia Policies node to view the list of vMedia Policies. |
| Step 4 | Double-click the name of a vMedia policy to view the properties for the selected vMedia Mount. On the Properties page, you can modify the properties used for the vMedia Mounts. |
Feedback