Ucs X Series Quick Start Guide
Ucs X Series Quick Start Guide
Cisco public
This guide is intended primarily for data center administrators with responsibilities and expertise in one or more
of the following:
● Server administration
● Storage administration
● Network administration
● Network security
The specifications and information regarding the products in this guide are subject to change without notice. all
statements, information, and recommendations in this manual are believed to be accurate but are presented
The software license and limited warranty for the accompanying product are set forth in the information packet
that shipped with the product and are incorporated herein by this reference. if you are unable to locate the
software license or limited warranty, contact your cisco representative for a copy.
Figure 1.
54-port Fabric Interconnect (1RU) model 6454
https://www.cisco.com/c/dam/en/us/products/collateral/servers-unified-computing/ucs-b-series-blade-
servers/6400-specsheet.pdf.
https://www.cisco.com/c/dam/en/us/products/collateral/servers-unified-computing/ucs-x-series-modular-
system/cisco-ucs-6536-fabric-interconnect-spec-sheet.pdf.
Figure 3.
Compute chassis and blades (7U) model X9508
Please refer to the “Cisco UCS 6400 Series Fabric Interconnect Hardware Installation Guide” for detailed
information related to the installation of 6400 series Fabric Interconnects.
Cisco UCS 6500 Series Fabric Interconnect requirements
Please refer to the “Cisco UCS 6500 Series Fabric Interconnect Hardware Installation Guide” for detailed
information related to the installation of 6500 series Fabric Interconnects.
Cisco UCS X9508 Server Chassis requirements
Please refer to the “Cisco UCS X9508 Server Chassis Installation Guide” for detailed information related to the
installation of X9508 chassis.
● Visualize – Unlike traditional, siloed tools, Cisco Intersight gives you one consolidated dashboard to see
your on-premises, cloud, and edge infrastructure—including their real-time status and
interdependencies.
● Control – Whereas traditional infrastructure management typically requires multiple, repeated tasks, this
platform lets you easily perform operations actions across your global infrastructure with just a few clicks
so you stay in constant control. Deploy, configure, and operate servers, VMs, storage, and networking
throughout their lifecycle, from one place anytime, anywhere.
● Prevent and resolve – Greater control to prevent and resolve issues stemming from computing
hardware using advisories, hardware compatibility lists, proactive RMAs, firmware upgrades, and
connected TAC are some of the biggest benefits operations teams get from Intersight.
● Automate – Instead of having to perform tasks manually, Intersight lets you automate day-0, day-1, and
day-2 tasks and workflows to accelerate infrastructure operations.
● Speed: Deploy, configure, and maintain infrastructure in minutes —at scale—anytime, anywhere.
● Consistency: Ensure consistent server configuration across your global infrastructure to identify and
eliminate configuration drift.
● Security: Apply strict security standards across infrastructure operations; continuously identify and
mitigate potential security threats.
● Audits and compliance: Log all actions taken on your infrastructure; ensure consistent adherence to
policies through automation, templates, and cross-domain management.
● Control and manage: Operate Cisco® and third-party infrastructure from one place.
● Reduce or eliminate downtime: Address potential hardware, OS, and software issues before they
impact users, or minimize them when they occur.
● Improve productivity: Reduce time spent on support, maintenance, and operation of multiple
infrastructure domains, including networking, compute, storage, virtualization, and integrated systems.
Figure 4.
Rear/port view cabling example
Depending on the state of each Fabric Interconnect, this first set of steps may not be necessary. If you see a
message “Switch can now be configured from GUI” as shown in the following image, you must follow these
steps:
Press CTRL-c as instructed on the screen to halt the GUI configuration process. You can configure Cisco
Intersight mode only through the console.
Type “X” followed by Enter. Because of screen wrapping, you may not be able to see the “X” that you typed,
but don’t worry about that.
The wizard will ask you to confirm that you are setting up a new Fabric Interconnect in Intersight Managed
Mode. Type “y” to confirm.
You will be asked whether or not to enforce strong passwords. Make your selection and input the password you
wish to use.
Name the system (Note that the name assigned to the system in this step will be applied to every chassis and
server connected to it. This name cannot be changed later without erasing the Fabric Interconnect
configuration).
The last step is to confirm all of your settings. Verify that your settings are correct and type “yes” to continue.
Congratulations. You have configured Fabric Interconnect A (FI-A) in Intersight Managed Mode. It will take
several minutes for the Fabric Interconnect to reboot. Before configuring the second fabric interconnect, please
wait until the Fabric interconnect A fully reboots. Once the first Fabric Interconnect has rebooted, the second
Fabric Interconnect will be able to detect the first Fabric Interconnect presence and will allow its configuration
as a cluster. Proceed to the next section to configure the second Fabric Interconnect.
1.2 Configure the second Fabric Interconnect for Intersight management
Configuring the second Fabric Interconnect is much faster because it obtains most of its configuration from
Fabric Interconnect A. These first few steps of the configuration are represented in the image following step 7
below:
You may need to hit the Enter key to wake up the console for Fabric Interconnect B (FI-B). If you see nothing on
the screen, the fabric interconnect might be in the mode where it is waiting for you either to configure it from
the GUI or to press CTRL-c to interrupt the process. Just as you did for the FI-A setup, press CTRL-c.
As you did for the FI-A setup, press “x” and then Enter. As with FI-A, you may not actually see the “x” when
you type it.
FI-B should detect that its peer (FI-A) is already configured and will ask if it should attempt to join that cluster.
Type “y” and hit Enter.
At this point, FI-B will pull the networking configuration from its peer. You only need to provide FI-B with an IP
address.
Type “yes” to save the configuration and restart the Fabric Interconnect.
Congratulations. You have configured Fabric Interconnect B in Cisco Intersight Managed Mode. It will take
several minutes for the Fabric Interconnect to reboot. Proceed to the next section to claim the Fabric
Interconnect pair into the Cisco Intersight platform.
For this step, you will connect to the Device Console on the Fabric Interconnect pair. There is no longer an
instance of Cisco UCS Manager, and when you browse to one of the Fabric Interconnects, you will be prompted
to log into the Device Console instead. This console is where you obtain a Device ID and Claim Code in order to
claim this new domain in the Cisco Intersight platform.
Using one of the supported browsers (see section 6 of this document), connect the IP address of Fabric
Interconnect A (you should see the Device Console login screen like the one shown in the following image).
Ensure that HTTPS is used or you will not be able to connect to the Device Console.
Use the credentials you configured earlier during Fabric Interconnect setup to log in.
Go to the Device Connector tab. If there is an error on this page saying, “Some unknown internal error has
occurred,” it is likely because this domain has been claimed in Cisco Intersight already. Please click the refresh
button in the device connector view, but if the problem persists, reach out to the Cisco® Technical Assistance
Center (TAC) to address this problem. If instead you see a screen like the one shown below (which shows that
the Fabric Interconnect can connect to Cisco Intersight but is not yet claimed), then proceed to the next step.
Select Admin -> Targets and then click the blue “Claim a New Target” button in the upper right portion of the
window.
For target type, select Cisco UCS Domain (Intersight Managed) and click the Start button.
You’ll need the Device ID and Claim Code from the Device Console. Try copying those values into Cisco
Intersight.
Click the blue Claim button after pasting the Device ID and Claim Code. Shortly after the claim succeeds, the
Fabric Interconnect Device Connector should show a status of “Claimed” as shown in the following image:
Although the Device Technician can claim a target, the Device Technician cannot put that target into the right
Intersight organization. Currently, only an Account Administrator can do that. If your credentials don’t have that
privilege level, please reach out to someone within the Intersight organization who has Account Administrator
credentials.
Before discovering what hardware is connected to the Fabric Interconnects, you should check to see if a
recommended firmware upgrade is available for the Fabric Interconnects. After logging into Intersight, select
the drop-down box in the upper left corner of the page and select “Infrastructure Service” if it is not currently
selected:
In the left side of the screen, select Operate -> Fabric Interconnects.
From the Fabric Interconnect screen, click the three dots at the end of the row for either of the Fabric
Interconnects and select “Upgrade Firmware.”
The General page should show the current bundle version that is installed on the selected Fabric Interconnect.
Click “Next” on the General step to proceed to the Version step.
Step 2 of the upgrade allows you to select a different version of firmware. Fabric Interconnects in this state
(with no discovered chassis) do not need to evacuate server traffic. You must select “Advanced Mode” and
uncheck “Fabric Interconnect Traffic Evacuation,” as shown in the following image.
After selecting the version you wish to apply, click “Next” to proceed to the Summary page.
Step 3 of the upgrade is simply a confirmation screen that should show both Fabric Interconnects with their
current firmware version and an icon showing the intended firmware version. Click “Upgrade” and click
“Upgrade” again on the next popup box when prompted if you wish to proceed with the firmware upgrade.
The Intersight Requests icon will help you keep track of long-running tasks such as firmware updates. It is the
left-most icon shown in the following images where three different states for the icon are shown:
Circle with a check mark: All user requests have been completed. You can click this icon to view completed
tasks.
Solid circle with a check mark and number: The number shows the number of tasks that require user action or
intervention. You can click the icon to view these actions and then act on them.
You will be required to confirm that it is okay to start upgrading the Fabric Interconnect. At this point, you can
watch the firmware upgrade process by clicking on the “Upgrade Firmware” request from the active requests
window.
Once you have clicked on the active request and are viewing the Execution Flow, click the “Proceed” button
when prompted and click “Proceed” again on the popup as shown below when it is time to acknowledge it is
okay to upgrade Fabric Interconnect B:
Once the firmware upgrade for Fabric Interconnect B has completed, you will be prompted to proceed with
upgrading Fabric Interconnect A. Click “Proceed” and click “Proceed” again on the popup when prompted, as
shown below:
It will take about 15 to 20 minutes for Fabric Interconnect A to complete its upgrade. If you browse away from
the firmware upgrade status, you can always get back to it by clicking on the spinning circle in the Intersight
task bar to see current or completed tasks. Browse to Operate -> Fabric Interconnects to confirm that both
Fabric Interconnects are now running the correct version of firmware.
Congratulations. You have performed a Fabric Interconnect firmware update through Intersight. Proceed to the
next section to discover what hardware is connected to that domain.
1.5 Create a UCS Domain Profile
In this section, you will create a domain profile for the newly claimed domain. Intersight cannot discover any
hardware connected to the Fabric Interconnects until its ports are configured, and that is done through a
domain profile. You can create each of the policies the profile will use before you create it, or you can create
the policies while creating the profile. We will do the latter in this guide.
While logged in to Intersight, choose CONFIGURE > Profiles > UCS Domain Profiles > Create UCS Domain
Profile as shown here:
Give the profile a name, a description, and any tags you want to apply to it. Click “Next.”
Step 2 of the domain creation wizard is UCS Domain Assignment. The domain you name created in the previous
step should now be seen in this step. Select that domain and click “Next.”
Step 3 of the domain creation wizard is VLAN and VSAN configuration. Notice that you can apply a different
policy to the A and B fabrics (if using the same VLANs on Fabric A and B, you can use the same policy for
both). Intersight allows for the creation of policies prior to configuring the equipment. If the VLAN/VSAN policies
were created prior to the configuration, select the policies needed for this deployment for both fabric
interconnects. If creating new policies, click “Select Policy” and then “Create New” as show below:
In the General step, give the policy a name, a description, and any tags you want to apply to it. Click “Next.”
If a multicast policy hasn’t been created, create a new multicast policy. Creating a multicast policy involves
selecting the snooping and querier state. Both settings have a tooltip next to them describing their function.
If connecting to a SAN, create a VSAN configuration policy (Note: It is best practice for VSAN IDs to be different
for each fabric, so you should create two policies.)
After the newly created policies have been selected for both fabrics, Click “Next.”
Step 4 of creating the Domain Profile is to create a Port Policy. If you follow internal standards for cabling Cisco
UCS domains, you can create this port policy once and reuse it for every new domain, saving significant setup
time.
On the ports configuration screen that shows an image of a Fabric Interconnect, click on “Select Policy” for
Fabric Interconnect A.
Click “Create New” to create a new policy if there was not an existing policy created prior to this deployment.
In the first step of creating the Port Policy, give the policy a name and select UCS-FI-xxxx (xxxx being your
specific FI model) for the switch model. You can optionally give the profile a description and any tags you like.
Click “Next.”
In the second step of creating a Port Policy, you have the option to set some number of the unified ports to
Fibre Channel by moving the slider. Note that in firmware 4.1(3c) and later, you can change the position of the
slider after deploying the Domain Profile, but it will require rebooting both Fabric Interconnects. Changing any of
the unified ports between Ethernet and Fibre Channel is a hardware change and requires a reboot. Click “Next.”
In the third step of creating the Port Policy, you are presented with a Breakout Option configuration step.
Various ports on Fabric Interconnects are capable of leveraging breakout cables. If using breakout cables,
proceed with configuring the ports and when finished, click “Next.”
In the fourth and final step of creating the Port Policy, you must change the role of ports connected to the
chassis to Server Ports. While on the Port Roles tab (tabs are shown in the image that follows), select the ports
that are connected to the X9508 IFMs (port 47) and click “Configure” to select “Server” as their port role. Click
“Save” after configuring the ports.
Click the Port Channels tab and click “Create Port Channel.” Add the ports connecting to the switch (ports 49
and 50) to an Ethernet Uplink Port Channel with a port channel ID of 1 and admin speed of Auto. If you need
to define additional details for flow control, link aggregation, and link control policies,
Please review additional information about these policies at:
https://intersight.com/help/saas/features/fabric_interconnects/configure#domain_policies
Click “Save” to save the port policy. You now have defined a reusable port policy and should be returned to
step 4 of the domain profile configuration.
Click “Select Policy” to choose a port policy for the second Fabric Interconnect and choose the port policy that
you just created. Click “Next” to move to step 5 of domain profile configuration.
Step 5 of the domain profile configuration involves creating several policies. This guide covers the steps for
creating the Network Time Protocol (NTP), Network Connectivity (DNS), and System quality-of-service (QoS)
policies, but you should familiarize yourself with the capabilities of the other policies as well. Consult the online
Intersight help for more information.
Create a new NTP policy that specifies the NTP servers being used for this deployment and choose the
appropriate time zone.
Create a new Network Connectivity policy that specifies the primary DNS and the alternate DNS.
Syslog, Simple Network Management Protocol (SNMP), and Switch Control policies are optional. You can
explore and create them if you choose. Click “Next” when you are ready to move to the next step.
The Summary page allows the user to view the configuration that will be deployed using the steps previously
taken. Once the information has been reviewed and you have confirmed the configuration meets the
requirements for the deployment, click “Deploy” (and then click “Deploy” again in the popup) to apply this UCS
domain profile. You can watch the status of the tasks associated with this action by clicking on any of the
requests. These tasks will be completed quickly and chassis discovery will begin.
Congratulations, you have created and applied a UCS domain profile in Intersight. This step had many tasks, but
fewer than are required for configuring a traditional UCS domain. Additionally, you can reuse many of the
policies you created to deploy a second domain in Intersight Managed Mode much faster.
1.6 Verify discovered chassis
The chassis will be discovered almost immediately, but it will take longer for the compute node(s) to be
discovered. In Intersight, browse to Operate -> Chassis to see the newly discovered chassis. The chassis will
likely show up empty because it is still performing discovery. Now is a good time to start creating pools,
templates, and profiles. Proceed to the next section.
In this step, you will create a server profile template. Intersight allows converting a server profile to a template,
but let’s just create a template directly instead. Just know that you can take any server profiles that you have
already created in your own Intersight account and convert them into templates.
The following reference details the policies involved in creating a server profile and server profile template. Not
all policies are required. Please refer to Server Policies for more details about each server policy type.
Before creating the profile, create some of the policies that you will need:
In Intersight, browse to Configure -> Policies and click “Create Policy”. Under the “UCS Server” Platform
Type, select “Local User” and then click “Start.“ The local user will be the user whom you use to connect to
KVM.
Give the local user policy any name, description, and tags that you like. Click “Next.”
This policy can be created for All Platforms, UCS Server (Standalone), or UCS Server (FI-Attached). For this
example, we are choosing “All Platforms,” but select the option best suited for your organization. Under Local
Users, choose “Add New User,” select the “+” symbol next to New User, define a username and a password
(also confirm the password), and set that user to a role of admin (you can create multiple user accounts with
this policy). Use something unique for the local user account. For the Password Properties, choose the
options that best meet your organization’s security policy. Best practice is to also set the Password History to
“0”; this should prevent the CIMC from rejecting the same password when the policy is redeployed at a later
time. When finished, click “Create.”
Next, you will create a LAN Connectivity policy. This policy specifies the number and mapping of virtual Network
Interface Cards (vNICs). It takes several steps, so this guide will walk you through building this policy prior to
building a server profile rather than building the policy in line with creating the profile.
In step 1 of the LAN Connectivity policy creation, it is important to select “UCS Server (FI-Attached)” for the
target platform. Give the policy a name, a description, and any tags you want to apply to it, then select “Next.”
During step 2 of the LAN Connectivity policy creation, you will create two vNICs and assign a Media Access
Control (MAC) pool and policies to each vNIC. The policies have been left at their default values, but you should
understand the purpose of these policies before installation. The next few numbered steps in this guide will
help you complete step 2 of the LAN Connectivity Policy for this example (address each step as your
environment requires if it differs from the examples below).
For iSCSI Initiator (IQN), leave this set to None as we are not using iSCSI in this example.
For vNIC placement, choose Auto vNICs Placement unless there is a requirement otherwise.
Click “add vNIC” for Fabric A and give the vNIC a name (some examples are names such as vNIC0 or Eth0).
In this example, we will be using a MAC pool. Click “Select Pool” for the MAC Address Pool. If you created a
MAC Address pool previously for this environment, you can select that now. If you didn’t, you can create one in
this step by selecting “Create New” and walking through the steps to create a new pool.
Create an Ethernet Network Group Policy, Ethernet Network Control Policy, Ethernet QoS, and Ethernet Adapter
policy according to the configuration requirements for the new environment.
Click “Add” to complete the creation of the first vNIC. You should follow these steps again to create a second
vNIC for Switch ID B with a name similar to what was used in the first vNIC (examples: vNIC1 or Eth1).
After you have created the correct number of vNICs required for the host(s), click “Create” to complete the
creation of the LAN Connectivity policy.
Now that you have completed some of the initial work, it is time to create the server profile template.
In Intersight, browse to Configure -> Templates and click “Create UCS Server Profile Template”:
In the first step, give the template a name, a description, and any tags you want to apply to it. Be sure to select
“UCS Server (FI-Attached)” for the target platform. When finished, select “Next.”
Step 2 is for setting the Compute Configuration. Similar to previous steps, you can have the pools/policies
created prior to starting the Server Profile Template creation and utilize the precreated pools/policies in this
step or you can create new policies directly from this step. Note: The UUID pool prefix requires the format to be
hexadecimal using xxxxxxxx-xxxx-xxxx as an example for the prefix’s required digits. The suffix has a similar
hexadecimal requirement but using xxxx-xxxxxxxxxxxx as an example for the suffix’s required digits.
The goal for our example is to create a virtual media policy that attempts to boot first from virtual media and
second from the local disk, but we recommend adding your own for familiarity. For the Boot Order, select
“create new” if one hasn’t already been created for this environment and give it a name, a description, and any
tags you want to apply to it. Click “Next.” When creating a boot policy, select the “Add Boot Device” drop
down, and choose the three following options:
Next, a virtual media policy will be needed to enable virtual media. Unlike traditional UCS servers, KVM-mapped
virtual media will not work if it is not enabled by policy. Next to Virtual Media, click “select policy,” select
“create new” if one hasn’t already been created for this environment, and give it a name, a description, and any
tags you want to apply to it. Click “Next,” then “Create.” Click “Next“ to proceed.
Step 3 of the server profile template configuration allows you to configure multiple management policies. Start
with local user and select the policy you created earlier.
For the IMC Access policy, select “create new” if one hasn’t already been created for this environment and
give it a name, a description, and any tags you want to apply to it (note that the purpose of this policy is to
define an IP pool for IMC as well as VLAN, gateway, and DNS information).
Create a new Virtual KVM policy by selecting “create new” if one hasn’t already been created for this
environment and give it a name, a description, and any tags you want to apply to it. Simply use the default
settings. Click “Next” to proceed.
Step 4 of the server profile template configuration allows you to configure storage-related policies. Configure
either of these policies. Click “Next” to proceed.
Step 5 of the server profile template configuration allows you to configure network policies. For the LAN
connectivity policy, choose the policy you built earlier in the guide. Click “Next” to proceed.
The final step of the server profile template configuration is the summary page, and you can either exit (Close)
or Derive Profiles. You will derive the profiles later, so for now, click “Close.”
Congratulations. You have created a server profile template and will soon get a chance to use it. First you
should verify if there is a recommended firmware update for the server(s).
Intersight allows for upgrading firmware on multiple servers at once. At this point, any servers attached to the
domain should have completed discovery.
In Intersight, browse to Operate -> Servers. Intersight should have discovered the servers in the domain. If you
don’t see them, hit the refresh button in your browser:
Select all of the discovered servers that are of the same type by clicking the checkbox next to each one. Bulk
firmware upgrade operations are supported only on similar servers. You can sort the servers table by Model if
there is any confusion.
With one or more servers selected, click the ellipses (…) at the top or bottom of the server table and choose
Upgrade Firmware:
The first step of the firmware upgrade process introduces the firmware upgrade wizard and allows you to
change your mind about which servers you want to upgrade. Click “Next” to proceed.
The second step of the firmware upgrade process allows you to select the upgrade firmware version. Select the
radio button for the firmware version that best applies to your deployment then click “Next.” On the Summary
page, verify the information is correct based on the desired upgrade, and if it meets the criteria, select
“Upgrade,” select “Reboot Immediately to Begin Upgrade” if the servers are at a state where it is safe to
reboot, and click “Upgrade” again on the popup. This process takes roughly 30 minutes, and the process can
be monitored by selecting the active requests in the upper righthand portion of the screen.
After you have completed the firmware update, you can assign profiles to the servers.
From the table of templates, click the ellipses to the right of the template you created and choose Derive
Profiles.
You can select server(s) to which to assign the derived profiles. Select all available servers applicable to this
deployment and click “Next” to proceed.
Intersight lets you set a prefix and suffix for all derived profile names, and also lets you customize each one.
You can also add a description and tags that will be applied to all profiles derived in this step (refer to the image
below). Feel free to rename the profiles if you don’t like seeing “DERIVED” in the profile name. After
customizing the steps in this section, click “Next.”
Click Derive.
The assignment process is immediate. The profiles are assigned to the servers, but no configuration changes
happen yet.
When ready to deploy the server profiles, click “Deploy” and then click “Deploy” again on the popup window:
Congratulations. You have assigned a profile to a server in Intersight. Now imagine an environment where you
have multiple UCS domains. You can move that profile between any of those domains.
2.4 Optional: Install an operating system with a Software Repository
You can install an operating system by a traditional method of mapping the operating system install media
through KVM and walking through the installation manually. Intersight provides the capability of automated
operating-system installation. This section guides you through that process. If you prefer to install through KVM,
proceed to the next section.
The automated OS installation requires a target for the OS to be installed to; see this document for more
information related to creating and configuring local storage:
https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/ucs-infrastructure-ucs-manager-
software/218160-configure-boot-from-local-storage-in-int.html.
Normally, the software repository used to install an operating system would be already configured. This section
shows you how to set up an operating system image in the software repository and install an OS using that
repository. Obviously, the process of automated OS installation for future OS installs will run faster after you do
the initial work of setting up the repository.
In Intersight, you may be in the Infrastructure Service view. Change the view to System:
Select either NFS, CIFS, or HTTP/S, add the file location (hover over the hint next to the field if you need an
example), and choose the mount options “ro.” Click “Next.”
Add details for the operating system image. Provide the image any Name that you choose, but the vendor and
version must match the contents of the ISO image. When finished providing the details, click the Add button.
We also need to map the Server Configuration Utility (SCU) in the software repository. In the Software
Repository section, click the “SCU Links” tab and click the “Add SCU Link”:
Select either NFS, CIFS, or HTTP/S, add the file location (hover over the hint next to the field if you need an
example), and choose the mount options “ro.” Click “Next.”
Add details for the SCU image. Provide the image a Name, the Version, and the Supported Models. When
finished providing the details, click the “Add” button.
Now that you have an OS image in your software repository, you can install that OS on your server(s). Make
sure you are back in the Infrastructure Service view, then browse to Operate -> Servers.
As you step through the wizard, you will see familiar screens like the one that lets you change your mind about
which servers you want to affect. Step 2 of the process lets you choose from the images available in your local
software repository.
Step 3 of the OS install lets you choose a config file. When selecting a valid config file, you will also see the
option to provide variables such as IP addresses for each server on which you are installing an OS.
Select the Server Configuration Utility that you added to the software repository. Click Next.
Choose the installation target (that is, which disk) for the operating system. Click Next.
On the final confirmation screen, choose Install. You can monitor the status of the installation the same way you
monitored the status of firmware upgrades earlier in this guide.
Congratulations. You have installed an operating system using Intersight’s automated OS installation feature.
2.5 Optional: Install an operating system with KVM-attached virtual media
In this section, you will install an operating system using KVM-attached virtual media. Cisco Intersight supports
OS install through a more automated process if desired. Additionally, it is unlikely you will have the OS images
staged in the Intersight software repository.
In Intersight, browse to Operate -> Servers and locate the server on which you would like to attempt to install
an OS through the KVM-attached virtual media.
Click the ellipses next to your server and select Launch vKVM.
In the tab that pops up for KVM, select Activate Virtual Devices from the Virtual Media menu. If you get an
error message on this step, you likely did not attach the proper virtual media policy to the server profile. There
should be a virtual media policy that enables virtual media. Go back and correct this problem. Do not forget to
Deploy the profile after making changes.
Once attached, boot (or reboot) the server from the KVM window’s power options.
The remainder of the installation process should proceed, such as installing ESXi on any UCS server.
In this guide, you may have had access to a single organization within an Intersight account that has several
organizations. When you started, your user role could have had visibility of only a single server. This construct is
powerful in that it allowed you to create policies and profiles that others could neither see nor modify when
using this Intersight account. Talk to your Cisco account team about using organizations effectively.
Every device that is claimed in Intersight is added to the default organization if no other Intersight organization
has been created. When starting to use Intersight, it is tempting to use default as the one and only organization.
As your environment grows, you may face RBAC challenges if attempting grant or restrict access to equipment
based on roles or functions if everything is left in the default organization. Please review the organizations
section of Intersight Help for more information: https://intersight.com/help/saas/resources/RBAC#organizations
Intersight User Roles
In this guide, you may have had access to a built-in role (Device Technician) for claiming targets and a custom
role for creating pools, policies, and profiles. The custom role could grant you administrative capabilities within
one Intersight organization. Roles are a powerful construct that can provide an individual user or group of
users the granular level of privileges needed. Talk to your Cisco account team about using roles effectively to
enable team members.
For more Intersight information such as browser, systems, and language support, please visit the Intersight Help
Center:
● https://intersight.com/help/saas/faqs#browser_support_supported_systems_and_multi-
language_support.