Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-22894-01
Page 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at http://cisco.com/
go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco
and any other company. (1005R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown
for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Describes how to configure the boot device order, how to control power to the
server, and how to reset the server.
Page 8
Conventions
Preface
DescriptionTitle
Viewing Server Properties
Viewing Server Sensors
Managing Remote
Presence
Managing User Accounts
Configuring
Network-Related Settings
Configuring
Communication Services
Event Filters
Management
Describes how to view the CPU, memory, power supply, and storage properties
of the server.
Describes how to view the power supply, fan, temperature, current, and voltage
sensors.
Describes how to configure and manage the virtual KVM, virtual media, and
the serial over LAN connection.
Describes how to add, delete, and authenticate users, and how to manage user
sessions.
Describes how to configure network interfaces, network settings, and network
security.
Describes how to configure server management communication by HTTP, SSH,
and IPMI.
Describes how to generate, upload, and manage server certificates.Managing Certificates
Describes how to configure and manage platform event filters and SNMP settings.Configuring Platform
Describes how to obtain, install, and activate firmware images.CIMC Firmware
Conventions
This document uses the following conventions:
Server Utilities
bold font
italic font
Describes how to view, export, and clear log messages.Viewing Logs
Describes how to export support data, how to reset the server configuration to
factory defaults, how to back up the configuration, and how to reboot the
management interface.
IndicationConvention
Commands, keywords, GUI elements, and user-entered text
appear in bold font.
Document titles, new or emphasized terms, and arguments for
which you supply values are in italic font.
To provide technical feedback on this document, or to report an error or omission, please send your comments
to ucs-docfeedback@cisco.com. We appreciate your feedback.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information,
see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco
technical documentation, at:
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
• Overview of the Cisco UCS C-Series Rack-Mount Servers, page 1
• Overview of the Server Software, page 2
• Cisco Integrated Management Controller, page 2
• Overview of the CIMC User Interface, page 3
Overview of the Cisco UCS C-Series Rack-Mount Servers
Following are the Cisco UCS C-Series rack-mount servers:
• Cisco UCS C200 Rack-Mount Server
• Cisco UCS C210 Rack-Mount Server
• Cisco UCS C250 Rack-Mount Server
• Cisco UCS C460 Rack-Mount Server
Note
OL-22894-011
To determine which Cisco UCS C-Series rack-mount servers are supported by this firmware release, see
the Release Notes for Cisco Integrated Management Controller.
UCS C200 Rack-Mount Server
The Cisco UCS C200 server is a high-density, two-socket, 1 RU rack-mount server. This server is built for
production-level network infrastructure, web services, and mainstream data centers, and branch and
remote-office applications.
UCS C210 Rack-Mount Server
The Cisco UCS C210 server is a general-purpose, two-socket, 2 RU rack-mount server. It is designed to
balance performance, density, and efficiency for storage-intensive workloads. This server is built for applications
such as network file and appliances, storage, database, and content-delivery.
The Cisco UCS C250 server is a high-performance, memory-intensive, two-socket, 2 RU rack-mount server.
It is designed to increase performance, and it has the capacity for demanding virtualization and large-data-set
workloads. The C250 server can also reduce the cost of smaller memory footprints.
UCS C460 Rack-Mount Server
The UCS C460 server is a high-density, 4U rack-mount server. Supporting one to four multi-core processors,
it is built for heavy workload applications like data warehousing, ERP, and large-scale virtualization.
Overview of the Server Software
The Cisco UCS C-Series Rack-Mount Server ships with two major software systems installed.
CIMC Firmware
Cisco Integrated Management Controller (CIMC) is a separate management module built into the motherboard.
A dedicated ARM-based processor, separate from the main server CPU, runs the CIMC firmware. The system
ships with a running version of the CIMC firmware. You can update the CIMC firmware, but no initial
installation is needed.
Overview
Server OS
The main server CPU runs an OS such as Windows or Linux. The server ships with a pre-installed OS, but
you can install a different OS using the DVD drive or over the network. You can use CIMC to install the new
OS using the KVM console and vMedia.
Use product-specific installation documentation when installing an OS.Note
Cisco Integrated Management Controller
The Cisco Integrated Management Controller (CIMC) is the management service for the C-Series servers.
CIMC runs within the server.
Management Interfaces
You can use a web-based GUI or SSH-based CLI to access, configure, administer, and monitor the server.
Almost all tasks can be performed in either interface, and the results of tasks performed in one interface are
displayed in another. However, you cannot do the following:
• Use CIMC GUI to invoke CIMC CLI
• View a command that has been invoked through CIMC CLI in CIMC GUI
• Generate CIMC CLI output from CIMC GUI
Tasks You Can Perform in CIMC
You can use CIMC to perform the following server management tasks:
• Power on, power off, power cycle, reset and shut down the server
• Toggle the locator LED
• Configure the server boot order
• View server properties and sensors
• Manage remote presence
• Create and manage local user accounts, and enable remote user authentication through Active Directory
• Configure network-related settings, including NIC properties, IPv4, VLANs, and network security
• Configure communication services, including HTTP, SSH, and IPMI Over LAN
• Manage certificates
• Configure platform event filters
• Update CIMC firmware
• Monitor faults, alarms, and server status
No Operating System or Application Provisioning or Management
CIMC provisions servers, and as a result, exists below the operating system on a server. Therefore, you cannot
use it to provision or manage operating systems or applications on servers. For example, you cannot do the
following:
• Deploy an OS, such as Windows or Linux
• Deploy patches for software, such as an OS or an application
• Install base software components, such as anti-virus software, monitoring agents, or backup clients
• Install software applications, such as databases, application server software, or web servers
• Perform operator actions, including restarting an Oracle database, restarting printer queues, or handling
non-CIMC user accounts
• Configure or manage external storage on the SAN or NAS storage
Overview of the CIMC User Interface
The CIMC user interface is a web-based management interface for Cisco C-Series servers. You can launch
the CIMC user interface and manage the server from any remote host that meets the following minimum
requirements:
In case you lose or forget the password that you use to log into CIMC, see the Cisco UCS C-Series server
installation and service guide for your platform for password recovery instructions.
CIMC Home Page
Figure 1 shows the CIMC home page.
Figure 1: CIMC Home Page
Navigation Pane
The Navigation pane displays on the left side in the CIMC user interface. Clicking links on the Server or
Admin tabs in the Navigation pane displays the selected pages in the Work pane on the right side of the
CIMC user interface.
The following table describes the elements in the Navigation pane:
The Overall Server Status area is found above the
Server and Admin tabs. Click this area to refresh the
Server Summary page.
The Server tab is found in the Navigation pane. It
contains links to the following pages:
• Summary
• Inventory
Page 15
Overview
Work Pane
• Sensors
• System Event Log
• Remote Presence
• BIOS
Work Pane
Admin tab
The Admin tab is found in the Navigation pane. It
contains links to the following pages:
• Users Management
• Network
• Communication Services
• Certificate Management
• CIMC Log
• Event Management
• Firmware Management
• Utilities
The Work pane displays on the right side of the UI. Different pages appear in the Work pane, depending on
what link you click on the Server or Admin tab.
The following table describes the elements and pages in the Work pane.
DescriptionPage or Element Name
Summary
On the page, you view server properties, server status, and CIMC
information. You also perform actions like powering the server on and
off.
There are four tabs on the page:Inventory
• CPUs—Use this tab to view information about the CPU.
• Memory—Use this tab to view information about memory.
• Power Supplies—Use this tab to view information about power
supplies.
• Storage—Use this tab to view information about storage.
There are six tabs on the page:Sensors
• Power Supply—Use this tab to view the power supply sensor.
• Current Certificate—Use this area to view the current certificate
for the server.
On this page, you view the CIMC Log.CIMC Log
There are two tabs on the page:Event Management
• Platform Event Filters—Use this tab to set up platform event
filters.
• Trap Settings—Use this tab to set up SNMP traps.
There are four areas on this page:Firmware Management
• Actions—Use this area to install CIMC firmware from a client
browser or TFTP server, or to activate installed CIMC firmware.
• CIMC Firmware—Use this area to view the status of the running,
backup, and boot-loader versions of the firmware.
Toolbar
• Last Firmware Install—Use this area to view information about
the last firmware update.
There are three areas on this page:Utilities
• Actions—Use this area to export technical support data, export or
import the CIMC configuration, reset the CIMC to factory default,
and reboot the CIMC.
• Last Technical Support Data Export—Use this area to view
information about the last technical support data export.
• CIMC Configuration Import/Export—Use this area to view the
action type and its status.
Cisco Integrated Management Controller Online Help Overview
Launches server information.Info
Cisco Integrated Management Controller Online Help Overview
The Cisco Integrated Management Controller is divided into two main sections, a Navigation pane on the
left and a Work pane on the right.
This help system describes the fields on each GUI page and in each dialog box.
To access the page help, do the following:
• In a particular tab in the GUI, click the Help icon in the toolbar above the Work pane.
• In a dialog box, click the Help button in that dialog box.
Logging Into CIMC
Note
For a complete list of the available C-Series documentation, see the Cisco UCS C-Series Servers
Documentation Roadmap at http://www.cisco.com/go/unifiedcomputing/c-series-doc.
Logging Into CIMC
Before You Begin
If not installed, install Adobe Flash Player 10 or higher on your local machine.
Procedure
Step 1
Step 2
Step 3
Step 4
In your web browser, type or select the web link for CIMC.
If a security dialog box displays, do the following:
a) (Optional) Check the check box to accept all content from Cisco.
b) Click Yes to accept the certificate and continue.
In the log in window, enter your username and password.
C-Series servers support several operating systems. Regardless of the OS being installed, you can install it
on your server using one of the following tools:
• KVM console
• PXE installation server
CHAPTER 2
KVM Console
The KVM console is an interface accessible from CIMC that emulates a direct keyboard, video, and mouse
(KVM) connection to the server. The KVM console allows you to connect to the server from a remote location.
Instead of using CD/DVD or floppy drives physically connected to the server, the KVM console uses virtual
media, which are actual disk drives or disk image files that are mapped to virtual CD/DVD or floppy drives.
You can map any of the following to a virtual drive:
• CD/DVD or floppy drive on your computer
• Disk image files (ISO or IMG files) on your computer
• USB flash drive on your computer
• CD/DVD or floppy drive on the network
• Disk image files (ISO or IMG files) on the network
You can use the KVM console to install an OS on the server.
Installing an OS Using the KVM Console
Before You Begin
• Locate the OS installation disk or disk image file.
• You must log in as a user with admin privileges to install an OS.
Procedure
Installing an OS Using the KVM Console
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Step 9
Load the OS installation disk into your CD/DVD drive, or copy the disk image files to your computer.
If CIMC is not open, log in.
In the Navigation pane, click the Server tab.
On the Server tab, click Remote Presence.
In the Remote Presence pane, click the Virtual KVM tab.
In the Actions area, click Launch KVM Console.
The KVM Console opens in a separate window.
From the KVM console, choose Tools ➤ Launch Virtual Media to open the Virtual Media Session dialog
box.
In the Virtual Media Session dialog box, map the virtual media using either of the following methods:
• Check the Mapped check box for the CD/DVD drive containing the OS installation disk.
• Click Add Image, navigate to and select the OS installation disk image, click Open to mount the disk
image, and then check the Mapped check box for the mounted disk image.
Note
Reboot the server and select the virtual CD/DVD drive as the boot device.
When the server reboots, it begins the installation process from the virtual CD/DVD drive. Refer to the
installation guide for the OS being installed to guide you through the rest of the installation process.
You must keep the Virtual Media Session dialog box open during the OS installation process.
Closing the dialog box unmaps all virtual media.
What to Do Next
After the OS installation is complete, reset the virtual media boot order to its original setting.
PXE Installation Servers
A Preboot Execution Environment (PXE) installation server allows a client to boot and install an OS from a
remote location. To use this method, a PXE environment must be configured and available on your VLAN,
typically a dedicated provisioning VLAN. Additionally, the server must be set to boot from the network.
When the server boots, it sends a PXE request across the network. The PXE installation server acknowledges
the request, and starts a sequence of events that installs the OS on the server.
PXE servers can use installation disks, disk images, or scripts to install an OS. Proprietary disk images can
also be used to install an OS, additional components, or applications.
PXE Installation Servers
Note
PXE installation is an efficient method for installing an OS on a large number of servers. However,
considering that this method requires setting up a PXE environment, it might be easier to use another
installation methods.
Installing an OS Using a PXE Installation Server
Before You Begin
• Verify that the server can be reached over a VLAN.
• You must log in as a user with admin privileges to install an OS.
Procedure
Step 1
Step 2
Set the boot order to PXE first.
Reboot the server.
If a PXE install server is available on the VLAN, the installation process begins when the server reboots. PXE
installations are typically automated and require no additional user input. Refer to the installation guide for
the OS being installed to guide you through the rest of the installation process.
What to Do Next
After the OS installation is complete, reset the LAN boot order to its original setting.
If the server was powered off by any means other than through CIMC, it will not become active immediately
when powered on. The server will remain in standby mode until CIMC completes initialization.
Before You Begin
You must log in with user or admin privileges to perform this task.
Procedure
In the Navigation pane, click the Server tab.
On the Server tab, click Summary.
In the Actions area, click Power On Server.
A dialog box with the message Power on the server? appears.
Click OK.
Powering Off the Server
Before You Begin
You must log in with user or admin privileges to perform this task.
Procedure
Step 1
Step 2
Step 3
Step 4
In the Navigation pane, click the Server tab.
On the Server tab, click Summary.
In the Actions area, click Power Off Server.
A dialog box with the message Power Off the Server? appears.
Click OK.
Power Cycling the Server
Before You Begin
You must log in with user or admin privileges to perform this task.
Serial over LAN enables the input and output of the serial port of a managed system to be redirected over IP.
Configure and use serial over LAN on your server when you want to reach the host console with CIMC.
Before You Begin
CHAPTER 6
You must log in as a user with admin privileges to configure serial over LAN.
Procedure
Step 1
Step 2
Step 3
Step 4
Step 5
OL-22894-0131
In the Navigation pane, click the Server tab.
On the Server tab, click Remote Presence.
In the Remote Presence pane, click the Serial over LAN tab.
In the Serial over LAN Properties area, update the following properties:
DescriptionName
If checked, Serial over LAN is enabled on this server.Enabled check box
The baud rate the system uses for Serial over LAN communication.Baud Rate field
You must log in as a user with admin privileges to configure virtual media.
Procedure
Managing Remote Presence
Step 1
Step 2
Step 3
Step 4
Step 5
In the Navigation pane, click the Server tab.
On the Server tab, click Remote Presence.
In the Remote Presence pane, click the Virtual Media tab.
In the Virtual Media Properties area, update the following properties:
Encryption check box
Click Save Changes.
KVM Console
The KVM console is an interface accessible from CIMC that emulates a direct keyboard, video, and mouse
(KVM) connection to the server. The KVM console allows you to connect to the server from a remote location.
Instead of using CD/DVD or floppy drives physically connected to the server, the KVM console uses virtual
media, which are actual disk drives or disk image files that are mapped to virtual CD/DVD or floppy drives.
You can map any of the following to a virtual drive:
DescriptionName
If checked, virtual media is enabled.Enabled check box
Note
The number of virtual media sessions currently running.Active Sessions field
If checked, all virtual media communications are encrypted.Enable Virtual Media
If you clear this check box, all virtual media devices are
automatically detached from the host.
• CD/DVD or floppy drive on your computer
• Disk image files (ISO or IMG files) on your computer
• USB flash drive on your computer
• CD/DVD or floppy drive on the network
• Disk image files (ISO or IMG files) on the network
• USB flash drive on the network
You can use the KVM console to install an OS on the server.
You must log in as a user with admin privileges to configure the virtual KVM.
Procedure
Configuring the Virtual KVM
Step 1
Step 2
Step 3
Step 4
In the Navigation pane, click the Server tab.
On the Server tab, click Remote Presence.
In the Remote Presence pane, click the Virtual KVM tab.
On the Virtual KVM tab, complete the following fields:
DescriptionName
If checked, the virtual KVM is enabled.Enabled check box
The virtual media viewer is accessed through the KVM. If you
disable the KVM console, CIMC also disables access to all
virtual media devices attached to the host.
Enable Video Encryption check
box
Enable Local Server Video check
box
Note
The maximum number of concurrent KVM sessions allowed.Max Sessions field
Enter an integer between 1 and 4.
The number of KVM sessions running on the server.Active Sessions field
The port used for KVM communication.Remote Port field
If checked, the server encrypts all video information sent through the
KVM.
If checked, the KVM session is also displayed on any monitor attached
to the server.
Step 5
Click Save Changes.
Disabling the Virtual KVM
Before You Begin
You must log in as a user with admin privileges to disable the virtual KVM.
Active Directory is a technology that provides a variety of network services including LDAP-like directory
services, Kerberos-based authentication, and DNS-based naming. The CIMC utilizes the Kerberos-based
authentication service of Active Directory.
When Active Directory is enabled in the CIMC, all user authentication and role authorization is performed
by Active Directory, and the CIMC ignores the local database. If the CIMC cannot connect to Active Directory,
it reverts to the local database.
you can require the server to encrypt data sent to Active Directory.
CHAPTER 7
Configuring Active Directory in CIMC
Before You Begin
You must log in as a user with admin privileges to configure active directory.
Procedure
Step 1
Step 2
Step 3
Step 4
OL-22894-0135
In the Navigation pane, click the Admin tab.
On the Admin tab, click User Management.
In the User Management pane, click the Active Directory tab.
In the Active Directory Properties area, update the following properties:
If checked, user authentication and role authorization is performed by
Active Directory for user accounts not found in the local user database.
The Active Directory server IP address.Server IP Address field
The number of seconds the CIMC waits until it assumes the connection
to Active Directory cannot be established.
If checked, the server encrypts all information it sends to Active
Directory.
The domain that all users must be in.Domain field
An LDAP attribute that contains the role and locale information for the
user. This property is always a name-value pair. The system queries the
user record for the value that matches this attribute name.
The LDAP attribute must have the following attribute ID:
1.3.6.1.4.1.9.287247.1
Note
If you do not specify this property, user access is restricted to
read-only.
Configuring the Active Directory Server
The CIMC can be configured to use Active Directory for user authentication and authorization. To use Active
Directory, configure users with an attribute that holds the user role and locale information for the CIMC. You
can use an existing LDAP attribute that is mapped to the CIMC user roles and locales or you can modify the
Active Directory schema to add a new custom attribute, such as the CiscoAVPair attribute, which has an
attribute ID of 1.3.6.1.4.1.9.287247.1. For more information about altering the Active Directory schema, see
the article at http://technet.microsoft.com/en-us/library/bb727064.aspx.
The following steps are to be performed on the Active Directory server.
Note
Step 1
Step 2
This example creates a custom attribute named CiscoAVPair, but you can also use an existing LDAP
attribute that is mapped to the CIMC user roles and locales.
Procedure
Ensure that the Active Directory schema snap-in is installed.
Using the Active Directory schema snap-in, add a new attribute with the following properties:
Add the CiscoAVPair attribute to the user class using the Active Directory snap-in:
a) Expand the Classes node in the left pane and type U to select the user class.
b) Click the Attributes tab and click Add.
c) Type C to select the CiscoAVPair attribute.
d) Click OK.
Add the following user role values to the CiscoAVPair attribute, for the users that you want to have access
to CIMC:
CiscoAVPair Attribute ValueRole
shell:roles="admin"admin
shell:roles="user"user
shell:roles="read-only"read-only
Note
For more information about adding values to attributes, see the article at http://technet.microsoft.com/
en-us/library/bb727064.aspx.
What to Do Next
Use the CIMC to configure Active Directory.
Configuring Local Users
Before You Begin
You must log in as a user with admin privileges to configure local users.
In the User Management pane, click the Sessions tab.
View the following information about current user sessions:
Click a column header to sort the table rows, according to the entries in that column.Tip
DescriptionName
The unique identifier for the session.Session ID column
The user name for the user.Username column
The IP address from which the user accessed the server.IP Address column
The method by which the user accessed the server.Type column
Action column
If your user account has admin privileges, this column displays
Terminate if you can force the associated user session to end. Otherwise
it displays N/A.
Note
You cannot terminate your current session from this
tab.
Two NIC modes are available for connection to the CIMC. In one mode, you can also choose an active-active
or active-standby redundancy mode, depending on your platform.
NIC Mode
• Dedicated—A connection to the CIMC is available through the management Ethernet port or ports.
• Shared LOM—A connection to the CIMC is available only through the LAN On Motherboard (LOM)
Ethernet host ports.
In shared LOM mode, all host ports must belong to the same subnet.Note
• Shipping (if supported)—A connection to the CIMC is available through the management Ethernet port
or ports using a limited factory default configuration.
Note
OL-22894-0141
Shipping mode is intended only for your initial connection to the CIMC. Configure
another mode for operation.
• Active-Active—All Ethernet ports operate simultaneously. This mode provides multiple paths to the
CIMC.
• Active-Standby—One port fails over to the other.
The available redundancy modes vary depending on the selected network mode and your platform. For the
available modes, see the Installation and Service Guide for your platform.
Configuring Server NICs
Configure a server NIC when you want to set the NIC mode and NIC redundancy.
Before You Begin
You must log in as a user with admin privileges to configure the NIC.
Configuring Server NICs
Step 1
Step 2
Step 3
Step 4
Procedure
In the Navigation pane, click the Admin tab.
On the Admin tab, click Network.
In the Network pane, click the Network Settings tab.
In the NIC Properties area, update the following properties:
DescriptionName
The NIC mode. This can be:NIC Mode drop-down list
• Dedicated—The management port is used to access the CIMC.
• Shared LOM—The LOM (LAN On Motherboard) ports are used
to access the CIMC.
• Shipping—The out-of-the-box defaults will be used for all options.
Note
This option is only available for some C-Series
servers.
NIC Redundancy drop-down list
The NIC redundancy options depend on the mode chosen in the NICMode drop-down list. If you do not see a particular option, then it is
not available for the selected mode.
The available options are:
• None—Each port associated with the configured NIC mode
operates independently. The ports do not failover if there is a
problem.
• active-active—If supported, all ports associated with the
configured NIC mode operate simultaneously. This increases
throughput and provides multiple paths to the CIMC.
• active-standby—If a port associated with the configured NIC
mode fails, traffic will failover to one of the other ports associated
with the NIC mode.
Note
If you select this option, make sure all ports associated
with the configured NIC mode are connected to the same
subnet to ensure that traffic is secure regardless of which
port is used.
The MAC address of the CIMC network interface selected in the NICMode field.
Step 5
MAC Address field
Click Save Changes.
Configuring Common Properties
Use common properties to describe your server.
Before You Begin
You must log in as a user with admin privileges to configure common properties.
Procedure
Step 1
Step 2
Step 3
Step 4
Step 5
In the Navigation pane, click the Admin tab.
On the Admin tab, click Network.
In the Network pane, click the Network Settings tab.
In the Hostname field, enter the name of the host.
Click Save Changes.
Configuring IPv4
Before You Begin
You must log in as a user with admin privileges to configure IPv4.
The priority of this system on the VLAN.Priority field
Step 5
Click Save Changes.
Network Security Configuration
Network Security
The CIMC uses IP blocking as network security. IP blocking prevents the connection between a server or
website and certain IP addresses or ranges of addresses. IP blocking effectively bans undesired connections
from those computers to a website, mail server, or other Internet servers.
IP banning is commonly used to protect against denial of service (DoS) attacks. CIMC bans IP addresses by
setting up an IP blocking fail count.
Configuring Network Security
Configure network security if you want to set up an IP blocking fail count.
Before You Begin
You must log in as a user with admin privileges to configure network security.
Procedure
Step 1
Step 2
Step 3
Step 4
OL-22894-0145
In the Navigation pane, click the Admin tab.
On the Admin tab, click Network.
In the Network pane, click the Network Security tab.
In the IP Blocking Properties area, update the following properties:
DescriptionName
Check this box to enable IP blocking.Enable IP Blocking check box
IPMI defines the protocols for interfacing with a service processor embedded in a server platform. This service
processor is called a Baseboard Management Controller (BMC), and resides on the server motherboard. The
BMC links to a main processor and other on-board elements using a simple serial bus.
During normal operations, IPMI lets a server operating system obtain information about system health and
control system hardware. For example, IPMI enables the monitoring of sensors, such as temperature, fan
speeds and voltages, for proactive problem detection. If server temperature rises above specified levels, the
server operating system can direct the BMC to increase fan speed or reduce processor speed to address the
problem.
Configuring IPMI over LAN
Configure IPMI over LAN when you want to manage the CIMC with IPMI messages.
Before You Begin
IPMI Over LAN
Step 1
Step 2
Step 3
You must log in as a user with admin privileges to configure IPMI over LAN.
Procedure
In the Navigation pane, click the Admin tab.
On the Admin tab, click Communication Services.
In the IPMI over LAN Properties area, update the following properties:
DescriptionName
Whether IPMI access is allowed on this server.Enabled check box
Privilege Level Limit drop-down
list
The user role that must be assigned to users accessing the system though
IPMI. This can be:
• read-only—This user can view information but cannot make any
changes.
• user—This user can:
◦ View all information
◦ Manage the power control options such as power on, power
cycle, and power off
◦ Launch the KVM console and virtual media
◦ Clear all logs
◦ Toggle the locator LED
• admin—This user can perform all actions available through the
GUI, CLI, and IPMI.
The IPMI encryption key to use for IPMI communications.Encryption Key field
The value of this field must match exactly the role assigned to
the user attempting to log in. For example, if this field is set to
read-only and a user with the admin role attempts to log in
through IPMI, that login attempt will fail.
• Generating a Certificate Signing Request, page 52
• Creating a Self-Signed Certificate, page 53
• Uploading a Server Certificate, page 54
Managing the Server Certificate
You can generate a certificate signing request (CSR) to obtain a new certificate, and you can upload the new
certificate to the CIMC to replace the current server certificate. The server certificate may be signed either
by a public Certificate Authority (CA), such as Verisign, or by your own certificate authority.
CHAPTER 10
Procedure
PurposeCommand or Action
Step 1
Step 2
Step 3
OL-22894-0151
Generate the CSR from the CIMC.
Submit the CSR file to a certificate authority that will
issue and sign your certificate. If your organization
generates its own self-signed certificates, you can use
the CSR file to generate a self-signed certificate.
The uploaded certificate must
be created from a CSR
generated by the CIMC. Do
not upload a certificate that
was not created by this
method.
Page 62
Generating a Certificate Signing Request
Generating a Certificate Signing Request
Before You Begin
You must log in as a user with admin privileges to configure certificates.
Procedure
Managing Certificates
Step 1
Step 2
Step 3
Step 4
In the Navigation pane, click the Admin tab.
On the Admin tab, click Certificate Management.
In the Actions area, click the Generate New Certificate Signing Request link.
The Generate New Certificate Signing Request dialog box appears.
In the Generate New Certificate Signing Request dialog box, update the following properties:
DescriptionName
The fully qualified hostname of the CIMC.Common Name field
The organization requesting the certificate.Organization Name field
The organizational unit.Organization Unit field
Locality field
State Name field
The city or town in which the company requesting the certificate is
headquartered.
The state or province in which the company requesting the certificate
is headquartered.
The country in which the company resides.Country Code drop-down list
The email contact at the company.Email field
Step 5
Step 6
Click Generate CSR.
The Opening csr.txt dialog box appears.
Perform any one of the following steps to manage the CSR file, csr.txt:
a) Click Open With to view csr.txt.
b) Click Save File and then click OK to save csr.txt to your local machine.
What to Do Next
Submit the CSR file to a certificate authority that will issue and sign your certificate. If your organization
generates its own self-signed certificates, you can use the CSR file to generate a self-signed certificate.
As an alternative to using a public Certificate Authority (CA) to generate and sign a server certificate, you
can operate your own CA and sign your own certificates. This section shows commands for creating a CA
and generating a server certificate using the OpenSSL certificate server running on Linux. For detailed
information about OpenSSL, see http://www.openssl.org.
These commands are to be entered on a Linux server with the OpenSSL package, not in the CIMC CLI.Note
Before You Begin
Obtain and install a certificate server software package on a server within your organization.
This command generates an RSA private key that will
be used by the CA.
Note
To allow the CA to access the key without user
input, do not use the -des3 option for this
command.
The specified file name contains an RSA key of the
specified key size.
This command generates a new self-signed certificate
for the CA using the specified key. The certificate is
valid for the specified period. The command prompts
the user for additional certificate information.
The certificate server is an active CA.
This command adds a line to the OpenSSL configuration
file to designate the certificate as a server-only
certificate. This designation is a defense against a
man-in-the-middle attack, in which an authorized client
attempts to impersonate the server.
The OpenSSL configuration file openssl.conf contains
the statement "nsCertType = server".
This command directs the CA to use your CSR file to
generate a server certificate.
Your server certificate is contained in the output file.
This example shows how to create a CA and to generate a server certificate signed by the new CA. These
commands are entered on a Linux server running OpenSSL.
# /usr/bin/openssl genrsa -out ca.key 1024
Generating RSA private key, 1024 bit long modulus
.............++++++
.....++++++
e is 65537 (0x10001)
# /usr/bin/openssl req -new -x509 -days 365 -key ca.key -out ca.crt
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a
DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
----Country Name (2 letter code) [GB]:US
State or Province Name (full name) [Berkshire]:California
Locality Name (eg, city) [Newbury]:San Jose
Organization Name (eg, company) [My Company Ltd]:Example Incorporated
Organizational Unit Name (eg, section) []:Unit A
Common Name (eg, your name or your server's hostname) []:example.com
Email Address []:admin@example.com
# echo "nsCertType = server" > openssl.conf
# /usr/bin/openssl x509 -req -days 365 -in csr.txt -CA ca.crt -set_serial 01 -CAkey ca.key -out server.crt
-extfile openssl.conf
Signature ok
subject=/C=US/ST=California/L=San Jose/O=Example Inc./OU=Unit
A/CN=example.com/emailAddress=john@example.com
Getting CA Private Key
#
Managing Certificates
PurposeCommand or Action
-CAkey ca.key -out myserver05.crt
-extfile openssl.conf
What to Do Next
Upload the new certificate to the CIMC.
Uploading a Server Certificate
Before You Begin
You must log in as a user with admin privileges to upload a certificate.
The certificate file to be uploaded must reside on a locally-accessible file system.
You must first generate a CSR using the CIMC Certificate Management menu, and you must use that
CSR to obtain the certificate for uploading. Do not upload a certificate that was not obtained by this
method.
Procedure
In the Navigation pane, click the Admin tab.
On the Admin tab, click Certificate Management.
In the Actions area, click Upload Server Certificate.
The Upload Certificate dialog box appears.
In the Upload Certificate dialog box, update the following properties:
DescriptionName
The certificate file you want to upload.File field
Browse button
Opens a dialog box that allows you to navigate to the appropriate
certificate file.
A platform event filter (PEF) can trigger an action and generate an alert when a critical hardware-related event
occurs. For each PEF, you can choose the action to be taken (or take no action) when a platform event occurs.
You can also choose to generate and send an alert when a platform event occurs. Alerts are sent as an SNMP
trap, so you must configure an SNMP trap destination before the alerts can be sent.
You can globally enable or disable the generation of platform event alerts. When disabled, alerts are not sent
even if PEFs are configured to send them.
CHAPTER 11
Enabling Platform Event Alerts
Before You Begin
You must log in as a user with admin privileges to enable platform event alerts.
• Installing CIMC Firmware from the TFTP Server, page 63
• Installing CIMC Firmware Through the Browser, page 64
• Activating Installed Firmware, page 64
Overview of Firmware
C-Series servers use firmware downloaded from cisco.com. This firmware is certified by Cisco to upgrade
firmware on a C-Series server.
The firmware you downloads is packaged in a .zip file. After you have downloaded a firmware .zip from
Cisco, you can use it to update the firmware on your server. Cisco also provides release notes with each image,
which you can obtain from the same website from which you obtained the image.
CHAPTER 12
Do not use the .zip file to reimage your server.Warning
You use a .bin file to reimage. You must extract the proper .bin upgrade file from this .zip file. You can extract
this .bin to a TFTP server or your local machine.
Note
OL-22894-0161
When you update the firmware, you can either upgrade an older firmware version to a newer one, or
downgrade a newer firmware version to an older one.
The CIMC separates the firmware update process into stages to ensure that you can install the firmware to a
component while the server is running without affecting its uptime. Because you do not need to reboot the
server until after you activate, you can perform that task overnight or during other maintenance periods. When
you update firmware, the following stages occur:
During this stage, the CIMC transfers the selected firmware version to the server. The install process always
overwrites the firmware in the non-active slot on the server. You can install the firmware using either of the
following methods:
• Through a browser client—this method allows you to browse for a firmware image on your computer
and install it on the server.
• From a TFTP server—this method allows you to install a firmware image residing on a TFTP server.
Activate
During this stage, the CIMC sets the non-active firmware version as active and reboots the server. When the
server reboots, the non-active slot becomes the active slot, and the active slot becomes the non-active slot.
The firmware in the new active slot becomes the running version.
Obtaining CIMC Firmware from Cisco
CIMC Firmware Management
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Step 9
Step 10
Step 11
Procedure
Navigate to cisco.com.
Click Support on the top toolbar, and then select Software Download from the drop-down menu.
Click the Unified Computing link in the lower left corner, and then log in.
Expand the Cisco C-Series Rack-Mount Servers node to display links to each model of the Cisco C-Series
Rack-Mount Servers.
Click the appropriate link for your server model.
Click the Unified Computing System (UCS) Integrated Management Controller Firmware link, and then
click the appropriate release version link.
Click Download Now.
The Download Cart dialog box appears.
Review the information in the Download Cart dialog box, and then click Proceed with Download.
The Software Download Rules page appears.
Review the download rules, and click Agree.
A dialog box listing your download appears. The Select Location dialog box also appears. This dialog box
has the focus.
Select a location in the Select Location dialog box, and then click Open.
The download begins.
Click Close when the download is finished.
The file that you downloaded is a .zip file.
Warning
You use a .bin file to reimage. You must extract the proper .bin upgrade file from this .zip file. You can extract
this .bin to an TFTP server or your local machine.
The name of the proper .bin you extract file depends on the model server you are reimaging. Following are
examples of 1.0.2 firmware update files:
• C200 and C210—upd-pkg-c200-m1-cimc.full.1.0.2.bin
• C250—upd-pkg-c250-m1-cimc.full.1.0.2.bin
What to Do Next
Install the CIMC firmware on the server.
Installing CIMC Firmware from the TFTP Server
Before You Begin
• You must log in as a user with admin privileges to install CIMC firmware through the browser.
Step 1
Step 2
Step 3
Step 4
Step 5
• Obtain the CIMC .zip firmware file from Cisco.
• Unzip the proper .bin upgrade file on your TFTP server.
Procedure
In the Navigation pane, click the Admin tab.
On the Admin tab, click Firmware Management.
In the Actions area, click Install CIMC Firmware from TFTP Server.
In the Install Firmware dialog box, complete the following fields:
DescriptionName
The IP address of the TFTP server on which the firmware image resides.TFTP Server IP Address field
Image Path and Filename field
Click Install Firmware.
The firmware image file name on the server. When you enter this name,
include the relative path for the image file from the top of the TFTP
tree to the file location.
In the Actions area, click Activate CIMC Firmware.
The Activate Firmware dialog box appears.
In the Activate Firmware dialog box, choose the firmware image to activate.
Click Activate Firmware.
Page 75
Viewing Logs
This chapter includes the following sections:
• CIMC Log, page 65
• System Event Log, page 67
CIMC Log
Viewing the CIMC Log
Procedure
CHAPTER 13
Step 1
Step 2
Step 3
Step 4
Step 5
In the Navigation pane, click the Admin tab.
On the Admin tab, click CIMC Log.
Review the following information for each CIMC event in the log.
DescriptionName
The date and time the event occurred.Timestamp column
The software module that logged the event.Source column
A description of the event.Description column
From the Entries Per Page drop-down list , select the number of CIMC events to display on each page.
Click <Newer and Older> to move backward and forward through the pages of CIMC events, or click
<<Newest to move to the top of the list.
By default, the newest CIMC events are displayed at the top if the list.
The IP address of the Syslog server on which the CIMC log should be
stored.
Page 77
Viewing the System Event Log
System Event Log
Viewing the System Event Log
Procedure
System Event Log
Step 1
Step 2
Step 3
Step 4
Step 5
In the Navigation pane, click the Server tab.
On the Server tab, click System Event Log.
Review the following information for each system event in the log:
DescriptionName
The date and time the event occurred.Timestamp column
The event severity. This can be:Severity column
• Unknown
• Informational
• Normal
• Warning
• Critical
• Non-Recoverable
A description of the event.Description column
From the Entries Per Page drop-down list, select the number of system events to display on each page.
Click <Newer and Older> to move backward and forward through the pages of system events, or click
<<Newest to move to the top of the list.
By default, the newest system events are displayed at the top if the list.
Clearing the System Event Log
Before You Begin
You must log in as a user with user privileges to clear the system event log.
• Backing Up and Importing the CIMC Configuration, page 71
Exporting Technical Support Data
Perform this task when requested by the Cisco Technical Assistance Center (TAC). This utility creates a
summary report containing configuration information, logs and diagnostic data that will help TAC in
troubleshooting and resolving a technical issue.
CHAPTER 14
Procedure
Step 1
Step 2
Step 3
Step 4
Step 5
OL-22894-0169
In the Navigation pane, click the Admin tab.
On the Admin tab, click Utilities.
In the Actions area of the Utilities pane, click Export Technical Support Data.
In the Export Technical Support Data dialog box, complete the following fields:
The IP address of the TFTP server on which the support data file should
be stored.
The name of the file in which the support data should be stored on the
server. When you enter this name, include the relative path for the file
from the top of the TFTP tree to the desired location.
Page 80
Rebooting CIMC
What to Do Next
Provide the generated report file to Cisco TAC.
Rebooting CIMC
On rare occasions, such as an issue with the current running firmware, troubleshooting a server may require
you to reboot the CIMC. This procedure is not part of the normal maintenance of a server. After you reboot
the CIMC, you are logged off and the CIMC will be unavailable for a few minutes.
Server Utilities
Note
If you reboot the CIMC while the server is performing power-on self test (POST) or is operating in the
Extensible Firmware Interface (EFI) shell, the server will be powered down until the CIMC reboot is
complete.
Before You Begin
You must log in as a user with admin privileges to reboot the CIMC.
Procedure
Step 1
Step 2
Step 3
Step 4
In the Navigation pane, click the Admin tab.
On the Admin tab, click Utilities.
In the Actions area of the Utilities pane, click Reboot CIMC.
Click OK.
Recovering from a Corrupted BIOS
Before You Begin
• You must be logged in as admin to recover corrupt BIOS.
• Have the BIOS recovery ISO image ready. You will find the BIOS recovery ISO image under the
Recovery folder of the firmware distribution package.
• Schedule some down time for the server because it will be powered cycled at the end of the recovery
procedure.
In the Actions area, click Recover Corrupt BIOS.
The Recover Corrupt BIOS wizard appears.
Use the Recover Corrupt BIOS wizard to recover your corrupt BIOS.
Resetting CIMC to Factory Defaults
On rare occasions, such as an issue with the current running firmware, troubleshooting a server may require
you to reset the CIMC to the factory default. When this happens, all user-configurable settings are reset.
This procedure is not part of the normal server maintenance. After you reset the CIMC, you are logged off
and must log in again. You may also lose connectivity and may need to reconfigure the network settings.
Before You Begin
You must log in as a user with admin privileges to reset the CIMC to factory defaults.
Procedure
Step 1
Step 2
Step 3
Step 4
In the Navigation pane, click the Admin tab.
On the Admin tab, click Utilities.
In the Actions area of the Utilities pane, click Reset CIMC to Factory Default Configuration.
Click OK.
A reboot of CIMC while the host is performing BIOS POST (Power on Self Test) or is in EFI shell will turn
off the host for a short amount of time. CIMC will power on when it is ready.
Backing Up and Importing the CIMC Configuration
Backing Up and Importing the CIMC Configuration
When you perform a backup of the CIMC configuration, you take a snapshot of the system configuration and
export the resulting CIMC configuration file to a location on your network. The backup operation saves
information from the management plane only; it does not back up data on the servers. Sensitive configuration
information such as user accounts and the server certificate are not exported.
You can restore a backup CIMC configuration file to the same system or you can import it to another CIMC
system, provided that the software version of the importing system is the same as or is configuration-compatible
with the software version of the exporting system. When you import a configuration file to another system
as a configuration template, you must modify system-specific settings such as IP addresses and host names.
An import operation modifies information on the management plane only.
The CIMC configuration file is an XML text file whose structure and elements correspond to the CIMC
command modes.
When performing a backup or import operation, consider these guidelines:
• You can perform a backup or an import while the system is up and running. While a backup operation
has no impact on the server or network traffic, some modifications caused by an import operation, such
as IP address changes, can disrupt traffic or cause a server reboot.
• You cannot execute a backup and an import simultaneously.
Backing Up the CIMC Configuration
For security reasons, this operation does not export user accounts or the server certificate.Note
Before You Begin
Obtain the backup TFTP server IP address.
Backing Up the CIMC Configuration
Step 1
Step 2
Step 3
Step 4
Step 5
Procedure
In the Navigation pane, click the Admin tab.
On the Admin tab, click Utilities.
In the Actions area of the Utilities pane, click Export CIMC Configuration.
In the Export CIMC Configuration dialog box, complete the following fields:
DescriptionName
Export to a local file field
TFTP Server IP Address field
Path and Filename field
Click Export.
Select this option and click Export to save the XML configuration file
to a drive that is local to the computer running the CIMC GUI.
Select this option to save the XML configuration file to a TFTP server.Export to TFTP server field
The IP address of the TFTP server to which the configuration file will
be exported.
The path and filename CIMC should use when exporting the file to the
TFTP server.
CIMC configuration 73
IP blocking 45
IPMI over LAN 49
IPMI over LAN properties 49
IPv4 properties 43
K
KVM
configuring 33
disabling 33
enabling 33, 34
KVM console 11, 32
L
led sensors 26
local users 37
locator LED 17
logging in 8
logging out 8
P
platform event filters
about 57
configuring 58
platform events
disabling alerts 58
enabling alerts 57
power cycling the server 19
power supply properties 22
power supply sensors 27
powering off the server 19
powering on the server 19
PXE installation 12
R
recovering from a corrupted bios 70
remote presence
serial over LAN 31
virtual KVM 33, 34
virtual media 32
resetting the server 20
S
M
memory properties 22
N
navigation pane 4
network properties
common properties 43
IPv4 properties 43
NIC properties 42
VLAN properties 44
network security 45
NIC properties 42
O
operating system installation 12
OS installation 11, 12, 13
KVM console 12
PXE 13
self-signed certificate 53
sensors
current 25
fan 27
led 26
power supply 27
temperature 29
voltage 30
serial over LAN 31
server health 15
server management
configuring the boot order 17
locator LED 17
power cycling the server 19
powering off the server 19
powering on the server 19
resetting the server 20
server health 15
shutting down the server 20
server NICs 41
server overview 1
server software 2
shutting down the server 20
SNMP traps 59
SSH properties 48