CISCO UCS C-Series Cli Configuration Guide 43
CISCO UCS C-Series Cli Configuration Guide 43
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
© 2023 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 1 Overview 1
OS Installation Methods 13
Virtual KVM Console 13
Installing an OS Using the KVM Console 14
PXE Installation Servers 14
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
iii
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
iv
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
v
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
vi
Contents
Configuring Local Users for Cisco UCS C-Series M7 and Later Servers 113
Managing SSH Keys for User Accounts 116
Configuring SSH Keys 116
Adding SSH Keys 117
Modifying SSH Keys 118
Deleting SSH Keys 120
Non-IPMI User Mode 121
Switching User Mode from IPMI to Non-IPMI 122
Switching User Mode from Non-IPMI to IPMI 122
Disabling Strong Password 123
Password Expiry 124
Configuring User Authentication Precedence 125
Resetting the User Password 125
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
vii
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
viii
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
ix
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
x
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
xi
Contents
Upgrading from Single Card to Dual Card Mirroring with FlexFlash 280
Configuring the Flexible Flash Controller Properties for C220 M5 and C240 M5 Servers 281
Resetting the Flexible Flash Controller 282
Configuring the Flexible Flash Controller Cards in Mirror Mode 283
Enabling Virtual Drives 285
Erasing Virtual Drives 287
Syncing Virtual Drives 288
Viewing FlexFlash Logs 289
Managing the FlexUtil Controller 290
Configuring FlexUtil Operational Profiles 291
Resetting FlexUtil Card Configuration 292
Viewing FlexUtil Properties 292
Viewing FlexUtil Physical Drives Details 293
Viewing FlexUtil Virtual Drives Details 294
Adding an Image to a FlexUtil Virtual Drive 295
Updating a FlexUtil Virtual Drive 297
Enabling FlexUtil Virtual Drive 299
Mapping an Image to a Virtual Drive 300
Unmapping an Image From a Virtual Drive 301
Erasing an Image on a Virtual Drive 302
Cisco Boot Optimized M.2 Raid Controller 303
Viewing Cisco Boot Optimized M.2 Raid Controller Details 303
Viewing Cisco Boot Optimized M.2 Raid Controller Physical Drive Details 303
Viewing Cisco Boot Optimized M.2 Raid Controller Virtual Drive Details 305
Creating a Cisco Boot Optimized M.2 Raid Controller Virtual Drive 306
Deleting a Cisco Boot Optimized M.2 Raid Controller Virtual Drive 307
Importing Cisco Boot Optimized M.2 Raid Controller Foreign Configuration 307
Clearing Cisco Boot Optimized M.2 Raid Controller Foreign Configuration 308
Cisco FlexMMC 308
Viewing Cisco FlexMMC Details 308
Uploading New Image File 309
Deleting an Image File 309
Mapping an Image 310
Resetting FlexMMC to Default Settings 310
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
xii
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
xiii
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
xiv
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
xv
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
xvi
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
xvii
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
xviii
Preface
• Audience, on page xix
• Conventions, on page xix
• Related Cisco UCS Documentation, on page xxi
Audience
This guide is intended primarily for data center administrators with responsibilities and expertise in one or
more of the following:
• Server administration
• Storage administration
• Network administration
• Network security
Conventions
Text Type Indication
GUI elements GUI elements such as tab titles, area names, and field labels appear in this font.
Main titles such as window, dialog box, and wizard titles appear in this font.
TUI elements In a Text-based User Interface, text the system displays appears in this font.
System output Terminal sessions and information that the system displays appear in this
font.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
xix
Preface
Preface
string A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
!, # An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
document.
Tip Means the following information will help you solve a problem. The tips information might not be
troubleshooting or even an action, but could be useful information, similar to a Timesaver.
Timesaver Means the described action saves time. You can save time by performing the action described in the paragraph.
Caution Means reader be careful. In this situation, you might perform an action that could result in equipment damage
or loss of data.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
xx
Preface
Related Cisco UCS Documentation
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
xxi
Preface
Related Cisco UCS Documentation
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
xxii
CHAPTER 1
Overview
This chapter includes the following sections:
• Overview of the Cisco UCS C-Series Rack-Mount Servers, on page 1
• Overview of the Server Software, on page 2
• Server Ports, on page 2
• Cisco Integrated Management Controller, on page 3
• Cisco IMC CLI, on page 4
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
1
Overview
Overview of the Server Software
Note To determine which Cisco UCS C-Series rack-mount servers are supported by this firmware release, see the
associated Release Notes. The C-Series release notes are available at the following URL:
http://www.cisco.com/en/US/products/ps10739/prod_release_notes_list.html
Server OS
The Cisco UCS C-Series rack servers support operating systems such as Windows, Linux, Oracle and so on.
For more information on supported operating systems, see the Hardware and Software Interoperability for
Standalone C-series servers at http://www.cisco.com/en/US/products/ps10477/prod_technical_reference_
list.html. You can use Cisco IMC to install an OS on the server using the KVM console and vMedia.
Server Ports
Following is a list of server ports and their default port numbers:
SSH Port 22
HTTP Port 80
SMTP Port 25
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
2
Overview
Cisco Integrated Management Controller
Note The Cisco IMC management service is used only when the server is operating in Standalone Mode. If your
C-Series server is integrated into a UCS system, you must manage it using UCS Manager. For information
about using UCS Manager, see the configuration guides listed in the Cisco UCS B-Series Servers Documentation
Roadmap at http://www.cisco.com/go/unifiedcomputing/b-series-doc.
Management Interfaces
You can use a web-based GUI or SSH-based CLI or an XML-based API to access, configure, administer, and
monitor the server. Almost all tasks can be performed in either interface, and the results of tasks performed
in one interface are displayed in another. However, you cannot do the following:
• Use Cisco IMC GUI to invoke Cisco IMC CLI
• View a command that has been invoked through Cisco IMC CLI in Cisco IMC GUI
• Generate Cisco IMC CLI output from Cisco IMC GUI
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
3
Overview
Cisco IMC CLI
• Create and manage local user accounts, and enable remote user authentication through Active Directory
• Configure network-related settings, including NIC properties, IPv4, VLANs, and network security
• Configure communication services, including HTTP, SSH, IPMI Over LAN, and SNMP.
• Manage certificates
• Configure platform event filters
• Update Cisco IMC firmware
• Monitor faults, alarms, and server status
• Set time zone and view local time
• Install and activate Cisco IMC firmware
• Install and activate BIOS firmware
Note To recover from a lost admin password, see the Cisco UCS C-Series server installation and service guide for
your platform.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
4
Overview
Command Modes
Command Modes
The CLI is organized into a hierarchy of command modes, with the EXEC mode being the highest-level mode
of the hierarchy. Higher-level modes branch into lower-level modes. You use the scope command to move
from higher-level modes to modes in the next lower level , and the exit command to move up one level in the
mode hierarchy. The top command returns to the EXEC mode.
Note Most command modes are associated with managed objects. The scope command does not create managed
objects and can only access modes for which managed objects already exist.
Each mode contains a set of commands that can be entered in that mode. Most of the commands available in
each mode pertain to the associated managed object. Depending on your assigned role, you may have access
to only a subset of the commands available in a mode; commands to which you do not have access are hidden.
The CLI prompt for each mode shows the full path down the mode hierarchy to the current mode. This helps
you to determine where you are in the command mode hierarchy and can be an invaluable tool when you need
to navigate through the hierarchy.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
5
Overview
Command Mode Table
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
6
Overview
Command Mode Table
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
7
Overview
Complete a Command
Complete a Command
You can use the Tab key in any mode to complete a command. Partially typing a command name and pressing
Tab causes the command to be displayed in full or to the point where another keyword must be chosen or an
argument value must be entered.
Command History
The CLI stores all commands used in the current session. You can step through the previously used commands
by using the Up Arrow or Down Arrow keys. The Up Arrow key steps to the previous command in the
history, and the Down Arrow key steps to the next command in the history. If you get to the end of the
history, pressing the Down Arrow key does nothing.
All commands in the history can be entered again by simply stepping through the history to recall the desired
command and pressing Enter. The command is entered as if you had manually typed it. You can also recall
a command and change it before you press Enter.
You can accumulate pending changes in multiple command modes and apply them together with a single
commit command. You can view the pending commands by entering the show configuration pending
command in any command mode.
Note Committing multiple commands together is not an atomic operation. If any command fails, the successful
commands are applied despite the failure. Failed commands are reported in an error message.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
8
Overview
Command Output Formats
Server /chassis #
• YAML—For easy parsing by scripts, the command output is presented in the YAML (YAML Ain't
Markup Language) data serialization language, delimited by defined character strings.
This example shows command output in the YAML format:
Server /chassis # set cli output yaml
Server /chassis # show hdd detail
---
name: HDD_01_STATUS
hdd-status: present
---
name: HDD_02_STATUS
hdd-status: present
---
name: HDD_03_STATUS
hdd-status: present
---
name: HDD_04_STATUS
hdd-status: present
...
Server /chassis #
In most CLI command modes, you can enter set cli output default to configure the default format, or set cli
output yaml to configure the YAML format.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
9
Overview
Smart Access: Serial
Note Note the following limitations while using the CLI through a serial connection:
• You cannot use the arrow keys to revert to previously executed commands.
• The CLI is not visible when the terminal type is set to either VT100+ or VTUFT8.
• The smart access feature does not work as expected after an OS boot unless the "console" property in
the grub configuration file of the OS is set to ttyS0. You must set the "console" property in the grub
configuration file of the OS to ttyS0 for it to work as expected.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
10
Overview
Logging In to Cisco IMC
Note After an upgrade from Cisco IMC version 1.5(x) or 2.0(1) to the latest version, or when you do
a factory reset, during first login Cisco IMC prompts for a password change. You cannot choose
the word 'password' as your new password. If this creates problems for any scripts you may be
running, you could change it to password by logging back into the user management options, but
this is ENTIRELY at your own risk. It is not recommended by Cisco.
Example
The following example shows how to login in to Cisco IMC first time:
Login as # admin
admin10.101.255.255's password # password
***********************WARNING*******************
Default credentials were used for login.
Administration passwords needs to be changed for security purpose.
********************************************************************
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
11
Overview
Logging In to Cisco IMC
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
12
CHAPTER 2
Installing the Server OS
This chapter includes the following sections:
• OS Installation Methods, on page 13
• Virtual KVM Console, on page 13
• PXE Installation Servers, on page 14
• Booting an Operating System from a USB Port, on page 15
OS Installation Methods
C-Series servers support several operating systems. Regardless of the OS being installed, you can install it
on your server using one of the following tools:
• KVM console
• PXE installation server
For more information on Cisco UCS Server Configuration Utility, see Cisco UCS Server Configuration Utility
Quick Start Guide.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
13
Installing the Server OS
Installing an OS Using the KVM Console
Instead of using CD/DVD or floppy drives physically connected to the server, the vKVM console uses virtual
media, which are actual disk drives or disk image files that are mapped to virtual CD/DVD or floppy drives.
You can map any of the following to a virtual drive:
• CD/DVD or floppy drive on your computer
• Disk image files (ISO or IMG files) on your computer
• USB flash drive on your computer
• CD/DVD or floppy drive on the network
• Disk image files (ISO or IMG files) on the network
• USB flash drive on the network
Note The vKVM Console is operated only through the GUI. To launch the vKVM Console, see the instructions in
the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Note Detailed guides for installing Linux, VMware, and Windows can be found at this URL: http://www.cisco.com/
en/US/products/ps10493/products_installation_and_configuration_guides_list.html.
Note PXE installation is an efficient method for installing an OS on a large number of servers. However, considering
that this method requires setting up a PXE environment, it might be easier to use another installation method.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
14
Installing the Server OS
Installing an OS Using a PXE Installation Server
Procedure
What to do next
After the OS installation is complete, reset the LAN boot order to its original setting. Always follow your OS
vendors recommended configuration, including software interoperability and driver compatibility. For more
information on driver recommendations and installation, follow the Cisco UCS Hardware Compatibility list
here:
https://ucshcltool.cloudapps.cisco.com/public/
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
15
Installing the Server OS
Booting an Operating System from a USB Port
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
16
CHAPTER 3
Managing the Server
This chapter includes the following sections:
• Toggling the Locator LED, on page 17
• Toggling the Front Locator LED for the Chassis, on page 18
• Toggling the Locator LED for a Hard Drive, on page 19
• Clearing Personality Configuration, on page 19
• Selecting a Time Zone, on page 20
• Managing the Server Boot Order, on page 23
• Resetting the Server, on page 38
• Shutting Down the Server, on page 39
• Managing Server Power, on page 40
• Configuring Power Policies, on page 42
• Configuring Fan Policies, on page 53
• Configuring DIMM Block Listing, on page 56
• Configuring BIOS Settings, on page 57
• BIOS Profiles, on page 61
• Secure Boot Certificate Management, on page 64
• Updating Firmware on Server Components, on page 68
• Viewing Product ID (PID) Catalog Details, on page 69
• Uploading and Activating a PID Catalog, on page 70
• Deleting a PID Catalog, on page 72
• Persistent Memory Module, on page 73
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
17
Managing the Server
Toggling the Front Locator LED for the Chassis
Example
This example disables the chassis locator LED and commits the transaction:
Server# scope chassis
Server /chassis # set locator-led off
Server /chassis *# commit
Server /chassis #
Procedure
Step 2 Server /chassis # set front-locator-led {on | Enables or disables the chassis locator LED.
off}
Step 3 Server /chassis # commit Commits the transaction to the system
configuration.
Example
This example disables the chassis locator LED and commits the transaction:
Server# scope chassis
Server /chassis # set front-locator-led off
Server /chassis *# commit
Server /chassis #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
18
Managing the Server
Toggling the Locator LED for a Hard Drive
Procedure
Step 2 Server/chassis # scope hdd Enters hard disk drive (HDD) command mode.
Step 3 Server /chassis/hdd # locateHDD drivenum {1 Where drivenum is the number of the hard drive
| 2} whose locator LED you want to set. A value of
1 turns the LED on while a value of 2 turns the
LED off.
Example
This example turns on the locator LED on HDD 2:
Server# scope chassis
Server /chassis # scope hdd
Server /chassis/hdd # locateHDD 2 1
HDD Locate LED Status changed to 1
Server /chassis/hdd # show
Name Status LocateLEDStatus
-------------------- -------------------- --------------------
HDD1_STATUS present TurnOFF
HDD2_STATUS present TurnON
HDD3_STATUS absent TurnOFF
HDD4_STATUS absent TurnOFF
Server /chassis/hdd #
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
19
Managing the Server
Selecting a Time Zone
When you set a local time, the timestamp on the applications that you can view are updated with the local
time that you have chosen.
Procedure
Step 3 Enter the number corresponding to your A list of all the countries or regions of the
continent or ocean. chosen continent or ocean displays.
Step 4 Enter the number corresponding to the country If a country or a region has more than one time
or region that you want to set as your time zone. zones, a list of time zones in that country or
region displays.
Step 5 Enter the number corresponding to time zone. Is the above information OK? message
appears.
Step 6 Enter 1. Continue?[y|N]: prompt appears.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
20
Managing the Server
Selecting a Time Zone
Example
This example sets the time zone:
Server# scope CIMC
Server /CIMC # timezone-select
Please identify a location so that time zone rules can be set correctly.
Please select a continent or ocean.
1) Africa
2) Americas
3) Antarctica
4) Arctic Ocean
5) Asia
6) Atlantic Ocean
7) Australia
8) Europe
9) Indian Ocean
10) Pacific Ocean
#? 2
Please select a country whose clocks agree with yours.
1) Anguilla
2) Antigua & Barbuda
3) Argentina
4) Aruba
5) Bahamas
6) Barbados
7) Belize
8) Bolivia
9) Brazil
10) Canada
11) Caribbean Netherlands
12) Cayman Islands
13) Chile
14) Colombia
15) Costa Rica
16) Cuba
17) Curacao
18) Dominica
19) Dominican Republic
20) Ecuador
21) El Salvador
22) French Guiana
23) Greenland
24) Grenada
25) Guadeloupe
26) Guatemala
27) Guyana
28) Haiti
29) Honduras
30) Jamaica
31) Martinique
32) Mexico
33) Montserrat
34) Nicaragua
35) Panama
36) Paraguay
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
21
Managing the Server
Selecting a Time Zone
37) Peru
38) Puerto Rico
39) St Barthelemy
40) St Kitts & Nevis
41) St Lucia
42) St Maarten (Dutch part)
43) St Martin (French part)
44) St Pierre & Miquelon
45) St Vincent
46) Suriname
47) Trinidad & Tobago
48) Turks & Caicos Is
49) United States
50) Uruguay
51) Venezuela
52) Virgin Islands (UK)
53) Virgin Islands (US)
#? 49
Please select one of the following time zone regions.
1) Eastern Time
2) Eastern Time - Michigan - most locations
3) Eastern Time - Kentucky - Louisville area
4) Eastern Time - Kentucky - Wayne County
5) Eastern Time - Indiana - most locations
6) Eastern Time - Indiana - Daviess, Dubois, Knox & Martin Counties
7) Eastern Time - Indiana - Pulaski County
8) Eastern Time - Indiana - Crawford County
9) Eastern Time - Indiana - Pike County
10) Eastern Time - Indiana - Switzerland County
11) Central Time
12) Central Time - Indiana - Perry County
13) Central Time - Indiana - Starke County
14) Central Time - Michigan - Dickinson, Gogebic, Iron & Menominee Counties
15) Central Time - North Dakota - Oliver County
16) Central Time - North Dakota - Morton County (except Mandan area)
17) Central Time - North Dakota - Mercer County
18) Mountain Time
19) Mountain Time - south Idaho & east Oregon
20) Mountain Standard Time - Arizona (except Navajo)
21) Pacific Time
22) Alaska Time
23) Alaska Time - Alaska panhandle
24) Alaska Time - southeast Alaska panhandle
25) Alaska Time - Alaska panhandle neck
26) Alaska Time - west Alaska
27) Aleutian Islands
28) Metlakatla Time - Annette Island
29) Hawaii
#? 8
United States
Eastern Time - Indiana - Crawford County
America/Indiana/Marengo
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
22
Managing the Server
Managing the Server Boot Order
Continue?[y|N]: y
Timezone has been updated.
The local time now is: Sun Jun 1 02:21:15 2014 EST
Server /CIMC #
Note The actual boot order differs from the configured boot order if either of the following conditions occur:
• BIOS encounters issues while trying to boot using the configured boot order.
• A user changes the boot order directly through BIOS.
• BIOS appends devices that are seen by the host but are not configured from the user.
Important While upgrading Cisco UCS C220 M5 or C480 M5 servers to release 4.1(1x) under the following conditions:
• if you are upgrading from any release earlier than 4.0(4x)
• if Legacy Boot Mode is enabled and no Cisco IMC Boot Order is configured
• and, if the server is booting from Cisco HWRAID adapter
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
23
Managing the Server
Viewing the Boot Device Detail
Note When you create a new policy using the configure boot order feature, BIOS tries to map this new policy to
the devices in the system. It displays the actual device name and the policy name to which it is mapped in the
Actual Boot Order area. If BIOS cannot map any device to a particular policy in Cisco IMC, the actual device
name is stated as NonPolicyTarget in the Actual Boot Order area.
Note During Cisco IMC 2.0(x) upgrade, the legacy boot order is migrated to the precision boot order. The previous
boot order configuration is erased and all device types configured before updating to 2.0 version are converted
to corresponding precision boot device types and some dummy devices are created for the same device types.
you can view these devices in the Configured Boot Order area in the web UI. To view these devices in the
CLI, enter show boot-device command. During this the server's actual boot order is retained and it can be
viewed under actual boot order option in web UI and CLI.
When you downgrade Cisco IMC prior to 2.0(x) verison the server's last legacy boot order is retained, and
the same can be viewed under Actual Boot Order area. For example:
• If you configured the server in a legacy boot order in 2.0(x) version, upon downgrade a legacy boot order
configuration is retained.
• If you configured the server in a precision boot order in 2.0(x), upon downgrade the last configured
legacy boot order is retained.
Important • Boot order configuration prior to 2.0(x) is referred as legacy boot order. If your running version is 2.0(x),
then you cannot configure legacy boot order through web UI, but you can configure through CLI and
XML API. In the CLI, you can configure it by using set boot-order HDD,PXE command. Even though,
you can configure legacy boot order through CLI or XML API, in the web UI this configured boot order
is not displayed.
• Legacy and precision boot order features are mutually exclusive. You can configure either legacy or
precision boot order. If you configure legacy boot order, it disables all the precision boot devices
configured. If you configure precision boot order, then it erases legacy boot order configuration.
Note Do not change the boot order while the host is performing BIOS power-on self test (POST).
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
24
Managing the Server
Configuring the Precision Boot Order
Procedure
Step 2 Server /bios # show boot-device [detail]. Displays the detailed information of the boot
device.
Example
This example displays the details of the created bootable device:
Server# scope bios
Server /bios # show boot-device
Boot Device Device Type Device State Device Order
-------------------- ------------ ------------------ ----------------
TestUSB USB Enabled 1
TestPXE PXE Enabled 2
Server /bios # show boot-device detail
Boot Device TestUSB:
Device Type: USB
Device State: Enabled
Device Order: 1
Sub Type: HDD
Boot Device TestPXE:
Device Type: PXE
Device State: Enabled
Device Order: 2
Slot Id: L
Port Number: 1
Note Do not change the boot order while the host is performing BIOS power-on self test (POST).
Procedure
Step 2 Server /bios # create-boot-device[ device Creates a bootable device that BIOS chooses to
name] [device type]. boot. This can be one of the following:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
25
Managing the Server
Configuring the Precision Boot Order
• USB
• Virtual Media
• PCHStorage
• UEFISHELL
• HTTP
Step 3 Server /bios # scope boot-device created boot Enters the management of the created bootable
device name. devices.
Step 4 Server /bios /boot-device # set values Specifies the property values for particular
bootable device. You can set one or more of the
following:
• cli— CLI options
• state— Whether the device will be visible
by BIOS. By default the device is disabled.
Note If enabled, the device will
overwrite the legacy boot
order configuration.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
26
Managing the Server
Configuring the Precision Boot Order
Step 5 Server /bios /boot-device # commit Commits the transaction to the system
configuration.
Example
This example configures the boot order, creates a boot device, set the attributes of the new device
and commit the transaction:
Server# scope bios
Server /bios # create boot-device TestPXE PXE
Server /bios # scope boot-device TestPXE
Server /bios /boot-device # set state Enabled
Server /bios /boot-device # set slot L
Server /bios /boot-device # set port 1
Server /bios /boot-device # set order 1
Server /bios /boot-device # commit
Enabling boot device will overwrite Legacy Boot Order configuration
Continue?[y|N]y
Server /bios /boot-device # y
Commiting device configuration
Server /bios/boot-device # show detail
BIOS:
BIOS Version: "C240M3.2.0.0.15 (Build Date: 03/16/2014)"
Boot Order: (none)
Boot Override Priority:
FW Update/Recovery Status: None, OK
UEFI Secure Boot: disabled
Configured Boot Mode: None
Actual Boot Mode: Legacy
Last Configured Boot Order Source: CIMC
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
27
Managing the Server
Configuring the Precision Boot Order
This example configures the boot order, creates a HTTP boot device for the IP type - DHCP, sets
the attributes of the new device and commits the transaction:
Server# scope server 1
Server /server # scope bios
Server /server/bios # create boot-device HTTP-Test HTTP
Server /server/bios # scope boot-device HTTP-Test
Server /server/bios/boot-device # set status enabled
Server /server/bios/boot-device # set port 10
Server /server/server/bios /boot-device # set order 1
Server /server/bios /boot-device # set slot MLOM
Server /server/bios/boot-device # set iptype IPv4
Server /server/bios/boot-device # set macaddress 00:25:B5:00:01:2b
Server /server/bios/boot-device # set ipconfig-type DHCP
Server /server/bios/boot-device # set uri http://www.cloudboot.com:80/EFI/rhel_82_dvd.iso
Server /bios /boot-device # commit
Commiting device configuration
Server /server/bios/boot-device # show detail
BBIOS:
BIOS Version: server-name.2.0.7c.0.071620151216
Backup BIOS Version: server-name.2.0.7c.0.071620151216
Boot Order: (none)
Boot Override Priority:
FW Update/Recovery Status: None, OK
UEFI Secure Boot: Enabled
Last Configured Boot Order Source: CIMC
This example configures the boot order, creates a HTTP boot device for the IP type - Static, sets the
attributes of the new device and commits the transaction:
Server# scope server 1
Server /server # scope bios
Server /server/bios # create boot-device HTTP-Test HTTP
Server /server/bios # scope boot-device HTTP-Test
Server /server/bios/boot-device # set status enabled
Server /server/bios/boot-device # set port 10
Server /server/server/bios /boot-device # set order 1
Server /server/bios /boot-device # set slot MLOM
Server /server/bios/boot-device # set macaddress 00:25:B5:00:01:2b
Server /server/bios/boot-device # set ipconfig-type Static
Server /server/bios/boot-device # set iptype IPv6C240-WZP21360Z1B /bios/boot-device *# set
ipaddress 2001:420:5446:2014::330:12
Server /server/bios/boot-device *# set netmask_or_ipv6prefix 64
Server /server/bios/boot-device *# set gateway 2001:420:5446:2014::330:1
Server /server/bios/boot-device *# set dnsserver 2001:420:c0e0:1008::118
Server /server/bios/boot-device *# commit
Server /server/bios/boot-device *# set uri http://cisco.com/a.iso
Server /server/bios/boot-device *# commit
Server /server/bios/boot-device # show detail
Boot Device http_test:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
28
Managing the Server
Modifying the Attributes of a Boot Device
What to do next
Reboot the server to boot with your new boot order.
Note Do not change the boot order while the host is performing BIOS power-on self test (POST).
Procedure
Step 2 Server /bios # scope boot-device created boot Enters the management of the created bootable
device name. devices.
Step 3 Server /bios /boot-device # set state Enables or disables the device. The default
{Enabled|Disabled}. state is disabled.
Note If enabled, the device will
overwrite the legacy boot order
configuration.
Step 4 Server /bios /boot-device* # set order {Index Specifies the order of booting for particular
| 1-50}. device in the device list. Enter a number
between 1 and 50 based on the total number
of created device.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
29
Managing the Server
Modifying the Attributes of a Boot Device
Step 5 Server /bios /boot-device* # set port {value | Specifies the port of the slot in which the
1-255 }. device is present. Enter a number between 1
and 255.
Step 6 Server /server/bios /boot-device* # set iptype Specifies the IP type for the device.
{value | IPv4 | IPv6}.
Step 7 Server /server/bios /boot-device* # set Sets the MAC address of the network ethernet
macaddress {value }. interface.
Step 8 Server /server/bios /boot-device* # set Specifies the IP configuration type for the
ipconfig-type {value | DHCP | Static }. device.
Step 9 Server /server/bios /boot-device* # set uri Specifies the URI path where all the OS iso
{value }. and EFI files are located.
Step 10 Server /bios /boot-device* # commit Commits the transaction to the system
configuration.
Example
This example modifies the attributes of an existing device:
Server# scope bios
Server /bios *# scope boot-device scu-device-hdd
Server /bios/boot-device # set status enabled
Server /bios/boot-device *# set order 2
Server /bios/boot-device *# set port 1
Server /bios/boot-device *# commit
Enabling boot device will overwrite boot order Level 1 configuration
Continue?[y|N]y
Server /bios/boot-device #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
30
Managing the Server
Rearranging Device Boot Order
Server /server/bios/boot-device #
Note Do not change the boot order while the host is performing BIOS power-on self test (POST).
Procedure
Step 2 Server /bios # rearrange boot-device[device Rearranges the selected boot devices in a single
name]:[position]. execution.
Example
This example rearranges the selected boot devices:
Server# scope bios
Server /bios # rearrange-boot-device TestPXE:1,TestUSB:2
Server /bios # show boot-device
Boot Device Device Type Device State Device Order
-------------------- ------------ ------------------ ----------------
TestPXE PXE Disabled 1
TestUSB USB Disabled 2
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
31
Managing the Server
Re-Applying the Boot Order Configuration
Server /bios #
Note Do not change the boot order while the host is performing BIOS power-on self test (POST).
Procedure
Step 2 Server /bios # re-apply. Re-applies the boot order to BIOS, if the last
configured boot order source is BIOS..
Example
This example re-applies the boot order to BIOS:
Server# scope bios
Server /bios # re-apply
Server /bios #
What to do next
Reboot the host after reapplying the boot order to BIOS.
Note Do not change the boot order while the host is performing BIOS power-on self test (POST).
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
32
Managing the Server
Overview to UEFI Secure Boot
Example
This example deletes the selected device from the device list:
Server# scope bios
Server /bios # remove-boot-device scu-device-hdd
Server /bios #
Note If you enable UEFI secure boot on a nonsupported OS, on the next reboot, you cannot boot from that particular
OS. If you try to boot from the previous OS, an error is reported and recorded the under system software event
in the web UI. You must disable the UEFI secure boot option using Cisco IMC to boot from your previous
OS.
Important Also, if you use an unsupported adapter, an error log event in Cisco IMC SEL is recorded. The error messages
is displayed that says:
System Software event: Post sensor, System Firmware error. EFI Load Image Security Violation. [0x5302]
was asserted .
Components Types
Supported OS • Windows Server 2019
• Windows Server 2016
• ESX 6.7
• ESX 6.5
• ESXi 7.0
• Linux
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
33
Managing the Server
Enabling UEFI Secure Boot Mode
Components Types
Broadcom PCI adapters • 5709 dual and quad port adapters
• 57712 10GBASE-T adapter
• 57810 CNA
• 57712 SFP port
Fusion-io
Step 2 Server/ BIOS # set secure-boot enable | Enables or disables UEFI secure boot.
disable
Note If enabled, the boot mode is set to
UEFI secure boot mode. You
cannot modify configure boot
mode until UEFI secure boot
mode is disabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
34
Managing the Server
Disabling UEFI Secure Boot
Example
This example enables UEFI secure boot mode and commits the transaction
Server# scope bios
Server /bios # set secure-boot enable
Setting Value : enable
Commit Pending.
Server /bios *# commit
UEFI Secure boot state changed successfully. Execute 'show detail' command to check the
current status
Server /bios #
What to do next
Reboot the server to have your configuration boot mode settings take place.
Step 2 Server/ BIOS # set secure-boot enable | Enables or disables UEFI secure boot.
disable
Example
This example disables UEFI secure boot mode and commits the transaction
Server# scope bios
Server /bios # set secure-boot disable
Setting Value : enable
Commit Pending.
Server /bios *# commit
UEFI Secure boot state changed successfully. Execute 'show detail' command to check the
current status
Server /bios #
What to do next
Reboot the server to have your configuration boot mode settings take place.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
35
Managing the Server
Viewing the Actual Server Boot Order
Procedure
Step 2 Server /bios # show actual-boot-order [detail] Displays the boot order actually used by the
BIOS when the server last booted.
Example
This example displays the actual boot order of the legacy boot order from the last boot:
Server# scope bios
Server /bios # show actual-boot-order
Server /bios #
This example displays the actual boot order of precision boot order from the last boot:
Server /bios # show actual-boot-order
Boot Order Boot Device Device Type Boot Policy
------------ ----------------------------------- --------------- --------------------
1 IBA GE Slot 0201 v1398 PXE TestPXE
2 IBA GE Slot 0200 v1398 PXE NonPolicyTarget
3 IBA GE Slot 0202 v1398 PXE NonPolicyTarget
4 IBA GE Slot 0203 v1398 PXE NonPolicyTarget
5 "UEFI: Built-in EFI Shell " EFI NonPolicyTarget
Server /bios #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
36
Managing the Server
Configuring a Server to Boot With a One-Time Boot Device
Procedure
Step 2 Server# /bios show boot-device Displays the list of available boot drives.
Step 5 (Optional) Server# /bios show detail Displays the BIOS details.
Example
This example shows how to configure a server to boot with a one-time boot device:
Server scope bios
Server /bios # show boot-device
Boot Device Device Type Device State Device Order
------------------------------ ------------ ------------------ ----------------
KVMDVD VMEDIA Enabled 1
vkvm VMEDIA Enabled 2
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
37
Managing the Server
Assigning User-defined Server Description and Asset Tag
Step 2 Server /chassis # set description <Server Enters the server description.
Description>
Step 3 Server /chassis* # set asset-tag <Asset Tag> Enters the asset tag.
Step 5 (Optional) Server /chassis # show detail Displays the server details.
Example
This example shows how to assign user-defined server description and asset tag:
Server# scope chassis
Server/chassis # set description DN1-server
Server/chassis* # set asset-tag powerpolicy
Server /chassis* # commit
Server /chassis # show detail
Chassis:
Power: on
Serial Number: FCH1834V23X
Product Name: UCS C220 M4S
PID : UCSC-C220-M4S
UUID: 414949AC-22D6-4D0D-B0C0-F7950E9217C1
Locator LED: off
Description: DN1-server
Asset Tag: powerpolicy
Server /chassis #
Important If any firmware or BIOS updates are in progress, do not reset the server until those tasks are complete.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
38
Managing the Server
Shutting Down the Server
Example
This example resets the server:
Server# scope chassis
Server /chassis # power hard-reset
This operation will change the server's power state.
Continue?[y|N]
Important If any firmware or BIOS updates are in progress, do not shut down the server until those tasks are complete.
Procedure
Example
The following example shuts down the server:
Server# scope chassis
Server /chassis # power shutdown
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
39
Managing the Server
Managing Server Power
Note If the server was powered off other than through the Cisco IMC, the server will not become active immediately
when powered on. In this case, the server will enter standby mode until the Cisco IMC completes initialization.
Important If any firmware or BIOS updates are in progress, do not change the server power until those tasks are complete.
Procedure
Example
This example shows how to turn on the server:
Server# scope chassis
Server /chassis # power on
Warning: System is already powered ON, this action is ineffective.
Do you want to continue?[y|N]y
Important If any firmware or BIOS updates are in progress, do not power off the server until those tasks are complete.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
40
Managing the Server
Power Cycling the Server
Procedure
Example
This example turns off the server:
Server# scope chassis
Server /chassis # power off
This operation will change the server's power state.
Continue?[y|N]y
Important If any firmware or BIOS updates are in progress, do not power cycle the server until those tasks are complete.
Procedure
Example
This example power cycles the server:
Server# scope chassis
Server /chassis # power cycle
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
41
Managing the Server
Configuring Power Policies
Important This section is valid only for some UCS C-Series servers.
Power capping determines how server power consumption is actively managed. When you enable power
capping option, the system monitors power consumption and maintains the power below the allocated power
limit. If the server cannot maintain the power limit or cannot bring the platform power back to the specified
power limit within the correction time, power capping performs actions that you specify in the Action field
under the Power Profile area.
Once power capping is enabled, you can configure multiple power profiles to either have standard or advanced
power profiles with defined attributes. If you choose a standard power profile, you can set the power limit,
correction time, corrective-action, suspend period, hard capping, and policy state (if enabled). If you choose
an advanced power profile, in addition to the attributes of the standard power profile, you can also set the
domain specific power limits, safe throttle level, and ambient temperature based power capping attributes.
Note The following changes are applicable for Cisco UCS C-Series release 2.0(13) and later:
• After upgrading to the 2.0(13) release, power characterization automatically runs during the first host
power on. Subsequent characterization runs only if initiated as described in section Run Power
Characterization section.
• Also, when a server is power cycled and there is a change to the CPU or DIMM configurations, power
characterization automatically runs on first host boot. For any other hardware change like PCIe adapters,
GPU or HDDs, power characterization does not run. The characterized power range is modified depending
on the components present after the host power cycle.
The Run Power Characterization option in the Power Cap Configuration Tab of the Web UI power cycles
the host and starts power characterization.
Procedure
Step 2 Server /sensor # scope psu-redundancy-policy Enters psu redundancy policy command.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
42
Managing the Server
Enabling Power Characterization
Example
This example shows how to set power redundancy for the server:
Server / #scope sensor
Server /sensor #scope psu-redundancy-policy
Server /sensor/psu-redundancy-policy # set psu-redundancy-policy grid
Server /sensor/psu-redundancy-policy* # commit
Server /sensor/psu-redundancy-policy # show detail
PSU Redundancy Policy: grid
Server /sensor/psu-redundancy-policy #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
43
Managing the Server
Configuring the Power Cap Policy
Procedure
Step 2 Server /chassis # scope power-cap-config Enters power cap command mode.
Example
This example shows how to automatically invoke power characterization during a host reboot:
Server# scope chassis
Server /chassis# scope power-cap-config
Server /chassis /power-cap-config # run-pow-char-at-boot
Server /chassis /power-cap-config* # commit
Server /chassis/power-cap-config #
Procedure
Step 2 Server /chassis # scope power-cap-config Enters power cap command mode.
Step 3 Server /chassis /power-cap-config# set Enables or disables the capping of power to the
pow-cap-enable {yes | no} server.
Step 4 Server /chassis /power-cap-config# commit Commits the transaction to the system
configuration.
Example
This example shows how to enable the power capping policy:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
44
Managing the Server
Checking the Power Cap Range
Procedure
Example
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
45
Managing the Server
Configuring Standard Power Profile
Procedure
Step 2 Server /chassis # scope power-cap-config Enters power cap command mode.
Step 3 Server /chassis /power-cap-config# set Enables or disables the power capping
pow-cap-enable {yes | no} capability of the system.
Step 4 Server /chassis /power-cap-config# scope Enters the standard command mode of a power
power-profile standard profile
Step 5 Server /chassis /power-cap-config# set Enables or disables the system to maintain the
allow-throttle yes | no power limit by forcing the processor to use the
throttling state (T-state) and memory throttle.
Step 6 Server /chassis /power-cap-config# set Sets the correction time in which the platform
corr-time value power should be brought back to the specified
power limit before taking the action specified
in the Action mode.
The range is from 3 and 600 seconds. The
default is 3 seconds.
Step 7 Server /chassis /power-cap-config# set Specifies the action to be performed if the
except-action alert | shutdown specified power limit is not maintained within
the correction time. This can be one of the
following:
• Alert—Logs the event to the Cisco IMC
SEL.
• Shutdown—Gracefully shuts down the
host.
• None—No actions are taken.
Step 8 Server /chassis /power-cap-config# set Enables or disables the system to maintain the
hard-cap yes | no power consumption below the specified power
limit.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
46
Managing the Server
Configuring Advanced Power Profile Settings
Step 10 Server /chassis /power-cap-config# set Specifies the time period that the power
susp-pd {h:m-h:m | capping profile is not active.
|All,Mo,Tu,We,Th,Fr,Sa,Su.}
Step 11 Server /chassis /power-cap-config# commit Commits the transaction to the system.
Example
This example shows how to configure standard power profile:
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
47
Managing the Server
Configuring Advanced Power Profile Settings
Step 3 Server /chassis /power-cap-config # set Enables or disables the power capping
pow-cap-enable {yes | no} capability of the server.
Step 4 Server /chassis /power-cap-config # commit Commits the transaction to the system.
Step 5 Server /chassis /power-cap-config # scope Enters the advance command mode of a power
power-profile advanced profile.
Step 8 Server /chassis Specifies the power limit for the CPU.
/power-cap-config/power-profile # set
Enter power in watts within the range
cpu-power-limit value
specified.
Step 11 Server /chassis Specifies the power limit for the memory.
/power-cap-config/power-profile # set
Enter power in watts within the range
mem-pow-limit value
specified.
Step 12 Server /chassis Specifies a safe throttle policy when the power
/power-cap-config/power-profile # set capping functionality is impacted internal
fail-safe-timeout value faults such as missing power readings for
platforms or CPUs.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
48
Managing the Server
Configuring Advanced Power Profile Settings
Step 13 Server /chassis Specifies the throttling level for the platform
/power-cap-config/power-profile # set in percentage.
plat-safe-Tlvl value
The range is from 0 and 100.
Step 16 Server /chassis Specifies the time period that the power
/power-cap-config/power-profile # set susp-pd capping profile will not be active.
{h:m-h:m | |All,Mo,Tu,We,Th,Fr,Sa,Su.}
Step 17 Server Specifies the power limit to be maintained.
/chassis/power-cap-config/power-profile # set
Enter power in watts within the range
thermal-power-limit value
specified.
Example
This example shows how to configure the advance power profile setting:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
49
Managing the Server
Resetting the Power Profiles to Defaults
Procedure
Step 2 Server /chassis # scope power-cap-config Enters power cap command mode.
Example
This example shows how to reset the power profile to the default settings:
Server# scope chassis
Server /chassis# scope power-cap-config
Server /chassis /power-cap-config # reset-power-profile-to-defaults
Server /chassis /power-cap-config* # commit
Server /chassis/power-cap-config #
Procedure
Step 2 Server /chassis # scope power-cap-config Enters power cap configuration command mode.
Step 3 Server /chassis/power-cap-config # show detail Displays information about the power
characterization.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
50
Managing the Server
Viewing the Power Statistics
Example
This example shows how to view information about the power cap configuration:
Procedure
Step 2 Server /chassis # show power-monitoring Displays the power used by the server, CPU,
and memory since the last time it was rebooted.
Example
This example shows how to view the power statistics of an individual domain:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
51
Managing the Server
Configuring the Power Restore Policy
Procedure
Step 2 Server /CIMC # Scope power-restore-policy Enters the power restore policy command mode.
Step 3 Server /CIMC/power-restore-policy # set policy Specifies the action to be taken when chassis
{power-off | power-on | restore-last-state} power is restored. Select one of the following:
• power-off—Server power will remain off
until manually turned on. This is the
default action.
• power-on—Server power will be turned
on when chassis power is restored.
• restore-last-state—Server power will
return to the state before chassis power
was lost.
Step 4 (Optional) Server /CIMC/power-restore-policy Specifies whether server power will be restored
# set delay {fixed | random} after a fixed or random time. The default is
fixed. This command is accepted only if the
power restore action is power-on.
Step 5 (Optional) Server /CIMC/power-restore-policy Specifies the delay time in seconds. The range
# set delay-value delay is 0 to 240; the default is 0.
Example
This example sets the power restore policy to power-on with a fixed delay of 180 seconds (3 minutes)
and commits the transaction:
Server# scope CIMC
Server /CIMC # Scope power-restore-policy
Server /CIMC/power-restore-policy # set policy power-on
Server /CIMC/power-restore-policy *# commit
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
52
Managing the Server
Configuring Fan Policies
Server /CIMC/power-restore-policy #
With the introduction of fan policies, you can determine the right fan speed for the server, based on the
components in the server. In addition, it allows you to configure the fan speed to address problems related to
maximum CPU performance and low power consumption.
Following are the fan policies that you can choose from:
• Balanced—This setting can cool almost any server configuration, but may not be suitable for servers
with PCIe cards as these cards overheat easily.
• Low Power—This setting is ideal for minimal configuration servers that do not contain any PCIe cards.
• High Power—This policy is ideal for servers that contain PCIe cards that overheat easily and have high
temperatures.
• Maximum Power—This setting can be used for server configurations that required extremely high fan
speeds. This policy is ideal for servers that contain PCIe cards that overheat easily and have very high
temperatures.
• Acoustic—This setting can be used for configuring the fan noise level, thereby enabling noise reduction
in the servers.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
53
Managing the Server
Configuring a Fan Policy
Application of this policy might result in performance throttling impacting system performance. If
excessive thermal or performance events are recorded in the event logs, select a standard fan control
policy like Low Power, which is a non-disruptive change.
Note This option is available only on Cisco UCS C220 M5, C240 SD M5, C240 M5,
C220 M6, C240 M6, C245 M6 , C225 M6 , C220 M7, and C240 M7 servers. For
these servers, Acoustic is the default fan policy.
For other servers, default fan policy depends on the server configuration and the
number of PCIe cards present in the server.
Note For Cisco UCS M5 servers, although you set a fan policy in Cisco IMC, the actual speed that the fan runs at
is determined by the configuration requirements of the server. PCIe cards are tagged with minimum fan speed
depending on thermal requirements. If the server is equipped with these PCIe cards, you cannot configure the
fan policy, which go below the tagged requirement.
The Configuration Status displays the status of the configured fan policy in Cisco UCS M5 servers. This
can be one of the following:
• SUCCESS —The selected fan policy matches the actual fan speed that runs on the server.
• PENDING —The configured fan policy is not in effect yet. This can be due to one of the following:
• The server is powered off
• The BIOS POST is not complete
• FAN POLICY OVERRIDE—Overrides the specified fan speed with the actual speed determined by the
configuration requirements of the server.
Note • For Cisco UCS C220 M7, C240 M7, C220 M6, C240 M6, UCS C220 M5,C240 M5, C240 SD M5, C125
M5,C480 M5,C480-M5ML, Applied fan policy depends on the PCIe cards present in the server.
• For Cisco UCS C225 M6 and C245 M6, Applied fan policy depends on the PCIe cards or a specific
CPU type present in the server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
54
Managing the Server
Configuring a Fan Policy
Procedure
Step 2 Server /chassis # scope fan-policy Enters the fan policy command mode.
Step 3 Server /chassis/fan-policy # set fan-policy Sets the fan policy for the server. It can be one
of the following:
• Balanced—This setting can cool almost
any server configuration, but may not be
suitable for servers with PCIe cards as
these cards overheat easily.
• Low Power—This setting is ideal for
minimal configuration servers that do not
contain any PCIe cards.
• High Power—This policy is ideal for
servers that contain PCIe cards that
overheat easily and have high
temperatures.
• Maximum Power—This setting can be
used for server configurations that required
extremely high fan speeds. This policy is
ideal for servers that contain PCIe cards
that overheat easily and have very high
temperatures.
• Acoustic—This setting can be used for
configuring the fan noise level, thereby
enabling noise reduction in the servers.
Application of this policy might result in
performance throttling impacting system
performance. If excessive thermal or
performance events are recorded in the
event logs, select a standard fan control
policy like Low Power, which is a
non-disruptive change.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
55
Managing the Server
Configuring DIMM Block Listing
Step 4 Server /chassis/fan-policy # set Use this option to enable aggressive cooling.
aggressive-coolingno\yes
Step 5 Server /chassis/fan-policy # commit Commits the changes to the server.
Example
This example shows how to set the fan policy to maximum power for a server:
server # scope chassis
server /chassis # scope fan-policy
server /chassis/fan-policy # set fan-policy maximum-power
server /chassis/fan-policy # set aggressive-cooling yes
server /chassis/fan-policy* # commit
server /chassis/fan-policy # show detail
Fan Policy: maximum-power
Applied Fan Policy: Max Power
Configuration Status: SUCCESS
server /chassis/fan-policy #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
56
Managing the Server
Enabling DIMM Block Listing
DIMMs are mapped out or blocklisted only when Uncorrectable errors occur. When a DIMM gets blocklisted,
other DIMMs in the same channel are ignored or disabled, which means that the DIMM is no longer considered
bad.
Note DIMMs do not get mapped out or blocklisted for 16000 Correctable errors.
Procedure
Step 2 Server /dimm-blocklisting # set enabled {yes Enables or disables DIMM blocklisting.
| no}
Step 3 Server /dimm-blocklisting* # commit Commits the transaction to the system
configuration.
Example
The following example shows how to enable DIMM blocklisting:
Server# scope dimm-blocklisting
Server /dimm-blocklisting # set enabled yes
Server /dimm-blocklisting* # commit
Server /dimm-blocklisting #
Server /dimm-blocklisting # show detail
DIMM blocklisting:
Enabled: yes
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
57
Managing the Server
Configuring BIOS Settings
Name Description
BIOS Version The version string of the running BIOS.
Boot Order The legacy boot order of bootable target types that
the server will attempt to use.
Configured Boot Mode The boot mode in which h BIOS will try to boot the
devices.
Actual Boot Mode The actual boot mode in which BIOS booted the
devices.
Last Configured Boot Order Source The last configured boot order source by BIOS.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
58
Managing the Server
Restoring BIOS Defaults
Example
This example configures the BIOS to enable the USB legacy support and commits the transaction:
Server# scope bios
Server /bios # scope input-output
Server /bios/input-output # set UsbLegacySupport enabled
Server /bios/input-output *# commit
Changes to BIOS set-up parameters will require a reboot.
Do you want to reboot the system?[y|N] n
Changes will be applied on next reboot.
Server /bios/input-output #
Procedure
Step 2 Server /bios # bios-setup-default Restores BIOS default settings. This command
initiates a reboot.
Example
This example restores BIOS default settings:
Server# scope bios
Server /bios # bios-setup-default
This operation will reset the BIOS set-up tokens to factory defaults.
All your configuration will be lost.
Changes to BIOS set-up parameters will initiate a reboot.
Continue?[y|N]y
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
59
Managing the Server
Restoring BIOS Manufacturing Custom Defaults
Procedure
Example
This example enables you to enter BIOS setup:
Server# scope bios
Server /bios # enter-bios-setup
This operation will enable Enter BIOS Setup option.
Host must be rebooted for this option to be enabled.
Continue?[y|N]y
Procedure
Step 2 Server /bios # restore-mfg-defaults Restores the set up tokens to the manufacturing
default values.
Example
This example shows how to restore the BIOS set up tokens to the manufacturing default values:
Server # scope bios
Server /bios # restore-mfg-defaults
This operation will reset the BIOS set-up tokens to manufacturing defaults.
The system will be powered on.
Continue? [y|n] N
Server /bios #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
60
Managing the Server
BIOS Profiles
BIOS Profiles
On the Cisco UCS server, default token files are available for every S3260 server platform, and you can
configure the value of these tokens using the Graphic User Interface (GUI), CLI interface, and the XML API
interface. To optimize server performance, these token values must be configured in a specific combination.
Configuring a BIOS profile helps you to utilize pre-configured token files with the right combination of the
token values. Some of the pre-configured profiles that are available are virtualization, high-performance, low
power, and so on. You can download the various options of these pre-configured token files from the Cisco
website and apply it on the servers through the BMC.
You can edit the downloaded profile to change the value of the tokens or add new tokens. This allows you to
customize the profile to your requirements without having to wait for turnaround time.
Procedure
Step 2 Server# /bios scope bios-profile Enters the BIOS profile command mode.
Step 3 Server# /bios/bios-profile activate You are prompted to back up the BIOS
virtualization configuration. Enter y.
Step 4 You are prompted to reboot the system to apply Initiates the system reboot.
the changes to the BIOS set-up parameters.
Enter y.
Example
This example activates the specified BIOS profile:
Server # scope bios
Server /bios # scope bios-profile
Server /bios/bios-profile # activate virtualization
It is recommended to take a backup before activating a profile.
Do you want to take backup of BIOS configuration?[y/n] y
backup-bios-profile succeeded.
bios profile “virtualization” deleted
Changes to BIOS set-up parameters will require a reboot.
Do you want to reboot the system?[y|N]y
A system reboot has been initiated.
Server /bios/bios-profile #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
61
Managing the Server
Taking a Back-Up of a BIOS Profile
Procedure
Step 2 Server# /bios scope bios-profile Enters the BIOS profile command mode.
Step 3 Server# /bios/bios-profile backup Displays a message that the backup of the BIOS
profile was successful.
Example
This example backs up a BIOS profile:
Server # scope bios
Server /bios # scope bios-profile
Server /bios/bios-profile # backup
backup-bios-profile succeeded.
Server /bios #
Procedure
Step 2 Server# /bios scope bios-profile Enters the BIOS profile command mode.
Step 3 Server# /bios/bios-profile delete BIOS profile Deletes the specified BIOS profile.
Example
This example deletes the specified BIOS profile:
Server # scope bios
Server /bios # scope bios-profile
Server /bios/bios-profile # delete performance
Server /bios/bios-profile #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
62
Managing the Server
Displaying BIOS Profiles
Step 2 Server# /bios show bios-profile Displays all the BIOS profiles.
Example
This example displays all the BIOS profiles:
Server # scope bios
Server /bios # show bios-profile
ID Name Active
------ ---------------- -------- --------
1 performance yes
2 virtualization no
3 none no
4 cisco_backup no
Server /bios #scope bios-profile
Server /bios #
Step 2 Server# /bios scope bios-profile Displays all the BIOS profiles.
Step 3 Server# /bios/bios-profile info performance Displays information of the BIOS profile such
as token name, profile value, and active value.
Example
This example displays information of the specified BIOS profile:
Server # scope bios
Server /bios # scope bios-profile
Server /bios/bios-profile # info performance
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
63
Managing the Server
Displaying details of the BIOS Profile
Step 2 Server# /bios scope bios-profile Enters the BIOS profile command mode.
Step 3 Server# /bios/bios-profile show detail Displays the details of BIOS profile.
Example
This example displays the details of the BIOS profile:
Server # scope bios
Server /bios # scope bios-profile
Server /bios/bios-profile # show detail
Active Profile: Virtualization
Install Status: bios profile install done
Server /bios/bios-profile #
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
64
Managing the Server
Uploading Secure Boot Certificate Using Paste Option
Example
This examples shows how to view secure boot certificate detail:
server # scope bios
server / bios # scope secure-boot-certificate 3
server /bios/secure-boot-certificate # show detail
Secure Boot CA Certificate:
Certificate ID: 3
Serial Number: 04
Subject Country Code (CC): XX
Subject State (S): XX
Subject Locality (L): XX
Subject Organization (O): XX
Subject Organizational Unit (OU): XX
Subject Common Name (CN): *.XX
Issuer Country Code (CC): XX
Issuer State (S): XX
Issuer Locality (L): XX
Issuer Organization (O): XX
Issuer Organizational Unit (OU): XX
Issuer Common Name (CN): .XX
Valid From: Month Date Time_Stamp 20xx GMT
Valid To: Month Date Time_Stamp 20xx GMT
Procedure
Step 3 Server / bios / secure-boot-certificate # You are prompted to paste the certificate.
upload-paste-secure-boot-certificate
Please paste your certificate
here, when finished, press
CTRL+D
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
65
Managing the Server
Uploading Secure Boot Certificate From Remote Location
Example
This examples shows how to upload a secure boot certificate using paste option:
server # scope bios
server / bios # scope secure-boot-certificate 3
server /bios/secure-boot-certificate # upload-paste-secure-boot-certificate
Please paste your certificate here, when finished, press CTRL+D.
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Secure Boot Certificate pasted successfully.
What to do next
You may verify the certificate details using the show detail command.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
66
Managing the Server
Uploading Secure Boot Certificate From Remote Location
Procedure
Example
This examples shows how to upload a secure boot certificate using remote location option (with scp
file transfer protocol):
server # scope bios
server / bios # scope secure-boot-certificate 3
server /bios/secure-boot-certificate # upload-remote-secure-boot-certificate scp 10.10.10.10
/home/username/certificate.pem
Server (RSA) key fingerprint is xx:xx:8b:36:5a:53:14:d3:85:d0:xx:xx:e0:xx:24:51
Do you wish to continue? [y/N]y
Username: username
Password: password
Secure Boot Certificate uploaded successfully
What to do next
You may verify the certificate details using the show detail command.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
67
Managing the Server
Deleting a Secure Boot Certificate
Procedure
Example
This examples shows how to delete a secure boot certificate:
server # scope bios
server / bios # scope secure-boot-certificate 3
Server /bios/secure-boot-certificate # delete-secure-boot-certificate
Do you want to delete the existing secure boot certificate? [y|N]y
Secure Boot Certificate - 3 is deleted
Important If any firmware or BIOS updates are in progress, do not reset the server until those tasks are complete.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
68
Managing the Server
Viewing Product ID (PID) Catalog Details
Step 4 Server /chassis/firmware # update-all Updates the firmware on the server components.
Example
This example resets the server:
Server# scope chassis
Server /chassis # scope firmware
Server /chassis / firmware # show detail
Step 2 Server /chassis # show cpu-pid Displays the CPU PID details.
Step 3 Server /chassis # show dimm-pid Displays the memory PID details.
Step 4 Server /chassis # show pciadapter-pid Displays the PCI adapters PID details.
Step 5 Server /chassis # show hdd-pid Displays the HDD PID details.
Example
This example shows how to create view PID details
Server # scope chassis
Viewing CPU PID details
Server /chassis # show cpu-pid
Socket Product ID Model
------ -------------------- ----------------------------------------
CPU1 UCS-CPU-E52660B Intel(R) Xeon(R) CPU E5-2660 v2 @ 2.2...
CPU2 UCS-CPU-E52660B Intel(R) Xeon(R) CPU E5-2660 v2 @ 2.2...
Viewing memory PID details
Server /chassis # show dimm-pid
Name Product ID Vendor ID Capacity Speed
----------------- -------------------- ---------- --------- ------
DIMM_A1 UNKNOWN NA Failed NA
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
69
Managing the Server
Uploading and Activating a PID Catalog
Server /chassis #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
70
Managing the Server
Uploading and Activating a PID Catalog
Procedure
Step 2 Server# /chassis scope pid-catalog Enters the PID catalog command mode.
Step 4 (Optional) Server# /chassis/pid-catalog show Displays the status of the upload.
detail
Step 5 Server# /chassis/pid-catalog activate Activates the uploaded PID catalog.
Step 6 Server# /chassis/pid-catalog show detail Displays the status of the activation.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
71
Managing the Server
Deleting a PID Catalog
Example
This example uploads and activates the PID catalog:
Server # scope chassis
Server /chassis # scope pid-catalog
Uploading PID Catalog
Server /chassis/pid-catalog # upload-pid-catalog tftp 10.10.10.10 pid-ctlg-2_0_12_78_01.tar.gz
upload-pid-catalog initialized.
Please check the status using "show detail".
Server /chassis/pid-catalog #
Server /chassis/pid-catalog # show detail
Upload Status: Upload Successful
Activation Status: Please Activate Catalog
Current Activated Version: N/A
Activating the uploaded PID catalog
Server /chassis/pid-catalog # activate
Successfully activated PID catalog
Server /chassis/pid-catalog # show detail
Upload Status:
Activation Status: Activation Successful
Current Activated Version: 2.0(12.78).01
Server /chassis/pid-catalog #
Procedure
Step 2 Server# /chassis scopepid-catalog Enters the PID catalog command mode.
Step 3 Server /chassis/pid-catalog # delete Enter y at the confirmation prompt to delete the
PID catalog.
Note You can delete a PID catalog only
if it has been previously updated
and activated.
Step 4 (Optional) Server# /chassis/pid-catalog show Displays the status of the PID catalog.
detail
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
72
Managing the Server
Persistent Memory Module
Example
This example uploads and activates the PID catalog:
Server # scope chassis
Server /chassis # scope pid-catalog
Server /chassis/pid-catalog # delete
CIMC will be automatically rebooted after successful deletion of the uploaded catalog file.
Once this is complete, a host reboot will be required for the catalog changes to be reflected
in
the BIOS and host Operating System Continue?[y|N]y
Server /chassis/pid-catalog # show detail
PID Catalog:
Upload Status: N/A
Activation Status: N/A
Current Activated Version: 4.1(0.41)
Server /chassis/pid-catalog #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
73
Managing the Server
Persistent Memory Modules
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
74
CHAPTER 4
Viewing Server Properties
This chapter includes the following sections:
• Viewing Server Properties, on page 75
• Viewing System Information, on page 76
• Viewing a Server Utilization, on page 76
• Viewing Cisco IMC Properties, on page 77
• Viewing CPU Properties, on page 78
• Viewing Memory Properties, on page 78
• Viewing Power Supply Properties, on page 80
• Viewing Storage Properties, on page 80
• Viewing PCI Adapter Properties, on page 86
• Viewing Network Related Properties, on page 87
• Viewing TPM Properties, on page 88
• Enabling 6G or 12G Mixed Mode Speed on SAS Expanders, on page 88
• Enabling Dual Enclosure in Storage Controllers, on page 89
Example
This example displays server properties:
Server# show chassis detail
Chassis:
Power: on
Serial Number: QCI140205ZG
Product Name: UCS C210 M2
PID : R210-2121605W
UUID: FFFFFFFF-FFFF-FFFF-FFFF-FFFFFFFFFFFF
Locator LED: off
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
75
Viewing Server Properties
Viewing System Information
Server#
Example
This example shows how to view system details:
Server# scope chassis
Server /chassis # show sku-details
SAS Expander: Not-Present
HDD: 10-SFF_drive_back_plane
Riser1: (1 Slot x16)
Riser2: (1 Slot x16)
M.2 SATA/NVMe: Not-Present
M.2 SD Card Controller: Not-Present
CPU1 PKG-ID: Non-MCP
CPU2 PKG-ID: Non-MCP
Intrusion Sensor: Not-Equipped
Server /chassis #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
76
Viewing Server Properties
Viewing Cisco IMC Properties
Procedure
Step 2 Server /chassis # show cups-utilization Displays the server utilization value on all the
available CPUs.
Note These utilization values are
reported as a percentage of the
total hardware bandwidth. These
values may not match with the
values being displayed by the host
based resource monitoring
software.
Example
This example shows how to view the server utilization value:
Server# scope chassis
Server /chassis # show cups-utilization
CPU Utilization (%) Memory Utilization (%) I/O Utilization (%) Overall Utilization (%)
-------------------- ----------------------- -------------------- ------------------------
100 69 0 86
Server /chassis #
Note Cisco IMC gets the current date and time from the server BIOS. To change this information, reboot the server
and press F2 when prompted to access the BIOS configuration menu. Then change the date or time using the
options on the main BIOS configuration tab.
Procedure
Example
This example displays Cisco IMC properties:
Server# show cimc detail
Cisco IMC:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
77
Viewing Server Properties
Viewing CPU Properties
Server#
Procedure
Example
This example displays CPU properties:
Server# scope chassis
Server /chassis # show cpu
Name Cores Version
------------ -------- --------------------------------------------------
CPU1 4 Intel(R) Xeon(R) CPU E5520 @ 2.27GHz
CPU2 4 Intel(R) Xeon(R) CPU E5520 @ 2.27GHz
Server /chassis #
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
78
Viewing Server Properties
Viewing Memory Properties
Example
This example displays memory properties:
Server# scope chassis
Server /chassis # show dimm
Name Capacity Channel Speed (MHz) Channel Type
-------------------- --------------- ------------------- ---------------
DIMM_A1 2048 MB 1067 Other
DIMM_A2 2048 MB 1067 Other
DIMM_B1 2048 MB 1067 Other
DIMM_B2 2048 MB 1067 Other
DIMM_C1 Not Installed Unknown Other
DIMM_C2 Not Installed Unknown Other
DIMM_D1 2048 MB 1067 Other
DIMM_D2 2048 MB 1067 Other
DIMM_E1 2048 MB 1067 Other
DIMM_E2 2048 MB 1067 Other
DIMM_F1 Not Installed Unknown Other
DIMM_F2 Not Installed Unknown Other
Server /chassis #
Server /chassis #
Server /chassis #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
79
Viewing Server Properties
Viewing Power Supply Properties
Procedure
Step 2 Server /chassis # show psu [detail] Displays power supply properties.
Example
This example displays power supply properties:
Server# scope chassis
Server /chassis # show psu
Name In. Power (Watts) Out. Power (Watts) Firmware Status
---------- -------------------- -------------------- -------- ----------
PSU1 74 650 R0E Present
PSU2 83 650 R0E Present
Server /chassis #
Note Input Power and Maximum Output Power options are available only for some C-Series servers.
Procedure
Step 2 Server /chassis # show storageadapter [slot] Displays installed storage cards.
[detail]
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
80
Viewing Server Properties
Viewing Storage Adapter Properties
Step 3 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 4 Server /chassis/storageadapter # show bbu Displays battery backup unit information for
[detail] the storage card.
Step 5 Server /chassis/storageadapter # show Displays RAID levels supported by the storage
capabilites [detail] card.
Step 6 Server /chassis/storageadapter # show Displays number of errors seen by the storage
error-counters [detail] card.
Step 7 Server /chassis/storageadapter # show Displays firmware version information for the
firmware-versions [detail] storage card.
Step 8 Server /chassis/storageadapter # show Displays hardware information for the storage
hw-config [detail] card.
Step 9 Server /chassis/storageadapter # show Displays manufacturer data for the storage
mfg-data [detail] card.
Step 10 Server /chassis/storageadapter # show pci-info Displays adapter PCI information for the
[detail] storage card.
Step 11 Server /chassis/storageadapter # show Displays running firmware information for the
running-firmware-images [detail] storage card.
Step 12 Server /chassis/storageadapter # show settings Displays adapter firmware settings for the
[detail] storage card.
Example
This example displays storage properties:
Server# scope chassis
Server /chassis # show storageadapter
PCI Slot Product Name Serial Number Firmware Package Build
-------- ---------------------------------- -------------- -------------------------
SAS LSI MegaRAID SAS 9260-8i SV93404392 12.12.0-0038
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
81
Viewing Server Properties
Viewing the Flexible Flash Controller Properties
Server /chassis #
This example displays battery backup unit information for the storage card named SAS:
Server# scope chassis
Server /chassis # scope storageadapter SAS
Server /chassis/storageadapter # show bbu
Controller Battery Type Battery Present Voltage Current Charge Charging State
---------- ------------ --------------- ---------- ---------- ------ --------------
SAS iBBU true 4.051 V 0.000 A 100% fully charged
Server /chassis/storageadapter #
Procedure
Step 2 Required: Server /chassis # show flexflash (Optional) Displays the available Cisco Flexible
[detail] Flash controllers.
Step 3 Required: Server /chassis # scope flexflash Enters the Cisco Flexible Flash controller
index command mode for the specified controller. At
this time, the only permissible index value is
FlexFlash-0.
Example
This example displays the properties of the flash controller:
Server# scope chassis
Server /chassis # show flexflash
Controller Product Name Has Error Firmware Version Vendor Internal State
------------ ---------------- ---------- ----------------- -------- ---------------
FlexFlash-0 Cisco FlexFlash No 1.2 build 247 Cypress Connected
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
82
Viewing Server Properties
Viewing Physical Drive Properties
Server /chassis/flexflash #
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # show Displays physical drive information for the
physical-drive [drive-number] [detail] storage card.
Step 4 Server /chassis/storageadapter # show Displays the number of physical drives on the
physical-drive-count [detail] storage card.
Step 5 Server /chassis/storageadapter # scope Enters command mode for the specified
physical-drive drive-number physical drive.
Example
This example displays general information about physical drive number 1 on the storage card named
SAS:
Server# scope chassis
Server /chassis # scope storageadapter SAS
Server /chassis/storageadapter # scope physical-drive 1
Server /chassis/storageadapter/physical-drive # show general
Slot Number 1:
Controller: SAS
Enclosure Device ID: 27
Device ID: 34
Sequence Number: 2
Media Error Count: 0
Other Error Count: 0
Predictive Failure Count: 0
Link Speed: 6.0 Gb/s
Interface Type: SAS
Media Type: HDD
Block Size: 512
Block Count: 585937500
Raw Size: 286102 MB
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
83
Viewing Server Properties
Viewing Virtual Drive Properties
Server /chassis/storageadapter/physical-drive #
This example displays inquiry data about physical drive number 1 on the storage card named SAS:
Server# scope chassis
Server /chassis # scope storageadapter SAS
Server /chassis/storageadapter # scope physical-drive 1
Server /chassis/storageadapter/physical-drive # show inquiry-data
Slot Number 1:
Controller: SAS
Product ID: MBD2300RC
Drive Firmware: 5701
Drive Serial Number: D010P9A0016D
Server /chassis/storageadapter/physical-drive #
This example displays status information about physical drive number 1 on the storage card named
SAS:
Server# scope chassis
Server /chassis # scope storageadapter SAS
Server /chassis/storageadapter # scope physical-drive 1
Server /chassis/storageadapter/physical-drive # show inquiry-data
Slot Number 1:
Controller: SAS
State: online
Online: true
Fault: false
Server /chassis/storageadapter/physical-drive #
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # show Displays virtual drive information for the
virtual-drive [drive-number] [detail] storage card.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
84
Viewing Server Properties
Viewing Nvidia GPU Card Information
Step 5 Server /chassis/storageadapter # scope Enters command mode for the specified virtual
virtual-drive drive-number drive.
Example
This example displays information about virtual drives on the storage card named SAS:
Server# scope chassis
Server /chassis # scope storageadapter SAS
Server /chassis/storageadapter # show virtual-drive
Virtual Drive Status Name Size RAID Level
-------------- --------------- ------------------------ ---------- ----------
0 Optimal SLES1SP1beta5 30720 MB RAID 0
1 Optimal RHEL5.5 30720 MB RAID 0
2 Optimal W2K8R2_DC 30720 MB RAID 0
3 Optimal VD_3 30720 MB RAID 0
4 Optimal ESX4.0u2 30720 MB RAID 0
5 Optimal VMs 285568 MB RAID 0
6 Optimal RHEL6-35GB 35840 MB RAID 0
7 Optimal OS_Ins_Test_DR 158720 MB RAID 0
8 Optimal 285568 MB RAID 1
Server /chassis/storageadapter #
This example displays physical drive information about virtual drive number 1 on the storage card
named SAS:
Server# scope chassis
Server /chassis # scope storageadapter SAS
Server /chassis/storageadapter # scope virtual-drive 1
Server /chassis/storageadapter/virtual-drive # show physical-drive
Span Physical Drive Status Starting Block Number Of Blocks
----- -------------- ---------- -------------- ----------------
0 12 online 62914560 62914560
Server /chassis/storageadapter/virtual-drive #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
85
Viewing Server Properties
Viewing PCI Adapter Properties
Procedure
Step 2 Server /chassis # show gpu Displays the available Nvidia GPU cards on the
system.
Step 3 Server /chassis # scope gpu slot-number Enters the GPU card command mode. Specify
the slot number of the GPU card.
Step 4 Server /chassis/gpu # show gpu-list Displays temperature information on the GPU
cards.
Example
This example shows how to view the temperature information of the available GPU cards on the
system:
Server # scope chassis
Server /chassis # show gpu
GPU ID Temperature
------ -----------
0 32
1 33
Server /chassis/gpu #
Procedure
Step 2 Server /chassis # show pci-adapter [detail] Displays PCI adapter properties.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
86
Viewing Server Properties
Viewing Network Related Properties
Example
This example displays PCI adapter properties:
Server# scope chassis
Server /chassis # show pci-adapter
Slot Vendor ID Device ID SubVendor ID SubDevice ID Firmware Version Product Name
---- --------- ---------- ------------ ------------- ---------------- -------------------
L 0x8086 0x1521 0x1137 0x008b 0x80000AA5... Intel(R) I350 1 Gbps N...
1 0x19a2 0x0710 0x10df 0xe702 4.6.142.10 Emulex OCe11102-FX 2 p...
3 0x10de 0x118f 0x10de 0x097f N/A Nvidia TESLA K10 P2055...
4 0x14e4 0x1639 0x14e4 0x1639 N/A Broadcom 5709 1 Gbps 2...
5 0x10de 0x0ff2 0x10de 0x1012 N/A Nvidia GRID K1 P2401-502
M 0x1000 0x0073 0x1137 0x00b1 N/A Cisco UCSC RAID SAS 20…
Server /chassis #
Note Option ROM Status is applicable only for legacy boot mode and not for UEFI boot mode.
Procedure
Step 2 Server /chassis # scope network-adapter slot Enters the specific network adapter command
ID mode.
Step 3 Server /chassis/network-adapter # show Displays the MAC addresses of the LOM ports.
mac-list [detail]
Example
This example shows how to display the MAC addresses of the LOM ports:
Server# scope chassis
Server /chassis # scope network-adapter L
Server /chassis/network-adapter # show mac-list
Interface ID MAC Address
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
87
Viewing Server Properties
Viewing TPM Properties
------------- --------------------
eth0 010000002000
eth1 010000002000
Server /chassis/network-adapter #
Procedure
Example
This example displays the TPM properties:
Server# scope chassis
Server /chassis # show tpm-inventory
Server /chassis #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
88
Viewing Server Properties
Enabling Dual Enclosure in Storage Controllers
Procedure
Step 2 Server /chassis # scope sas-expander Enters the SAS expander command mode.
sas-expander ID
Step 3 Server /chassis/sas-expander # scope Enters the 6G or 12G mixed mode command
6G-12G-Mixed-Mode-status mode.
Example
This example shows how to enable the 6G or 12G mixed mode on the SAS expander:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
89
Viewing Server Properties
Enabling Dual Enclosure in Storage Controllers
Procedure
Example
This example sets dual enclosure support in the SAS expanders:
Server # scope chassis
Server /chassis # scope dynamic-storage
Server /chassis # show expander-hw-detail
Name Id ExpanderHwRev SasAddress EnclosureId
---------- ----- --------------- -------------------- -------------------------
SASEXP1 1 2 52cd02db305cba00 52cd02db305cb000
Name Id ExpanderHwRev SasAddress EnclosureId
---------- ----- --------------- -------------------- -------------------------
SASEXP2 2 2 52cd02db305ccb00 52cd02db305cb000
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
90
Viewing Server Properties
Enabling Dual Enclosure in Storage Controllers
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
91
Viewing Server Properties
Enabling Dual Enclosure in Storage Controllers
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
92
CHAPTER 5
Viewing Sensors
This chapter includes the following sections:
• Viewing Power Supply Sensors, on page 93
• Viewing Fan Sensors, on page 94
• Viewing Temperature Sensors, on page 95
• Viewing Voltage Sensors, on page 96
• Viewing Current Sensors, on page 97
• Viewing Storage Sensors, on page 97
• Setting Dynamic Front Panel Temperature Threshold, on page 98
Step 2 Server /sensor # show psu Displays power supply sensor statistics for the
server.
Step 3 Server /sensor # show psu-redundancy Displays power supply redundancy sensor status
for the server.
Example
This example displays power supply sensor statistics:
Server# scope sensor
Server /sensor # show psu
Name Sensor Status Reading Units Min. Warning Max. Warning Min. Failure Max.
Failure
------------ -------------- -------- ------ ------------ ------------ -------------
-------------
SU1_PIN Normal 102 Watts N/A 882 N/A
1098
PSU2_PIN Normal 96 Watts N/A 882 N/A
1098
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
93
Viewing Sensors
Viewing Fan Sensors
Server /sensor #
Step 2 Server /sensor # show fan [detail] Displays fan sensor statistics for the server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
94
Viewing Sensors
Viewing Temperature Sensors
Example
This example displays fan sensor statistics:
Server# scope sensor
Server /sensor # show fan
Name Sensor Status Reading Units Min. Warning Max. Warning Min. Failure
Max. Failure
--------------- ------------- ---------- ------ ------------- ------------ -------------
------------
PSU1_FAN_SPEED Normal 5160 RPM 1118 N/A 946
N/A
PSU2_FAN_SPEED Normal 6106 RPM 1118 N/A 946
N/A
PSU3_FAN_SPEED Normal 5762 RPM 1118 N/A 946
N/A
PSU4_FAN_SPEED Normal 4988 RPM 1118 N/A 946
N/A
FAN1_SPEED Normal 6600 RPM 2040 N/A 1800
N/A
FAN2_SPEED Normal 6660 RPM 2040 N/A 1800
N/A
FAN3_SPEED Normal 6600 RPM 2040 N/A 1800
N/A
FAN4_SPEED Normal 6660 RPM 2040 N/A 1800
N/A
FAN5_SPEED Normal 6660 RPM 2040 N/A 1800
N/A
FAN6_SPEED Normal 6660 RPM 2040 N/A 1800
N/A
FAN7_SPEED Normal 6660 RPM 2040 N/A 1800
N/A
FAN8_SPEED Normal 6660 RPM 2040 N/A 1800
N/A
Server /sensor #
Step 2 Server /sensor # show temperature [detail] Displays temperature sensor statistics for the
server.
Example
This example displays temperature sensor statistics:
Server# scope sensor
Server /sensor # show temperature
Name Sensor Status Reading Units Min. Warning Max. Warning
Min. Failure Max. Failure
------------------------- -------------- ---------- ---------- ------------ ------------
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
95
Viewing Sensors
Viewing Voltage Sensors
------------ ------------
IOH_TEMP_SENS Normal 32.0 C N/A 80.0
N/A 85.0
P2_TEMP_SENS Normal 31.0 C N/A 80.0
N/A 81.0
P1_TEMP_SENS Normal 34.0 C N/A 80.0
N/A 81.0
DDR3_P2_D1_TMP Normal 20.0 C N/A 90.0
N/A 95.0
DDR3_P1_A1_TMP Normal 21.0 C N/A 90.0
N/A 95.0
FP_AMBIENT_TEMP Normal 28.0 C N/A 40.0
N/A 45.0
Server /sensor #
Step 2 Server /sensor # show voltage [detail] Displays voltage sensor statistics for the server.
Example
This example displays voltage sensor statistics:
Server# scope sensor
Server /sensor # show voltage
Name Sensor Status Reading Units Min. Warning Max. Warning
Min. Failure Max. Failure
------------------------- -------------- ---------- ---------- ------------ ------------
------------ ------------
P3V_BAT_SCALED Normal 3.022 V N/A N/A
2.798 3.088
P12V_SCALED Normal 12.154 V N/A N/A
11.623 12.331
P5V_SCALED Normal 5.036 V N/A N/A
4.844 5.157
P3V3_SCALED Normal 3.318 V N/A N/A
3.191 3.381
P5V_STBY_SCALED Normal 5.109 V N/A N/A
4.844 5.157
PV_VCCP_CPU1 Normal 0.950 V N/A N/A
0.725 1.391
PV_VCCP_CPU2 Normal 0.891 V N/A N/A
0.725 1.391
P1V5_DDR3_CPU1 Normal 1.499 V N/A N/A
1.450 1.548
P1V5_DDR3_CPU2 Normal 1.499 V N/A N/A
1.450 1.548
P1V1_IOH Normal 1.087 V N/A N/A
1.068 1.136
P1V8_AUX Normal 1.773 V N/A N/A
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
96
Viewing Sensors
Viewing Current Sensors
1.744 1.852
Server /sensor #
Step 2 Server /sensor # show current [detail] Displays current sensor statistics for the server.
Example
This example displays current sensor statistics:
Server# scope sensor
Server /sensor # show current
Name Sensor Status Reading Units Min. Warning Max. Warning
Min. Failure Max. Failure
------------------------- -------------- ---------- ---------- ------------ ------------
------------ ------------
VR_P2_IMON Normal 16.00 AMP N/A 147.20
N/A 164.80
VR_P1_IMON Normal 27.20 AMP N/A 147.20
N/A 164.80
Server /sensor #
Step 2 Server /chassis # show hdd [detail] Displays storage sensor information.
Name Description
Name column The name of the storage device.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
97
Viewing Sensors
Setting Dynamic Front Panel Temperature Threshold
Name Description
LED Status column The current LED color, if any.
To make the physical LED on the storage device blink, select Turn On
from the drop-down list. To let the storage device control whether the
LED blinks, select Turn Off.
Note This information is only available for some C-Series
servers.
Example
This example displays storage sensor information:
Server# scope chassis
Server /chassis # show hdd
Name Status
-------------------- --------------------
HDD_01_STATUS present
HDD_02_STATUS present
HDD_03_STATUS present
HDD_04_STATUS present
Server /chassis #
Procedure
Step 2 server /sensor # set fp-critical-temp upper Sets the upper critical temperature threshold.
critical temperature threshold value The valid range is between 8 and 50.
Example
This example shows how to set the dynamic front panel temperature threshold:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
98
Viewing Sensors
Setting Dynamic Front Panel Temperature Threshold
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
99
Viewing Sensors
Setting Dynamic Front Panel Temperature Threshold
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
100
CHAPTER 6
Managing Remote Presence
This chapter includes the following sections:
• Managing the Virtual KVM, on page 101
• Configuring Virtual Media, on page 104
• Managing Serial over LAN, on page 109
Instead of using CD/DVD or floppy drives physically connected to the server, the vKVM console uses virtual
media, which are actual disk drives or disk image files that are mapped to virtual CD/DVD or floppy drives.
You can map any of the following to a virtual drive:
• CD/DVD or floppy drive on your computer
• Disk image files (ISO or IMG files) on your computer
• USB flash drive on your computer
• CD/DVD or floppy drive on the network
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
101
Managing Remote Presence
Enabling the Virtual KVM
Note The vKVM Console is operated only through the GUI. To launch the vKVM Console, see the instructions in
the Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide.
Procedure
Step 2 Server /kvm # set enabled yes Enables the virtual KVM.
Step 4 Server /kvm # show [detail] (Optional) Displays the virtual KVM
configuration.
Example
This example enables the virtual KVM:
Server# scope kvm
Server /kvm # set enabled yes
Server /kvm *# commit
Server /kvm # show
Encryption Enabled Local Video Active Sessions Enabled KVM Port
------------------ ---------------- --------------- ------- --------
no yes 0 yes 2068
Server /kvm #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
102
Managing Remote Presence
Configuring the Virtual KVM
Procedure
Step 4 Server /kvm # show [detail] (Optional) Displays the virtual KVM
configuration.
Example
This example disables the virtual KVM:
Server# scope kvm
Server /kvm # set enabled no
Server /kvm *# commit
Server /kvm # show
Encryption Enabled Local Video Active Sessions Enabled KVM Port
------------------ ---------------- --------------- ------- --------
no yes 0 no 2068
Server /kvm #
Procedure
Step 2 Server /kvm # set enabled {yes | no} Enables or disables the virtual KVM.
Step 3 Server /kvm # set encrypted {yes | no} If encryption is enabled, the server encrypts all
video information sent through the KVM.
Step 4 Server /kvm # set kvm-port port Specifies the port used for KVM
communication.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
103
Managing Remote Presence
Configuring Virtual Media
Step 6 Server /kvm # set max-sessions sessions Specifies the maximum number of concurrent
KVM sessions allowed. The sessions argument
is an integer between 1 and 4.
Step 8 Server /kvm # show [detail] (Optional) Displays the virtual KVM
configuration.
Example
This example configures the virtual KVM and displays the configuration:
Server# scope kvm
Server /kvm # set enabled yes
Server /kvm *# set encrypted no
Server /kvm *# set kvm-port 2068
Server /kvm *# set max-sessions 4
Server /kvm *# set local-video yes
Server /kvm *# commit
Server /kvm # show detail
KVM Settings:
Encryption Enabled: no
Max Sessions: 4
Local Video: yes
Active Sessions: 0
Enabled: yes
KVM Port: 2068
Server /kvm #
What to do next
Launch the virtual KVM from the GUI.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
104
Managing Remote Presence
Configuring Virtual Media
Step 3 Server /vmedia # set encryption {yes | no} Enables or disables virtual media encryption.
Step 4 Server /vmedia # set low-power-usb-enabled Enables or disables low power USB.
{yes | no}
Note While mapping an ISO to a server
which has a UCS VIC P81E card
and the NIC is in Cisco Card
mode:
• If the low power USB is
enabled, after mapping the
ISO and rebooting the host
the card resets and ISO
mapping is lost. The virtual
drives are not visible on the
boot selection menu.
• If the low power USB is
disabled, after mapping the
ISO, and rebooting the host
and the Cisco IMC, the
virtual drivers appear on the
boot selection menu as
expected.
Step 6 Server /vmedia # show [detail] (Optional) Displays the virtual media
configuration.
Example
This example configures virtual media encryption:
Server# scope vmedia
Server /vmedia # set enabled yes
Server /vmedia *# set encryption yes
Server /vmedia *# set low-power-use-enabled no
Server /vmedia *# commit
Server /vmedia # show detail
vMedia Settings:
Encryption Enabled: yes
Enabled: yes
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
105
Managing Remote Presence
Configuring a Cisco IMC-Mapped vMedia Volume
Max Sessions: 1
Active Sessions: 0
Low Power USB Enabled: no
Server /vmedia #
What to do next
Use the KVM to attach virtual media devices to a host.
Procedure
Step 2 Server /vmedia # map-cifs {volume-name | Maps a CIFS file for vMedia. You must specify
remote-share | remote-file-path [mount the following:
options]
• Name of the volume to create
• Remote share including IP address and the
exported directory
• Path of the remote file corresponding to
the exported directory.
• (Optional) Mapping options
• Username and password to connect to the
server
Step 3 Server /vmedia # map-nfs {volume-name | Maps an NFS file for vMedia. You must specify
remote-share | remote-file-path} [mount the following:
options]
• Name of the volume to create
• Remote share including IP address and the
exported directory
• Path of the remote file corresponding to
the exported directory.
• (Optional) Mapping options
Step 4 Server /vmedia # map-www {volume-name Maps an HTTPS file for vMedia. You must
| remote-share | remote-file-path [mount specify the following:
options]
• Name of the volume to create
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
106
Managing Remote Presence
Viewing Cisco IMC-Mapped vMedia Volume Properties
Example
This example shows how to create a CIFS Cisco IMC-mapped vmedia settings:
Server # scope vmedia
Server /vmedia # map-cifs sample-volume //10.10.10.10/project /test/sample
Server username:
Server password: ****
Confirm password: ****
Server /vmedia #
Procedure
Step 2 Server /vmedia # show mappings detail Displays information on all the vmedia mapping
that are configured.
Example
This example shows how to view the properties of all the configured vmedia mapping:
Server # scope vmedia
Server /vmedia # show mappings
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
107
Managing Remote Presence
Remapping an Existing Cisco IMC vMedia Image
Procedure
Step 2 Server /vmedia # show saved-mappings Displays the available saved mappings.
Step 4 (Optional) Server /vmedia # show mappings Displays the mapped vMedia details.
Example
This example shows how to remap a vMedia image to a saved mapping:
Server # scope vmedia
Server/vmedia # remap huu
Server/vmedia # show mappings
Volume Map-Status Drive-Type Remote-Share Remote-File
Mount-Type
---------------- ------------------------ ---------- ------------------------
------------------------ --------
huu OK CD https://10.104.236.99...
ucs-c240-huu-3.0.0.33... www
Server/vmedia # show saved-mappings
Volume Drive-Type Remote-Share Remote-File Mount-Type
---------------- ---------- ------------------------ ------------------------ --------
huu CD https://10.104.236.99... ucs-c240-huu-3.0.0.33... www
Server/vmedia #
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
108
Managing Remote Presence
Managing Serial over LAN
Step 3 Server /vmedia # show saved-mappings Does not display any saved mapping as it is
deleted.
Example
This example shows how to delete a saved mapping:
Server # scope vmedia
Server/vmedia # show saved-mappings
Volume Drive-Type Remote-Share Remote-File Mount-Type
---------------- ---------- ------------------------ ------------------------ --------
huu CD https://10.104.236.99... ucs-c240-huu-3.0.0.33... www
Server/vmedia # delete-saved-mappings
Purge saved mappings? Enter 'yes' to confirm -> yes
Server/vmedia # show saved-mappings
Server/vmedia #
The SoL session will display line-oriented information such as boot messages, and character-oriented screen
menus such as BIOS setup menus. If the server boots an operating system or application with a bitmap-oriented
display, such as Windows, the SoL session will no longer display. If the server boots a command-line-oriented
operating system (OS), such as Linux, you may need to perform additional configuration of the OS in order
to properly display in an SoL session.
In the SoL session, your keystrokes are transmitted to the console except for the function key F2. To send an
F2 to the console, press the Escape key, then press 2.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
109
Managing Remote Presence
Configuring Serial Over LAN
Procedure
Step 2 Server /sol # set enabled {yes | no} Enables or disables SoL on this server.
Step 3 Server /sol # set baud-rate {9600 | 19200 | Sets the serial baud rate the system uses for SoL
38400 | 57600 | 115200} communication.
Note The baud rate must match the
baud rate configured in the server
serial console.
Step 4 (Optional) Server /sol # set comport {com0 | Sets the serial port through which the system
com1 routes SoL communications.
Note This option is only available on
some C-Series servers. If it is not
available, the server always uses
COM port 0 for SoL
communication.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
110
Managing Remote Presence
Launching Serial Over LAN
Step 6 Server /sol # show [detail] (Optional) Displays the SoL settings.
Example
This example configures SoL:
Server# scope sol
Server /sol # set enabled yes
Server /sol *# set baud-rate 115200
Server /sol *# commit
Server /sol # show
Enabled Baud Rate(bps) Com Port
------- --------------- --------
yes 115200 com2
Server /sol # show detail
Serial Over LAN:
Enabled: yes
Baud Rate(bps): 115200
Com Port: com2
Server /sol #
What to do next
To end the SoL session, you must close the CLI session. For example, to end an SoL session over an SSH
connection, disconnect the SSH connection.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
111
Managing Remote Presence
Launching Serial Over LAN
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
112
CHAPTER 7
Managing User Accounts
This chapter includes the following sections:
• Configuring Local Users for Cisco UCS C-Series M7 and Later Servers, on page 113
• Managing SSH Keys for User Accounts, on page 116
• Non-IPMI User Mode, on page 121
• Disabling Strong Password, on page 123
• Password Expiry, on page 124
• Configuring User Authentication Precedence, on page 125
• Resetting the User Password, on page 125
• Configuring Password Expiry for Users, on page 126
• LDAP Servers, on page 127
• Configuring the LDAP Server, on page 128
• Configuring LDAP in Cisco IMC, on page 129
• Configuring LDAP Groups in Cisco IMC, on page 133
• Configuring Nested Group Search Depth in LDAP Groups, on page 134
• TACACS+ Authentication, on page 135
• LDAP Certificates Overview, on page 137
• Viewing User Sessions, on page 140
• Terminating a User Session, on page 141
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
113
Managing User Accounts
Configuring Local Users for Cisco UCS C-Series M7 and Later Servers
Step 3 Server /user # set name username Specifies the username for the user.
Step 4 Server /user # set role {readonly | user | Specifies the role assigned to the user. The
admin} roles are as follows:
• readonly—This user can view information
but cannot make any changes.
• user—This user can do the following:
• View all information
• Manage the power control options
such as power on, power cycle, and
power off
• Launch the KVM console and virtual
media
• Clear all logs
• Toggle the locator LED
• Set the time zone
• Ping an IP address
Step 5 Server /user # set Specifies the user type assigned to the user.
user-typeCIMC|SNMP|IPMI You may select one or multiple user-type for
a single user.
Step 6 Server /user # set password You are prompted to enter the password twice.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
114
Managing User Accounts
Configuring Local Users for Cisco UCS C-Series M7 and Later Servers
Step 7 Server /user # set ipmi-password password Set the password for IPMI user type.
Step 8 Server /user # set Set this value for SNMP user type.
v3priv-protoNone|CFB128_AES128
Step 9 Server /user # set Set this value for SNMP user type.
v3protoHMAC128_SHA224|
HMAC192_SHA256| HMAC256_SHA384
|HMAC384_SHA512 |HMAC_SHA96 |None
Step 10 Server /user # set Set the key, if required.
v3priv-auth-keyPriv_Auth_key
Step 11 Server /user # set v3auth-keyAuth_key Set the key, if required.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
115
Managing User Accounts
Managing SSH Keys for User Accounts
Example
This example configures user 5 as an admin and all three user type:
Server# scope user 5
Server /user # set enabled yes
Server /user *# set name UserName
Server /user *# set role readonly
Server /user *# set user-type CIMC,SNMP,IPMI
Server /user *# set password
Warning:
Strong Password Policy is enabled!
For CIMC protection your password must meet the following requirements:
The password must have a minimum of 8 and a maximum of 14 characters.
The password must not contain the User's Name.
The password must contain characters from three of the following four categories.
English uppercase characters (A through Z)
English lowercase characters (a through z)
Base 10 digits (0 through 9)
Please enter password:
Please confirm password:
Server /user *# set ipmi-password
Warning:
Strong Password Policy is enabled!
For CIMC protection your password must meet the following requirements:
The password must have a minimum of 8 and a maximum of 20 characters for IPMI users
and
maximum 127 characters for Non IPMI users.
The password must not contain the User's Name.
The password must contain characters from three of the following four categories.
English uppercase characters (A through Z)
English lowercase characters (a through z)
Base 10 digits (0 through 9)
Non-alphabetic characters (!, @, #, $, %, ^, &, *, -, _, +, =)
Please enter ipmi-password:
Server /user *# set v3proto None
Server /user *# set v3priv-proto None
Server /user *# commit
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
116
Managing User Accounts
Adding SSH Keys
You must log in as a user with admin privileges to configure the SSH keys for all the users. If you are a
non-admin user, you can configure the SSH keys to authenticate and login only to your account. You can
configure only one SSH RSA key pair, public and private, for your account. The SSH keys must be in .pem
or .pub format.
The Cisco IMC sessions authenticated using public keys will be active even if the password has expired. You
can also start new sessions using the public SSH key even after the password has expired. Account lockout
option, available on some C-series servers, does not apply to the accounts that use public key authentication.
Procedure
Step 2 Server /user # show-detail Displays the details of the user account. You
can view the number of SSH keys configured
for a user in the SSH Key Count field.
Step 3 Server /user # scope ssh-keys Enters the SSH keys command mode.
Step 4 Server /user/ssh-keys # add-key 1 remote Use this option to add the SSH key from a
remote server.
Enter the following details:
a. Specify the protocol to connect to the
remote server. It can be of the following
types:
• TFTP
FTP
SFTP
SCP
HTTP
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
117
Managing User Accounts
Modifying SSH Keys
Step 5 (Optional) Server /user/ssh-keys # add-key 2 Use this option to add the SSH key by paste
paste method.
Launches a dialog for entering the public SSH
key. Copy the SSH key text, paste it into the
console when prompted, and type CTRL+D.
Step 6 (Optional) Server /user/ssh-keys # show-detail Displays the public SSH key that you have
added to the account.
Example
1. This example adds the SSH key from a remote server.
Server# scope user 1
Server /user # scope ssh-keys
Server /user/ssh-keys # add-key 1 remote
Enter the remote Protocol [tftp | ftp | sftp | scp | http]: scp
Enter the remote Server: 10.10.10.10
Enter the remote file Path: /home/xyz/publickey.pem
Server (RSA) key fingerprint is dd:b5:2b:07:ad:c0:30:b2:d5:6a:6a:78:80:85:93:b0
Do you wish to continue? [y/N]y
Username: xyz
Password:
SSH Public key added successfully
Server /user/ssh-keys #
What to do next
Modify or delete the SSH key.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
118
Managing User Accounts
Modifying SSH Keys
• If you are a non-admin user, you can modify the public key only for your account.
Procedure
Step 2 Server /user # show-detail Displays the details of the user account. You
can view the number of SSH keys configured
for a user in the SSH Key Count field.
Step 3 Server /user # scope ssh-keys Enters the SSH keys command mode.
Step 4 Server /user/ssh-keys # modify-key 1 remote Use this option to add the modified key from a
remote server. Enter the following details:
a. Specify the protocol to connect to the
remote server. It can be of the following
types:
• TFTP
FTP
SFTP
SCP
HTTP
Step 5 (Optional) Server /user/ssh-keys # modify-key Use this option to add the modified SSH key
2 paste by paste method.
Launches a dialog for entering the updated
public SSH key. Copy the SSH key text, paste
it into the console when prompted, and type
CTRL+D.
Step 6 (Optional) Server /user/ssh-keys # show-detail Displays the updated public SSH key that you
modified in the account.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
119
Managing User Accounts
Deleting SSH Keys
Example
1. This example adds the modified SSH key from a remote server.
Server# scope user 1
Server /user # scope ssh-keys
Server /user/ssh-keys # modify-key 1 remote
Enter the remote Protocol [tftp | ftp | sftp | scp | http]: scp
Enter the remote Server: 10.10.10.10
Enter the remote file Path: /home/xyz/publickey.pem
Server (RSA) key fingerprint is dd:b5:2b:07:ad:c0:30:b2:d5:6a:6a:78:80:85:93:b0
Do you wish to continue? [y/N]y
Username: xyz
Password:
SSH Public key modified successfully
Server /user/ssh-keys #
What to do next
Delete the SSH key.
Procedure
Step 2 Server /user # show-detail Displays the details of the user account. The
field SSH Key Countdisplays the number of
SSH keys that are configured for the user.
Step 3 Server /user # scope ssh-keys Enters the SSH keys command mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
120
Managing User Accounts
Non-IPMI User Mode
Example
This example deletes the SSH key.
Server# scope user 1
Server /user # scope ssh-keys
Server /user/ssh-keys # delete-key 1
This operation will delete the SSH key -
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFOK17ZYbMMfGcxGrfxlupMqFyl1ZNIJohPxAStu41
OkItF9VrrhrfF1ZKOpogJinx3s0OcPfGLMSWEQkUq1zGlL8rAESZbi6z36WGFeZ93amJ3nfxDU7JWD9K
HmINixpX5XbbZeKQJvfSTptanmkjTQ8sq2iSMK0HL+G35i8BXmwIBLuEM+SWIEYjLaDAZ6aLKPxxddTr
FxWTP9QpzJAfQGlXXZSYauYb6OMNUxjgqFtB2XCiROZTzcj4n1XQRbzU+56HvHmowcOPhO81Btbun+xv
ksTeXbV3e9DVymjQK1qD2yY5h/EJdC0+9wGPyVmaT2bAOu4HbTsz8u4HFkTf
Do you wish to continue? [y/N]y
SSH Public key deleted successfully
Server /user/ssh-keys #
Note When you reset to factory defaults, the user mode reverts to IPMI mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
121
Managing User Accounts
Switching User Mode from IPMI to Non-IPMI
Procedure
Step 2 Server /user-policy # scope user-mode Enters user mode command mode.
Step 3 Server /user-policy/user-mode # set user-mode Enter y at the confirmation prompt to switch to
non-ipmi Non-IPMI user mode.
Example
This example shows how to disable strong password:
Server# scope user-policy
Server /user-policy # scope user-mode
Server /user-policy/user-mode # set user-mode non-ipmi
Server /user-policy/user-mode *# commit
Warning: This will enable NON-IPMI based user mode.
Converting to Non-IPMI User Mode disables IPMI Services and removes IPMI user
support.
SSH, KVM, Webserver, XMAPI and Redfish sessions will be disconnected.
Do you wish to continue? [y/N] y
Connection to 10.10.10.10 closed by remote host.
Connection to 10.10.10.10 closed.
Server /user-policy/user-mode # show detail
User Mode:
User mode for IPMI accessibility: non-ipmi
Server /user-policy/user-mode #
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
122
Managing User Accounts
Disabling Strong Password
Step 3 Server /user-policy/user-mode # set user-mode Enter y at the confirmation prompt to switch to
ipmi IPMI user mode.
Note Switching to IPMI user mode
deletes all the UCS users and
reverts to default username and
password.
Example
This example shows how to disable strong password:
Server# scope user-policy
Server /user-policy # scope user-mode
Server /user-policy/user-mode # set user-mode ipmi
Server /user-policy/user-mode *# commit
Warning: This will enable IPMI based user mode.
Converting to IPMI User Mode deletes all UCS users and reverts to default
userid/password.
SSH, KVM, Webserver, XMAPI and Redfish sessions will be disconnected.
Do you wish to continue? [y/N] y
Connection to 10.10.10.10 closed by remote host.
Connection to 10.10.10.10 closed.
Server /user-policy/user-mode # show detail
User Mode:
User mode for IPMI accessibility: ipmi
Server /user-policy/user-mode #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
123
Managing User Accounts
Password Expiry
Procedure
Step 2 Server /user-policy # set password-policy At the confirmation prompt, enter y to complete
{enabled | disabled} the action or n to cancel the action. Enables or
disables the strong password.
Example
This example shows how to disable strong password:
Server# scope user-policy
Server /user-policy # set password-policy disabled
Warning: Strong password policy is being disabled.
Do you wish to continue? [y/N] y
Server /user-policy *# commit
Server /user-policy #
Password Expiry
You can set a shelf life for a password, after which it expires. As an administrator, you can set this time in
days. This configuration would be common to all users. Upon password expiry, the user is notified on login
and would not be allowed to login unless the password is reset.
Note When you downgrade to an older database, existing users are deleted. The database returns to default settings.
Previously configured users are cleared and the database is empty, that is, the database has the default username
- 'admin' and password - 'password'. Since the server is left with the default user database, the change default
credential feature is enabled. This means that when the 'admin' user logs on to the database for the first time
after a downgrade, the user must mandatorily change the default credential.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
124
Managing User Accounts
Configuring User Authentication Precedence
Example
Server # scope user-policy
Server /user-policy # set authentication-precedence DB1,DB2
Server /user-policy* # commit
Note • This option is not available when you login as an admin, you can only change the password of the
configured users with read-only user privileges.
• When you change your password you will be logged out of Cisco IMC.
Procedure
Step 2 Server /chassis/user # set password Read the password requirements instructions
and enter the current password, new password
and confirm the password at the respective
prompts.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
125
Managing User Accounts
Configuring Password Expiry for Users
Example
This example shows how to change the password of a configured user:
Server # scope user 2
Server /chassis/user # set password
Warning:
Strong Password Policy is enabled!
For CIMC protection your password must meet the following requirements:
The password must have a minimum of 8 and a maximum of 20 characters.
The password must not contain the User's Name.
The password must contain characters from three of the following four categories.
English uppercase characters (A through Z)
English lowercase characters (a through z)
Base 10 digits (0 through 9)
Non-alphabetic characters (!, @, #, $, %, ^, &, *, -, _, +, =)
Please enter current password:Testabcd1
Please enter password: Testabcd2
Please confirm password: Testabcd2
Server /chassis/user * # commit
Server /chassis/user #
Step 2 Server /user-policy # scope Enters the password expiration command mode.
password-expiration
Step 3 Server /user-policy/password-expiration # set The time period that you can set for the existing
password-expiry-duration integer in the range password to expire (from the time you set a new
0-3650 password or modify an existing one). The range
is between 0 to 3650 days. Entering 0 disables
this option.
Step 4 Server /user-policy/password-expiration * # set Notifies the time by when the password expires.
notification-period integer in the range 0-15 Enter a value between 0 to 15 days. Entering 0
disables this option.
Step 5 Server /user-policy/password-expiration * # set Time period till when the existing password can
grace-period integer in the range 0-5 still be used, after it expires. Enter a value
between 0 to 5 days. Entering 0 disables this
option.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
126
Managing User Accounts
LDAP Servers
Example
This example sets the password expiration and restore the settings to default vales:
Server # scope user-policy
Server /user-policy # scope password-expiration
Server /user-policy/password-expiration # set password-expiry-duration 5
Server /user-policy/password-expiration * # set notification-period 2
Server /user-policy/password-expiration *# set grace-period 1
Server /user-policy/password-expiration *# set password-history 4
Server /user-policy/password-expiration *# commit
Server /user-policy/password-expiration # show detail
Password expiration parameters:
Valid password duration: 5
Number of stored old passwords: 4
Notification period: 2
Grace period: 1
Server /user-policy/password-expiration #
Restoring the password expiry parameters to default values:
Server /user-policy/password-expiration # restoreAre you sure you want to restore
User password expiration parameters to defaults?
Please enter 'yes' to confirm:yes
Server /user-policy/password-expiration #
LDAP Servers
Cisco IMC supports directory services that organize information in a directory, and manage access to this
information. Cisco IMC supports Lightweight Directory Access Protocol (LDAP), which stores and maintains
directory information in a network. In addition, Cisco IMC supports Microsoft Active Directory (AD). Active
Directory is a technology that provides a variety of network services including LDAP-like directory services,
Kerberos-based authentication, and DNS-based naming. The Cisco IMC utilizes the Kerberos-based
authentication service of LDAP.
When LDAP is enabled in the Cisco IMC, user authentication and role authorization is performed by the
LDAP server for user accounts not found in the local user database. The LDAP user authentication format is
username@domain.com.
By enabling encryption in the configuration of Active Directory on the server, you can require the server to
encrypt data sent to the LDAP server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
127
Managing User Accounts
Configuring the LDAP Server
Important For more information about altering the schema, see the article at
http://technet.microsoft.com/en-us/library/bb727064.aspx.
Note This example creates a custom attribute named CiscoAVPair, but you can also use an existing LDAP attribute
that is mapped to the Cisco IMC user roles and locales.
If you are using Group Authorization on the Cisco IMC LDAP configuration, then you can skip Steps 1-4
and perform the steps listed in the Configuring LDAP Settings and Group Authorization in Cisco IMC section.
The following steps must be performed on the LDAP server.
Procedure
Properties Value
Description CiscoAVPair
Step 3 Add the CiscoAVPair attribute to the user class using the snap-in:
a) Expand the Classes node in the left pane and type U to select the user class.
b) Click the Attributes tab and click Add.
c) Type C to select the CiscoAVPair attribute.
d) Click OK.
Step 4 Add the following user role values to the CiscoAVPair attribute, for the users that you want to have access
to Cisco IMC:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
128
Managing User Accounts
Configuring LDAP in Cisco IMC
admin shell:roles="admin"
user shell:roles="user"
read-only shell:roles="read-only"
Note For more information about adding values to attributes, see the article at
http://technet.microsoft.com/en-us/library/bb727064.aspx.
What to do next
Use the Cisco IMC to configure the LDAP server.
Procedure
Step 2 Server /ldap # set enabled {yes | no} Enables or disables LDAP security. When
enabled, user authentication and role
authorization is performed by LDAP for user
accounts not found in the local user database.
Step 3 Server /ldap # set domainLDAP domain name Specifies an LDAP domain name.
Step 4 Server /ldap # set timeout seconds Specifies the number of seconds the Cisco IMC
waits until the LDAP search operation times
out. The value must be between 0 and 1800
seconds.
Step 5 Server /ldap # set base-dn domain-name Specifies the Base DN that is searched on the
LDAP server.
Step 6 Server /ldap # set attribute name Specify an LDAP attribute that contains the
role and locale information for the user. This
property is always a name-value pair. The
system queries the user record for the value
that matches this attribute name.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
129
Managing User Accounts
Configuring LDAP in Cisco IMC
Step 7 Server /ldap # set filter-attribute Specifies the account name attribute. If Active
Directory is used, then specify
sAMAccountName for this field.
Step 8 Server /ldap # scope secure Enters the secure LDAP mode.
Step 9 Enable secure LDAP and either download the Perform one of the following:
certificate remotely or paste the certificate.
a. Server /ldap # secure-ldap
disabled|enabled paste tftp | ftp | sftp | scp
| http
Prompts you to paste the certificate
content.
b. Paste the certificate content and press
CTRL+D.
Confirmation prompt appears.
c. At the confirmation prompt, enter y.
This begins the download of the LDAP
CA certificate.
OR
a. Server /ldap # secure-ldap
disabled|enabled remote tftp | ftp | sftp |
scp | http IP Address LDAP CA Certificate
file
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
130
Managing User Accounts
Configuring LDAP in Cisco IMC
Step 11 Server /ldap # show [detail] (Optional) Displays the LDAP configuration.
Example
This example configures LDAP using remote download option:
Server# scope ldap
Server /ldap # set enabled yes
Server /ldap *# set domain sample-domain
Server /ldap *# set timeout 60
Server /ldap *# set base-dn example.com
Server /ldap *# set attribute CiscoAVPair
Server /ldap *# set filter-attribute sAMAccountName
Server /ldap *# scope secure
Server /ldap/secure *# secure-ldap enabled remote ftp xx.xx.xx.xx filename
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
131
Managing User Accounts
Configuring LDAP in Cisco IMC
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
132
Managing User Accounts
Configuring LDAP Groups in Cisco IMC
Filter-Attribute: sAMAccountName
Server /ldap #
What to do next
If you want to use LDAP groups for group authorization, see Configuring LDAP Groups in Cisco IMC.
Note When Active Directory (AD) group authorization is enabled and configured, user authentication is also done
on the group level for users that are not found in the local user database or who are not individually authorized
to use Cisco IMC in the Active Directory.
Procedure
Step 2 Server /ldap# scope ldap-group-rule Enters the LDAP group rules command mode
for AD configuration.
Step 3 Server /ldap/ldap-group-rule # set group-auth Enables or disables LDAP group authorization.
{yes | no}
Step 4 Server /ldap # scope role-group index Selects one of the available group profiles for
configuration, where index is a number between
1 and 28.
Step 5 Server /ldap/role-group # set name group-name Specifies the name of the group in the AD
database that is authorized to access the server.
Step 6 Server /ldap/role-group # set domain Specifies the AD domain the group must reside
domain-name in.
Step 7 Server /ldap/role-group # set role {admin | user Specifies the permission level (role) assigned
| readonly} to all users in this AD group. This can be one
of the following:
• admin—The user can perform all actions
available.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
133
Managing User Accounts
Configuring Nested Group Search Depth in LDAP Groups
Example
This example shows how to configure LDAP group authorization:
Server# scope ldap
Server /ldap # scope ldap-group-rule
Server /ldap/ldap-group-rule # set group-auth yes
Server /ldap *# scope role-group 5
Server /ldap/role-group # set name Training
Server /ldap/role-group* # set domain example.com
Server /ldap/role-group* # set role readonly
Server /ldap/role-group* # commit
ucs-c250-M2 /ldap # show role-group
Group Group Name Domain Name Assigned Role
------ ----------- -------------- --------------
1 (n/a) (n/a) admin
2 (n/a) (n/a) user
3 (n/a) (n/a) readonly
4 (n/a) (n/a) (n/a)
5 Training example.com readonly
Server /ldap/role-group #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
134
Managing User Accounts
TACACS+ Authentication
Procedure
Step 2 Server /ldap# scope ldap-group-rule Enters the LDAP group rules command mode
for AD configuration.
Step 3 Server /ldap/ldap-group-rule # set Enables search for a nested LDAP group.
group-search-depth value
Step 4 Server /ldap/role-group-rule # commit Commits the transaction to the system
configuration.
Example
This example shows how to search for run a search for an LDAP group nested within another defined
group.
Server# scope ldap
Server /ldap # scope ldap-group-rule
Server /ldap/ldap-group-rule # set group-search-depth 10
Server /ldap/role-group-rule* # commit
Server /ldap/role-group-rule # show detail
Group rules for LDAP:
Group search attribute: memberOf
Enable Group Authorization: yes
Nested group search depth: 10
Server/ldap/ldap-group-rule #
TACACS+ Authentication
Beginning with 4.1(3b) release, Cisco IMC supports Terminal Access Controller Access-Control System Plus
(TACACS+) user authentication. Cisco IMC supports up to six TACACS+ remote servers. Once a user is
successfully authenticated, the username is appended with (TACACS+). This is also displayed in the Cisco
IMC interfaces.
Refer Enabling TACACS+ Authentication, on page 136 to enable TACACS+ Authentication. Cisco IMC also
supports user authentication precedence in case TACACS+ remote servers are inaccessible. User authentication
precedence can be configured using Configuring User Authentication Precedence, on page 125.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
135
Managing User Accounts
Enabling TACACS+ Authentication
Note If cisco-av-pair is not configured on the TACACS+ server, then a user with that server has read-only privilege.
Procedure
Step 4 Server/tacacs+ # set timeout timeout duration Enter a value between 5 to 30.
in seconds
Step 5 Server/tacacs+ # restore If you wish to restore TACACS+ configuration
to default in case of time out, enter yes to
confirm.
Example
Server # scope tacacs+
Server /tacacs+ # set enabled yes
Server /tacacs+ # set fallback-only-on-no-connectivity yes
Warning: If TACACS+ and fallback option is enabled, then the fallback to the next
precedence database happens only when CIMC is not able to connect to any
of the configured TACACS+ servers.
Do you wish to continue? [y/N] y
Server /tacacs+ # set timeout 5
Server /tacacs+ # restore
Are you sure you want to restore TACACS+ configuration to defaults?
Please enter 'yes' to confirm: yes
Restored TACSCS+ default configuration.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
136
Managing User Accounts
Configuring TACACS+ Remote Server Settings
Step 2 Server# scope tacacs-serverServer Number Enters the TACACS server command mode.
Example
Server # scope tacacs+
Server # scope tacacs-server 1
Server /tacacs+/tacacs-server # set tacacs-port 6
Server /tacacs+/tacacs-server # set tacacs-key xxx
Server /tacacs+/tacacs-server # set tacacs-server xx.xx.xx.xx
Server /tacacs+/tacacs-server # restore
Are you sure you want to restore TACACS+ configuration to defaults?
Please enter 'yes' to confirm: yes
Restored TACSCS+ default configuration.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
137
Managing User Accounts
Exporting LDAP CA Certificate
Procedure
Step 2 Server# /ldap scope binding-certificate Enters the LDAP CA certificate binding
command mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
138
Managing User Accounts
Testing LDAP Binding
Example
This example exports the LDAP certificate:
Server # scope ldap
Server /ldap # scope binding-certificate
Server /ldap/binding-certificate # export-ca-certificate tftp 172.22.141.66 test.csv
Initiating Export
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 1262 0 0 100 1262 0 1244 0:00:01 0:00:01 --:--:-- 1653
100 1262 0 0 100 1262 0 1237 0:00:01 0:00:01 --:--:-- 1237
LDAP CA Certificate is exported successfully
Server /ldap/binding-certificate #
Note If you checked the Enable Encryption and the Enable Binding CA Certificate check boxes, enter the fully
qualified domain name (FQDN) of the LDAP server in the LDAP Server field. To resolve the FQDN of the
LDAP server, configure the preferred DNS of Cisco IMC network with the appropriate DNS IP address.
Procedure
Step 2 Server# /ldap scope binding-certificate Enters the LDAP CA certificate binding
command mode.
Example
This example tests the LDAP user binding:
Server # scope ldap
Server /ldap # scope binding-certificate
Server /ldap/binding-certificate # test-ldap-binding user
Password:
diagldapbinding: Authenticated by LDAP
User user authenticated successfully.
Server /ldap/binding-certificate #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
139
Managing User Accounts
Deleting LDAP CA Certificate
Procedure
Step 2 Server# /ldap scope binding-certificate Enters the LDAP CA certificate binding
command mode.
Example
This example deletes the LDAP certificate:
Server # scope ldap
Server /ldap # scope binding-certificate
Server /ldap/binding-certificate # delete-ca-certificate
You are going to delete the LDAP CA Certificate.
Are you sure you want to proceed and delete the LDAP CA Certificate? [y|N]y
LDAP CA Certificate is deleted successfully
Server /ldap/binding-certificate #
The command output displays the following information about current user sessions:
Name Description
Session ID column The unique identifier for the session.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
140
Managing User Accounts
Terminating a User Session
Name Description
IP Address column The IP address from which the user accessed the server. If this is a serial
connection, it displays N/A.
Session Type column The type of session the user chose to access the server. This can be one
of the following:
• webgui— indicates the user is connected to the server using the
web UI.
• CLI— indicates the user is connected to the server using CLI.
• serial— indicates the user is connected to the server using the serial
port.
• XML API— indicates the user is connected to the server using
XML API.
• Redfish— indicates the user is connected to the server using
Redfish API.
Action column This column displays N/A when the SOL is enabled and Terminate
when the SOL is disabled. You can terminate a session by clicking
Terminate on the web UI.
Example
This example displays information about current user sessions:
Server# show user-session
ID Name IP Address Type Killable
------ ---------------- ----------------- ------------ --------
15 admin 10.20.30.138 CLI yes
Server /user #
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
141
Managing User Accounts
Terminating a User Session
Example
This example shows how the admin at user session 10 terminates user session 15:
Server# show user-session
ID Name IP Address Type Killable
------ ---------------- ----------------- ------------ --------
10 admin 10.20.41.234 CLI yes
15 admin 10.20.30.138 CLI yes
Server# scope user-session 15
Server /user-session # terminate
User session 15 terminated.
Server /user-session #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
142
CHAPTER 8
Configuring Network-Related Settings
This chapter includes the following sections:
• Server NIC Configuration, on page 143
• Common Properties Configuration, on page 152
• Configuring IPv4, on page 154
• Configuring IPv6, on page 156
• Configuring ICMP, on page 159
• Configuring the Server VLAN, on page 160
• Connecting to a Port Profile, on page 162
• Network Interface Configuration, on page 163
• Network Security Configuration, on page 165
• Network Time Protocol Configuration, on page 167
• Pinging an IP address, on page 168
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
143
Configuring Network-Related Settings
Server NICs
Note Shared LOM and Shared LOM Extended ports are available only on some
C-series servers.
Note For other UCS C-Series M4, M5, C220 M6, and C240 M6 servers, the NIC mode
is set to Shared LOM Extended by default.
• Shared OCP—The OCP adapter card LOM ports are used to access Cisco IMC. You must select either
the Active-Active or Active-standby NIC redundancy setting in the following step.
• Shared OCP Extended—In this NIC mode, DHCP replies are returned to both the OCP adapter card
LOM ports and the Cisco virtual interface card (VIC) ports. If the system determines that the Cisco VIC
connection is not getting its IP address from a Cisco UCS Manager system because the server is in
standalone mode, further DHCP requests from the Cisco VIC are disabled.
Note Shared OCP and Shared OCP Extended ports are available only on Cisco UCS
C225 M6, C245 M6, C220 M7, and C240 M7 servers.
For Cisco UCS C225 M6, C245 M6, C220 M7, and C240 M7 servers:
• if the server has a Cisco VIC card with OCP card, then the default NIC mode is Shared OCP Extended
and NIC Redundancy is set to active-active.
• if the server has VIC card populated in NCSI supported slots and no OCP card, then the default NIC
mode is Cisco Card.
• if the server does not have any VIC card and OCP card, the default NIC mode is Dedicated and NIC
Redundancy is set to None.
NIC Redundancy
The following NIC redundancy options are available, depending on the selected NIC mode and your platform:
• active-active—If supported, all ports that are associated with the configured NIC mode operate
simultaneously. This feature increases throughput and provides multiple paths to the Cisco IMC.
• active-standby—If a port that is associated with the configured NIC mode fails, traffic fails over to one
of the other ports associated with the NIC mode.
Note If you choose this option, make sure that all ports associated with the configured
NIC mode are connected to the same subnet to ensure that traffic is secure
regardless of which port is used.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
144
Configuring Network-Related Settings
Server NICs
The available redundancy modes vary depending on the selected network mode and your platform. For the
available modes, see the Hardware Installation Guide (HIG) for the type of server you are using. The C-Series
HIGs are available at the following URL:
http://www.cisco.com/en/US/products/ps10493/prod_installation_guides_list.html
VIC Slots
The VIC slot that can be used for management functions in Cisco card mode.
For C240 M6, C245 M6, and C240 M7, VIC slot options are as follows:
• Riser 1—Slot 1 and Slot 2
• Riser 2—Slot 4 and Slot 5
• mLOM
Note For C240 M6, C245 M6, and C240 M7, after resetting to factory default settings, the slot precedence is as
follows:
1. mLOM
2. Riser 1 - Slot 2; and Riser 2 - Slot 5
3. Riser 1 - Slot 1; and Riser 2- Slot 4
For C220 M6, C225 M6, and C220 M7, VIC slot options are as follows:
• Riser 1—Slot 1 is selected.
• Riser 3 —Slot 3 is selected.
• mLOM
Note For C220 M6, C225 M6, and C220 M7, after resetting to factory default settings, the slot precedence is as
follows:
1. mLOM
2. Riser 1 - Slot 1
3. Riser 3 - Slot 3
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
145
Configuring Network-Related Settings
Configuring Server NICs
For C480 M5 ML servers, Cisco card mode slot is Slot 11 and Slot 12.
The following options are available only on some UCS C-Series servers:
•4
•5
•9
• 10
Procedure
Step 2 Server /cimc # scope network Enters the Cisco IMC network command mode.
Step 3 Server /cimc/network # set mode {dedicated Sets the NIC mode to one of the following:
| shared_lom | shared_lom_10g | shipping |
• Dedicated—The management port that is
cisco_card | share_lom_ext | shared_ocp |
used to access the Cisco IMC.
shared_ocp_ext}
• Cisco Card—Any port on the adapter card
that can be used to access Cisco IMC. The
Cisco adapter card has to be installed in a
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
146
Configuring Network-Related Settings
Configuring Server NICs
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
147
Configuring Network-Related Settings
Configuring Server NICs
Step 4 Server /cimc/network # set vic-slot {none | VIC slot can be set to Cisco cards available in
riser1 | riser2 | mlom} MLOM or supported Risers.
For C240 M6, C245 M6, and C240 M7, VIC
slot options are as follows:
• Riser 1—Slot 1 and Slot 2
• Riser 2—Slot 4 and Slot 5
• mLOM
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
148
Configuring Network-Related Settings
Configuring Server NICs
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
149
Configuring Network-Related Settings
Configuring Server NICs
Step 5 Server /cimc/network # set redundancy {none Sets the NIC redundancy mode when the NIC
| active-active | active-standby} mode is Shared LOM. The redundancy mode
can be one of the following:
• none—The LOM Ethernet ports operate
independently and do not fail over if there
is a problem.
• active-active—If supported, all LOM
Ethernet ports are utilized.
• active-standby—If one LOM Ethernet
port fails, traffic fails over to another LOM
port.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
150
Configuring Network-Related Settings
Cisco VIC mLOM and OCP Card Replacement Considerations
Example
This example configures the Cisco IMC network interface:
scope cimc
Server /cimc # scope network
Server /cimc/network # set mode cisco_card
Server /cimc/network # set vic-slot <mlom>
Server /cimc/network *# set redundancy <active-active>
Server /cimc/network *# commit
Changes to the network settings will be applied immediately.
You may lose connectivity to the Cisco IMC and may have to log in again.
Do you wish to continue? [y/N] y
Server /cimc/network #
Follow these recommendations while replacing Cisco VIC mLOM or OCP cards in Cisco UCS C220 M7,
C240 M7, C225 M6 or C245 M6 servers to avoid loss of connectivity:
• Before replacing the card, configure any of the NIC modes that has network connected, other than Cisco
card MLOM, Shared OCP, or Shared OCP Extended. After replacing the card, configure the
appropriate NIC mode.
To set the NIC mode, refer Server NIC Configuration section in Configuration Guides for your Cisco
IMC release.
• Or, after replacing the card, configure the appropriate NIC mode using Cisco IMC Configuration Utility/F8.
Refer Connecting to the Server Locally For Setup section in Install and Upgrade Guides for your server.
• Or, after replacing the card, perform factory default settings using Cisco IMC Configuration Utility/F8
then perform the following steps:
1. Once the server is rebooted, boot the system to Cisco IMC Configuration Utility/F8 then change the
default password.
2. Configure the appropriate NIC mode settings.
VIC in mLOM slot Intel OCP 3.0 NIC in VIC in Riser Slot Dedicated NIC Mode for CIMC
mLOM Slot Management Port Access
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
151
Configuring Network-Related Settings
Common Properties Configuration
VIC in mLOM slot Intel OCP 3.0 NIC in VIC in Riser Slot Dedicated NIC Mode for CIMC
mLOM Slot Management Port Access
No No No Yes Dedicated
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
152
Configuring Network-Related Settings
Configuring Common Properties
Dynamic DNS
Dynamic DNS (DDNS) is used to add or update the resource records on the DNS server from Cisco IMC.
You can enable Dynamic DNS by using either the web UI or CLI. When you enable the DDNS option, the
DDNS service records the current hostname, domain name, and the management IP address and updates the
resource records in the DNS server from Cisco IMC.
Note The DDNS server deletes the prior resource records (if any) and adds the new resource records to the DNS
server if any one of the following DNS configuration is changed:
• Hostname
• Domain name in the LDAP settings
• When DDNS and DHCP are enabled, if the DHCP gets a new IP address or DNS IP or domain name
due to a change in a network or a subnet.
• When DHCP is disabled and if you set the static IP address by using CLI or web UI.
• When you enter the dns-use-dhcp command.
Dynamic DNS Update Domain— You can specify the domain. The domain could be either main domain or
any sub-domain. This domain name is appended to the hostname of the Cisco IMC for the DDNS update.
Procedure
Step 2 Server /cimc # scope network Enters Cisco IMC network command mode.
Step 3 Server /cimc/network # set hostname Specifies the name of the host.
host-name
When you modify the hostname, you are
prompted to confirm whether you want to create
a new self-signed certificate with Common
Name (CN) as the new hostname.
If you enter y at the prompt, a new self-signed
certificate is created with CN as the new
hostname.
If you enter n at the prompt, only the hostname
is changed and no certificate will be generated.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
153
Configuring Network-Related Settings
Configuring IPv4
Example
This example shows how to configure the common properties:
Server# scope cimc
Server /cimc # scope network
Server /cimc/network # set hostname Server
Create new certificate with CN as new hostname? [y|N]
y
New certificate will be generated on committing changes.
All HTTPS and SSH sessions will be disconnected.
Server /cimc/network # set ddns-enabled
Server /cimc/network # set ddns-update-domain 1.2.3.4
Server /cimc/network *# commit
Changes to the network settings will be applied immediately.
You may lose connectivity to the Cisco IMC and may have to log in again.
Do you wish to continue? [y/N] y
Server /cimc/network #
What to do next
Changes to the network are applied immediately. You might lose connectivity to Cisco IMC and have to log
in again. Because of the new SSH session created, you may be prompted to confirm the host key.
Configuring IPv4
Before you begin
You must log in as a user with admin privileges to configure IPv4 network settings.
Procedure
Step 2 Server /cimc # scope network Enters the Cisco IMC network command
mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
154
Configuring Network-Related Settings
Configuring IPv4
Step 4 Server /cimc/network # set v4-addr Specifies the IP address for the Cisco IMC.
ipv4-address
Step 5 Server /cimc/network # set v4-netmask Specifies the subnet mask for the IP address.
ipv4-netmask
Step 6 Server /cimc/network # set v4-gateway Specifies the gateway for the IP address.
gateway-ipv4-address
Step 7 Server /cimc/network # set dns-use-dhcp {yes Selects whether the Cisco IMC retrieves the
| no} DNS server addresses from DHCP.
Step 8 Server /cimc/network # set Specifies the IP address of the primary DNS
preferred-dns-server dns1-ipv4-address server.
Step 9 Server /cimc/network # set Specifies the IP address of the secondary DNS
alternate-dns-server dns2-ipv4-address server.
Step 12 Server /cimc/network # show [detail] (Optional) Displays the IPv4 network settings.
Example
This example configures and displays the IPv4 network settings:
Server# scope cimc
Server /cimc # scope network
Server /cimc/network # set dhcp-enabled yes
Server /cimc/network *# set v4-addr 10.20.30.11
Server /cimc/network *# set v4-netmask 255.255.248.0
Server /cimc/network *# set v4-gateway 10.20.30.1
Server /cimc/network *# set dns-use-dhcp-enabled no
Server /cimc/network *# set preferred-dns-server 192.168.30.31
Server /cimc/network *# set alternate-dns-server 192.168.30.32
Server /cimc/network *# commit
Changes to the network settings will be applied immediately.
You may lose connectivity to the Cisco IMC and may have to log in again.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
155
Configuring Network-Related Settings
Configuring IPv6
Server /cimc/network #
Configuring IPv6
Before you begin
You must log in as a user with admin privileges to configure IPv6 network settings.
Procedure
Step 2 Server /cimc # scope network Enters the Cisco IMC network command
mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
156
Configuring Network-Related Settings
Configuring IPv6
Step 5 Server /cimc/network # set v6-addr Specifies the IP address for the Cisco IMC.
ipv6-address
Step 6 Server /cimc/network # set v6-prefix Specifies the prefix length for the IP address.
ipv6-prefix-length
Step 7 Server /cimc/network # set v6-gateway Specifies the gateway for the IP address.
gateway-ipv6-address
Step 8 Server /cimc/network # set v6-dns-use-dhcp Selects whether the Cisco IMC retrieves the
{yes | no} DNS server addresses from DHCP.
Note You can use this option only
when DHCP enabled.
Step 9 Server /cimc/network # set Specifies the IP address of the primary DNS
v6-preferred-dns-server dns1-ipv6-address server.
Step 10 Server /cimc/network # set Specifies the IP address of the secondary DNS
v6-alternate-dns-server dns2-ipv6-address server.
Step 13 Server /cimc/network # show [detail] (Optional) Displays the IPv6 network settings.
Example
This example enables static IPv6 and displays the IPv6 network settings:
Server# scope cimc
Server /cimc # scope network
Server /cimc/network # set v6-enabled yes
Server /cimc/network *# set v6-addr 2010:201::279
Server /cimc/network *# set v6-gateway 2010:201::1
Server /cimc/network *# set v6-prefix 64
Server /cimc/network *# set v6-dns-use-dhcp no
Server /cimc/network *# set v6-preferred-dns-server 2010:201::100
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
157
Configuring Network-Related Settings
Configuring IPv6
Server /cimc/network #
This example enables DHCP for IPv6 and displays the IPv6 network settings:
Server# scope cimc
Server /cimc # scope network
Server /cimc/network # set v6-enabled yes
Server /cimc/network *# set v6-dhcp-enabled yes
Changes to the network settings will be applied immediately.
You may lose connectivity to the Cisco IMC and may have to log in again.
Server /cimc/network *# commit
Changes to the network settings will be applied immediately.
You may lose connectivity to the Cisco IMC and may have to log in again.
Do you wish to continue? [y/N] y
Server /cimc/network # show detail
Network Setting:
IPv4 Enabled: yes
IPv4 Address: 10.106.145.76
IPv4 Netmask: 255.255.255.0
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
158
Configuring Network-Related Settings
Configuring ICMP
Server /cimc/network #
Configuring ICMP
In the release 4.1(3b), Cisco IMC allows you to enable or disable processing of incoming ICMP redirect and
destination unreachable packets on BMC.
Procedure
Step 2 Server /cimc # scope network Enters the Cisco IMC network command mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
159
Configuring Network-Related Settings
Configuring the Server VLAN
Example
This example shows how to configure the ICMP configuration settings:
Procedure
Step 2 Server /cimc # scope network Enters the Cisco IMC network command mode.
Step 3 Server /cimc/network # set vlan-enabled {yes Selects whether the Cisco IMC is connected to
| no} a VLAN.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
160
Configuring Network-Related Settings
Configuring the Server VLAN
Step 8 Server /cimc/network # show [detail] (Optional) Displays the network settings.
Example
This example configures the server VLAN:
Server# scope cimc
Server /cimc # scope network
Server /cimc/network # set vlan-enabled yes
Server /cimc/network *# set vlan-id 10
Server /cimc/network *# set vlan-priority 32
Server /cimc/network *# commit
Changes to the network settings will be applied immediately.
You may lose connectivity to the Cisco IMC and may have to log in again.
Do you wish to continue? [y/N] y
Server /cimc/network # show detail
Network Setting:
IPv4 Address: 10.20.30.11
IPv4 Netmask: 255.255.248.0
IPv4 Gateway: 10.20.30.1
DHCP Enabled: yes
Obtain DNS Server by DHCP: no
Preferred DNS: 192.168.30.31
Alternate DNS: 192.168.30.32
IPv6 Enabled: no
IPv6 Address: ::
IPv6 Prefix: 64
IPv6 Gateway: ::
IPv6 Link Local: ::
IPv6 SLAAC Address: ::
IPV6 DHCP Enabled: no
IPV6 Obtain DNS Server by DHCP: no
IPV6 Preferred DNS: ::
IPV6 Alternate DNS: ::
VLAN Enabled: yes
VLAN ID: 10
VLAN Priority: 32
Port Profile:
Hostname: C240-FCH1938V17L
MAC Address: E4:AA:5D:AD:19:81
NIC Mode: shared_lom_ext
NIC Redundancy: active-active
VIC Slot: riser1
Auto Negotiate: no
Admin Network Speed: NA
Admin Duplex: NA
Operational Network Speed: NA
Operational Duplex: NA
Server /cimc/network #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
161
Configuring Network-Related Settings
Connecting to a Port Profile
Note You can configure a port profile or a VLAN, but you cannot use both. If you want to use a port profile, make
sure the set vlan-enabled command is set to no.
Procedure
Step 2 Server /cimc # scope network Enters the Cisco IMC network command mode.
Step 3 Server /cimc/network # set port-profile Specifies the port profile Cisco IMC should use
port_profile_name to configure the management interface, the
virtual Ethernet, and the VIF on supported
adapter cards such as the Cisco UCS VIC 1225
Virtual Interface Card.
Enter up to 80 alphanumeric characters. You
cannot use spaces or other special characters
except for - (hyphen) and _ (underscore). In
addition, the port profile name cannot begin
with a hyphen.
Note The port profile must be defined
on the switch to which this server
is connected.
Example
This example connects to port profile abcde12345:
Server# scope cimc
Server /cimc # scope network
Server /cimc/network # set port-profile abcde12345
Server /cimc/network *# commit
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
162
Configuring Network-Related Settings
Network Interface Configuration
Server /cimc/network #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
163
Configuring Network-Related Settings
Configuring Interface Properties
• Operation Mode—Displays the operation network port speed and duplex values. If you enabled auto
negotiation mode, the network port speed and duplex details of the switch are displayed. If unchecked,
the network port speed and duplex values that you set at the Admin Mode are displayed.
When you reset Cisco IMC 1.5(x), 2.0(1), and 2.0(3) versions to factory defaults, Shared LOM mode is
configured by default.
Procedure
Step 5 Server/cimc/network # set net-speed {10 Mbps Sets specified network port speed.
| 100 Mbps | 1 Gbps}
Note This option is available only if
auto-negotiate is set to no. Before
changing the port speed, ensure
that the switch you connected to
has the same port speed. When
auto-negotiate is set to yes, by
default the network port speed is
set to 100 Mbps.
Step 6 Server/cimc/network* # set duplex {full | half} Sets specified duplex mode type. By default,
the duplex mode is set to Full.
Note For network speed of 1 Gbps, only
full duplex mode is allowed.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
164
Configuring Network-Related Settings
Network Security Configuration
Example
This example shows how to configure the interface properties and commit the transaction:
Server # scope cimc
Server/cimc # scope network
Server/cimc/network* # set mode dedicated
Server/cimc/network # set auto-negotiate no
Warning: You have chosen to set auto-negotiate to no
Please set speed and duplex
If not set then a default speed of 100Mbps and duplex full will be applied
Server/cimc/network* # commit
Server/cimc/network* # set net-speed 100 Mbps
Server/cimc/network # set duplex full
Server/cimc/network* # commit
Changes to the network settings will be applied immediately.
You may lose connectivity to the Cisco IMC and may have to log in again.
Do you wish to continue? [y/N] y
Server/cimc/network #
Procedure
Step 2 Server /cimc # scope network Enters the Cisco IMC network command
mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
165
Configuring Network-Related Settings
Configuring Network Security
Step 6 Server /cimc/network/ipblocking # set Sets the length of time, in seconds, in which
fail-window fail-seconds the unsuccessful login attempts must occur in
order for the user to be locked out.
Enter an integer between 60 and 120.
Step 7 Server /cimc/network/ipblocking # set Sets the number of seconds the user remains
penalty-time penalty-seconds locked out if they exceed the maximum
number of login attempts within the specified
time window.
Enter an integer between 300 and 900.
Step 9 Server /cimc/network/ipblocking # exit Exits the IP blocking to the network command
mode.
Step 10 Server /cimc/network # scope ipfiltering Enters the IP filtering command mode.
Step 11 Server /cimc/network/ipfiltering # set enabled Enables or disables IP filtering. At the prompt
{yes | no} enter y to enable IP filtering.
Step 12 Server /cimc/network/ipfiltering # set filter-1 You can set four IP filters. You can assign an
IPv4 or IPv6 address or a range of IP IPv4 or IPv6 IP address or a range of IP
addresses addresses.
Example
This example configures network security:
Server# scope cimc
Server /cimc # scope network
Server /cimc/network # scope ipblocking
Server /cimc/network/ipblocking # set enabled yes
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
166
Configuring Network-Related Settings
Network Time Protocol Configuration
Note To enable the NTP service, it is preferable to specify the IP address of a server rather than the DNS address.
Procedure
Step 3 Server /cimc/network # scope ntp Enters NTP service command mode.
Step 4 Server /cimc/network/ntp # set enabled yes Enables the NTP service on the server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
167
Configuring Network-Related Settings
Pinging an IP address
Step 7 Server /cimc/network/ntp # set server-2 Specifies the IP/DNS address of one of the
10.120.34.45 four servers that act as an NTP server or the
time source server.
Step 8 Server /cimc/network/ntp # set server-3 Specifies the IP/DNS address of one of the
10.120.35.46 four servers that act as an NTP server or the
time source server.
Step 9 Server /cimc/network/ntp # set server-4 Specifies the IP/DNS address of one of the
10.120.36.48 four servers that act as an NTP server or the
time source server.
Example
This example shows how to configure the NTP service:
Server # scope cimc
Server /cimc # scope network
Server /cimc/network # scope ntp
Server /cimc/network/ntp # set enabled yes
Warning: IPMI Set SEL Time Command will be
disabled if NTP is enabled.
Do you wish to continue? [y|N]
y
Server /cimc/network/ntp* # commit
Server /cimc/network/ntp # set server-1 10.120.33.44
Server /cimc/network/ntp* # set server-2 10.120.34.45
Server /cimc/network/ntp* # set server-3 10.120.35.46
Server /cimc/network/ntp* # set server-4 10.120.36.48
Server /cimc/network/ntp* # commit
Server /cimc/network/ntp #
Pinging an IP address
Ping an IP address when you want to validate network connectivity with the IP address in the Cisco IMC.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
168
Configuring Network-Related Settings
Pinging an IP address
Step 3 Server /cimc /network# ping IP address | Pings the IP address or host name for a specified
retriesnumber | timeoutseconds number of times until timeout.
• IP address/hostname - The IP address or
the host name of the server.
• Number of retries - The number of times
the system tries to connect to the server.
Default value is 3. Valid range is from 1
to 10.
• Timeout - The number of seconds the
system waits before it stops pinging.
Default maximum value is 20 seconds.
Valid range is from 1 to 20 seconds.
Example
This example pings an IP address:
Server# scope cimc
Server /cimc # scope network
Server /cimc/network # ping 10.10.10.10
Server /cimc/network *# commit
Changes to the network settings will be applied immediately.
You may lose connectivity to the Cisco IMC and may have to log in again.
Do you wish to continue? [y/N] y
Server /cimc/network #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
169
Configuring Network-Related Settings
Pinging an IP address
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
170
CHAPTER 9
Managing Network Adapters
This chapter includes the following sections:
• Overview of the Cisco UCS C-Series Network Adapters, on page 171
• Viewing Network Adapter Properties, on page 174
• Configuring Network Adapter Properties, on page 175
• Managing vHBAs, on page 179
• Managing vNICs, on page 193
• Backing Up and Restoring the Adapter Configuration, on page 221
• Managing Adapter Firmware, on page 225
• Resetting the Adapter, on page 227
Note The procedures in this chapter are available only when a Cisco UCS C-Series network adapter is installed in
the chassis.
A Cisco UCS C-Series network adapter can be installed to provide options for I/O consolidation and
virtualization support. The following adapters are available:
• Cisco UCS VIC 15238 Virtual Interface Card
• Cisco UCS VIC 15428 Virtual Interface Card
• Cisco UCS VIC 1497 Virtual Interface Card
• Cisco UCS VIC 1495 Virtual Interface Card
• Cisco UCS VIC 1477 Virtual Interface Card
• Cisco UCS VIC 1467 Virtual Interface Card
• Cisco UCS VIC 1457 Virtual Interface Card
• Cisco UCS VIC 1455 Virtual Interface Card
• Cisco UCS VIC 1387 Virtual Interface Card
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
171
Managing Network Adapters
Overview of the Cisco UCS C-Series Network Adapters
Note You must have same generation VIC cards on a server. For example, you cannot have a combination of 3rd
generation and 4th generation VIC cards on a single server.
The interactive UCS Hardware and Software Interoperability Utility lets you view the supported components
and configurations for a selected server model and software release. The utility is available at the following
URL: http://www.cisco.com/web/techdoc/ucs/interoperability/matrix/matrix.html
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
172
Managing Network Adapters
Overview of the Cisco UCS C-Series Network Adapters
The card can present PCIe standards-compliant interfaces to the host, and these can be dynamically configured
as either NICs or HBA.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
173
Managing Network Adapters
Viewing Network Adapter Properties
The virtual interface card makes Cisco VN-Link connections to the parent fabric interconnects, which allows
virtual links to connect virtual NICs in virtual machines to virtual interfaces in the interconnect. In a Cisco
Unified Computing System environment, virtual links then can be managed, network profiles applied, and
interfaces dynamically reprovisioned as virtual machines move between servers in the system.
Step 2 Server /chassis # show adapter [index] [detail] Displays adapter properties. To display the
properties of a single adapter, specify the PCI
slot number as the index argument.
Example
• This example displays the properties of adapter:
Server# scope chassis
Server /chassis # show adapter
PCI Slot Product Name Serial Number Product ID Vendor
-------- -------------- -------------- -------------- --------------------
11 UCS VIC 1455 FCH233770S8 UCSC-PCIE-C... Cisco Systems Inc
Server /chassis # show adapter detail
PCI Slot 11:
Product Name: UCS VIC 1455
Serial Number: FCH233770S8
Product ID: UCSC-PCIE-C25Q-04
Adapter Hardware Revision: 5
Current FW Version: 5.1(1.64)
VNTAG: Disabled
FIP: Enabled
LLDP: Enabled
PORT CHANNEL: Enabled
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
174
Managing Network Adapters
Configuring Network Adapter Properties
Configuration Pending: no
Cisco IMC Management Enabled: no
VID: V04
Vendor: Cisco Systems Inc
Description:
Bootloader Version: 5.0(3c)
FW Image 1 Version: 5.1(1.64)
FW Image 1 State: RUNNING ACTIVATED
FW Image 2 Version: 5.1(1.59)
FW Image 2 State: BACKUP INACTIVATED
FW Update Status: Fwupdate never issued
FW Update Error: No error
FW Update Stage: No operation (0%)
FW Update Overall Progress: 0%
Server /chassis #
Procedure
Step 2 Server /chassis # show adapter (Optional) Displays the available adapter
devices.
Step 3 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 4 Server /chassis/adapter # set fip-mode {disable Enables or disables FCoE Initialization Protocol
| enable} (FIP) on the adapter card. FIP is enabled by
default.
Note • We recommend that you
disable this option only when
explicitly directed to do so
by a technical support
representative.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
175
Managing Network Adapters
Configuring Network Adapter Properties
Step 6 Server /chassis/adapter # set vntag-mode Enables or disables VNTAG on the adapter
{disabled | enabled} card. VNTAG is disabled by default.
Note
If VNTAG mode is enabled:
• vNICs and vHBAs can be assigned to a
specific channel.
• vNICs and vHBAs can be associated to a
port profile.
• vNICs can fail over to another vNIC if
there are communication problems.
Step 7 Server /chassis/adapter # set portchannel Allows you to enable or disable the port
disabled channel. When you disable port channel, four
vNICs and vHBAs are available for use on the
adapter.
When Port channel is enabled:
• Only two vNICs and vHBAs are available
for use.
• Port 0 and 1 are bundled as one port
channel and Port 2 and 3 are bundled as
the other port channel.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
176
Managing Network Adapters
Configuring Network Adapter Properties
Step 8 Server /chassis/adapter # set physical-nic-mode Allows you to enable or disable the physical
enabled NIC mode. This option is disabled by default.
When Physical NIC Mode is enabled, up-link
ports of the VIC are set to pass-through mode.
This allows the host to transmit packets without
any modification. VIC ASIC does not rewrite
the VLAN tag of the packets based on the
VLAN and CoS settings for the vNIC.
Note This option is available only for
Cisco UCS VIC 14xx series and
15xxx series adapters.
For the VIC configuration changes
to be effective, you must reboot
the host.
This option cannot be enabled on
an adapter that has:
• Port Channel mode enabled
• VNTAG mode enabled
• LLDP enabled
• FIP mode enabled
• Cisco IMC Management
Enabled value set to Yes
• multiple user created vNICs
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
177
Managing Network Adapters
Configuring Network Adapter Properties
Example
This example configures the properties of adapter 1:
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # set fip-mode enable
Server /chassis/adapter *# set vntag-mode enabled
Server /chassis/adapter *# commit
Warning: Enabling VNTAG mode
All the vnic configuration will be reset to factory defaults
New VNIC adapter settings will take effect upon the next server reset
Server /chassis/adapter # show detail
PCI Slot 1:
Product Name: UCS VIC xxxx
Serial Number: FCHXXXXXZV4
Product ID: UCSC-PCIE-xxx-04
Adapter Hardware Revision: 3
Current FW Version: x.0(0.345)
VNTAG: Enabled
FIP: Enabled
LLDP: Enabled
PORT CHANNEL: Disabled
Configuration Pending: yes
Cisco IMC Management Enabled: no
VID: V00
Vendor: Cisco Systems Inc
Description:
Bootloader Version: xxx
FW Image 1 Version: x.0(0.345)
FW Image 1 State: RUNNING ACTIVATED
FW Image 2 Version: bodega-dev-170717-1500-orosz-ET
FW Image 2 State: BACKUP INACTIVATED
FW Update Status: Fwupdate never issued
FW Update Error: No error
FW Update Stage: No operation (0%)
FW Update Overall Progress: 0%
Server /chassis/adapter #
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # set fip-mode enable
Server /chassis/adapter *# set vntag-mode enabled
Server /chassis/adapter* # set portchannel disabled
Server /chassis/adapter *# commit
Warning: Enabling VNTAG mode
All the vnic configuration will be reset to factory defaults
New VNIC adapter settings will take effect upon the next server reset
Server /chassis/adapter # show detail
PCI Slot 1:
Product Name: UCS VIC xxxx
Serial Number: FCHXXXXXZV4
Product ID: UCSC-PCIE-xxx-04
Adapter Hardware Revision: 3
Current FW Version: x.0(0.345)
VNTAG: Enabled
FIP: Enabled
LLDP: Enabled
PORT CHANNEL: Disabled
Configuration Pending: no
Cisco IMC Management Enabled: no
VID: V00
Vendor: Cisco Systems Inc
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
178
Managing Network Adapters
Managing vHBAs
Description:
Bootloader Version: xxx
FW Image 1 Version: x.0(0.345)
FW Image 1 State: RUNNING ACTIVATED
FW Image 2 Version: gafskl-dev-170717-1500-orosz-ET
FW Image 2 State: BACKUP INACTIVATED
FW Update Status: Fwupdate never issued
FW Update Error: No error
FW Update Stage: No operation (0%)
FW Update Overall Progress: 0%
Server /chassis/adapter #
Managing vHBAs
Guidelines for Managing vHBAs
When managing vHBAs, consider the following guidelines and restrictions:
• The Cisco UCS Virtual Interface Cards provide two vHBAs and two vNICs by default. You can create
up to 14 additional vHBAs or vNICs on these adapter cards.
The Cisco UCS 1455, 1457, and 1467 Virtual Interface Cards, in non-port channel mode, provide four
vHBAs and four vNICs by default. You can create up to 10 additional vHBAs or vNICs on these adapter
cards in VNTAG mode.
Note If VNTAG mode is enabled for the adapter, you must assign a channel number
to a vHBA when you create it.
• When using the Cisco UCS Virtual Interface Cards in an FCoE application, you must associate the vHBA
with the FCoE VLAN. Follow the instructions in the Modifying vHBA Properties section to assign the
VLAN.
• After making configuration changes, you must reboot the host for settings to take effect.
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
179
Managing Network Adapters
Modifying vHBA Properties
Example
This example displays all vHBAs on adapter card 1 and the detailed properties of fc0:
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # show host-fc-if
Name World Wide Port Name FC SAN Boot Uplink Port
-------- ------------------------ ----------- -----------
fc0 20:00:00:22:BD:D6:5C:35 Disabled 0
fc1 20:00:00:22:BD:D6:5C:36 Disabled 1
Server /chassis/adapter #
Procedure
Step 2 Server /chassis # show adapter (Optional) Displays the available adapter
devices.
Step 3 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
180
Managing Network Adapters
Modifying vHBA Properties
Step 4 Server /chassis/adapter # scope host-fc-if {fc0 Enters the host Fibre Channel interface
| fc1 | name} command mode for the specified vHBA.
Step 5 Server /chassis/adapter/host-fc-if # set wwnn Specifies a unique World Wide Node Name
wwnn (WWNN) for the adapter in the form
hh:hh:hh:hh:hh:hh:hh:hh.
Unless specified by this command, the WWNN
is generated automatically by the system.
Step 6 Server /chassis/adapter/host-fc-if # set wwpn Specifies a unique World Wide Port Name
wwpn (WWPN) for the adapter in the form
hh:hh:hh:hh:hh:hh:hh:hh.
Unless specified by this command, the WWPN
is generated automatically by the system.
Step 7 Server /chassis/adapter/host-fc-if # set boot Enables or disables FC SAN boot. The default
{disable | enable} is disable.
Step 9 Server /chassis/adapter/host-fc-if # set Specifies a MAC address for the vHBA.
mac-addr mac-addr
Step 10 Server /chassis/adapter/host-fc-if # set vlan Specifies the default VLAN for this vHBA.
{none | vlan-id} Valid VLAN numbers are 1 to 4094; the
default is none.
Step 11 Server /chassis/adapter/host-fc-if # set cos Specifies the class of service (CoS) value to
cos-value be marked on received packets unless the
vHBA is configured to trust host CoS. Valid
CoS values are 0 to 6; the default is 0. Higher
values indicate more important traffic.
This setting is not functional in NIV mode.
Step 12 Server /chassis/adapter/host-fc-if # set Specifies a maximum data rate for the vHBA.
rate-limit {off | rate} The range is 1 to 100000 Mbps; the default is
off.
This setting is not functional in NIV mode.
Step 13 Server /chassis/adapter/host-fc-if # set order Specifies the relative order of this device for
{any | 0-99} PCIe bus device number assignment; the
default is any.
Step 14 Server /chassis/adapter/host-fc-if # set Specifies the error detect timeout value
error-detect-timeout msec (EDTOV), the number of milliseconds to wait
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
181
Managing Network Adapters
Modifying vHBA Properties
Step 15 Server /chassis/adapter/host-fc-if # set Specifies the resource allocation timeout value
resource-allocation-timeout msec (RATOV), the number of milliseconds to wait
before the system assumes that a resource
cannot be properly allocated. The range is 5000
to 100000; the default is 10000 milliseconds.
Step 16 Server /chassis/adapter/host-fc-if # set Specifies the maximum size of the Fibre
max-data-field-size size Channel frame payload (in bytes) that the
vHBA supports. The range is 1 to 2112; the
default is 2112 bytes.
Step 17 Server /chassis/adapter/host-fc-if # set The channel number that will be assigned to
channel-number channel number this vHBA. Enter an integer between 1 and
1,000.
Note VNTAG mode is required for
this option.
Step 18 Server /chassis/adapter/host-fc-if # set pci-link The link through which vNICs can be
0|1 connected. These are the following values:
• 0 — The first cross-edged link where the
vNIC is placed.
• 1 — The second cross-edged link where
the vNIC is placed.
Step 19 Server /chassis/adapter/host-fc-if # set uplink The uplink port associated with the vHBA.
Port number
Note This value cannot be changed for
the system-defined vHBAs fc0
and fc1.
Step 20 Server /chassis/adapter/host-fc-if # set The vHBA type used in this policy. vHBAs
vhba-type supporting FC and FC-NVMe can now be
fc-initiator|fc-target|fc-nvme-initiator|fc-nvme-target created on the same adapter. The vHBA type
used in this policy can be one of the following:
• fc-initiator—Legacy SCSI FC vHBA
initiator
• fc-target—vHBA that supports SCSI FC
target functionality
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
182
Managing Network Adapters
Modifying vHBA Properties
• fc-nvme-initiator—vHBA that is an FC
NVME initiator, which discovers FC
NVME targets and connects to them.
• fc-nvme-target—vHBA that acts as an
FC NVME target and provides
connectivity to the NVME storage.
Step 21 Server /chassis/adapter/host-fc-if # scope Enters the Fibre Channel error recovery
error-recovery command mode.
Step 24 Server Specifies the port down I/O retries value, the
/chassis/adapter/host-fc-if/error-recovery # set number of times an I/O request to a port is
port-down-io-retry-count count returned because the port is busy before the
system decides the port is unavailable. The
range is 0 to 255; the default is 8 retries.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
183
Managing Network Adapters
Modifying vHBA Properties
Step 30 Server /chassis/adapter/host-fc-if # scope port Enters the Fibre Channel port command mode.
Step 31 Server /chassis/adapter/host-fc-if/port # set Specifies the I/O throttle count, the number of
outstanding-io-count count I/O operations that can be pending in the
vHBA at one time. The range is 1 to 1024; the
default is 512 operations.
Step 32 Server /chassis/adapter/host-fc-if/port # set Specifies the maximum logical unit numbers
max-target-luns count (LUNs) per target, the maximum number of
LUNs that the driver will discover. This is
usually an operating system platform
limitation. The range is 1 to 1024; the default
is 256 LUNs.
Step 33 Server /chassis/adapter/host-fc-if/port # exit Exits to the host Fibre Channel interface
command mode.
Step 34 Server /chassis/adapter/host-fc-if # scope Enters the Fibre Channel fabric login command
port-f-logi mode.
Step 38 Server /chassis/adapter/host-fc-if # scope Enters the Fibre Channel port login command
port-p-logi mode.
Step 39 Server /chassis/adapter/host-fc-if/port-p-logi Specifies the port login (PLOGI) retries value,
# set plogi-retries count the number of times that the system tries to log
in to the fabric after the first failure. The range
is 0 and 255; the default is 8 retries.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
184
Managing Network Adapters
Modifying vHBA Properties
Step 42 Server /chassis/adapter/host-fc-if # scope Enters the SCSI I/O command mode.
scsi-io
Step 43 Server /chassis/adapter/host-fc-if/scsi-io # set The number of command descriptor block
cdb-wq-count count (CDB) transmit queue resources to allocate.
For Cisco UCS VIC 14xx series adapters, enter
an integer between 1 and 64. For any other
VIC adapter, enter an integer between 1 and
245.
Step 45 Server /chassis/adapter/host-fc-if/scsi-io # exit Exits to the host Fibre Channel interface
command mode.
Step 46 Server /chassis/adapter/host-fc-if # scope Enters the Fibre Channel transmit queue
trans-queue command mode.
Step 49 Server /chassis/adapter/host-fc-if # scope Enters the Fibre Channel receive queue
recv-queue command mode.
Step 51
Step 52 Server /chassis/adapter/host-fc-if/recv-queue Exits to the host Fibre Channel interface
# exit command mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
185
Managing Network Adapters
Creating a vHBA
Example
This example configures the properties of a vHBA (only few options are shown):
Server# scope chassis
Server /chassis # show adapter
PCI Slot Product Name Serial Number Product ID Vendor
-------- -------------- -------------- -------------- --------------------
1 UCS VIC P81E QCI1417A0QK N2XX-ACPCI01 Cisco Systems Inc
What to do next
Reboot the server to apply the changes.
Creating a vHBA
The adapter provides two permanent vHBAs. If NIV mode is enabled, you can create up to 16 additional
vHBAs.
Procedure
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 3 Server /chassis/adapter # create host-fc-if Creates a vHBA and enters the host Fibre
name Channel interface command mode. The name
argument can be up to 32 ASCII characters.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
186
Managing Network Adapters
Deleting a vHBA
Example
This example creates a vHBA on adapter 1:
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # create host-fc-if Vhba5
Server /chassis/adapter/host-fc-if *# commit
New host-fc-if settings will take effect upon the next server reset
Server /chassis/adapter/host-fc-if #
What to do next
• Reboot the server to create the vHBA.
• If configuration changes are required, configure the new vHBA as described in Modifying vHBA
Properties, on page 180.
Deleting a vHBA
Before you begin
You cannot delete the default vHBAs.
Procedure
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 3 Server /chassis/adapter # delete host-fc-if name Deletes the specified vHBA.
Note You cannot delete either of the
two default vHBAs, fc0 or fc1.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
187
Managing Network Adapters
vHBA Boot Table
Example
This example deletes a vHBA on adapter 1:
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # delete host-fc-if Vhba5
Server /chassis/adapter *# commit
Server /chassis/adapter #
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 3 Server /chassis/adapter # scope host-fc-if {fc0 Enters the host Fibre Channel interface
| fc1 | name} command mode for the specified vHBA.
Step 4 Server /chassis/adapter/host-fc-if # show boot Displays the boot table of the Fibre Channel
interface.
Example
This example displays the boot table for a vHBA:
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # scope host-fc-if fc1
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
188
Managing Network Adapters
Creating a Boot Table Entry
Server /chassis/adapter/host-fc-if #
Procedure
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 3 Server /chassis/adapter # scope host-fc-if {fc0 Enters the host Fibre Channel interface
| fc1 | name} command mode for the specified vHBA.
Example
This example creates a boot table entry for vHBA fc1:
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # scope host-fc-if fc1
Server /chassis/adapter/host-fc-if # create-boot-entry 20:00:00:11:22:33:44:55 3
Server /chassis/adapter/host-fc-if *# commit
New boot table entry will take effect upon the next server reset
Server /chassis/adapter/host-fc-if #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
189
Managing Network Adapters
Deleting a Boot Table Entry
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 3 Server /chassis/adapter # scope host-fc-if {fc0 Enters the host Fibre Channel interface
| fc1 | name} command mode for the specified vHBA.
Step 4 Server /chassis/adapter/host-fc-if # show boot Displays the boot table. From the Boot Table
Entry field, locate the number of the entry to be
deleted.
Step 5 Server /chassis/adapter/host-fc-if # delete boot Deletes the boot table entry at the specified
entry position in the table. The range of entry is 0
to 3. The change will take effect upon the next
server reset.
Example
This example deletes boot table entry number 1 for the vHBA fc1:
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # scope host-fc-if fc1
Server /chassis/adapter/host-fc-if # show boot
Boot Table Entry Boot Target WWPN Boot LUN ID
----------------- -------------------------- ------------
0 20:00:00:11:22:33:44:55 3
1 20:00:00:11:22:33:44:56 5
Server /chassis/adapter/host-fc-if #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
190
Managing Network Adapters
vHBA Persistent Binding
What to do next
Reboot the server to apply the changes.
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 3 Server /chassis/adapter # scope host-fc-if {fc0 Enters the host Fibre Channel interface
| fc1 | name} command mode for the specified vHBA.
Step 4 Server /chassis/adapter/host-fc-if # scope perbi Enters the persistent binding command mode
for the vHBA.
Step 5 Server /chassis/adapter/host-fc-if/perbi # set Enables persistent binding for the vHBA.
persistent-lun-binding enable
Step 6 Server /chassis/adapter/host-fc-if/perbi # Commits the transaction to the system
commit configuration.
Example
This example enables persistent binding for a vHBA:
Server# scope chassis
Server /chassis # scope adapter 4
Server /chassis/adapter # scope host-fc-if fc1
Server /chassis/adapter/host-fc-if # scope perbi
Server /chassis/adapter/host-fc-if/perbi # set persistent-lun-binding enable
Server /chassis/adapter/host-fc-if/perbi *# commit
Server /chassis/adapter/host-fc-if/perbi #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
191
Managing Network Adapters
Disabling Persistent Binding
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 3 Server /chassis/adapter # scope host-fc-if {fc0 Enters the host Fibre Channel interface
| fc1 | name} command mode for the specified vHBA.
Step 4 Server /chassis/adapter/host-fc-if # scope perbi Enters the persistent binding command mode
for the vHBA.
Step 5 Server /chassis/adapter/host-fc-if/perbi # set Disables persistent binding for the vHBA.
persistent-lun-binding disable
Step 6 Server /chassis/adapter/host-fc-if/perbi # Commits the transaction to the system
commit configuration.
Example
This example disables persistent binding for a vHBA:
Server# scope chassis
Server /chassis # scope adapter 4
Server /chassis/adapter # scope host-fc-if fc1
Server /chassis/adapter/host-fc-if # scope perbi
Server /chassis/adapter/host-fc-if/perbi # set persistent-lun-binding disable
Server /chassis/adapter/host-fc-if/perbi *# commit
Server /chassis/adapter/host-fc-if/perbi #
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
192
Managing Network Adapters
Managing vNICs
Step 3 Server /chassis/adapter # scope host-fc-if {fc0 Enters the host Fibre Channel interface
| fc1 | name} command mode for the specified vHBA.
Step 4 Server /chassis/adapter/host-fc-if # scope perbi Enters the persistent binding command mode
for the vHBA.
Step 5 Server /chassis/adapter/host-fc-if/perbi # Rebuilds the persistent binding table for the
rebuild vHBA.
Example
This example rebuilds the persistent binding table for a vHBA:
Server# scope chassis
Server /chassis # scope adapter 4
Server /chassis/adapter # scope host-fc-if fc1
Server /chassis/adapter/host-fc-if # scope perbi
Server /chassis/adapter/host-fc-if/perbi # rebuild
Server /chassis/adapter/host-fc-if/perbi #
Managing vNICs
Guidelines for Managing vNICs
When managing vNICs, consider the following guidelines and restrictions:
• The Cisco UCS Virtual Interface Cards provide two vHBAs and two vNICs by default. You can create
up to 14 additional vHBAs or vNICs on these adapter cards.
Additional vHBAs can be created using VNTAG mode.
The Cisco UCS 1455, 1457, and 1467 Virtual Interface Cards, in non-port channel mode, provide four
vHBAs and four vNICs by default. You can create up to 10 additional vHBAs or vNICs on these adapter
cards.
Note If VNTAG mode is enabled for the adapter, you must assign a channel number
to a vNIC when you create it.
• After making configuration changes, you must reboot the host for settings to take effect.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
193
Managing Network Adapters
Viewing vNIC Properties
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 3 Server /chassis/adapter # show host-eth-if [eth0 Displays properties of a single vNIC, if
| eth1 | name] [detail] specified, or all vNICs.
Step 4 Server /chassis/adapter # show ext-eth-if Displays the external ethernet interfaces' details.
[detail]
Example
Following examples display the brief properties of all vNICs and the detailed properties of eth0 and
the external interfaces:
Note These examples may show features available only with certain releases.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
194
Managing Network Adapters
Viewing vNIC Properties
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
195
Managing Network Adapters
Modifying vNIC Properties
Server /chassis/adapter #
Procedure
Step 2 Server /chassis # show adapter (Optional) Displays the available adapter
devices.
Step 3 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 4 Server /chassis/adapter # scope host-eth-if Enters the host Ethernet interface command
{eth0 | eth1 | name} mode for the specified vNIC.
Step 5 Server /chassis/adapter/host-eth-if # set mtu Specifies the maximum transmission unit
mtu-value (MTU) or packet size that the vNIC accepts.
Valid MTU values are 1500 to 9000 bytes; the
default is 1500.
Step 6 Server /chassis/adapter/host-eth-if # set Specifies the uplink port associated with this
uplink {0 | 1} vNIC. All traffic for this vNIC goes through
this uplink port.
Step 7 Server /chassis/adapter/host-eth-if # set Specifies a MAC address for the vNIC in the
mac-addr mac-addr form hh:hh:hh:hh:hh:hh or hhhh:hhhh:hhhh.
Step 8 Server /chassis/adapter/host-eth-if # set cos Specifies the class of service (CoS) value to
cos-value be marked on received packets unless the vNIC
is configured to trust host CoS. Valid CoS
values are 0 to 6; the default is 0. Higher values
indicate more important traffic.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
196
Managing Network Adapters
Modifying vNIC Properties
Step 9 Server /chassis/adapter/host-eth-if # set Specifies whether the vNIC will trust host CoS
trust-host-cos {disable | enable} or will remark packets. The behavior is as
follows:
• disable —Received packets are remarked
with the configured CoS. This is the
default.
• enable —The existing CoS value of
received packets (host CoS) is preserved.
Step 10 Server /chassis/adapter/host-eth-if # set order Specifies the relative order of this device for
{any | 0-99} PCI bus device number assignment; the default
is any.
Step 11 Server /chassis/adapter/host-eth-if # set vlan Specifies the default VLAN for this vNIC.
{none | vlan-id} Valid VLAN numbers are 1 to 4094; the
default is none.
Note If NIV is enabled, this setting is
determined by the switch, and the
command is ignored.
Step 12 Server /chassis/adapter/host-eth-if # set Specifies the VLAN mode for the vNIC. The
vlan-mode {access | trunk} modes are as follows:
• access —The vNIC belongs to only one
VLAN. When the VLAN is set to access
mode, any frame received from the
specified default VLAN (1-4094) that is
received from the switch with a TAG
removes that TAG when it is sent to the
host OS through the vNIC.
• trunk —The vNIC can belong to more
than one VLAN. This is the default.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
197
Managing Network Adapters
Modifying vNIC Properties
Step 14 Server /chassis/adapter/host-eth-if # set boot Specifies whether the vNIC can be used to
{disable | enable} perform a PXE boot. Default value is set to
disable for the default vNICs and user-created
vNICs.
Step 15 Server /chassis/adapter/host-eth-if # set If NIV mode is enabled for the adapter, select
channel-number number the channel number that will be assigned to
this vNIC. The range is 1 to 1000.
Step 16 Server /chassis/adapter/host-eth-if # set If NIV mode is enabled for the adapter, select
port-profile name the port profile that should be associated with
the vNIC.
Note The name must be a port profile
defined on the switch to which
this server is connected.
Step 17 Server /chassis/adapter/host-eth-if # set If NIV mode is enabled for the adapter, enable
uplink-failover {disable | enable} this setting if traffic on this vNIC should fail
over to the secondary interface if there are
communication problems.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
198
Managing Network Adapters
Modifying vNIC Properties
Step 19 Server /chassis/adapter/host-eth-if # set vmq Enables or disables Virtual Machine Queue
{disabled | enabled} (VMQ) for this adapter.
Note • Ensure that VMQ is not
enabled when SR-IOV is
enabled on the adapter.
• This option is available only
on some Cisco UCS
C-Series servers with 1495
or 1497 adapters.
Step 20 Server /chassis/adapter/host-eth-if # set Enables or disables the multi queue option for
multi-queue {disabled | enabled} this adapter and allows you to set the following
multi queue parameters:
• mq-rq-count—The number of receive
queue resources to allocate. Enter an
integer between 1 and 1000.
• mq-wq-count—The number of transmit
queue resources to allocate. Enter an
integer between 1 and 1000.
• mq-cq-count—The number of
completion queue resources to allocate.
In general, the number of completion
queue resources you should allocate is
equal to the number of transmit queue
resources plus the number of receive
queue resources. Enter an integer between
1 and 2000.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
199
Managing Network Adapters
Modifying vNIC Properties
Step 21 Server /chassis/adapter/host-eth-if # set arfs Enables or disables Accelerated Receive Flow
{disable | enable} steering (aRFS) for this adapter.
Step 22 Server /chassis/adapter/host-eth-if # set Beginning with release 4.1(2a), Cisco IMC
geneve {disable | enable} supports Generic Network Virtualization
Encapsulation (Geneve) Offload feature with
Cisco VIC 14xx series adapters in ESX 7.0
(NSX-T 3.0) and ESX 6.7U3(NSX-T 2.5) OS.
Geneve is a tunnel encapsulation functionality
for network traffic. Enable this feature if you
want to enable Geneve Offload encapsulation
in Cisco VIC 14xx series adapters.
Disable this feature to disable Geneve Offload,
in order to prevent non-encapsulated UDP
packets whose destination port numbers match
with the Geneve destination port from being
treated as tunneled packets.
If you enable Geneve Offload feature, then
Cisco recommends the following settings:
• Transmit Queue Count—1
• Transmit Queue Ring Size—4096
• Receive Queue Count—8
• Receive Queue Ring Size—4096
• Completion Queue Count—9
• Interrupt Count—11
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
200
Managing Network Adapters
Modifying vNIC Properties
Step 25 Server /chassis/adapter/host-eth-if/interrupt # The time to wait between interrupts or the idle
set coalescing-time usec period that must be encountered before an
interrupt is sent.
The range is 1 to 65535 microseconds; the
default is 125. To turn off coalescing, enter 0
(zero).
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
201
Managing Network Adapters
Modifying vNIC Properties
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
202
Managing Network Adapters
Modifying vNIC Properties
Step 40 Server /chassis/adapter/host-eth-if/ # set Sets the number of memory regions to be used
rdma_mr number per adapter. The values range from 4096 to
524288.
Step 41 Server /chassis/adapter/host-eth-if/ # set Sets the number of queue pairs to be used per
rdma_qp number adapter. The values range from 1-8192 queue
pairs.
Step 42 Server /chassis/adapter/host-eth-if/ # set Sets the number of resource groups to be used.
rdma_resgrp number The values range from 1-128 resource groups.
Note After committing the RoCE
details, you are required to reboot
the server for the changes to take
place.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
203
Managing Network Adapters
Modifying vNIC Properties
Step 49 Server /chassis/adapter/host-eth-if # scope rss Enters Receive-side Scaling (RSS) command
mode.
Step 50 Server /chassis/adapter/host-eth-if/rss # set Enables or disables RSS, which allows the
rss {disable | enable} efficient distribution of network receive
processing across multiple CPUs in
multiprocessor systems. The default is enable
for the two default vNICs, and disable for
user-created vNICs.
Step 51 Server /chassis/adapter/host-eth-if/rss # set Enables or disables IPv4 RSS. The default is
rss-hash-ipv4 {disable | enable} enable.
Step 52 Server /chassis/adapter/host-eth-if/rss # set Enables or disables TCP/IPv4 RSS. The default
rss-hash-tcp-ipv4 {disable | enable} is enable.
Step 53 Server /chassis/adapter/host-eth-if/rss # set Enables or disables IPv6 RSS. The default is
rss-hash-ipv6 {disable | enable} enable.
Step 54 Server /chassis/adapter/host-eth-if/rss # set Enables or disables TCP/IPv6 RSS. The default
rss-hash-tcp-ipv6 {disable | enable} is enable.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
204
Managing Network Adapters
Modifying vNIC Properties
Step 57 Server /chassis/adapter/host-eth-if/rss # exit Exits to the host Ethernet interface command
mode.
Step 59 Server /chassis/adapter/host-eth-if # set Specify number of VFs for each PF.
vf-countCount
Enter an integer between 1 and 64; the default
is zero.
Note Beginning with release
4.3.1.230097, Cisco IMC
provides Single Root I/O
Virtualization support on Cisco
UCS C-series M7 servers with
UCS VIC 15xxx series adapters
for ESXi 7.0 U3 and 8.0.
Single Root I/O Virtualization
allows multiple VMs running a
variety of guest operating
systems to share a single PCIe
network adapter within a host
server. SR-IOV allows a VM to
move data directly to and from
the network adapter, bypassing
the hypervisor for increased
network throughput and lower
server CPU burden.
Step 60 Server /chassis/adapter/host-eth-if* # set Specify number of interrupts for each VF.
vf-intr-countCount
Enter an integer between 1 and 16
Step 61 Server /chassis/adapter/host-eth-if* # set Specify number of Receive queues for each
vf-rq-countCount VF.
Enter an integer between 1 and 8.
Step 62 Server /chassis/adapter/host-eth-if* # set Specify number of Transmit Queues for each
vf-wq-countCount VF.
Enter an integer between 1 and 8.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
205
Managing Network Adapters
Modifying vNIC Properties
Step 64 Server /chassis/adapter/host-eth-if* # set Specify the QinQ VLAN id for this vNIC.
qinq_vlan4090
Enter an integer between 2 and 4094.
Beginning with release 4.3.2.230207, Cisco
IMC provides VIC QinQ Tunneling support
on Cisco UCS C-series M5, M6 and M7
servers with UCS VIC 14xx and 15xxx series
adapters.
Note • QinQ is not supported on
13xx adapters.
• Default vLAN should not
be none when QinQ is
configured and vLAN mode
is trunk.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
206
Managing Network Adapters
Setting Admin Link Training on External Ethernet Interfaces
Example
The below examples configure the properties of a vNIC.
• The below example enables QinQ tunneling in a vNIC:
Server# scope chassis
Server /chassis # show adapter
Server /chassis # scope adapter MLOM
Server /chassis/adapter # scope host-eth-if eth0
Server /chassis/adapter/host-eth-if # set qinq enabled
Server /chassis/adapter/host-eth-if *# set qinq_vlan 4090
Server /chassis/adapter/host-eth-if *# commit
Committed host-eth-if settings will take effect upon the next host power cycle
Server /chassis/adapter/host-eth-if #
• The below example configure the properties of a vNIC (VMQ, Multi-queue, SR-IOV)
Server# scope chassis
Server /chassis # show adapter
PCI Slot Product Name Serial Number Product ID Vendor
-------- -------------- -------------- -------------- --------------------
1 UCS VIC P81E QCI1417A0QK N2XX-ACPCI01 Cisco Systems Inc
What to do next
Reboot the server to apply the changes.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
207
Managing Network Adapters
Setting Admin Link Training on External Ethernet Interfaces
Note This option is available only on some of the adapters and servers.
Procedure
Step 2 Server /chassis # show adapter (Optional) Displays the available adapter
devices.
Step 3 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 4 Server /chassis / adapter # scope ext-eth-if 0 | Enters the external ethernet interface command
1 name mode for the specified vNIC.
Step 5 Server /chassis / adapter / ext-eth-if # set Sets the admin link training to the chosen option
admin-link-training on | off |auto for the specified vNIC.
Admin Link Training is set to auto, by default.
Beginning from 4.2(2a), the below different
settings apply only to Cisco UCS VIC 15xxx
adapters and Copper cables at speeds
10G/25G/50G only.
• If admin-link-training is set to auto,
then Adapter firmware sets
oper-link-training value as on or off,
depending upon the transceivers.
• Auto Negotiate disabled with 25G
copper
• Auto Negotiate enabled with 50G
copper
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
208
Managing Network Adapters
Setting Admin Link Training on External Ethernet Interfaces
Step 6 Server /chassis / adapter / ext-eth-if * # commit Commits the transaction to the system
configuration.
Example
This example shows how to set admin link training to auto on the external ethernet interface.
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # scope ext-eth-if 1
Server /chassis/adapter/ext-eth-if # set admin-link-training auto
Server /chassis/adapter/ext-eth-if* # commit
You may lose connectivity to the Cisco IMC and may have to log in again.
Do you wish to continue? [y/N] y
Port 1:
MAC Address: 74:A2:E6:28:C6:A3
Link State: Link
Encapsulation Mode: CE
Admin Speed: 40Gbps
Operating Speed: -
Admin Link Training: Auto
Connector Present: Yes
Connector Supported: Yes
Connector Type: QSFP_XCVR_CR4
Connector Vendor: CISCO
Connector Part Number: 2231254-3
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
209
Managing Network Adapters
Setting Admin FEC Mode on External Ethernet Interfaces
Procedure
Step 2 Server /chassis # show adapter (Optional) Displays the available adapter
devices.
Step 3 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 4 Server /chassis / adapter # scope ext-eth-if {0 Enters the external ethernet interface command
| 1 name} mode for the specified vNIC.
Step 5 Server /chassis / adapter / ext-eth-if # set Sets the admin FEC mode. The default value is
admin-fec-mode {|cl108 |cl91-cons16| cl91.
cl91|cl74 | off}
Note Admin Forward Error Correction
(FEC) mode apply only to Cisco
UCS VIC 14xx adapters at speed
25/100G and Cisco UCS VIC
15xxx adapters at speeds
25G/50G.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
210
Managing Network Adapters
Creating a vNIC
Example
This example shows how to set the admin FEC mode on the external ethernet interface.
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # scope ext-eth-if 1
Server /chassis/adapter/ext-eth-if # set admin-fec-mode cl74
Server /chassis/adapter/ext-eth-if* # commit
Changes to the network settings will be applied immediately.
You may lose connectivity to the Cisco IMC and may have to log in again.
Do you wish to continue? [y/N] y
Port 1:
MAC Address: 00:5D:73:1C:6C:58
Link State: LinkDown
Encapsulation Mode: CE
Admin Speed: Auto
Operating Speed: -
Admin Link Training: N/A
Admin FEC Mode: cl74
Operating FEC Mode: Off
Connector Present: NO
Connector Supported: N/A
Connector Type: N/A
Connector Vendor: N/A
Connector Part Number: N/A
Connector Part Revision: N/A
Server /chassis/adapter/ext-eth-if #
Creating a vNIC
The adapter provides two permanent vNICs. You can create up to 16 additional vNICs.
Procedure
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
211
Managing Network Adapters
Deleting a vNIC
Step 4 (Optional) Server /chassis/adapter/host-eth-if # If NIV mode is enabled for the adapter, you
set channel-number number must assign a channel number to this vNIC. The
range is 1 to 1000.
Example
This example creates a vNIC on adapter 1:
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # create host-eth-if Vnic5
Server /chassis/adapter/host-eth-if *# commit
New host-eth-if settings will take effect upon the next server reset
Server /chassis/adapter/host-eth-if #
Deleting a vNIC
Procedure
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
212
Managing Network Adapters
Creating Cisco usNIC Using the Cisco IMC CLI
Example
This example deletes a vNIC on adapter 1:
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # delete host-eth-if Vnic5
Server /chassis/adapter *# commit
Server /chassis/adapter #
Note Even though several properties are listed for Cisco usNIC in the usNIC properties dialog box, you must
configure only the following properties because the other properties are not currently being used.
• cq-count
• rq-count
• tq-count
• usnic-count
Procedure
Step 2 server/chassis# scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note Make sure that the server is
powered on before you attempt
to view or change adapter
settings. To view the index of the
adapters configured on you
server, use the show adapter
command.
Step 3 server/chassis/adapter# scope host-eth-if {eth0 Enters the command mode for the vNIC.
| eth1} Specify the Ethernet ID based on the number
of vNICs that you have configured in your
environment. For example, specify eth0 if you
configured only one vNIC.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
213
Managing Network Adapters
Creating Cisco usNIC Using the Cisco IMC CLI
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
214
Managing Network Adapters
Creating Cisco usNIC Using the Cisco IMC CLI
Step 16 server/bios/advanced# set IntelVTD Enabled Enables the Intel Virtualization Technology.
Step 17 server/bios/advanced# set ATS Enabled Enables the Intel VT-d Address Translation
Services (ATS) support for the processor.
Step 18 server/bios/advanced# set CoherencySupport Enables Intel VT-d coherency support for the
Enabled processor.
Example
This example shows how to configure Cisco usNIC properties:
Server # scope chassis
server /chassis # show adapter
server /chassis # scope adapter 2
server /chassis/adapter # scope host-eth-if eth0
server /chassis/adapter/host-eth-if # create usnic-config 0
server /chassis/adapter/host-eth-if/usnic-config *# set usnic-count 64
server /chassis/adapter/host-eth-if/usnic-config *# set cq-count 6
server /chassis/adapter/host-eth-if/usnic-config *# set rq-count 6
server /chassis/adapter/host-eth-if/usnic-config *# set tq-count 6
server /chassis/adapter/host-eth-if/usnic-config *# commit
Committed settings will take effect upon the next server reset
server /chassis/adapter/host-eth-if/usnic-config # exit
server /chassis/adapter/host-eth-if # exit
server /chassis/adapter # exit
server /chassis # exit
server # exit
server# scope bios
server /bios # scope advanced
server /bios/advanced # set IntelVTD Enabled
server /bios/advanced *# set ATS Enabled*
server /bios/advanced *# set CoherencySupport Enabled
server /bios/advanced *# commit
Changes to BIOS set-up parameters will require a reboot.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
215
Managing Network Adapters
Modifying a Cisco usNIC value using the Cisco IMC CLI
Procedure
Step 2 server/chassis# scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note Make sure that the server is
powered on before you attempt
to view or change adapter
settings. To view the index of the
adapters configured on you
server, use the show adapter
command.
Step 3 server/chassis/adapter# scope host-eth-if {eth0 Enters the command mode for the vNIC.
| eth1} Specify the Ethernet ID based on the number
of vNICs that you have configured in your
environment. For example, specify eth0 if you
configured only one vNIC.
Step 4 server/chassis/adapter/host-eth-if# scope Enters the command mode for the usNIC.
usnic-config 0 Make sure that you always set the index value
as 0 to configure a Cisco usNIC.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
216
Managing Network Adapters
Viewing usNIC Properties
Example
This example shows how to configure Cisco usNIC properties:
server # scope chassis
server /chassis # show adapter
server /chassis # scope adapter 2
server /chassis/adapter # scope host-eth-if eth0
server /chassis/adapter/host-eth-if # scope usnic-config 0
server /chassis/adapter/host-eth-if/usnic-config # set usnic-count 32
server /chassis/adapter/host-eth-if/usnic-config # commit
Committed settings will take effect upon the next server reset
server /chassis/adapter/host-eth-if/usnic-config # exit
server /chassis/adapter/host-eth-if # exit
server /chassis/adapter # exit
server /chassis # exit
server # exit
Procedure
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
217
Managing Network Adapters
Deleting Cisco usNIC from a vNIC
Step 4 Server /chassis/adapter/host-eth-if # show Displays the usNIC properties for a vNIC.
usnic-config index
Example
This example displays the usNIC properties for a vNIC:
Server # scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # scope host-eth-if eth0
Server /chassis/adapter/host-eth-if # show usnic-config 0
Idx usNIC Count TQ Count RQ Count CQ Count TQ Ring Size RQ Ring Size Interrupt Count
--- ----------- -------- -------- -------- ------------ ------------ ---------------
0 113 2 2 4 256 512 4
Server /chassis/adapter/host-eth-if #
Procedure
Step 2 server/chassis# scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note Make sure that the server is
powered on before you attempt to
view or change adapter settings.
To view the index of the adapters
configured on you server, use the
show adapter command.
Step 3 server/chassis/adapter# scope host-eth-if {eth0 Enters the command mode for the vNIC.
| eth1} Specify the Ethernet ID based on the number
of vNICs that you have configured in your
environment. For example, specify eth0 if you
configured only one vNIC.
Step 4 Server/chassis/adapter/host-eth-if# delete Deletes the Cisco usNIC configuration for the
usnic-config 0 vNIC.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
218
Managing Network Adapters
Configuring iSCSI Boot Capability
Example
This example shows how to delete the Cisco usNIC configuration for a vNIC:
server # scope chassis
server/chassis # show adapter
server/chassis # scope adapter 1
server/chassis/adapter # scope host-eth-if eth0
server/chassis/adapter/host-eth-if # delete usnic-config 0
server/chassis/host-eth-if/iscsi-boot *# commit
New host-eth-if settings will take effect upon the next adapter reboot
server/chassis/host-eth-if/usnic-config #
Note You can configure a maximum of 2 iSCSI vNICs for each host.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
219
Managing Network Adapters
Configuring iSCSI Boot Capability on a vNIC
Procedure
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 3 Server /chassis/adapter # scope host-eth-if Enters the host Ethernet interface command
{eth0 | eth1 | name} mode for the specified vNIC.
Step 4 Server /chassis/adapter/host-eth-if # create Creates the iSCSI boot index for the vNIC. At
iscsi-boot index this moment, only 0 is allowed as the index.
Step 5 Server /chassis/adapter/host-eth-if/iscsi-boot* Creates an iSCSI target for the vNIC. The value
# create iscsi-target index can either be 0 or 1.
Step 6 Server /chassis/adapter/host-eth-if/iscsi-boot* Enables the DHCP network settings for the
# set dhcp-net-settings enabled iSCSI boot.
Step 7 Server /chassis/adapter/host-eth-if/iscsi-boot* Sets the initiator name. It cannot be more than
# set initiator-name string 223 characters.
Example
This example shows how to configure the iSCSI boot capability for a vNIC:
Server # scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # scope host-eth-if eth0
Server /chassis/adapter/host-eth-if # create iscsi-boot 0
Server /adapter/host-eth-if/iscsi-boot *# set dhcp-net-settings enabled
Server /adapter/host-eth-if/iscsi-boot *# set initiator-name iqn.2012-01.com.adser:abcde
Server /adapter/host-eth-if/iscsi-boot *# set dhcp-iscsi-settings enabled
Server /adapter/host-eth-if/iscsi-boot *# commit
New host-eth-if settings will take effect upon the next server reset
Server /adapter/host-eth-if/iscsi-boot #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
220
Managing Network Adapters
Deleting an iSCSI Boot Configuration for a vNIC
Procedure
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 3 Server /chassis/adapter # scope host-eth-if Enters the host Ethernet interface command
{eth0 | eth1 | name} mode for the specified vNIC.
Step 4 Server /chassis/adapter/host-eth-if # delete Deletes the iSCSI boot capability for the vNIC.
iscsi-boot 0
Step 5 Server /chassis/adapter/host-eth-if* # commit Commits the transaction to the system
configuration
Note The changes will take effect upon
the next server reboot.
Example
This example shows how to delete the iSCSI boot capability for a vNIC:
Server # scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # scope host-eth-if eth0
Server /chassis/adapter/host-eth-if # delete iscsi-boot 0
Server /adapter/host-eth-if/iscsi-boot *# commit
New host-eth-if settings will take effect upon the next server reset
Server /adapter/host-eth-if/iscsi-boot #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
221
Managing Network Adapters
Exporting the Adapter Configuration
Important If any firmware or BIOS updates are in progress, do not export the adapter configuration until those tasks are
complete.
Procedure
Step 2 Server /chassis # scope adapter index Enters the command mode for the adapter card
at the PCI slot number specified by index.
Note The server must be powered on
before you can view or change
adapter settings.
Step 3 Server /chassis/adapter # export-vnic protocol Starts the export operation. The adapter
remote server IP address configuration file will be stored at the specified
path and filename on the remote server at the
specified IP address. The protocol can be one
of the following:
• TFTP
• FTP
• SFTP
• SCP
• HTTP
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
222
Managing Network Adapters
Importing the Adapter Configuration
Example
This example exports the configuration of adapter 1:
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # export-vnic ftp 192.0.20.34 //test/dnld-ucs-k9-bundle.1.0.2h.bin
Server /chassis/adapter #
Important If any firmware or BIOS updates are in progress, do not import the adapter configuration until those tasks are
complete.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
223
Managing Network Adapters
Restoring Adapter Defaults
Step 3 Server /chassis/adapter # import-vnic Starts the import operation. The adapter
tftp-ip-address path-and-filename downloads the configuration file from the
specified path on the TFTP server at the
specified IP address. The configuration will be
installed during the next server reboot.
Example
This example imports a configuration for the adapter in PCI slot 1:
Server# scope chassis
Server /chassis # scope adapter 1
Server /chassis/adapter # import-vnic 192.0.2.34 /ucs/backups/adapter4.xml
Import succeeded.
New VNIC adapter settings will take effect upon the next server reset.
Server /chassis/adapter #
What to do next
Reboot the server to apply the imported configuration.
Procedure
Step 2 Server /chassis # adapter-reset-defaults index Restores factory default settings for the adapter
at the PCI slot number specified by the index
argument.
Note Resetting the adapter to default
settings sets the port speed to 4 X
10 Gbps. Choose 40 Gbps as the
port speed only if you are using a
40 Gbps switch.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
224
Managing Network Adapters
Managing Adapter Firmware
Example
This example restores the default configuration of the adapter in PCI slot 1:
Server# scope chassis
Server /chassis # adapter-reset-defaults 1
This operation will reset the adapter to factory default.
All your configuration will be lost.
Continue?[y|N] y
Server /chassis #
Important If any firmware or BIOS updates are in progress, do not install the adapter firmware until those tasks are
complete.
Procedure
Step 2 Server /chassis # update-adapter-fw Downloads the specified adapter firmware file
tftp-ip-address path-and-filename {activate | from the TFTP server, then installs the firmware
no-activate} [pci-slot] [pci-slot] as the backup image on one or two specified
adapters or, if no adapter is specified, on all
adapters. If the activate keyword is specified,
the new firmware is activated after installation.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
225
Managing Network Adapters
Activating Adapter Firmware
Example
This example begins an adapter firmware upgrade on the adapter in PCI slot 1:
Server# scope chassis
Server /chassis # update-adapter-fw 192.0.2.34 /ucs/adapters/adapter4.bin activate 1
Server /chassis #
What to do next
To activate the new firmware, see Activating Adapter Firmware, on page 226.
Procedure
Step 2 Server /chassis # activate-adapter-fw pci-slot Activates adapter firmware image 1 or 2 on the
{1 | 2} adapter in the specified PCI slot.
Note The changes will take effect upon
the next server reboot.
Example
This example activates adapter firmware image 2 on the adapter in PCI slot 1:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
226
Managing Network Adapters
Resetting the Adapter
What to do next
Reboot the server to apply the changes.
Procedure
Step 2 Server/chassis # adapter-reset index Resets the adapter at the PCI slot number
specified by the index argument.
Note Resetting the adapter also resets
the host.
Example
This example resets the adapter in PCI slot 1:
Server# scope chassis
Server /chassis # adapter-reset 1
This operation will reset the adapter and the host if it is on.
You may lose connectivity to the CIMC and may have to log in again.
Continue?[y|N] y
Server /chassis #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
227
Managing Network Adapters
Resetting the Adapter
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
228
CHAPTER 10
Managing Storage Adapters
This chapter includes the following sections:
• Creating Virtual Drives from Unused Physical Drives, on page 230
• Creating Virtual Drive from an Existing Drive Group, on page 233
• Setting a Virtual Drive as Transport Ready, on page 235
• Clearing a Virtual Drive as Transport Ready, on page 237
• Configuring Physical Drive Status Auto Config Mode for Storage Controllers, on page 238
• Setting Physical Drive Status Auto Config Mode, on page 239
• Importing Foreign Configuration, on page 240
• Unlocking Foreign Configuration Drives, on page 241
• Clearing Foreign Configuration, on page 243
• Enabling JBOD, on page 243
• Disabling JBOD, on page 244
• Clearing a Boot Drive, on page 245
• Enabling Security on a JBOD, on page 246
• Clearing a Secure Physical Drive, on page 247
• Clearing a Secure SED Foreign Configuration Physical Drive , on page 248
• Retrieving Storage Firmware Logs for a Controller, on page 249
• Self Encrypting Drives (Full Disk Encryption), on page 250
• Deleting a Virtual Drive, on page 255
• Initializing a Virtual Drive, on page 256
• Set as Boot Drive, on page 257
• Editing a Virtual Drive, on page 258
• Securing a Virtual Drive, on page 259
• Modifying Attributes of a Virtual Drive, on page 260
• Making a Dedicated Hot Spare, on page 261
• Making a Global Hot Spare, on page 261
• Preparing a Drive for Removal, on page 262
• Toggling Physical Drive Status, on page 263
• Setting a Physical Drive as a Controller Boot Drive, on page 264
• Removing a Drive from Hot Spare Pools, on page 265
• Undo Preparing a Drive for Removal, on page 266
• Enabling Auto Learn Cycles for the Battery Backup Unit, on page 267
• Disabling Auto Learn Cycles for the Battery Backup Unit, on page 267
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
229
Managing Storage Adapters
Creating Virtual Drives from Unused Physical Drives
Note Cisco IMC now provides single drive support in M.2 RAID controller along with existing dual drive support.
With single drive support, you cannot create a virtual disk.
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # create At this point, you are prompted to enter
virtual-drive information corresponding to the RAID level,
the physical drives to be used, the size, enabling
full disk encryption of the drive and the write
policy for the new virtual drive. Enter the
appropriate information at each prompt.
When you have finished specifying the virtual
drive information, you are prompted to confirm
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
230
Managing Storage Adapters
Creating Virtual Drives from Unused Physical Drives
Example
This example shows how to create a new virtual drive that spans two unused physical drives.
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # create-virtual-drive
Please enter RAID level
0, 1, 5, 10, 50 --> 1
Optional attribute:
0: 8K Bytes
1: 16K Bytes
2: 32K Bytes
3: 64K Bytes
4: 128K Bytes
5: 256K Bytes
6: 512K Bytes
7: 1024K Bytes
Choose number from above options or hit return to pick default--> 2
stripsize will be set to 32K Bytes (6 and 'strip-size\:32k')
0: Unchanged
1: Enabled
2: Disabled
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
231
Managing Storage Adapters
Creating Virtual Drives from Unused Physical Drives
0: No Read Ahead
1: Always
Choose number from above options or hit return to pick default--> 0
Read Policy will be set to No Read Ahead (0 and 'read-policy\:no-read-ahead')
0: Write Through
1: Write Back Good BBU
2: Always Write Back
Choose number from above options or hit return to pick default--> 0
Write Policy will be set to Write Through (0 and 'write-policy\:write-through')
0: Direct I/O
1: Cached I/O
Choose number from above options or hit return to pick default--> 0
IO Policy will be set to Direct I/O (0 and 'io-policy\:direct-io')
0: Read Write
1: Read Only
2: Blocked
Choose number from above options or hit return to pick default--> 0
Access Policy will be set to Read Write (0 and 'access-policy\:read-write')
Enable SED security on virtual drive (and underlying drive group)?
Enter y or n--> y
Virtual drive and drive group will be secured
OK? (y or n)--> y
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
232
Managing Storage Adapters
Creating Virtual Drive from an Existing Drive Group
Server /chassis/storageadapter #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Example
This example shows how to carve a new virtual drive out of unused space in an existing RAID 1
drive group:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # carve-virtual-drive
< Fetching virtual drives...>
Please choose from the above list the virtual drive number
whose space the new virtual drive will share--> 0
New virtual drive will share space with VD 0
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
233
Managing Storage Adapters
Creating Virtual Drive from an Existing Drive Group
Optional attributes:
OK? (y or n)--> y
Server /chassis/storageadapter # show virtual-drive
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
234
Managing Storage Adapters
Setting a Virtual Drive as Transport Ready
Server /chassis/storageadapter #
Procedure
Step 2 Server /chassis # scope storageadapter slot ID Enters the command mode for an installed
storage card.
Step 3 Server /chassis/storageadapter # scope Enters the command mode for the specified
virtual-drive drive-number virtual drive.
Step 4 Server /chassis/storageadapter/virtual-drive # Sets the virtual drive to transport ready and
set-transport-ready {include-all | exclude-all assigns the chosen properties.
| include-dhsp}
Enter the initialization type using which you
can set the selected virtual drive as transport
ready. This can be one of the following:
• exlude-all— Excludes all the dedicated
hot spare drives.
• include-all— Includes any exclusively
available or shared dedicated hot spare
drives.
• include-dhsp— Includes exclusive
dedicated hot spare drives.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
235
Managing Storage Adapters
Setting a Virtual Drive as Transport Ready
Step 5 (Optional) Server Display the virtual drive properties with the
/chassis/storageadapter/virtual-drive # show change.
detail
Example
This example shows how to set virtual drive 5 to transport ready:
Server # scope chassis
Server /chassis # scope storageadapter SLOT-HBA
Server /chassis/storageadapter # scope virtual-drive 5
Server /chassis/storageadapter/virtual-drive # set-transport-ready exclude-all
Since they belong to same drive group, all these virtual drives will be set to Transport
Ready - 0
Are you sure you want to proceed?[y|N]y
Server /chassis/storageadapter/virtual-drive # show detail
Virtual Drive 0:
Health: Good
Status: Optimal
Visibility : Visible
Name: RAID0_124_RHEL
Size: 2858160 MB
Physical Drives: 1, 2, 4
RAID Level: RAID 0
Boot Drive: false
FDE Capable: 0
FDE Enabled: 0
Target ID: 0
Strip Size: 64 KB
Drives Per Span: 3
Span Depth: 1
Access Policy: Transport Ready
Cache Policy: Direct
Read Ahead Policy: None
Requested Write Cache Policy: Write Through
Current Write Cache Policy: Write Through
Disk Cache Policy: Unchanged
Auto Snapshot: false
Auto Delete Oldest: true
Allow Background Init: true
Server /chassis/storageadapter/virtual-drive #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
236
Managing Storage Adapters
Clearing a Virtual Drive as Transport Ready
Procedure
Step 2 Server /chassis # scope storageadapter slot ID Enters the command mode for an installed
storage card.
Step 3 Server /chassis/storageadapter # scope Enters the command mode for the specified
virtual-drive drive-number virtual drive.
Step 4 Server /chassis/storageadapter/virtual-drive # This reverts the selected transport ready virtual
clear-transport-ready drive to its original status.
When you are prompted to confirm the action.
Enter y to confirm.
Step 5 (Optional) Server Display the virtual drive properties with the
/chassis/storageadapter/virtual-drive # show change.
detail
Example
This example shows how to revert the selected transport ready virtual drive to its original state:
Server # scope chassis
Server /chassis # scope server 1
Server /chassis # scope storageadapter SLOT-HBA
Server /chassis/storageadapter # scope virtual-drive 5
Server /chassis/storageadapter/virtual-drive # clear-transport-ready
Since they belong to same drive group, all these virtual drives will be moved out of Transport
Ready - 0
Are you sure you want to proceed?[y|N]y
Server /chassis/storageadapter/virtual-drive # show detail
Virtual Drive 0:
Health: Good
Status: Optimal
Visibility : Visible
Name: RAID0_124_RHEL
Size: 2858160 MB
Physical Drives: 1, 2, 4
RAID Level: RAID 0
Boot Drive: false
FDE Capable: 0
FDE Enabled: 0
Target ID: 0
Strip Size: 64 KB
Drives Per Span: 3
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
237
Managing Storage Adapters
Configuring Physical Drive Status Auto Config Mode for Storage Controllers
Span Depth: 1
Access Policy: Read-Write
Cache Policy: Direct
Read Ahead Policy: None
Requested Write Cache Policy: Write Through
Current Write Cache Policy: Write Through
Disk Cache Policy: Unchanged
Auto Snapshot: false
Auto Delete Oldest: true
Allow Background Init: true
Server /chassis/storageadapter/virtual-drive #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
238
Managing Storage Adapters
Setting Physical Drive Status Auto Config Mode
Selecting jbod as the default configuration does not retain the unconfigured-good state across host reboot.
The drive state can be retained by disabling the automatic configuration feature. If the set-auto-cfg-option
option is used, the default automatic configuration will always mark a drive as unconfigured-good.
When automatic configuration is selected, then the drive is configured to the desired drive state. And the
JBOD and unconfigured drives will set the drive state accordingly on the next controller boot or OCR.
The following table shows sample use cases for different automatic configuration scenarios.
Using the server for Mixed JBOD and RAID volume unconfigured-good
Using the server for per drive RAID0 Write Back raid-0-writeback
Note You can set physical drive status auto config mode only on some UCS C-Series servers.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
239
Managing Storage Adapters
Importing Foreign Configuration
Name Description
Physical Drive Status Auto This can be one of the following:
Config Mode options
• unconfigured-good - The default option. Select this option if you
are using the server for RAID volume and mixed JBOD.
• raid-0-writeback - Select this option if you are using the server
for per drive R0 WB.
• jbod - Select this option if you are using the server for JBOD only.
Note All the status of the unused physical drives changes when you select the appropriate option in
the Auto Config mode.
Example
This example set the physical drive status auto config mode to unconfigured-good.
Server# scope chassis
Server /chassis # scope storageadapter
Server /chassis/storageadapter # set-auto-cfg-option unconfigured-good
Enter 'yes' to confirm -> yes
Server /chassis/storageadapter #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
240
Managing Storage Adapters
Unlocking Foreign Configuration Drives
Important You cannot import a foreign configuration in the following two scenarios:
1. When the secure virtual drive was created on server 1 (from which you want to import the configuration)
using the remote key, and on server 2 (to which you want to import) using the local key.
2. When server 2 is configured with another KMIP server, which is not a part of the server 1 KMIP server
cluster.
In order to import the foreign configuration in these scenarios, change the controller security on server 2 from
local key management to remote key management, and use the same KMIP server from the same cluster where
the server 1 KMIP is configured.
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # You are prompted to confirm the action. Enter
import-foreign-config yes to confirm.
Note If you do not enter yes, the action
is aborted.
Example
This example shows how to import all foreign configurations on the MegaRAID controller in slot
3:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # import-foreign-config
Are you sure you want to import all foreign configurations on this controller?
Enter 'yes' to confirm -> yes
Server /chassis/storageadapter #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
241
Managing Storage Adapters
Unlocking Foreign Configuration Drives
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # At the prompt, enter the security key and enter
unlock-foreign-configuration yes at the confirmation prompt.
Step 4 (Optional) Server /chassis/storageadapter # Enters the physical drive command mode.
scope physical-drive 2
Step 5 (Optional) Server Displays the status of the unlocked foreign
/chassis/storageadapter/physicsl-drive # show drive.
detail
Example
This example shows how to unlock a foreign configuration drive:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # unlock-foreign-configuration
Please enter the security key to unlock the foreign configuration -> testSecurityKey
Server /chassis/storageadapter # import-foreign-config
Are you sure you want to import all foreign configurations on this controller?
Enter 'yes' to confirm -> yes
Server /chassis/storageadapter # scope physical-drive 2
Server /chassis/storageadapter/physical-drive # show detail
Physical Drive Number 2:
Controller: SLOT-HBA
Health: Good
Status: Online
.
.
FDE Capable: 1
FDE Enabled: 1
FDE Secured: 1
FDE Locked: 0
FDE locked foreign config: 0
Server /chassis/storageadapter/physical-drive #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
242
Managing Storage Adapters
Clearing Foreign Configuration
Important This task clears all foreign configuration on the controller. Also, all configuration information from all physical
drives hosting foreign configuration is deleted. This action cannot be reverted.
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # You are prompted to confirm the action. Enter
clear-foreign-config yes to confirm.
Note If you do not enter yes, the action
is aborted.
Example
This example shows how to clear all foreign configurations on the MegaRAID controller in slot 3:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # clear-foreign-config
Are you sure you want to clear all foreign configurations on this controller?
All data on the drive(s) will be lost.
Enter 'yes' to confirm -> yes
Server /chassis/storageadapter #
Enabling JBOD
Note You can enable Just a Bunch of Disks (JBOD) only on some UCS C-Series servers.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
243
Managing Storage Adapters
Disabling JBOD
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis /storageadapter # Enables the JBOD Mode for the selected
enable-jbod-mode controller
Example
This example enables the JBOD mode for the selected controller:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # enable-jbod-mode
Are you sure you want to enable JBOD mode?
Enter 'yes' to confirm -> yes
Server/chassis/storageadapter # show settings
PCI Slot SLOT-3:
Info Valid: Yes
Enable JBOD Mode: true
Disabling JBOD
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis /storageadapter # Disables the JBOD Mode for the selected
disable-jbod-mode controller
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
244
Managing Storage Adapters
Clearing a Boot Drive
Example
This example disables the JBOD mode for the selected controller:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # disable-jbod-mode
Are you sure you want to disable JBOD mode?
Enter 'yes' to confirm -> yes
Server/chassis/storageadapter # show settings
PCI Slot SLOT-3:
Info Valid: Yes
Enable JBOD Mode: false
Important This task clears the boot drive configuration on the controller. This action cannot be reverted.
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # You are prompted to confirm the action. Enter
clear-boot-drive yes to confirm.
Note If you do not enter yes, the action
is aborted.
Example
This example shows how to clear the boot drive configuration on the MegaRAID controller in slot
3:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # clear-boot-drive
Are you sure you want to clear the controller's boot drive?
Enter 'yes' to confirm -> yes
Server /chassis/storageadapter #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
245
Managing Storage Adapters
Enabling Security on a JBOD
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters the physical drive command mode.
physical-drive 2
Step 4 Server /chassis/storageadapter # At the confirmation prompt, enter yes.
enable-security-on-jbod
Enables security on the JBOD.
Step 5 (Optional) Server Displays details of the physical drive.
/chassis/storageadapter/physicsl-drive # show
detail
Example
This example shows how to enable security on a JBOD:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
savbu-stordev-dn1-2-cimc /chassis/storageadapter # scope physical-drive 2
server /chassis/storageadapter/physical-drive # enable-security-on-jbod
Are you sure you want to enable security on this JBOD?
NOTE: this is not reversible!
Enter 'yes' to confirm -> yes
server /chassis/storageadapter/physical-drive # show detail
Physical Drive Number 2:
.
.
Status: JBOD
.
.
FDE Capable: 1
FDE Enabled: 1
FDE Secured: 1
server /chassis/storageadapter/physical-drive #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
246
Managing Storage Adapters
Clearing a Secure Physical Drive
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters the physical drive command mode.
physical-drive 2
Step 4 Server /chassis/storageadapter/physicsl-drive # At the confirmation prompt, enter yes.
clear-secure-drive
This clears the secure SED physical drive and
all the data will be lost.
Step 5 (Optional) Server Displays the physical drive details.
/chassis/storageadapter/physicsl-drive # show
detail
Example
This example shows how to clear an SED foreign configuration physical drive:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope physical-drive 2
Server /chassis/storageadapter/physical-drive # clear-secure-drive
Are you sure you want to erase all data from this physical drive?
NOTE: this is not reversible! ALL DATA WILL BE LOST!!
Enter 'yes' to confirm -> yes
Server /chassis/storageadapter/physical-drive # show detail
Physical Drive Number 2:
Controller: SLOT-HBA
Health: Good
Status: Unconfigured Good
.
.
FDE Capable: 1
FDE Enabled: 0
FDE Secured: 0
Server /chassis/storageadapter/physical-drive #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
247
Managing Storage Adapters
Clearing a Secure SED Foreign Configuration Physical Drive
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters the physical drive command mode.
physical-drive 2
Step 4 Server /chassis/storageadapter/physicsl-drive # At the confirmation prompt, enter yes.
clear-secure-foreign-config-drive
This clears the secure SED foreign
configuration physical drive and all the data
will be lost.
Step 5 (Optional) Server Displays the physical drive details.
/chassis/storageadapter/physicsl-drive # show
detail
Example
This example shows how to clear an SED foreign configuration physical drive:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope physical-drive 2
Server /chassis/storageadapter/physical-drive # clear-secure-foreign-config-drive
Are you sure you want to erase all data from this foreign-configuration physical drive?
NOTE: this is not reversible! ALL DATA WILL BE LOST!!
Enter 'yes' to confirm -> yes
Server /chassis/storageadapter/physical-drive # show detail
Physical Drive Number 2:
Controller: SLOT-HBA
Health: Good
Status: Unconfigured Good
.
.
FDE Capable: 1
FDE Enabled: 0
FDE Secured: 0
FDE Locked: 0
FDE Locked Foreign Config: 0
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
248
Managing Storage Adapters
Retrieving Storage Firmware Logs for a Controller
Server /chassis/storageadapter/physical-drive #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Example
This example shows how to retrieve Storage Firmware Logs for a MegaRAID controller in slot 3:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # get-storage-fw-log
Server /chassis/storageadapter # show detail
PCI Slot SLOT-3:
TTY Log Status: In progress (8192 bytes fetched)
Server /chassis/storageadapter # show detail
PCI Slot SLOT-3:
TTY Log Status: In progress (90112 bytes fetched)
Server /chassis/storageadapter # show detail
PCI Slot SLOT-3:
TTY Log Status: Complete (172032 bytes fetched)
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
249
Managing Storage Adapters
Self Encrypting Drives (Full Disk Encryption)
Controller security can be enabled, disabled, or modified independently. However, local and remote key
management applies to all the controllers on the server. Therefore security action involving switching the key
management modes must be performed with caution. In a scenario where both controllers are secure, and you
decide to move one of the controllers to a different mode, you need to perform the same operation on the other
controller as well.
Consider the following two scenarios:
• Scenario 1—Key management is set to remote; both controllers are secure and use remote key
management. If you now wish to switch to local key management, switch the key management for each
controller and disable remote key management.
• Scenario 2—Key management is set to local; both controllers are secure and use local key management.
If you now wish to switch to remote key management, enable remote key management and switch the
key management for each controller.
If you do not modify the controller security method on any one of the controllers, it renders the secure key
management in an unsupported configuration state.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
250
Managing Storage Adapters
Enabling Drive Security on a Controller
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 4 Server /chassis/storageadapter # show detail Displays the storage drive details.
Example
The following example shows how to enable security on a controller:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # enable-controller-security
Use generated key-id 'UCSC-MRAID12G_FHH18250010_1d85dcd3'? (y or n)--> y
Use suggested security-key '6ICsmuX@oVB7e9wXt79qsTgp6ICsmuX@'? (y or n)--> n
Enter security-key --> testSecurityKey
Will use security-key 'testSecurityKey'
Server /chassis/storageadapter show detail
PCI Slot SLOT-HBA:
<stuff deleted>
Controller is Secured: 1
Server /chassis/storageadapter #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
251
Managing Storage Adapters
Modifying Controller Security Settings
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Example
The following example shows how to disable security on a controller:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # disable-controller-security
Note: this operation will fail if any secured drives are present.
Are you sure you want to disable security on this controller?
Enter 'yes' to confirm -> yes
Please enter the controller's security-key -> testSecurityKey
savbu-stordev-dn1-2-cimc /chassis/storageadapter # show detail
PCI Slot SLOT-HBA:
<stuff deleted>
Controller is Secured: 0
Server /chassis/storageadapter #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # At this point, you are prompted to enter the
modify-controller-security current security key, option to choose whether
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
252
Managing Storage Adapters
Verifying the Security Key Authenticity
Example
The following example shows how to modify the security settings of a controller:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # modify-controller-security
Please enter current security-key --> testSecurityKey
Keep current key-id 'UCSC-MRAID12G_FHH18250010_1d85dcd3'? (y or n)--> n
Enter new key-id: NewKeyId
Will change key-id to 'NewKeyId'
Keep current security-key? (y or n)--> y
Server /chassis/storageadapter #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # At the prompt, enter the security key and press
verify-controller-security-key Enter.
If you enter a security key that does not match
the controller security key, a verification failure
message appears.
Example
The following example shows how to verify the security key of a controller:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
253
Managing Storage Adapters
Switching Controller Security From Remote to Local Key Management
Server /chassis/storageadapter #
Procedure
Step 2 Server /chassis # scope storageadapter Slot-ID Enters storage adapter command mode.
Step 4 Server /chassis/server/storageadapter # key id Enter the new key ID at the prompt. Switches
to local key management.
Example
The following example shows how to switch controller security from remote to local key management:
Server # scope chassis
Server /chassis # scope storageadapter SLOT-HBA 1
Server /chassis/storageadapter # switch-to-local-key-mgmt
Executing this command will require you to disable remote key management once switch is
complete.
Do you want to continue(y or n)?y
Proceeding to switch to local key management.
Enter new security-key: test
Will change security-key to 'test'
Switch to local key management complete on controller in SLOT-HBA.
***Remote key management needs to be disabled***
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
254
Managing Storage Adapters
Switching Controller Security From Local to Remote Key Management
What to do next
After you switch from Remote to Local Key Management, ensure that you disable KMIP secure key
management.
Procedure
Step 2 Server /chassis # scope storageadapter Slot-ID Enters storage adapter command mode.
Example
The following example shows how to switch controller security from local to remote key management:
Server # scope chassis
Server /chassis # scope storageadapter SLOT-HBA 1
Server /chassis/server/storageadapter # switch-to-remote-key-mgmt
Changing the security key requires existing security key.
Please enter current security-key --> test
Switch to remote key management complete on controller in SLOT-HBA.
Server /chassis/server/storageadapter #
Important This task deletes a virtual drive, including the drives that run the booted operating system. So back up any
data that you want to retain before you delete a virtual drive.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
255
Managing Storage Adapters
Initializing a Virtual Drive
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters command mode for the specified virtual
virtual-drive drive-number drive.
Step 4 Server /chassis/storageadapter/virtual-drive # You are prompted to confirm the action. Enter
delete-virtual-drive yes to confirm.
Note If you do not enter yes, the action
is aborted.
Example
This example shows how to delete virtual drive 3.
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope virtual-drive 3
Server /chassis/storageadapter/virtual-drive # delete-virtual-drive
Are you sure you want to delete virtual drive 3?
All data on the drive will be lost. Enter 'yes' to confirm -> yes
Server /chassis/storageadapter/virtual-drive #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
256
Managing Storage Adapters
Set as Boot Drive
Step 6 Server /chassis/storageadapter/physical-drive Displays the status of the task that is in progress
# get-operation-status on the drive.
Example
This example shows how to initialize virtual drive 3 using fast initialization:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope virtual-drive 3
Server /chassis/storageadapter/virtual-drive # start-initialization
Are you sure you want to initialize virtual drive 3?
All data on the drive will be lost. Enter 'yes' to confirm -> yes
Fast (0) or full (1) initialization? -> 0
Server /chassis/storageadapter/virtual-drive # get-operation-status
progress-percent: 20%
elapsed -seconds: 30
operation-in-progress: initializing virtual drive
Server /chassis/storageadapter/virtual-drive #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters command mode for the specified virtual
virtual-drive drive-number drive.
Step 4 Server /chassis/storageadapter # set-boot-drive Specifies the controller to boot from this virtual
drive.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
257
Managing Storage Adapters
Editing a Virtual Drive
Example
This example shows how to specify the controller to boot from virtual drive 3:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope virtual-drive 3
Server /chassis/storageadapter/virtual-drive # set-boot-drive
Are you sure you want to set virtual drive 3 as the boot drive?
Enter 'yes' to confirm -> yes
Server /chassis/storageadapter/virtual-drive #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server chassis /storageadapter # scope Enters command mode for the specified virtual
virtual-drive drive number drive.
Step 4 Server chassis /storageadapter /virtual-drive # Prompts you to select a different current policy.
modify-attributes
Step 5 Server chassis /storageadapter /virtual-drive# Specifies the RAID level for the specified
set raid-level value virtual drive.
Step 6 Server chassis /storageadapter /virtual-drive# Specifies the physical drive for the specified
set physical-drive value virtual drive.
Example
This example shows to edit a virtual drive:
Server# scope chassis
Server /chassis # scope storageadapter slot-3
Server /chassis/storageadapter # scope virtual-drive 3
Server /chassis/storageadapter/virtual-drive #set raid-level 1
Server /chassis/storageadapter/virtual-drive *# physical-drive 1
Server /chassis/storageadapter/virtual-drive* #commit
Server /chassis/storageadapter /virtual-drive # modify-attribute
Current write policy: Write Back Good BBU
0: Write Through
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
258
Managing Storage Adapters
Securing a Virtual Drive
OK? (y or n)--> y
Server /chassis/storageadapter/virtual-drive #
Important This task secures all the VDs in an existing drive group, where virtual-drive is the target ID of a virtual drive
in the drive group.
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters command mode for the specified virtual
virtual-drive drive-number drive.
Step 4 Server /chassis/storageadapter/virtual-drive # You are prompted to confirm the action. Enter
secure-drive-group yes to confirm.
Note If you do not enter yes, the action
is aborted.
Example
This example shows how to secure the virtual drive group.
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope virtual-drive 3
Server /chassis/storageadapter/virtual-drive # secure-drive-group
This will enable security for virtual drive 16, and all virtual drives sharing this drive
group.
It is not reversible. Are you quite certain you want to do this?
Enter 'yes' to confirm -> yes
server /chassis/storageadapter/virtual-drive # show detail
Virtual Drive 16:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
259
Managing Storage Adapters
Modifying Attributes of a Virtual Drive
.
.
FDE Capable: 1
FDE Enabled: 1
.
.
server /chassis/storageadapter/virtual-drive #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters the command mode for the virtual drive.
virtual-drive 3
Step 4 Server /chassis/storageadapter/virtual-drive # Prompts you to select a different current policy.
modify-attributes
Example
This example shows how to carve a new virtual drive out of unused space in an existing RAID 1
drive group:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope virtual-drive
Server /chassis/storageadapter/virtual-drive # modify-attributes
0: Write Through
1: Write Back
2: Write Back even if Bad BBU
OK? (y or n) --> y
operation in progress.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
260
Managing Storage Adapters
Making a Dedicated Hot Spare
Server /chassis/storageadapter/virtual-drive #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters command mode for the specified
physical-drive drive-number physical drive.
Step 4 Server /chassis/storageadapter/physical-drive You are prompted to choose a virtual drive for
# make-dedicated-hot-spare which the dedicated hot spare is being created.
Example
This example shows how to make physical drive 3 a dedicated hot spare for virtual drive 6:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope physical-drive 3
Server /chassis/storageadapter/physical-drive # make-dedicated-hot-spare
5: VD_OS_1, RAID 0, 102400 MB, physical disks: 1
6: VD_OS_2, RAID 0, 12288 MB, physical disks: 1
7: VD_OS_3, RAID 0, 12288 MB, physical disks: 1
8: VD_DATA_1, RAID 0, 12512 MB, physical disks: 1
9: RAID1_2358, RAID 1, 40000 MB, physical disks: 2,3,5,8
11: JFB_RAID1_67, RAID 1, 20000 MB, physical disks: 6,7
12: JFB_Crv_R1_40, RAID 1, 40000 MB, physical disks: 6,7
13: JFB_R1_10GB, RAID 1, 10000 MB, physical disks: 6,7
Server /chassis/storageadapter/physical-drive #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
261
Managing Storage Adapters
Preparing a Drive for Removal
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters command mode for the specified
physical-drive drive-number physical drive.
Example
This example shows how to make physical drive 3 a global hot spare:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope physical-drive 3
Server /chassis/storageadapter/physical-drive # make-global-hot-spare
Server /chassis/storageadapter/physical-drive #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters command mode for the specified
physical-drive drive-number physical drive.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
262
Managing Storage Adapters
Toggling Physical Drive Status
Example
This example shows how to prepare physical drive 3 for removal.
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope physical-drive 3
Server /chassis/storageadapter/physical-drive # prepare-for-removal
Server /chassis/storageadapter/physical-drive #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters command mode for the physical drive.
physical-drive 4
Step 4 Server /chassis/storageadapter/physical-drive Modifies the status of the drive to Unconfigured
# make-unconfigured-good good.
Step 5 Server /chassis/storageadapter/physical-drive Enables the JBOD mode on the physical drive.
# make-jbod
Example
This example shows how to toggle between the status of the physical drive:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope physical-drive 4
Server /chassis/storageadapter/physical-drive # show detail
Physical Drive Number 4:
Controller: SLOT-4
Health: Good
Status: JBOD
Boot Drive: true
Manufacturer: ATA
Model: ST500NM0011
Predictive Failure Count: 0
Drive Firmware: CC02
Coerced Size: 476416 MB
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
263
Managing Storage Adapters
Setting a Physical Drive as a Controller Boot Drive
Type: HDD
Server /chassis/storageadapter/physical-drive # make-unconfigured-good
Server /chassis/storageadapter/physical-drive # show detail
Physical Drive Number 4:
Controller: SLOT-4
Health: Good
Status: Unconfigured Good
Boot Drive: true
Manufacturer: ATA
Model: ST500NM0011
Predictive Failure Count: 0
Drive Firmware: CC02
Coerced Size: 476416 MB
Type: HDD
Server /chassis/storageadapter/physical-drive # make-jbod
Server /chassis/storageadapter/physical-drive # show detail
Physical Drive Number 4:
Controller: SLOT-4
Health: Good
Status: JBOD
Boot Drive: true
Manufacturer: ATA
Model: ST500NM0011
Predictive Failure Count: 0
Drive Firmware: CC02
Coerced Size: 476416 MB
Type: HDD
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters command mode for the physical drive.
physical-drive 4
Step 4 Server /chassis/storageadapter/physical-drive You are prompted to confirm the action. Enter
# set-boot-drive yes to confirm.
Note If you do not enter yes, the action
is aborted.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
264
Managing Storage Adapters
Removing a Drive from Hot Spare Pools
Example
This example shows how to set a physical drive as a boot drive for a controller:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # show detail
PCI Slot SLOT-4:
Health: Good
Controller Status: Optimal
ROC Temperature: Not Supported
Product Name: MegaRAID 9240-8i (RAID 0,1,10,5)
Serial Number: SP23807413
Firmware Package Build: 20.11.1-0159
Product ID: LSI Logic
Battery Status: no battery
Cache Memory Size: 0 MB
Boot Drive: none
Boot Drive is PD: false
TTY Log Status: Not Downloaded
Server /chassis/storageadapter # scope physical-drive 4
Server /chassis/storageadapter/physical-drive # set-boot-drive
Are you sure you want to set physical drive 4 as the boot drive?
Enter 'yes' to confirm -> yes
Server /chassis/storageadapter/physical-drive # exit
Server /chassis/storageadapter # show detail
PCI Slot SLOT-4:
Health: Good
Controller Status: Optimal
ROC Temperature: Not Supported
Product Name: MegaRAID 9240-8i (RAID 0,1,10,5)
Serial Number: SP23807413
Firmware Package Build: 20.11.1-0159
Product ID: LSI Logic
Battery Status: no battery
Cache Memory Size: 0 MB
Boot Drive: 4
Boot Drive is PD: true
TTY Log Status: Not Downloaded
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
265
Managing Storage Adapters
Undo Preparing a Drive for Removal
Step 4 Server /chassis/storageadapter/physical-drive Removes a drive from the host spare pool.
# remove-hot-spare
Example
This example shows how to remove physical drive 3 from the hot spare pools:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope physical-drive 3
Server /chassis/storageadapter/physical-drive # remove-hot-spare
Server /chassis/storageadapter/physical-drive #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters command mode for the specified
physical-drive drive-number physical drive.
Example
This example shows how to respin physical drive 3 after preparing the drive for removal.
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope physical-drive 3
Server /chassis/storageadapter/physical-drive # undo-prepare-for-removal
Server /chassis/storageadapter/physical-drive #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
266
Managing Storage Adapters
Enabling Auto Learn Cycles for the Battery Backup Unit
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope bbu Enter the battery backup unit command mode.
Example
This example shows how to enable the battery auto-learn cycles:
Server # scope chassis
Server /chassis # scope storageadapter SLOT-2
Server /chassis/storageadapter # scope bbu
Server /chassis/storageadapter/bbu # enable-auto-learn
Automatic BBU learn cycles will occur without notice if enabled.
Are you sure? [y/n] --> y
enable-auto-learn initiated
Server /chassis/storageadapter/bbu #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope bbu Enter the battery backup unit command mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
267
Managing Storage Adapters
Starting a Learn Cycle for a Battery Backup Unit
Example
This example shows how to disables the battery auto-learn cycles:
Server # scope chassis
Server /chassis # scope storageadapter SLOT-2
Server /chassis/storageadapter # scope bbu
Server /chassis/storageadapter/bbu # disable-auto-learn
Automatic BBU learn cycles will no longer occur if disabled.
Are you sure? [y/n] --> y
disable-auto-learn initiated
Server /chassis/storageadapter/bbu #
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope bbu Enter the battery backup unit command mode.
Step 4 Server /chassis/storageadapter # Starts the learn cycle for the battery.
start-learn-cycle
Example
This example shows how to initiate the learn cycles for a battery:
Server # scope chassis
Server /chassis # scope storageadapter SLOT-2
Server /chassis/storageadapter # scope bbu
Server /chassis/storageadapter/bbu # start-learn-cycle
Server /chassis/storageadapter/bbu #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
268
Managing Storage Adapters
Toggling the Locator LED for a Physical Drive
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters the physical drive command mode.
physical-drive 3
Step 4 Server /chassis/storageadapter/physical-drive Enables or disables the physical drive locator
# locator-led {on | off} LED.
Example
This example shows how to enable the locator LED for physical drive 3:
Server # scope chassis
Server /chassis # scope storageadapter SLOT-2
Server /chassis/storageadapter # scope physical-drive 3
Server /chassis/storageadapter/physical-drive # locator-led on
Server /chassis/storageadapter/physical-drive* # commit
Server /chassis/storageadapter/physical-drive #
Procedure
Step 2 Server /chassis # scope storageadapter Slot-ID Enters storage adapter command mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
269
Managing Storage Adapters
Restoring Storage Controller to Factory Defaults
Example
The following example shows how to clear the controller configuration:
Server # scope chassis
Server /chassis # scope storageadapter SLOT-HBA 1
Server /chassis/storageadapter # clear-all-config
Are you sure you want to clear the controller's config and delete all VDs?
Enter 'yes' to confirm -> yes
Enter administrative password to proceed with operation\n
Password -> Password accepted. Performing requested operation.
Server /chassis/storageadapter #
Procedure
Step 2 Server /chassis # scope storageadapter Slot-ID Enters storage adapter command mode.
Example
The following example shows how to restore the controller configuration parameters to factory
defaults:
Server # scope chassis
Server /chassis # scope storageadapter SLOT-HBA 1
Server /chassis/storageadapter # set-factory-defaults
This operation will restore controller settings to factory default values. Do you want to
proceed?
Enter 'yes' to confirm -> yes
Server /chassis/storageadapter #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
270
Managing Storage Adapters
Viewing Physical Drive Details
Procedure
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # show log Displays the storage controller logs.
Example
This example shows how to display storage controller logs:
Server # scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # show log
Server /chassis/storageadapter #
Step 2 Server /chassis # scope storageadapter slot Enters command mode for an installed storage
card.
Step 3 Server /chassis/storageadapter # scope Enters the physical drive command mode.
physical-drive 2
Step 4 Server /chassis/storageadapter/physicsl-drive # Displays the physical drive details.
show detail
Example
This example shows how to view the physical drive information:
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
271
Managing Storage Adapters
Viewing NVMe Controller Details
Step 2 Server /chassis # show nvmeadapter Displays the available NVMe adapters.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
272
Managing Storage Adapters
Viewing NVMe Physical Drive Details
Step 4 Server /chassis/nvmeadapter # show detail Displays the NVMe controller details.
Example
This example shows how to view the controller information:
Server# scope chassis
Server /chassis # show nvmeadapter
PCI Slot
----------------------------
NVMe-direct-U.2-drives
PCIe-Switch
Server /chassis # scope nvmeadapter PCIe-Switch
Server /chassis/nvmeadapter # show detail
PCI Slot: PCIe-Switch
Health: Good
Drive Count: 8
Vendor ID: MICROSEM
Product ID: PFX 48XG3
Component ID: 8533
Product Revision: RevB
P2P Vendor ID: f811
P2P Device ID: efbe
Running Firmware Version: 1.8.0.58-24b1
Pending Firmware Version: 1.8.0.58
Switch temperature: 49 degrees C
Switch status: Optimal
Link Status: Optimal
Server /chassis/nvmeadapter #
Step 2 Server /chassis # show nvmeadapter Displays the available NVMe adapters.
Step 3 Server /chassis/nvmeadapter # scope Enters the chosen NVMe adapter command
nvmeadapter NVMe Adapter Name mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
273
Managing Storage Adapters
Viewing SIOC NVMe Drive Details
Example
This example shows how to view the physical drive information:
Server# scope chassis
Server /chassis # scope nvmeadapter NVMe-direct-U.2-drives
Server /chassis/nvmeadapter # show nvme-physical-drive
Physical Drive Number Product Name Manufacturer Serial Number Temperature % Drive Life Used
Performance Level LED Fault status % Power on Hours
--------------------- ----- ------------ ------------- ----------- -----------------
----------------- ---------------- ----------------
REAR-NVME-1 Ci... HGST SDM00000E5EC 48 degre... 3 100
Healthy. Driv... 2
REAR-NVME-2 Ci... HGST SDM00000DC90 47 degre... 2 100
Healthy 3
Server /chassis/nvmeadapter # scope nvme-physical-drive REAR-NVME-1
Server /chassis/nvmeadapter/nvme-physical-drive # show detail
Physical Drive Number REAR-NVME-1:
Product Name: Cisco UCS (SN200) 2.5 inch 800 GB NVMe based PCIe SSD
Manufacturer: HGST
Serial Number: SDM00000E5EC
Temperature: 48 degrees C
% Drive Life Used: 3
Performance Level: 100
LED Fault status: Healthy. Drive is overused based on current write pattern
% Power on Hours: 2
Firmware Revision:
PCI Slot: REAR-NVME-1
Managed Id: 10
Controller Type: NVME-SFF
Controller Temperature: 48 degrees C
Fault State: 0
Throttle Start Temperature: 70 degrees C
Shutdown Temperature: 75 degrees C
Server /chassis/nvmeadapter/nvme-physical-drive #
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
274
Managing Storage Adapters
Viewing SIOC NVMe Drive Details
Step 3 Server /chassis/CMC # scope nvmeadapter Enters the NVMe adapter command mode.
adapter name
Step 4 Server /chassis/CMC/nvmeadapter # show Displays the SIOC NVMe physical drive
nvme-physical-drive detail details.
Example
This example shows how to view SIOC NVMe drive details:
Server # scope chassis
Server /chassis # scope cmc
Server /chassis/cmc # show detail
Firmware Image Information:
ID: 1
Name: CMC1
SIOC PID: UCS-S3260-PCISIOC
Serial Number: FCH21277K8T
Update Stage: ERROR
Update Progress: OS_ERROR
Current FW Version: 4.0(0.166)
FW Image 1 Version: 0.0(4.r17601)
FW Image 1 State: BACKUP INACTIVATED
FW Image 2 Version: 4.0(0.166)
FW Image 2 State: RUNNING ACTIVATED
Reset Reason: ac-cycle
Secure Boot: ENABLED
Server /chassis # scope cmc 1
Server /chassis/cmc # scope nvmeadapter NVMe-direct-U.2-drives
Server /chassis/cmc/nvmeadapter # show nvme-physical-drive detail
Physical Drive Number SIOCNVMe1:
Product Name: Cisco 2.5 inch 1TB Intel P4501 NVMe Med. Perf. Value Endurance
Manufacturer: Intel
Serial Number: PHLF7303008G1P0KGN
Temperature: 39 degrees C
% Drive Life Used: 1
Performance Level: 100
LED Fault status: Healthy
Drive Status: Optimal
% Power on Hours: 8
Firmware Version: QDV1CP03
PCI Slot: SIOCNVMe1
Managed Id: 1
Controller Type: NVME-SFF
Controller Temperature: 39
Throttle State: 0
Throttle Start Temperature: 70
Shutdown Temperature: 80
Physical Drive Number SIOCNVMe2:
Product Name: Cisco 2.5 inch 500GB Intel P4501 NVMe Med. Perf. Value Endurance
Manufacturer: Intel
Serial Number: PHLF73440068500JGN
Temperature: 39 degrees C
% Drive Life Used: 1
Performance Level: 100
LED Fault status: Healthy
Drive Status: Optimal
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
275
Managing Storage Adapters
Viewing PCI Switch Details
% Power on Hours: 7
Firmware Version: QDV1CP03
PCI Slot: SIOCNVMe2
Managed Id: 2
Controller Type: NVME-SFF
Controller Temperature: 39
Throttle State: 0
Throttle Start Temperature: 70
Shutdown Temperature: 80
Server /chassis/cmc/nvmeadapter #
Procedure
Step 2 Server /chassis # show pci-switch Displays the list of PCI switches available in
the system.
Step 3 Server /chassis # show pci-switch detail Displays the details of the PCI switches
available in the system.
Example
This example shows how to view PCI Switch details:
Server # scope chassis
Server /chassis # show pci-switch
Slot-ID Product Name Manufacturer
------------------------- -------------------- --------------------
PCI-Switch-1 PEX 8764 PLX
PCI-Switch-2 PEX 8764 PLX
PCI-Switch-3 PEX 8764 PLX
PCI-Switch-4 PEX 8764 PLX
Server /chassis # show pci-switch detail
PCI SWITCH:
Slot-ID: PCI-Switch-1
Product Name: PEX 8764
Product Revision: 0xab
Manufacturer: PLX
Device Id: 0x8764
Vendor Id: 0x10b5
Sub Device Id: 0x8764
Sub Vendor Id: 0x10b5
Temperature: 43
Composite Health: Good
Adapter Count: 3
PCI SWITCH:
Slot-ID: PCI-Switch-2
Product Name: PEX 8764
Product Revision: 0xab
Manufacturer: PLX
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
276
Managing Storage Adapters
Viewing Details of a Particular PCI Switch
Procedure
Step 2 Server /chassis # show pci-switch Displays the list of PCI switches available in
the system.
Step 3 Server /chassis # scope pci-switch PCI-Switch Enters the PCI switch command mode of the
Number chosen switch.
Step 4 Server /chassis/pci-switch # show detail Displays the details of the PCI switch.
Step 5 Server /chassis/pci-switch # show adapter-list Displays the details of the adapters present on
the PCI switch.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
277
Managing Storage Adapters
Managing the Flexible Flash Controller
Example
This example shows how to view details of a particular PCI Switch:
Server # scope chassis
Server /chassis # show pci-switch
Slot-ID Product Name Manufacturer
------------------------- -------------------- --------------------
PCI-Switch-1 PEX 8764 PLX
PCI-Switch-2 PEX 8764 PLX
PCI-Switch-3 PEX 8764 PLX
PCI-Switch-4 PEX 8764 PLX
Server /chassis # scope pci-switch PCI-Switch-1
Server /chassis/pci-switch show detail
PCI SWITCH:
Slot-ID: PCI-Switch-1
Product Name: PEX 8764
Product Revision: 0xab
Manufacturer: PLX
Device Id: 0x8764
Vendor Id: 0x10b5
Sub Device Id: 0x8764
Sub Vendor Id: 0x10b5
Temperature: 43
Composite Health: Good
Adapter Count: 3
Server /chassis/pci-switch # show adapter-list
Slot Link Status Link Speed Link Width Status
-------------------- -------------------- -------------------- --------------------
--------------------
GPU-3 up 8.0 16 Good
GPU-4 up 8.0 16 Good
12 up 8.0 16 Good
Server /chassis/pci-switch #
Some C-Series Rack-Mount Servers support an internal Secure Digital (SD) memory card for storage of server
software tools and utilities. The SD card is hosted by the Cisco Flexible Flash storage adapter.
The SD storage is available to Cisco IMC as a single hypervisor (HV) partition configuration. Prior versions
had four virtual USB drives. Three were preloaded with Cisco UCS Server Configuration Utility, Cisco drivers
and Cisco Host Upgrade Utility, and the fourth as user-installed hypervisor. A single HV partition configuration
is also created when you upgrade to the latest version of Cisco IMC or downgrade to the prior version, and
reset the configuration.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
278
Managing Storage Adapters
Cisco Flexible Flash
For more information about installing and configuring the M.2 drives, see the Storage Controller
Considerations (Embbeded SATA RAID Requirements) and Replacing an M.2 SSD in a Mini-Storage
Carrier For M.2 sections in the Cisco UCS Server Installation and Service Guide for the C240 M5 servers
at this URL:
https://www.cisco.com/c/en/us/support/servers-unified-computing/ucs-c-series-rack-servers/
products-installation-guides-list.html
For information about the Cisco software utilities and packages, see the Cisco UCS C-Series Servers
Documentation Roadmap at this URL:
http://www.cisco.com/go/unifiedcomputing/c-series-doc
Note • If you want to upgrade from version 1.4(5e) to 1.5(4) or higher versions, you must first upgrade to
version1.5(2) and then upgrade to a higher version of Cisco IMC.
• Reset the Cisco Flexible Flash controller to load the latest Flex Flash firmware after every Cisco IMC
firmware upgrade.
Action Description
Reset Partition Defaults Allows you to reset the configuration in the selected
slot to the default configuration.
Synchronize Card Configuration Allows you to retain the configuration for an SD card
that supports firmware version 253 and later.
Configure Operational Profile Allows you to configure the SD cards on the selected
Cisco Flexible Flash controller.
Scenario Behavior
Single card RAID partitions are enumerated if the card is healthy,
and if the mode is either Primary or
Secondary-active.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
279
Managing Storage Adapters
Upgrading from Single Card to Dual Card Mirroring with FlexFlash
Scenario Behavior
Dual paired cards RAID partitions are enumerated if one of the cards is
healthy.
When only one card is healthy, all read/write
operations occur on this healthy card. You must use
UCS SCU to synchronize the two RAID partitions.
Prior to using either of these methods, you must keep in mind the following guidelines:
• To create RAID1 mirroring, the empty card that you want to add to the server must be of the exact size
of the card that is already in the server. Identical card size is a must to set up RAID1 mirroring.
• Ensure that the card with valid data in the Hypervisor partition is marked as the primary healthy card.
You can determine this state either in the Cisco IMC GUI or from the Cisco IMC CLI. To mark the state
of the card as primary healthy, you can either use the Reset Configuration option in the Cisco IMC GUI
or run the reset-config command in the Cisco IMC CLI. When you reset the configuration of a particular
card, the secondary card is marked as secondary active unhealthy.
• In a Degraded RAID health state all read-write transactions are done on the healthy card. In this scenario,
data mirroring does not occur. Data mirroring occurs only in the Healthy RAID state.
• Data mirroring is only applicable to RAID partitions. In the C-series servers, only Hypervisor partitions
operate in the RAID mode.
• If you have not configured SD cards for use with prior versions, then upgrading to the latest version loads
the latest 253 firmware and enumerates all four partitions to the host.
While upgrading versions of the FlexFlash, you may see the following error message:
Unable to communicate with Flexible Flash controller: operation ffCardsGet, status
CY_AS_ERROR_INVALID_RESPONSE”
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
280
Managing Storage Adapters
Configuring the Flexible Flash Controller Properties for C220 M5 and C240 M5 Servers
In addition, the card status may be shown as missing. This error occurs because you accidently switched to
an alternate release or a prior version, such as 1.4(x). In this scenario, you can either revert to the latest version,
or you can switch back to the FlexFlash 1.4(x) configuration. If you choose to revert to the latest Cisco IMC
version, then the Cisco FlexFlash configuration remains intact. If you choose to switch back to the prior
version configuration, you must reset the Flexflash configuration. In this scenario, you must be aware of the
following:
• If multiple cards are present, and you revert to a prior version, then the second card cannot be discovered
or managed.
• If the card type is SD253, then you must run the reset-config command twice from the Cisco IMC CLI
- once to reload the old firmware on the controller and to migrate SD253 to SD247 type, and the second
time to start the enumeration.
Configuring the Flexible Flash Controller Properties for C220 M5 and C240 M5
Servers
Before you begin
• You must log in with admin privileges to perform this task.
• Cisco Flexible Flash must be supported by your platform.
Procedure
Step 2 Required: Server /chassis # scope flexflash Enters the Cisco Flexible Flash controller
command mode for the specified controller.
Step 3 Server /chassis/flexflash # scope Enters the operational profile command mode.
operational-profile
Step 4 Server /chassis/flexflash/operational-profile # Specifies the number of read errors that are
set read-error-count- slot1-threshold permitted while accessing the Cisco Flexible
threshold Flash card in slot 1. If the number of errors
exceeds this threshold, the Cisco Flexible Flash
card is disabled and you must reset it manually
before Cisco IMC attempts to access it again.
To specify a read error threshold, enter an
integer between 1 and 255. To specify that the
card should never be disabled regardless of the
number of errors encountered, enter 0 (zero).
Step 5 Server /chassis/flexflash/operational-profile # Specifies the number of read errors that are
set read-error-count- slot2-threshold permitted while accessing the Cisco Flexible
threshold Flash card in slot 2. If the number of errors
exceeds this threshold, the Cisco Flexible Flash
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
281
Managing Storage Adapters
Resetting the Flexible Flash Controller
Step 6 Server /chassis/flexflash/operational-profile # Specifies the number of write errors that are
set write-error-count-slot2-threshold permitted while accessing the Cisco Flexible
threshold Flash card in slot 2. If the number of errors
exceeds this threshold, the Cisco Flexible Flash
card is disabled and you must reset it manually
before Cisco IMC attempts to access it again.
To specify a write error threshold, enter an
integer between 1 and 255. To specify that the
card should never be disabled regardless of the
number of errors encountered, enter 0 (zero).
Example
This example shows how to configure the properties of the Flash controller:
Server# scope chassis
Server /chassis # scope flexflash FlexFlash-0
Server /chassis/flexflash # scope operational-profile
Server /chassis/flexflash/operational-profile # set read-err-count-slot1-threshold 9
Server /chassis/flexflash/operational-profile *# set read-err-count-slot2-threshold 10
Server /chassis/flexflash/operational-profile *# set write-err-count-slot1-threshold 11
Server /chassis/flexflash/operational-profile *# set write-err-count-slot2-threshold 12
Server /chassis/flexflash/operational-profile *# commit
Server /chassis/flexflash/operational-profile # show detail
FlexFlash Operational Profile:
Firmware Operating Mode: util
SLOT1 Read Error Threshold: 9
SLOT1 Write Error Threshold: 11
SLOT2 Read Error Threshold: 10
SLOT2 Write Error Threshold: 12
Note This operation will disrupt traffic to the virtual drives on the Cisco Flexible Flash controller.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
282
Managing Storage Adapters
Configuring the Flexible Flash Controller Cards in Mirror Mode
Procedure
Step 2 Required: Server /chassis # scope flexflash Enters the Cisco Flexible Flash controller
index command mode for the specified controller. At
this time, the only permissible index value is
FlexFlash-0.
Step 3 Server /chassis/flexflash # reset Resets the Cisco Flexible Flash controller.
Example
This example resets the flash controller:
Server# scope chassis
Server /chassis # scope flexflash FlexFlash-0
Server /chassis/flexflash # reset
This operation will reset Cisco Flexible Flash controller.
Host traffic to VDs on this device will be disrupted.
Continue?[y|N] y
Server /chassis/flexflash #
Procedure
Step 2 Required: Server /chassis # scope flexflash Enters the Cisco Flexible Flash controller
command mode for the specified controller.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
283
Managing Storage Adapters
Configuring the Flexible Flash Controller Cards in Mirror Mode
Step 8 Enter y at the Continue?[y|N]y prompt. Configures the cards in Mirror mode and sets
the card in SLOT-1 as primary healthy and
SLOT-2 (if card existing) as unhealthy
secondary.
Step 9 (Optional) Server /chassis/flexflash # show Displays the status of the configured cards.
physical-drive
Note •
• If the cards are configured in
auto sync mode and if a card
goes out of sync, then
syncing from a good card
starts automatically.
• If the server is running with
one auto mirror healthy card
and if a new card is inserted
then the metadata is
automatically created on the
new card and data syncing
starts from auto mirror
configured card to the new
paired card.
Example
This example shows how to configure the controller cards in mirror mode:
Server# scope chassis
Server /chassis # scope flexflash
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
284
Managing Storage Adapters
Enabling Virtual Drives
Server /chassis/flexflash #
Procedure
Step 2 Required: Server /chassis # scope flexflash Enters the Cisco Flexible Flash controller
command mode for the specified controller.
Step 3 Required: Server /chassis/ flexflash # scope Enters the virtual drive command mode for the
virtual-drive specified controller.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
285
Managing Storage Adapters
Enabling Virtual Drives
Example
This example shows how to enable the virtual drives to the host:
Server# scope chassis
Server /chassis # scope flexflash
Server /chassis/flexflash # scope virtual-drive
Server /chassis/flexflash/virtual-drive # enable-vds "SCU HUU dlfd"
Server /chassis/flexflash/virtual-drive # show detail
Server /chassis/flexflash/virtual-drive #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
286
Managing Storage Adapters
Erasing Virtual Drives
Procedure
Step 2 Required: Server /chassis # scope flexflash Enters the Cisco Flexible Flash controller
command mode for the specified controller.
Step 3 Required: Server /chassis/ flexflash # scope Enters the virtual drive command mode for the
virtual-drive specified controller.
Example
This example shows how to erase data on the virtual drives:
Server# scope chassis
Server /chassis # scope flexflash
Server /chassis/flexflash # scope virtual-drive
Server /chassis/flexflash/virtual-drive # erase-vds "SCU HUU"
Server /chassis/flexflash/virtual-drive # show detail
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
287
Managing Storage Adapters
Syncing Virtual Drives
VD Status: Healthy
VD Type: Removable
Read/Write: R/W
Host Accessible: Not-Connected
Operation in progress: NA
Last Operation completion status: none
Virtual Drive dlfd:
Server /chassis/flexflash/virtual-drive #
Procedure
Step 2 Required: Server /chassis # scope flexflash Enters the Cisco Flexible Flash controller
command mode for the specified controller.
Step 3 Required: Server /chassis/ flexflash # scope Enters the virtual drive command mode for the
virtual-drive specified controller.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
288
Managing Storage Adapters
Viewing FlexFlash Logs
Example
This example shows how to sync the virtual drives:
Server# scope chassis
Server /chassis # scope flexflash
Server /chassis/flexflash # scope virtual-drive
Server /chassis/flexflash/virtual-drive # sync-vds Hypervisor
Server /chassis/flexflash/virtual-drive # show detail
Server /chassis/flexflash/virtual-drive #
Procedure
Step 2 Required: Server /chassis # scope flexflash Enters the Cisco Flexible Flash controller
index command mode.
Step 3 Server /chassis/flexflash # show logs Displays the Flexible Flash controller logs.
Example
An example of the Flexible Flash Controller logs.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
289
Managing Storage Adapters
Managing the FlexUtil Controller
2017 July 10 07:45:07 UTC warning "CYWB_LOG: CYWB FWLOG (usbapp): USB Suspend
event, data=0"
2017 July 10 07:45:06 UTC warning "CYWB_LOG: CYWB FWLOG (usbapp): USB VbusValid
event, data=0"
2017 July 10 07:44:23 UTC warning "CYWB_LOG: CYWB FWLOG (usb): connect done,
usb_state=4 ctrl_reg=0"
2017 July 10 07:44:23 UTC info "cywb_blkdev_create_disks: Finished changing
disks: S0=0 S1=0 RAID=0 TOTAL=0"
2017 July 10 07:44:23 UTC info "cywbblkdev_blk_put: disk=cd3ad400 queue=cd3bd360
port=0 unit=0 usage=0"
2017 July 10 07:44:23 UTC info "cywb_blkdev_create_disks: S2 unit 0 has become
unavailable"
2017 July 10 07:44:23 UTC info "CYWB_LOG: Found 0 RAID partitions, 0 partitions
on port0 and 0 partitions on port 1"
2017 July 10 07:44:23 UTC info cywb_blkdev_create_disks called
2017 July 10 07:44:23 UTC info "cywb_blkdev_create_disks: Scheduling driver
callback"
2017 July 10 07:44:23 UTC info "cywbblkdev: Added disk=cd3ad400 queue=cd3bd360
port=0 unit=0"
2017 July 10 07:44:23 UTC info "cywbblkdev: Registered block device cydiskraida
with capacity 124727295 (major=254, minor=0)"
2017 July 10 07:44:23 UTC info cywbblkdev_blk_release exit
2017 July 10 07:44:23 UTC info "cywbblkdev_blk_put: disk=cd3ad400 queue=cd3bd360
port=0 unit=0 usage=1"
2017 July 10 07:44:23 UTC info cywbblkdev_blk_release entry
2017 July 10 07:44:23 UTC warning "CYWB_LOG: CyWb: Disk on port0, unit0 is busy,
waiting"
2017 July 10 07:44:23 UTC warning "CYWB_LOG: CYWB: No device found on storage port
0"
2017 July 10 07:44:23 UTC info cywbblkdev_revalidate_disk called
2017 July 10 07:44:23 UTC info cywbblkdev_blk_open exit
2017 July 10 07:44:23 UTC info cywbblkdev_media_changed called
2017 July 10 07:44:23 UTC info cywbblkdev_blk_open entry
2017 July 10 07:44:23 UTC info "cywb_blkdev_create_disks: Finished changing
disks: S0=0 S1=0 RAID=1 TOTAL=1"
Note The number of partitions and size of each partition on microSD is fixed.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
290
Managing Storage Adapters
Configuring FlexUtil Operational Profiles
At any time, two partitions can be mapped onto the host. These partitions (except the user partition ) can also
be updated through a CIFS or NFS share. A second level BIOS boot order support is also available for all the
bootable partitions.
Note User partition must be used only for storage. This partition does not support OS installations.
Procedure
Step 2 Required: Server /chassis # scope flexutil Enters the FlexUtil controller command mode.
Step 3 Required: Server /chassis/flexutil # scope Enters the operational profile command mode.
operational-profile
Step 4 Server /chassis/flexutil/operational-profile # set Sets the read error threshold count.
read-err-count-threshold count
Note Zero value for threshold will be
treated as special case, cards will
not be marked unhealthy if error
count crosses zero threshold.
Example
This example shows how to configure the FlexUtil operational profile:
Server# scope chassis
Server /chassis # scope flexutil
Server /chassis/flexutil # scope operational-profile
Server /chassis/flexutil/operational-profile # set read-err-count-threshold 49
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
291
Managing Storage Adapters
Resetting FlexUtil Card Configuration
Procedure
Step 2 Required: Server /chassis # scope flexutil Enters the FlexUtil controller command mode.
Step 3 Server /chassis/flexutil # reset-card-config At the confirmation prompt enter y. Resets the
FlexUtil card configuration.
Example
This example shows how to reset the FlexUtil card configuration:
Server# scope chassis
Server /chassis # scope flexutil
Server /chassis/flexutil # reset-card-config
This operation will wipe all the data on the card.
Any VD connected to host (except UserPartition) will be disconnected from host.
This task will take few minutes to complete.
Do you want to continue?[y|N]y
Server /chassis/flexutil #
Procedure
Step 2 Required: Server /chassis # scope flexutil Enters the FlexUtil controller command mode.
Step 3 Server /chassis/flexutil # show detail Displays the FlexUtil controller properties.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
292
Managing Storage Adapters
Viewing FlexUtil Physical Drives Details
Example
This example displays the FlexUtil controller properties:
Server# scope chassis
Server /chassis # scope flexutil
Server /chassis/flexutil # show detail
Controller Flexutil:
Product Name: Cisco Flexutil
Internal State: Connected
Controller Status: OK
Physical Drive Count: 1
Virtual Drive Count: 5
Server /chassis/flexutil #
Procedure
Step 2 Required: Server /chassis # scope flexutil Enters the FlexUtil controller command mode.
Step 3 Server /chassis/flexutil # show physical-drive Displays the FlexUtil physical drives properties.
detail
Example
This example displays the FlexUtil physical drives properties:
Server# scope chassis
Server /chassis # scope flexutil
Server /chassis/flexutil # show physical-drive detail
Physical Drive microSD:
Status: present
Controller: Flexutil
Health: healthy
Capacity: 30624 MB
Write Enabled: true
Read Error Count: 0
Read Error Threshold: 49
Write Error Count: 0
Write Error Threshold : 49
Product Name: SD32G
Product Revision: 3.0
Serial#: 0x1cafb
Manufacturer Id: 39
OEM Id: PH
Manufacturing Date : 12/2016
Block Size: 512 bytes
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
293
Managing Storage Adapters
Viewing FlexUtil Virtual Drives Details
Partition Count: 5
Drives Enabled: SCU Diagnostics HUU Drivers UserPartition
Server /chassis/flexutil #
Procedure
Step 2 Required: Server /chassis # scope flexutil Enters the FlexUtil controller command mode.
Step 3 Required: Server /chassis/flexutil # scope Enters the virtual drive command mode.
virtual-drive
Step 4 Server /chassis/flexutil/virtual-drive # show Displays the FlexUtil physical drives properties.
detail
Example
This example displays the FlexUtil physical drives properties:
Server# scope chassis
Server /chassis # scope flexutil
Server /chassis/flexutil # scope virtual-drive
Server /chassis/flexutil/virtual-drive # show detail
Virtual Drive SCU:
ID: 1
LUN ID: NA
Size: 1280 MB
VD Scope: Non-RAID
VD Status: Healthy
VD Type: Removable
Read/Write: R/W
Host Accessible: Not-Connected
Operation in progress: NA
Last Operation completion status: none
Virtual Drive Diagnostics:
ID: 2
LUN ID: 0
Size: 256 MB
VD Scope: Non-RAID
VD Status: Healthy
VD Type: Removable
Read/Write: R/W
Host Accessible: Connected
Operation in progress: NA
Last Operation completion status: none
Virtual Drive HUU:
ID: 3
LUN ID: NA
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
294
Managing Storage Adapters
Adding an Image to a FlexUtil Virtual Drive
Size: 1536 MB
VD Scope: Non-RAID
VD Status: Healthy
VD Type: Removable
Read/Write: R/W
Host Accessible: Not-Connected
Operation in progress: NA
Last Operation completion status: none
Virtual Drive Drivers:
ID: 4
LUN ID: NA
Size: 8192 MB
VD Scope: Non-RAID
VD Status: Healthy
VD Type: Removable
Read/Write: R/W
Host Accessible: Not-Connected
Operation in progress: NA
Last Operation completion status: none
Virtual Drive UserPartition:
ID: 5
LUN ID: NA
Size: 11159 MB
VD Scope: Non-RAID
VD Status: Healthy
VD Type: Removable
Read/Write: R/W
Host Accessible: Not-Connected
Operation in progress: NA
Last Operation completion status: none
Server /chassis/flexutil/virtual-drive #
Procedure
Step 2 Required: Server /chassis # scope flexutil Enters the FlexUtil controller command mode.
Step 3 Required: Server /chassis/flexutil # scope Enters the virtual drive image configuration
vd-image-configs command mode.
Step 4 Server /chassis/flexutil/vd-image-configs # Maps a CIFS file for the FlexUtil virtual drive.
vd-image-cifs {virtual-drive-name You must specify the following:
remote-share remote-file-path [mount options]
• Name of the virtual drive
• Remote share including IP address (IPv4
or IPv6 address) and the exported directory
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
295
Managing Storage Adapters
Adding an Image to a FlexUtil Virtual Drive
Step 5 Server /chassis/flexutil/vd-image-configs # Maps an NFS file for the FlexUtil virtual drive.
vd-image-nfs {virtual-drive-name You must specify the following:
remote-share remote-file-path [mount options]
• Name of the virtual drive
• Remote share including IP address (IPv4
or IPv6 address)
• Path of the remote file
• (Optional) Mapping options
Step 6 Server /chassis/flexutil/vd-image-configs # Maps an HTTPS file to the virtual drive. You
vd-image-www {virtual-drive-name | must specify the following:
remote-share | remote-file-path [mount
• Name of the virtual drive to map
options]
• Remote share including IP address and the
exported directory
• Path of the remote file corresponding to
the exported directory.
• (Optional) Mapping options
• Username and password to connect to the
server
Step 7 Server /chassis/flexutil/vd-image-configs # Displays the FlexUtil virtual drive image details.
show detail
Example
This example shows how to map an image to a FlexUtil virtual drive:
Server# scope chassis
Server /chassis # scope flexutil
Server /chassis/flexutil # scope vd-image-configs
Server /chassis/flexutil/vd-image-configs # vd-image-nfs HUU 10.10.10.10:/nfsdata
ucs-c240m5-huu-3.1.0.182.iso
Server /chassis/flexutil/vd-image-configs # show detail
Virtual drive: SCU
mount-type: nfs
remote-share: 10.10.10.10:/nfsshare
remote-file: ucs-cxx-scu-4.0.12.3.iso
mount-options: 'nolock,noexec,noac,soft,timeo=60,retry=2,rsize=3072,wsize=3072'
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
296
Managing Storage Adapters
Updating a FlexUtil Virtual Drive
Virtual-drive: Drivers
mount-type: None
remote-share: None
remote-file: None
mount-options: None
Server /chassis/flexutil/vd-image-configs #
Procedure
Step 2 Required: Server /chassis # scope flexutil Enters the FlexUtil controller command mode.
Step 3 Required: Server /chassis/flexutil # scope Enters the virtual drive command mode.
virtual-drive
Step 4 Server /chassis/flexutil/virtual-drive # Updates the chosen virtual drive.
update-vds virtual-drive
Step 5 (Optional) Server /chassis/flexutil/virtual-drive Cancels an ongoing virtual drive update.
# update-vds-cancel
Step 6 Server /chassis/flexutil/virtual-drive # show Displays the FlexUtil virtual drive image details.
detail
Example
This example shows how to updates a FlexUtil virtual drive:
Server# scope chassis
Server /chassis # scope flexutil
Server /chassis/flexutil # scope virtual-drive
Server /chassis/flexutil/virtual-drive # update-vds HUU
Server /chassis/flexutil/virtual-drive # show detail
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
297
Managing Storage Adapters
Updating a FlexUtil Virtual Drive
Virtual-drive: SCU
partition-id: 1
lun-id: NA
size: 1280 MB
partition-scope: Non-RAID
partition-status: Healthy
partition-type: Removable
writable: R/W
host-accessible: Not-Connected
operation-in-progress: NA
operation-completion-status: none
Virtual-drive: Diagnostics
partition-id: 2
lun-id: NA
size: 256 MB
partition-scope: Non-RAID
partition-status: Healthy
partition-type: Removable
writable: R/W
host-accessible: Not-Connected
operation-in-progress: NA
operation-completion-status: none
Virtual-drive: HUU
partition-id: 3
lun-id: NA
size: 1536 MB
partition-scope: Non-RAID
partition-status: Healthy
partition-type: Removable
writable: R/W
host-accessible: Not-Connected
operation-in-progress: Updating
operation-completion-status: none
Virtual-drive: Drivers
partition-id: 4
lun-id: NA
size: 8192 MB
partition-scope: Non-RAID
partition-status: Healthy
partition-type: Removable
writable: R/W
host-accessible: Not-Connected
operation-in-progress: NA
operation-completion-status: none
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
298
Managing Storage Adapters
Enabling FlexUtil Virtual Drive
Procedure
Step 2 Required: Server /chassis # scope flexutil Enters the FlexUtil controller command mode.
Step 3 Required: Server /chassis/flexutil # scope Enters the virtual drive command mode.
virtual-drive
Step 4 Server /chassis/flexutil/virtual-drive # Maps the virtual drive to host.
enable-vds virtual-drive
Step 5 Server /chassis/flexutil/virtual-drive # show Displays the FlexUtil virtual drive image details.
detail
Example
This example shows how to map a virtual drive image to a host:
Server# scope chassis
Server /chassis # scope flexutil
Server /chassis/flexutil # scope virtual-drive
Server /chassis/flexutil/virtual-drive # enable-vds HUU
Server /chassis/flexutil/virtual-drive # show detail
Virtual Drive ID LUN ID Size VD Status Host Accessible Operation in Last
Operation
progress completion status
-------------- ------ ------ -------- ------------ ----------------- ------------
-----------------
SCU 1 NA 1280 MB Healthy Not-Connected NA none
Diagnostics 2 0 256 MB Healthy Connected NA
Update-Success
HUU 3 1 1536 MB Healthy Connected NA
Update-Success
Drivers 4 NA 8192 MB Healthy Not-Connected NA none
UserPartition 5 NA 11159 MB Healthy Not-Connected NA none
Server /chassis/flexutil/vd-image-configs #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
299
Managing Storage Adapters
Mapping an Image to a Virtual Drive
Procedure
Step 2 Required: Server /chassis # scope flexutil Enters the FlexUtil controller command mode.
Step 3 Required: Server /chassis/flexutil # scope Enters the virtual drive image configuration
vd-image-configs command mode.
Step 4 Required: /chassis/flexutil/vd-image-configs # Specify the IP and the path of the nfs/cifs share,
vd-image-nfs HUU nfs/cifs share IP and path and the ISO image file.
ISO image file
Step 5 /chassis/flexutil/vd-image-configs # show Displays the FlexUtil virtual drive image details.
detail
Example
This example shows how to add an image to a FlexUtil virtual drive:
virtual-drive: SCU
mount-type: nfs
remote-share: 10.104.236.81:/nfsshare
remote-file: ucs-cxx-scu-4.0.12.3.iso
mount-options: 'nolock,noexec,noac,soft,timeo=60,retry=2,rsize=3072,wsize=3072'
virtual-drive: Diagnostics
mount-type: nfs
remote-share: 10.104.236.81:/nfsshare
remote-file: ucs-cxx-diag.5.0.1a.iso
mount-options: 'nolock,noexec,noac,soft,timeo=60,retry=2,rsize=3072,wsize=3072'
virtual-drive: HUU
mount-type: nfs
remote-share: 10.127.54.176:/nfsdata
remote-file: ucs-c240m5-huu-3.1.0.182.iso
mount-options: "nolock,noexec,noac,soft,timeo=60,retry=2,rsize=3072,wsize=3072"
virtual-drive: Drivers
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
300
Managing Storage Adapters
Unmapping an Image From a Virtual Drive
mount-type: None
remote-share: None
remote-file: None
mount-options: None
Server /chassis/flexutil/vd-image-configs
Procedure
Step 2 Required: Server /chassis # scope flexutil Enters the FlexUtil controller command mode.
Step 3 Required: Server /chassis/flexutil # scope Enters the virtual drive image configuration
vd-image-configs command mode.
Example
This example shows how to unmap a FlexUtil virtual drive:
Server# scope chassis
Server /chassis # scope flexutil
Server /chassis/flexutil # scope vd-image-configs
Server /chassis/flexutil/vd-image-configs # unmap HUU
Server /chassis/flexutil/vd-image-configs # show detail
Virtual drive: SCU
mount-type: nfs
remote-share: 10.10.10.10:/nfsshare
remote-file: ucs-cxx-scu-4.0.12.3.iso
mount-options: 'nolock,noexec,noac,soft,timeo=60,retry=2,rsize=3072,wsize=3072'
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
301
Managing Storage Adapters
Erasing an Image on a Virtual Drive
remote-share: None
remote-file: None
mount-options: None
Virtual-drive: Drivers
mount-type: None
remote-share: None
remote-file: None
mount-options: None
Server /chassis/flexutil/vd-image-configs #
Procedure
Step 2 Required: Server /chassis # scope flexutil Enters the FlexUtil controller command mode.
Step 3 Required: Server /chassis/flexutil # scope Enters the virtual drive command mode.
virtual-drive
Step 4 Server /chassis/flexutil/virtual-drive # erase-vds Erases a virtual drive image.
virtual-drive
Step 5 Server /chassis/flexutil/virtual-drive # show Displays the FlexUtil virtual drive image details.
detail
Example
This example shows how to erase a virtual drive image:
Server# scope chassis
Server /chassis # scope flexutil
Server /chassis/flexutil # scope virtual-drive
Server /chassis/flexutil/virtual-drive # erase-vds SCU
This operation will erase data on the VD
Continue?[y|N]y
Server /chassis/flexutil/virtual-drive # show detail
Virtual Drive ID LUN ID Size VD Status Host Accessible Operation in Last
Operation
progress completion status
-------------- ------ ------ -------- ------------ ----------------- ------------
-----------------
SCU 1 NA 1280 MB Healthy Not-Connected Erasing none
Diagnostics 2 0 256 MB Healthy Connected NA
Update-Success
HUU 3 1 1536 MB Healthy Connected NA
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
302
Managing Storage Adapters
Cisco Boot Optimized M.2 Raid Controller
Update-Success
Drivers 4 NA 8192 MB Healthy Not-Connected NA none
UserPartition 5 NA 11159 MB Healthy Not-Connected NA none
C220-WZP210606A7 /chassis/flexutil/virtual-drive #
Step 2 Server /chassis # scope storageadapter Enters the Cisco Boot Optimized M.2 raid
MSTOR-RAID controller command mode.
Step 3 Server /chassis/storageadapter # show detail Displays the Cisco Boot Optimized M.2 raid
controller details.
Example
This example shows how to view the controller information:
Server# scope chassis
Server /chassis # show storageadapter MSTOR-RAID
Server /chassis/storageadapter # show detail
PCI Slot MSTOR-RAID:
Health: Good
Controller Status: Optimal
Product Name: Cisco Boot optimized M.2 Raid controller
Serial Number: FCH222877A7
Firmware Package Build: 2.3.17.1009
Product ID: Marvell
Flash Memory Size: 2 MB
Product PID: UCS-M2-HWRAID
Server /chassis/storageadapter #
Viewing Cisco Boot Optimized M.2 Raid Controller Physical Drive Details
Procedure
Step 2 Server /chassis # scope storageadapter Enters the Cisco Boot Optimized M.2 raid
MSTOR-RAID controller command mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
303
Managing Storage Adapters
Viewing Cisco Boot Optimized M.2 Raid Controller Physical Drive Details
Example
This example shows how to view the physical drive information:
Server# scope chassis
Server /chassis # show storageadapter MSTOR-RAID
Server /chassis/storageadapter # scope physical-drive 253
Server /chassis/storageadapter/physical-drive # show general
PCI Slot MSTOR-RAID:
Health: Good
Controller Status: Optimal
Product Name: Cisco Boot optimized M.2 Raid controller
Serial Number: FCH222877A7
Firmware Package Build: 2.3.17.1009
Product ID: Marvell
Flash Memory Size: 2 MB
Product PID: UCS-M2-HWRAID
Server /chassis/storageadapter/physical-drive # show detail
Physical Drive Number 253:
Controller: MSTOR-RAID
Info Valid: Yes
Info Invalid Cause:
Drive Number: 253
Health: Good
Status: Online
Manufacturer: ATA
Model: Micron_5100_MTFDDAV240TCB
Drive Firmware: D0MU054
Type: SSD
Block Size: 512
Physical Block Size: 512
Negotiated Link Speed: 6.0 Gb/s
State: online
Operating Temperature: 32
Enclosure Association: Direct Attached
Interface Type: SATA
Block Count: 468862127
Raw Size: 228936 MB
Non Coerced Size: 228936 MB
Coerced Size: 228936 MB
Power State: active
Server /chassis/storageadapter/physical-drive # show inquiry-data
Physical Drive Number 253:
Controller: MSTOR-RAID
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
304
Managing Storage Adapters
Viewing Cisco Boot Optimized M.2 Raid Controller Virtual Drive Details
Viewing Cisco Boot Optimized M.2 Raid Controller Virtual Drive Details
Procedure
Step 2 Server /chassis # scope storageadapter Enters the Cisco Boot Optimized M.2 raid
MSTOR-RAID controller command mode.
Step 3 Server /chassis/storageadapter # scope Enters the virtual drive command mode.
virtual-drive Virtual Drive Number
Step 4 Server /chassis/storageadapter/virtual-drive # Displays the virtual drive information.
show detail
Step 5 Server /chassis/storageadapter/virtual-drive # Displays the status of the virtual drive rebuild.
show lrop-info
Example
This example shows how to view the virtual drive information:
Server# scope chassis
Server /chassis # show storageadapter MSTOR-RAID
Server /chassis/storageadapter # scope virtual-drive 0
Server /chassis/storageadapter/virtual-drive # show detail
Virtual Drive 0:
Health: Good
Status : Optimal
Name: test
Size: 228872 MB
Physical Drives: 253, 254
RAID Level: RAID 1
Target ID: 0
Strip Size: 32 KB
Server /chassis/storageadapter/virtual-drive # show detail
LROP:
LROP In Progress: false
Current Long-Running Op: No operation in progress
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
305
Managing Storage Adapters
Creating a Cisco Boot Optimized M.2 Raid Controller Virtual Drive
Percent Complete: 0
Server /chassis/storageadapter/virtual-drive #
Step 2 Server /chassis # scope storageadapter Enters the Cisco Boot Optimized M.2 raid
MSTOR-RAID controller command mode.
Step 3 Server /chassis/storageadapter # Enters the virtual drive name and the stripsize
create-virtual-drive at the respective prompts. This creates the
virtual drive.
Example
This example shows how to create a virtual drive:
Server# scope chassis
Server /chassis # show storageadapter MSTOR-RAID
Server /chassis/storageadapter # create-virtual-drive
Please enter Virtual Drive name (15 characters maximum, hit return to skip name)--> test
Optional attribute:
0: 32K Bytes
1: 64K Bytes
Choose number from above options or hit return to pick default--> 0
stripsize will be set to 32K Bytes (4 and 'strip-size\:32k')
OK? (y or n)--> y
Server /chassis/storageadapter #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
306
Managing Storage Adapters
Deleting a Cisco Boot Optimized M.2 Raid Controller Virtual Drive
Step 2 Server /chassis # scope storageadapter Enters the Cisco Boot Optimized M.2 raid
MSTOR-RAID controller command mode.
Example
This example shows how to delete a virtual drive:
Server# scope chassis
Server /chassis # show storageadapter MSTOR-RAID
Server /chassis/storageadapter # delete-virtual-drive
Are you sure you want to delete virtual drive 0?
All data on the drive will be lost. Enter 'yes' to confirm -> yes
Server /chassis/storageadapter #
Step 2 Server /chassis # scope storageadapter Enters the Cisco Boot Optimized M.2 raid
MSTOR-RAID controller command mode.
Example
This example shows how to import the controller configuration:
Server# scope chassis
Server /chassis # show storageadapter MSTOR-RAID
Server /chassis/storageadapter # import-foreign-config
Are you sure you want to import all foreign configurations on this controller?
Enter 'yes' to confirm -> yes
Server /chassis/storageadapter #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
307
Managing Storage Adapters
Clearing Cisco Boot Optimized M.2 Raid Controller Foreign Configuration
Step 2 Server /chassis # scope storageadapter Enters the Cisco Boot Optimized M.2 raid
MSTOR-RAID controller command mode.
Example
This example shows how to clear the controller configuration:
Server# scope chassis
Server /chassis # show storageadapter MSTOR-RAID
Server /chassis/storageadapter # clear-foreign-config
Are you sure you want to clear all foreign configurations on this controller?
All data on the drive(s) will be lost.
Enter 'yes' to confirm -> yes
Server /chassis/storageadapter #
Cisco FlexMMC
Viewing Cisco FlexMMC Details
Procedure
Example
This example shows how to view the controller information:
Server# scope chassis
Server /chassis # scope flexmmc
Server /chassis/flexmmc # show detail
Cisco FlexMMC Storage:
Total Memory For IMC Utilities: 2048 MB
Available Memory For IMC Utilities: 1970 MB
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
308
Managing Storage Adapters
Uploading New Image File
Procedure
Example
This example shows how to upload an image file:
Server# scope chassis
Server /chassis # scope flexmmc
Server /chassis/flexmmc # download-file file location
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
309
Managing Storage Adapters
Mapping an Image
Example
This example shows how to delete an image file:
Server# scope chassis
Server /chassis # scope flexmmc
Server /chassis/flexmmc # delete-file file ID
Mapping an Image
Procedure
Example
This examples shows how to map an already uploaded image file.
Server# scope chassis
Server /chassis # scope flexmmc
Server /chassis/flexmmc # scope flexmmc-file file ID
Server /chassis/flexmmc/flexmmc-file # map
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
310
Managing Storage Adapters
Configuring Drive Diagnostics
Procedure
Example
This example shows how to reset FlexMMC to default settings:
Server# scope chassis
Server /chassis # scope flexmmc
Server /chassis/flexmmc # reset-to-default
Are you sure you want to reset the Cisco FlexMMC to default? All the files will be
deleted/wiped
Please enter 'yes' to confirm: yes
Server /chassis/flexmmc
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
311
Managing Storage Adapters
Initiating the On-Demand Device Self Test
When the controller puts the unconfigured good and hot spare HDD drives in power-save mode, the diagnostic
self-test cannot be initiated on drives. So, the drives have to be spun up to run the diagnostic drive self-test.
You can use the parameter bg_diag_powersave_override to set the diagnostic drive self-test policy on the
HDDs which are in power-save mode. For more information, see Setting the Diagnostics Drive Self-test Policy
on HDDs in Power-Save Mode, on page 317.
You can evaluate the actual state and health of the device using the comprehensive set of results from the
device self-test. You can run the commands to collect the diagnostic data by using the two interfaces in Cisco
IMC: CLI and Redfish API.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
312
Managing Storage Adapters
Viewing the Status of the Drive Self-test
Note If the bg_diag_powersave_override parameter is set to false in the drive self-test, then the
drive self-test will not be run on the drives in power-save mode.
Example
This example initializes the on-demand device self test on the SATA drive to collect the diagnostic
data.
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope physical-drive drive-number
Server /chassis/storageadapter/physical-drive # start-diag
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
You are initiating drive self test diagnostics via Cisco IMC.
This task will take a few minutes to complete. You may monitor the status
of the retrieval by running the 'get-diag-status' command.
When the self test is finished, the 'selftest-percent-complete' value shows
'100%'.
You may then download the diag report using the Technical Support facility
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Do you want to proceed?
Enter 'yes' to confirm -> yes
Self test operation on drive: MRAID/10 initiated successfully
What to do next
• See Viewing the Status of the Drive Self-test, on page 313: You can view the status of the current running
device self-test.
• See Viewing the Diagnostic Self Test Report, on page 318: You can use the technical support utility to
view the diagnostic report
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
313
Managing Storage Adapters
Aborting the Diagnostic Self Test
Procedure
Example
Server# scope chassis
Server /chassis # scope storageadapter SLOT-3
Server /chassis/storageadapter # scope physical-drive drive-number
Server /chassis/storageadapter/physical-drive # get-diag-status
selftest-type: Background
selftest-status: Self test in progress
selftest-percent-complete:11
Server /chassis/storageadapter/physical-drive # get-diag-status
selftest-type: Background
selftest-status: Self test in progress
selftest-percent-complete:34
Server /chassis/storageadapter/physical-drive # get-diag-status
selftest-type: Background
selftest-status: Self test completed without error
selftest-percent-complete:100
Server /chassis/storageadapter/physical-drive #
What to do next
You can use the Technical Support utility and view the diagnostic results. See Viewing the Diagnostic Self
Test Report, on page 318.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
314
Managing Storage Adapters
Initiating Background Diagnostic Drive Self Test
Example
This example aborts the on-demand device self test on the SATA drive and views the status of the
ongoing self-test.
Server /chassis/storageadapter/physical-drive # get-diag-status
selftest-type: Self test immediate offline
selftest-status: Self test in progress
selftest-percent-complete: 20
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
315
Managing Storage Adapters
Initiating Background Diagnostic Drive Self Test
Procedure
Example
This example displays the background drive self-test configuration parameters :
Server# scope diag-config
Server /diag-config # scope drive-diag-config
scope /diag-config/drive-diag-config* # set bg_diag_frequency_interval fortnightly
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
316
Managing Storage Adapters
Setting the Diagnostics Drive Self-test Policy on HDDs in Power-Save Mode
What to do next
You can view the diagnostic drive self-test report from the technical support utility.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
317
Managing Storage Adapters
Viewing the Diagnostic Self Test Report
Example
This example displays the drive diagnostics configuration parameters and how to disable the
bg_diag_powersave_override parameter:
Important If any firmware or BIOS updates are in progress, do not export the technical support data until those tasks are
complete.
Note See Overview of the Diagnostic Self-Test Report, on page 320 to know more about the information available
in the diagnostic self-test report.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
318
Managing Storage Adapters
Viewing the Diagnostic Self Test Report
Tip To have the system auto-generate the file name, enter the file name as default.tar.gz.
Note The Cisco UCS C-Series server now supports fingerprint confirmation of the server when you
update firmware through a remote server. This option is available only if you choose SCP or
SFTP as the remote server type.
If you chose SCP or SFTP as the remote server type while performing this action, a prompt with
the message Server (RSA) key fingerprint is <server_finger_print _ID> Do you wish to continue?
Click y or n depending on the authenticity of the server fingerprint.
The fingerprint is based on the host's public key and helps you to identify or verify the host you
are connecting to.
What to do next
Provide the generated report file to Cisco TAC.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
319
Managing Storage Adapters
Overview of the Diagnostic Self-Test Report
Note • The values in the self-test report are in hexadecimal number format. You must convert the values to
decimal number format.
• You can view the drive-specific details like ID, vendor in the section Diagnostic Summary at the end
of the self-test report.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
320
Managing Storage Adapters
Overview of the Diagnostic Self-Test Report
-----------------------------------------------------------------------
READ IDENTIFY DEVICE :0xec : 512 Bytes
-----------------------------------------------------------------------
Vendor Id : ATA
Product Id : INTEL SSDSC2KG960G8K
Firmware revision : XCV1CS04
Unit serial number : BTYG817308KB960CGN
-----------------------------------------------------------------------
READ SMART ATTRIBUTES :0xd0 : 512 Bytes
-----------------------------------------------------------------------
Self test status : 0 ( Self test completed without error )
Short self test rec poll time : 1 (mins)
Extended self test rec poll time : 2 (mins)
Conveyance self test rec poll time : 2 (mins)
Offline data collection capability : 121
Abort/restart offline by host not supported
Offline read scanning supported
Short and extended self-test supported
Conveyance self-test supported
Selective self-test supported
Offline data collection status : 2 ( Offline data collection activity was completed
without error )
Total time Offline data collection : 2 (secs)
Smart capability : 3 ( Smart save enabled, Smart attribute autosave
enabled )
Error log capability : 1 ( Error logging supported )
-----------------------------------------------------------------------
READ SMART THRESHOLDS :0xd1 : 512 Bytes
-----------------------------------------------------------------------
-----------------------------------------------------------------------
SMART ATTRIBUTES SUMMARY
-----------------------------------------------------------------------
ID# ATTRIBUTE_NAME FLAGS VALUE WORST THRESH RAW_VALUE
------------------------------------------------------------------------------------------
5 Reallocate Sector Count 0x32 100 100 0 0
9 Power On Hours 0x32 100 100 0 4318
12 Power Cycle Count 0x32 100 100 0 1756
171 Program Fail Count 0x32 100 100 0 0
172 Erase Fail Count 0x32 100 100 0 0
184 End To End Data Path Error Count 0x33 100 100 90 0
187 Uncorrectable Error Count 0x32 100 100 0 0
194 Operating Temperature 0x22 100 100 0 36
199 CRC Error Count 0x3e 100 100 0 0
232 Reserved Capacity Consumed 0x33 100 100 10 0
233 Percentage Life Left 0x32 98 98 0 98
233 Wear Status In Days 0x32 98 98 0 1764
------------------------------------------------------
DIAGNOSTIC SUMMARY
------------------------------------------------------
Date of drive diag test : Thu Feb 24 04:43:01 2022
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
321
Managing Storage Adapters
Overview of the Diagnostic Self-Test Report
The below sample displays the format of a sample diagnostic file report for SAS drives.
-------------------------------------------------
DRIVE DIAGNOSTIC REPORT
-------------------------------------------------
DIAG TIME STAMP := Tue Apr 12 14:43:54 2022
-------------------------------------------------
INQUIRY EPVD0 PAGE:0x0 ( EVPD0 PAGE:0h) : 96 Bytes
-------------------------------------------------
Vendor Id : TOSHIBA
Product Id : AL14SXB60EN
Firmware revision : 5703
Unit serial number : X060A05HFJVF
-------------------------------------------------
INQUIRY EPVD1 PAGE:0x0 ( SUPPORTED EPVD1 PAGES ) : 19 Bytes
-------------------------------------------------
Page 0x0
Page 0x80
Page 0x83
Page 0x86
Page 0x8a
Page 0x90
Page 0x91
Page 0xb1
-------------------------------------------------
INQUIRY EPVD1 PAGE:0x83 : 76 Bytes
-------------------------------------------------
LUN(World Wide ID) := 0x5000039a780a1fad
Target Port Identifier(World Wide ID) := 0x5000039a780a1fae
Relative Port Identifier := 0x1
Target Device Name(World Wide ID) := 0x5000039a780a1fac
Target Device Name(World Wide ID) in ASCII := 5000039A780A1FAC
-------------------------------------------------
INQUIRY EPVD1 PAGE:0x8a : 18 Bytes
-------------------------------------------------
Standby Z := 0x1
Standby Y := 0x1
Idle A := 0x1
Idle B := 0x1
Idle C := 0x1
Stopped condition recovery time := 0x3a98
Standby Z condition recovery time := 0x3a98
Standby Y condition recovery time := 0xfa0
Idle A condition recovery time := 0x64
Idle B condition recovery time := 0x4b0
Idle C condition recovery time := 0xfa0
-------------------------------------------------
INQUIRY EPVD1 PAGE:0xb1 : 64 Bytes
-------------------------------------------------
Medium rotation rate := 0x3a98
Nominal form factor := 0x3
----------------------------------------------------
LOG SENSE PAGE:0x0 ( SUPPORTED PAGES) : 18 Bytes
----------------------------------------------------
Page 0x0
Page 0x1
Page 0x2
Page 0x3
Page 0x5
Page 0x6
Page 0xd
Page 0xe
Page 0xf
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
322
Managing Storage Adapters
Overview of the Diagnostic Self-Test Report
Page 0x10
Page 0x15
Page 0x18
Page 0x1a
Page 0x2f
----------------------------------------------------
LOG SENSE PAGE:0x10 ( SELF TEST RESULTS ) : 404 Bytes
----------------------------------------------------
Parameter code : 0x1
General parameter data : 0x3
Parameter len : 0x10
Self test result : 0x0 : Self test completed without error
Function code : 0x1
Extended segment number : 0x0 : No extended segment failures
First failure LBA : 0xffffffffffffffff
Sense key : 0x0
Add Sense Code : 0x0
Add Sense Code Qual : 0x0
Vendor data : 0x0
Timestamp( Power on hours) : 0x123e
----------------------------------------------------------
LOG SENSE PAGE:0x2f ( SMART STATUS ) : 12 Bytes
----------------------------------------------------------
SMART sense code byte := 0x0
SMART sense qualifier := 0x0
Most recent temperature reading := 0x1f
Vendor HDA temperature trip point := 0x0
-------------------------------------------------------
LOG SENSE PAGE:0x2 ( WRITE ERROR COUNTERS ) : 88 Bytes
-------------------------------------------------------
errs_recovered_without_delay := 0x10004
errs_recovered_with_delay := 0x2000400000000
total_errors_recovered := 0x1c8cbeba000006
times_recovery_invoked := 0x0
total_bytes_written := 0x0
count_hard_errors := 0x0
-------------------------------------------------------
LOG SENSE PAGE:0x3 ( READ ERROR COUNTERS ) : 88 Bytes
-------------------------------------------------------
errs_recovered_without_delay := 0x10004
errs_recovered_with_delay := 0x2000400000000
total_errors_recovered := 0x6f0de26344000006
times_recovery_invoked := 0x0
total_bytes_read := 0x0
count_hard_errors := 0x0
-------------------------------------------------------
LOG SENSE PAGE:0x5 ( VERIFY ERROR COUNTERS ) : 88 Bytes
-------------------------------------------------------
errs_recovered_without_delay := 0x10004
errs_recovered_with_delay := 0x2000400000000
total_errors_recovered := 0x6
times_recovery_invoked := 0x0
total_bytes_verified := 0x0
count_hard_errors := 0x0
------------------------------------------------------------
LOG SENSE PAGE:0x6 ( NON-MEDIUM ERROR COUNTERS ) : 16 Bytes
------------------------------------------------------------
error_count := 0x4000000000
---------------------------------------------------
LOG SENSE PAGE:0xd ( TEMPERATURE INFO ) : 16 Bytes
---------------------------------------------------
Temperature(celsius) := 0x1f
Ref Temperature(celsius) := 0x41
---------------------------------------------------
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
323
Managing Storage Adapters
Overview of the Diagnostic Self-Test Report
----------------------------------------------------------
MODE SENSE PAGE:0x0 ( VENDOR UNIQUE PARAMS ) : 14 Bytes
----------------------------------------------------------
Merge Glist into Plist(MRG) : 0x0
Report Recovered Non Data Errors(RRNDE) : 0x0
Veggie mode(VGMDE) : 0x0
Command Aging Enable(CAEN) : 0x0
Format Degraded Disable(FDD) : 0x0
Overall Command Timer(OCT) : 0x0
AV ERP Mode(AVERP) : 0x0
Ignore Reassigned LBA(IGRA) : 0x0
First Format Enable(FFMT) : 0x0
Disable Restore Reassign Target(DRRT) : 0x0
Format Certification(FCERT) : 0x0
Overall Command Timer(low byte) : 0x8
Temperature Threshold : 0xdd
Command Aging Limit(Hi byte) : 0x2f
Command Aging Limit(Low byte) : 0xb0
Read reporting threshold : 0x0
Write reporting threshold : 0x0
-----------------------------------------------------------------------
MODE SENSE PAGE:0x1 ( READ/WRITE ERROR RECOVERY PARAMS) : 10 Bytes
-----------------------------------------------------------------------
Automatic Write Reallocation Enabled(AWRE) : 0x0
Automatic Read Reallocation Enabled(ARRE) : 0x0
Transfer Block (TB) : 0x0
Read Continous(RC) : 0x0
Enable Early Recovery(EER) : 0x0
Post Error(PER) : 0x0
Data Teriminate on Error(DTE) : 0x0
Disable Correction (DCR) : 0x0
Read Retry Count : 0x10
Write Retry Count : 0x45
Read Retry Count : 0x10
Recovery Time Limit : 0x0
----------------------------------------------------------
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
324
Managing Storage Adapters
Overview of the Diagnostic Self-Test Report
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
325
Managing Storage Adapters
Overview of the Diagnostic Self-Test Report
Standby_Z : 0x0
Idle_A : 0x0
Idle_B : 0x0
Idle_C : 0x0
Idle A Condition Timer : 0x8000000
Idle B Condition Timer : 0x20000
Idle C Condition Timer : 0x640269a
Standy Y Condition Timer : 0x14000000
Standy Z Condition Timer : 0xb02fdd45
PM BG Predence : 0x0
-----------------------------------------------------------------------
MODE SENSE PAGE:0x1c ( INFORMATIONAL EXCEPTIONS CONTROL ) : 10 Bytes
-----------------------------------------------------------------------
Performance(PERF) : 0x0
Enable Background Function(EBF) : 0x0
Enable Warning ASC(EWASC) : 0x0
Disable Exception Control(DEXCPT) : 0x0
TEST : 0x0
Enable Background Error(EBACKERR) : 0x0
Log Errors(LOGERR) : 0x0
Method of Reporting : 0x0
Interval Timer : 0x8000000
Report Count : 0xdd45
-----------------------------------------------------------------------
SMART ATTRIBUTES SUMMARY
-----------------------------------------------------------------------
------------------------------------------------------
DIAGNOSTIC SUMMARY
------------------------------------------------------
Date of drive diag test : Tue Apr 12 14:43:54 2022
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
326
CHAPTER 11
Configuring Communication Services
This chapter includes the following sections:
• Enabling or Disabling TLS v1.2, on page 327
• Enabling TLS Static Key Cipher, on page 328
• Configuring HTTP, on page 330
• Configuring SSH, on page 331
• Configuring XML API, on page 332
• Enabling Redfish, on page 333
• Configuring IPMI, on page 334
• Configuring SNMP, on page 336
• Configuring a Server to Send Email Alerts Using SMTP, on page 342
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
327
Configuring Communication Services
Enabling TLS Static Key Cipher
Step 6 (Optional) Server/tls-config # set Enter a valid cipher value for Custom cipher
tlsv2CipherMode Custom Cipher_Value mode.
Note Refer https://www.openssl.org/
docs/man1.0.2/man1/ciphers.html
for OpenSSL equivalent cipher
name for a specific cipher to be
provided in custom cipher.
Example
Following example shows how to enable TLS v1.2 and set cipher mode to high:
Server# scope cimc
Server /cimc # scope tls-config
Server /cimc/tls-config # set tlsv2Enabled yes
Server /cimc/tls-config* # commit
Server /cimc/tls-config # set tlsv2CipherMode high
Server /cimc/tls-config* # commit
Following example shows how to enable TLS v1.2 and set cipher mode to custom:
server# scope cimc
server /cimc # scope tls-config
server /cimc/tls-config # set tlsv2CipherMode Custom
server /cimc/tls-config *# set tlsv2CipherList ECDHE-RSA-AES256-GCM-SHA384
server /cimc/tls-config *# commit
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
328
Configuring Communication Services
Enabling TLS Static Key Cipher
Note You can enable this feature only through Cisco IMC CLI interface.
Static key cipher option is not applicable when TLS v1.2 Cipher Mode is set to High or Custom.
Static key cipher, if enabled, switches to NA automatically when TLS v1.2 Cipher Mode changes from
Medium/Low to High/Custom.
Procedure
Step 2 Server /chassis # scope tls-config Enters the TLS configuration mode.
Step 3 Server /chassis/tls-config # show detail Displays the TLS Static Cipher Enabled
status:
TLS Configuration : TLS Static
Cipher Enabled: no
Example
This example shows how to enable TLS static key cipher:
Server# scope cimc
Server /cimc # scope tls-config
Server /cimc/tls-config # show detail
TLS Configuration :
TLS Static Cipher Enabled: no
Server /cimc/tls-config #
Server /cimc/tls-config # set static-cipher-enabled yes
Server /cimc/tls-config *# commit
Warning: This will enable static ciphers in TLS.
KVM, Webserver, XMLAPI and Redfish sessions will be disconnected.
Do you wish to continue? [[Y]es/[N]o] y
Server /cimc/tls-config # show detail
TLS Configuration :
TLS Static Cipher Enabled: yes
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
329
Configuring Communication Services
Configuring HTTP
Configuring HTTP
Beginning with release 4.1(2b), Cisco IMC supports separate HTTPS and HTTP communication services.
You can disable only HTTP services using this functionality.
This functionality is supported only on the following servers:
• Cisco UCS C220 M5
• Cisco UCS C240 M5
• Cisco UCS C480 M5
• Cisco UCS C480 ML M5
• Cisco UCS C240 SD M5
• Cisco UCS C125 M5
• Cisco UCS S3260 M4/M5
Note If Redirect HTTP to HTTPS Enabled was disabled in any release earlier than 4.1(2b), then after upgrading
to release 4.1(2b) or later, HTTP Enabled value is set to Disabled by the system.
Procedure
Step 2 Server /http # set https-enabled {yes | no} Enables the HTTPS services or disables both
HTTPS and HTTP services on Cisco IMC.
Step 3 Server /http # set http-enabled {yes | no} Enables or disables HTTP services on the Cisco
IMC.
Step 4 Server /http # set http-port number Sets the port to use for HTTP communication.
The default is 80.
Step 5 Server /http # set https-port number Sets the port to use for HTTPS communication.
The default is 443.
Step 6 Server /http # set http-redirect {yes | no} Note This option is applicable only
when HTTP is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
330
Configuring Communication Services
Configuring SSH
Example
This example configures HTTP for the Cisco IMC:
Server# scope http
Server /http # set https-enabled yes
Server /http # set http-enabled yes
Server /http *# set http-port 80
Server /http *# set https-port 443
Server /http *# set http-redirect yes
Server /http *# set timeout 1800
Server /http *# commit
Server /http # show
HTTP Port HTTPS Port Timeout Active Sessions HTTPS Enabled HTTP Redirected HT
TP Enabled
---------- ---------- -------- --------------- ------- ---------------- --------
--------
80 443 1800 0 yes yes yes
Server /http #
Configuring SSH
Before you begin
You must log in as a user with admin privileges to configure SSH.
Procedure
Step 2 Server /ssh # set enabled {yes | no} Enables or disables SSH on the Cisco IMC.
Step 3 Server /ssh # set ssh-port number Sets the port to use for secure shell access. The
default is 22.
Step 4 Server /ssh # set timeout seconds Sets the number of seconds to wait before the
system considers an SSH request to have timed
out.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
331
Configuring Communication Services
Configuring XML API
Step 6 Server /ssh # show [detail] (Optional) Displays the SSH configuration.
Example
This example configures SSH for the Cisco IMC:
Server# scope ssh
Server /ssh # set enabled yes
Server /ssh *# set ssh-port 22
Server /ssh *# set timeout 600
Server /ssh *# commit
Server /ssh # show
SSH Port Timeout Active Sessions Enabled
---------- -------- --------------- -------
22 600 1 yes
Server /ssh #
Procedure
Step 2 Server /xmlapi # set enabled {yes | no} Enables or disables XML API control of Cisco
IMC.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
332
Configuring Communication Services
Enabling Redfish
Example
This example enables XML API control of Cisco IMC and commits the transaction:
Server# scope xmlapi
Server /xmlapi # set enabled yes
Server /xmlapi *# commit
Server /xmlapi # show detail
XMLAPI Settings:
Enabled: yes
Active Sessions: 0
Max Sessions: 4
Server /xmlapi #
Enabling Redfish
Before you begin
You must log in as a user with admin privileges to perform this task.
Procedure
Step 2 Server /redfish # set enabled {yes | no} Enables or disables redfish control of Cisco
IMC.
Example
This example enables redfish control of Cisco IMC and commits the transaction:
Server# scope redfish
Server /redfish # set enabled yes
Server /redfish *# commit
Server /redfish # show detail
REDFISH Settings:
Enabled: yes
Active Sessions: 0
Max Sessions: 4
Server /redfish #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
333
Configuring Communication Services
Configuring IPMI
Configuring IPMI
IPMI Over LAN
Intelligent Platform Management Interface (IPMI) defines the protocols for interfacing with a service processor
embedded in a server platform. This service processor is called a Baseboard Management Controller (BMC)
and resides on the server motherboard. The BMC links to a main processor and other on-board elements using
a simple serial bus.
During normal operations, IPMI lets a server operating system obtain information about system health and
control system hardware. For example, IPMI enables the monitoring of sensors, such as temperature, fan
speeds and voltages, for proactive problem detection. If server temperature rises above specified levels, the
server operating system can direct the BMC to increase fan speed or reduce processor speed to address the
problem.
Procedure
Step 2 Server /ipmi # set enabled {yes | no} Enables or disables IPMI access on this server.
Step 3 Server /ipmi # set privilege-level {readonly | Specifies the highest privilege level that can be
user | admin} assigned to an IPMI session on this server. This
can be:
• readonly — IPMI users can view
information but cannot make any changes.
If you select this option, IPMI users with
the "Administrator", "Operator", or "User"
user roles can only create read-only IPMI
sessions, regardless of their other IPMI
privileges.
• user — IPMI users can perform some
functions but cannot perform
administrative tasks. If you select this
option, IPMI users with the
"Administrator" or "Operator" user role
can create user and read-only sessions on
this server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
334
Configuring Communication Services
Configuring IPMI over LAN
Step 4 Server /ipmi # set encryption-key key Sets the IPMI encryption key to use for IPMI
communications. The key value must be 40
hexadecimal numbers.
Step 6 Server /ipmi # randomise-key Sets the IPMI encryption key to a random value.
Note You can perform the Step 6 action
instead of Steps 4 and 5.
Step 7 At the prompt, enter y to randomize the Sets the IPMI encryption key to a random value.
encryption key.
Example
This example configures IPMI over LAN for the Cisco IMC:
Server# scope ipmi
Server /ipmi # set enabled yes
Server /ipmi *# set privilege-level admin
Server /ipmi *# set encryption-key abcdef01234567890abcdef01234567890abcdef
Server /ipmi *# commit
Server /ipmi *# show
Enabled Encryption Key Privilege Level Limit
------- ---------------------------------------- ---------------------
yes ABCDEF01234567890ABCDEF01234567890ABCDEF admin
Server /ipmi #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
335
Configuring Communication Services
Configuring SNMP
Configuring SNMP
SNMP
The Cisco UCS C-Series Rack-Mount Servers support the Simple Network Management Protocol (SNMP)
for viewing server configuration and status and for sending fault and alert information by SNMP traps. For
information on Management Information Base (MIB) files supported by Cisco IMC, see the MIB Quick
Reference for Cisco UCS at this URL: http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/sw/mib/
b-series/b_UCS_MIBRef.html.
Beginning with release 4.1(3b), Cisco IMC introduces enhanced authentication protocol for SNMP v3 version.
SNMP v3 users cannot be added with DES security protocol.
Cisco IMC GUI displays a warning when you select an existing v3 version with unsupported security level,
authentication type, or privacy type. You may select and modify the user details.
Procedure
Step 2 Server /snmp # set enabled {yes | no} Enables or disables SNMP.
Note SNMP must be enabled and
saved before additional SNMP
configuration commands are
accepted.
Step 4 Server /snmp # set enable-serial-num {yes | Prefixes the traps with the serial number of the
no} server.
Step 5 Server /snmp # set snmp-port port number Sets the port number on which the SNMP
agent runs. You can choose a number within
the range 1 to 65535. The default port number
is 161.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
336
Configuring Communication Services
Configuring SNMP Properties
Step 6 Server /snmp # set community-str community Specifies the default SNMP v1 or v2c
community name that Cisco IMC includes on
any trap messages it sends to the SNMP host.
The name can be up to 18 characters.
Step 7 Server /snmp # set community-access This can be one of the following : Disabled,
Limited, or Full.
Step 8 Server /snmp # set trap-community-str Specifies the SNMP community group to
which trap information should be sent. The
name can be up to 18 characters
Step 9 Server /snmp # set sys-contact contact Specifies the system contact person responsible
for the SNMP implementation. The contact
information can be up to 254 characters, such
as an email address or a name and telephone
number. To enter a value that contains spaces,
you must enclose the entry with quotation
marks.
Step 10 Server /snmp # set sys-location location Specifies the location of the host on which the
SNMP agent (server) runs. The location
information can be up to 254 characters. To
enter a value that contains spaces, you must
enclose the entry with quotation marks.
Example
This example configures the SNMP properties and commits the transaction:
Server# scope snmp
Server /snmp # set enabled yes
Server /snmp *# commit
Server /snmp *# set enable-serial-num yes
Server /snmp *# set snmp-port 20000
Server /snmp *# set community-str cimcpublic
Server /snmp *# set community-access Full
Server /snmp *# set trap-community-str public
Server /snmp *# set sys-contact "User Name <username@example.com> +1-408-555-1212"
Server /snmp *# set sys-location "San Jose, California"
Server /snmp *# commit
Server /snmp # show detail
SNMP Settings:
SNMP Port: 20000
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
337
Configuring Communication Services
Configuring SNMP Trap Settings
Server /snmp #
What to do next
Configure SNMP trap settings as described in Configuring SNMP Trap Settings, on page 338.
Procedure
Step 2 Server /snmp # scope trap-destinations number Enters the SNMP trap destination command
mode for the specified destination. Four SNMP
trap destinations are available. The destination
number is an integer between 1 and 15.
Step 3 Server /snmp/trap-destinations # set enabled Enables or disables the SNMP trap destination.
{yes | no}
Step 4 Server /snmp/trap-destinations # set version { Specify the desired SNMP version of the trap
| 2 | 3} message.
Note SNMPv3 traps will be delivered
only to locations where the
SNMPv3 user and key values are
configured correctly.
Step 5 Server /snmp/trap-destinations # set type {trap Specifies whether SNMP notification messages
| inform} are sent as simple traps or as inform requests
requiring acknowledgment by the receiver.
Note The inform option can be chosen
only for V2 users.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
338
Configuring Communication Services
Configuring SNMP Trap Settings
Step 7 Server /snmp/trap-destination # set trap-addr Specifies the trap destination address to which
trap destination address the trap information is sent. You can set an IPv4
or IPv6 address or a domain name as the trap
destination.
Note When IPv6 is enabled, the SNMP
Trap destination source address
can either be the SLAAC IPv6
address (if available) or a user
assigned IPv6 address. Both these
are valid SNMP IPv6 destination
addresses that uniquely identify
the server.
Step 8 Server /snmp/trap-destinations # set trap-port Sets the port number the server uses to
trap destination port communicate with the trap destination. You can
choose a number within the range 1 to 65535.
Step 9 Server /snmp/trap-destination # commit Commits the transaction to the system
configuration.
Example
This example configures general SNMP trap settings and trap destination number 1 and commits the
transaction:
Server# scope snmp
Server /snmp # Scope trap-destinations 1
Server /snmp/trap-destination *# set enabled yes
Server /snmp/trap-destination *# set version 2
Server /snmp/trap-destination *# set type inform
Server /snmp/trap-destination *# set user user1
Server /snmp/trap-destination *# set trap-addr www.cisco.com
Server /snmp/trap-destination *# set trap-port 10000
Server /snmp/trap-destination *# commit
Server /snmp/trap-destination # show detail
Trap Destination 1:
Enabled: yes
SNMP version: 2
Trap type: inform
SNMP user: user1
Trap Address: www.cisco.com
Trap Port: 10000
Delete Trap: no
Server /snmp/trap-destination #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
339
Configuring Communication Services
Sending a Test SNMP Trap Message
Procedure
Step 2 Server /snmp # send-test-trap Sends an SNMP test trap to the configured
SNMP trap destination that are enabled.
Note The trap must be configured and
enabled in order to send a test
message.
Example
This example sends a test message to all the enabled SNMP trap destinations:
Server# scope snmp
Server /snmp # send-test-trap
SNMP Test Trap sent to the destination.
Server /snmp #
Procedure
Step 2 Server /snmp # scope v3users number Enters the SNMPv3 users command mode for
the specified user number.
Step 3 Server /snmp/v3users # set v3add {yes | no} Adds or deletes an SNMPv3 user. This can be
one of the following:
• yes—This user is enabled as an SNMPv3
user and is allowed to access the SNMP
OID tree.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
340
Configuring Communication Services
Configuring SNMPv3 Users
Step 4 Server /snmp/v3users # set v3security-name Enter an SNMP username for this user.
security-name
Step 5 Server /snmp/v3users # set v3security-level Select a security level for this user. This can
{noauthnopriv | authnopriv | authpriv} be one of the following:
• noauthnopriv—The user does not require
an authorization or privacy password.
• authnopriv—The user requires an
authorization password but not a privacy
password. If you select this option, you
must configure an authentication key.
• authpriv—The user requires both an
authorization password and a privacy
password. If you select this option, you
must configure an authentication key and
a private encryption key.
Step 6 Server /snmp/v3users # set v3proto {MD5 | Note For a v3 version, only SHA
SHA} authentication methods are
available.
Step 7 Server /snmp/v3users # set v3auth-key Enter an authorization password for this user.
auth-key
Step 8 Server /snmp/v3users # set v3priv-proto Note For a v3 version, only AES
{DES | AES} option is available.
Step 9 Server /snmp/v3users # set v3priv-auth-key Enter a private encryption key (privacy
priv-auth-key password) for this user.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
341
Configuring Communication Services
Configuring a Server to Send Email Alerts Using SMTP
Example
This example configures SNMPv3 user number 2 and commits the transaction:
Server# scope snmp
Server /snmp # scope v3users 2
Server /snmp/v3users # set v3add yes
Server /snmp/v3users *# set v3security-name ucsSNMPV3user
Server /snmp/v3users *# set v3security-level authpriv
Server /snmp/v3users *# set v3proto SHA
Server /snmp/v3users *# set v3auth-key
Please enter v3auth-key:ex4mp1ek3y
Please confirm v3auth-key:ex4mp1ek3y
Server /snmp/v3users *# set v3priv-proto AES
Server /snmp/v3users *# set v3priv-auth-key
Please enter v3priv-auth-key:!1@2#3$4%5^6&7*8
Please confirm v3priv-auth-key:!1@2#3$4%5^6&7*8
Server /snmp/v3users *# commit
Settings are being applied ... allow a few minutes for the process to complete
Server /snmp/v3users # show detail
User 2:
Add User: yes
Security Name: ucsSNMPV3user
Security Level: authpriv
Auth Type: SHA
Auth Key: ******
Encryption: AES
Private Key: ******
Server /snmp/v3users #
Procedure
Step 2 Server /smtp # set enabled {yes | no} Enables or disables the SMTP feature.
Step 3 Server /smtp * # set server-addr IP_Address Assigns the SMTP server IP address.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
342
Configuring Communication Services
Configuring SMTP Servers for Receiving E-Mail Alerts
Step 5 Server /smtp # set-mail-addr email_address Sets recipient email address with minimum
recipient_minimum_severity informational | severity level.
warning | minor | major | critical
Step 6 Server /smtp * # commit Commits the transaction to the system
configuration.
Step 7 Server /smtp # send-test-mail recipient1 Sends a test mail alert to the email address
assigned to the chosen recipient.
Example
This example shows how to configure SMTP for receiving mail alerts:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
343
Configuring Communication Services
Configuring SMTP Servers for Receiving E-Mail Alerts
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
344
CHAPTER 12
Managing Certificates and Server Security
This chapter includes the following sections:
• Managing the Server Certificate, on page 345
• Managing the External Certificate, on page 351
• SPDM Security - MCTP SPDM, on page 355
• Key Management Interoperability Protocol, on page 362
• FIPS 140-2 Compliance in Cisco IMC, on page 378
Note Before performing any of the following tasks in this chapter, ensure that the Cisco IMC time is set to the
current time.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
345
Managing Certificates and Server Security
Generating a Certificate Signing Request
Procedure
You will be prompted to enter the following information for the certificate signing request:
Name Description
Common Name field The fully qualified name of the Cisco IMC.
By default the CN of the servers appears in CXXX-YYYYYY format,
where XXX is the model number and YYYYYY is the serial number
of the server.
When you upgrade to latest version, CN is retained as is.
Locality field The city or town in which the company requesting the certificate is
headquartered.
State Name field The state or province in which the company requesting the certificate
is headquartered.
Country Code drop-down list The country in which the company resides.
After you have entered the requested information, the system will generate and display a certificate signing
request in the console output. A CSR file will not be created, but you can copy the CSR information from the
console output and paste the information into a text file.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
346
Managing Certificates and Server Security
Generating a Certificate Signing Request
Example
This example generates a certificate signing request:
Server# scope certificate
Server /certificate # generate-csr
Common Name (CN): test.example.com
Organization Name (O): Example, Inc.
Organization Unit (OU): Test Department
Locality (L): San Jose
StateName (S): CA
Country Code (CC): US
Email: user@example.com
Continue to generate CSR?[y|N]y
What to do next
Perform one of the following tasks:
• If you do not want to obtain a certificate from a public certificate authority, and if your organization does
not operate its own certificate authority, you can allow Cisco IMC to internally generate a self-signed
certificate from the CSR and upload it immediately to the server. Type y after the final prompt in the
example to perform this action.
• If your organization operates its own certificate server for generating self-signed certificates, copy the
command output from "-----BEGIN ..." to "END CERTIFICATE REQUEST-----" and paste to a file
named csr.txt. Input the CSR file to your certificate server to generate a self-signed certificate.
• If you will obtain a certificate from a public certificate authority, copy the command output from
"-----BEGIN ..." to "END CERTIFICATE REQUEST-----" and paste to a file named csr.txt. Submit the
CSR file to the certificate authority to obtain a signed certificate.
• Ensure that the certificate is of type Server.
If you did not use the first option, in which Cisco IMC internally generates and uploads a self-signed certificate,
you must upload the new certificate using the upload command in certificate command mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
347
Managing Certificates and Server Security
Creating an Untrusted CA-Signed Certificate
Note These commands are to be entered on a Linux server with the OpenSSL package, not in the Cisco IMC.
Procedure
Step 2 openssl req -new -x509 -days numdays -key This command generates a new self-signed
CA_keyfilename -out CA_certfilename certificate for the CA using the specified key.
The certificate is valid for the specified period.
Example:
The command prompts the user for additional
# openssl req -new -x509 -days 365 -key certificate information.
ca.key -out ca.crt
The certificate server is an active CA.
Step 3 echo "nsCertType = server" > openssl.conf This command adds a line to the OpenSSL
configuration file to designate the certificate as
Example:
a server-only certificate. This designation is a
# echo "nsCertType = server" > defense against a man-in-the-middle attack, in
openssl.conf
which an authorized client attempts to
impersonate the server.
The OpenSSL configuration file openssl.conf
contains the statement "nsCertType = server".
Step 4 openssl x509 -req -days numdays -in This command directs the CA to use your CSR
CSR_filename -CA CA_certfilename -set_serial file to generate a server certificate.
04 -CAkey CA_keyfilename -out
Your server certificate is contained in the output
server_certfilename -extfile openssl.conf
file.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
348
Managing Certificates and Server Security
Creating an Untrusted CA-Signed Certificate
Step 5 openssl x509 -noout -text -purpose -in <cert Verifies if the generated certificate is of type
file> Server.
Example: Note If the values of the fields Server
openssl x509 -noout -text -purpose -in SSL and Netscape SSL server are
<cert file> not yes, ensure that openssl.conf
is configured to generate
certificates of type server.
Step 6 (Optional) If the generated certificate does not Certificate with the correct validity dates is
have the correct validity dates, ensure the Cisco created.
IMC time is set to the current time, and
regenerate the certificate by repeating steps 1
through 5.
Example
This example shows how to create a CA and to generate a server certificate signed by the new CA.
These commands are entered on a Linux server running OpenSSL.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
349
Managing Certificates and Server Security
Uploading a Server Certificate
What to do next
Upload the new certificate to the Cisco IMC.
Note You must first generate a CSR using the Cisco IMC certificate management CSR generation procedure, and
you must use that CSR to obtain the certificate for uploading. Do not upload a certificate that was not obtained
by this method.
Note All current HTTPS and SSH sessions are disconnected when the new server certificate is uploaded.
Procedure
Step 2 Server /certificate # upload Launches a dialog for entering and uploading
the new server certificate.
Copy the certificate text, paste it into the console when prompted, and type CTRL+D to upload the certificate.
Example
This example uploads a new certificate to the server:
Server# scope certificate
Server /certificate # upload
Please paste your certificate here, when finished, press CTRL+D.
-----BEGIN CERTIFICATE-----
MIIB/zCCAWgCAQAwgZkxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDQTEVMBMGA1UE
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
350
Managing Certificates and Server Security
Managing the External Certificate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-----END CERTIFICATE-----
<CTRL+D>
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
351
Managing Certificates and Server Security
Uploading an External Certificate
Note If you enter the protocol as FTP, SCP or SFTP, you will be prompted to enter your username and
password.
Along with the remote protocol, enter the filepath from where you want to upload the external certificate.
After validating your remote server username and password, uploads the external certificate from the remote
server.
Step 3 (Optional) Server /certificate #upload-paste-external-certificate
This is an additional option to upload the external certificate.
At the prompt, paste the content of the certificate and press CTRL+D.
Example
• This example uploads an external certificate from a remote server:
Server # scope certificate
Server /certificate # upload-remote-external-certificate scp 10.10.10.10
/home/user-xyz/ext-certif.cert
Server (RSA) key fingerprint is dd:b5:2b:07:ad:c0:30:b2:d5:6a:6a:78:80:85:93:b0
Do you wish to continue? [y/N]y
Username: user-xyz
Password:
External Certificate uploaded successfully
Server /certificate #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
352
Managing Certificates and Server Security
Uploading an External Private Key
What to do next
You must upload an external private key and then activate the external certificate.
Note • Cisco IMC supports external private key size of 2048 bits and 4096 bits in Cisco UCS C-Series M4
servers.
• Cisco IMC supports external private key size of 2048 bits, 4096 bits and 8192 bits in Cisco UCS C-Series
M5 servers.
Procedure
Along with the remote protocol, enter the filepath from where you want to upload the private key. After
validating your remote server username and password, uploads the private key from the remote server.
Example
• This example uploads an external private key from a remote server:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
353
Managing Certificates and Server Security
Activating the External Certificate
What to do next
You must activate the external certificate.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
354
Managing Certificates and Server Security
SPDM Security - MCTP SPDM
Procedure
Example
This example activates the uploaded certificate:
Server # scope certificate
Server /certificate # activate-external-certificate
This operation will overwrite the current certificate with the uploaded external certificate.
All HTTPS and SSH sessions will be disconnected.
Continue?[y|N]y
A system reboot has been initiated.
Server /certificate #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
355
Managing Certificates and Server Security
Configuring and Viewing the MCTP SPDM Fault Alert Setting
• Partial Security:
When you select this setting, a fault is generated when any endpoint authentication failure is detected.
There will NOT be a fault generated when the endpoint doesn’t support endpoint authentication. This is
chosen as the default setting.
• No Security
When you select this setting, no fault will be generated for any failure (endpoint measurement).
Procedure
Step 2 Server /chassis# scope mctp Enters the MCTP SPDM security command
mode.
Step 4 Server /chassis/mctp# show detail Displays the configured MCTP SPDM fault
alert setting.
Step 5 (Optional) Server /chassis/mctp# exit Returns to the chassis command mode.
Step 6 (Optional) Server /chassis# exit Returns to the server command mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
356
Managing Certificates and Server Security
Uploading SPDM Root CA Certificates
Step 8 (Optional) Server /chassis/fault# show Displays a log of all the faults.
fault-entries
Note If the device attestation fails, a
fault is generated. Run the steps 5
to 8 to view the relevant fault.
Example
This example configures the fault-alert-setting to full.
Server# scope chassis
Server /chassis # scope mctp
Server /chassis/mctp # set fault-alert-setting full
Server /chassis/mctp # show detail
Fault Alert Setting: Full
Procedure
Step 2 Server /chassis# scope mctp Enters the MCTP SPDM security command
mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
357
Managing Certificates and Server Security
Uploading SPDM Root CA Certificates
Step 5 (Optional) Server /chassis/mctp# This is an additional option to upload the SPDM
upload-paste-external-certificate Root CA certificate (.pem format only).
At the prompt, paste the content of the
certificate and press CTRL+D.
Example
• This example uploads an SPDM Root CA certificate from a remote server:
Server# scope chassis
Server /chassis # scope mctp
Server /chassis/mctp# upload-remote-external-certificate scp 10.10.10.10
/home/user-xyz/ext-certif.cert
Server (RSA) key fingerprint is dd:b5:2b:07:ad:c0:30:b2:d5:6a:6a:78:80:85:93:b0
Do you wish to continue? [y/N]y
Username: user-xyz
Password:
External Certificate uploaded successfully
Server /chassis/mctp #
• This example uploads an SPDM Root certificate using paste option (.pem format only):
Server# scope chassis
Server /chassis # scope mctp
Server /chassis/mctp# upload-paste-external-certificate
Please paste your certificate here, when finished, press CTRL+D.
-----BEGIN CERTIFICATE-----
MIIDfDCCAmSgAwIBAgIQGKy1av1pthU6Y2yv2vrEoTANBgkqhkiG9w0BAQUFADBY
MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjExMC8GA1UEAxMo
R2VvVHJ1c3QgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjEx
MjcwMDAwMDBaFw0zNjA3MTYyMzU5NTlaMFgxCzAJBgNVBAYTAlVTMRYwFAYDVQQK
Ew1HZW9UcnVzdCBJbmMuMTEwLwYDVQQDEyhHZW9UcnVzdCBQcmltYXJ5IENlcnRp
ZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
mO9Y+pyEtzavwt+s0vQQBnBxNQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4G
A1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQULNVQQZcVi/CPNmFbSvtr2ZnJM5IwDQYJ
6CePbJC/kRYkRj5KTs4rFtULUh38H2eiAkUxT87z+gOneZ1TatnaYzr4gNfTmeGl
4b7UVXGYNTq+k+qurUKykG/g/CFNNWMziUnWm07Kx+dOCQD32sfvmWKZd7aVIl6K
oKv0uHiYyjgZmclynnjNS6yvGaBzEi38wkG6gZHaFloxt/m0cYASSJlyc1pZU8Fj
UjPtp8nSOQJw+uCxQmYpqptR7TBUIhRf2asdweSU8Pj1K/fqynhG1riR/aYNKxoU
AT6A8EKglQdebc3MS6RFjasS6LPeWuWgfOgPIh1a6Vk=
-----END CERTIFICATE-----
External Certificate pasted successfully.
Server /chassis/mctp#
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
358
Managing Certificates and Server Security
Viewing SPDM Authentication Status and SPDM Certificate Chain
Procedure
Step 2 Server /chassis# scope mctp Enters the MCTP SPDM security command
mode.
Step 4 Server /chassis/mctp# spdm-cert-chain Slot-ID Displays the SPDM certificate chain for a
particular slot.
Example
This example displays the SPDM status, when in progress and on successful completion.
Server# scope chassis
Server /chassis # scope mctp
Server /chassis/mctp # spdm-status
Overall SPDM Status : in progress
Server /chassis/mctp # spdm-cert-chain MRAID
Certificate Chain Information
Error : Failed to get cert chain due to on-going handshake ( Please try after some time)
Server /chassis/mctp # spdm-status
Overall SPDM Status : success
Slot ID Status Name
-----------------------------------------------------------------
MRAID success N/A
Server /chassis/mctp # spdm-cert-chain MRAID
Certificate Chain Information
Slot ID : MRAID
---------------------------------------
Depth : 0
Subject Country Code (C) : US
Subject State (ST) : Colorado
Subject City (L) : Colorado Springs
Subject Organization (O) : Broadcom Inc.
Subject Organization Unit(OU) : NA
Subject Common Name (CN) : Aero Device
Issuer Country Code (C) : US
Issuer State (ST) : Colorado
Issuer City (L) : NA
Issuer Organization (O) : Broadcom Inc.
Issuer Organization Unit(OU) : DCSG
Issuer Common Name (CN) : Aero Model
Valid From : Oct 23 01:01:28 2019 GMT
Valid To : Mar 10 01:01:28 2047 GMT
---------------------------------------------------------
Depth : 1
Subject Country Code (C) : US
Subject State (ST) : Colorado
Subject City (L) : Colorado Springs
Subject Organization (O) : Broadcom Inc.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
359
Managing Certificates and Server Security
Viewing the List of Certificates and Certificate Details
Procedure
Step 2 Server /chassis# scope mctp Enters the MCTP SPDM security command
mode.
Step 4 Server /chassis/mctp# cert-details Lists the details of the SPDM Root CA
Certificate-ID certificate with the certificate ID 1
The following example shows the certificate ID, common name, issuer organization, and validity of two
Broadcom certificates.
Example
The example below lists all the SDPM Root CA certificates.
Server# scope chassis
Server /chassis # scope mctp
Server /chassis/mctp# cert-list
The example below lists all the details of the SPDM Root CA certificate with the certificate ID 1.
Server# scope chassis
Server /chassis # scope mctp
Server /chassis/mctp# cert-details 1
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
360
Managing Certificates and Server Security
Deleting Certificates
Certificate Information
Subject Country Code (C) : US
Subject State (ST) : Colorado
Subject City (L) : Colorado Springs
Subject Organization (O) : Broadcom Inc.
Subject Organization Unit(OU) : NA
Subject Common Name (CN) : NA
Issuer Country Code (C) : US
Issuer State (ST) : Colorado
Issuer City (L) : Colorado Springs
Issuer Organization (O) : Broadcom Inc.
Issuer Organization Unit(OU) : NA
Issuer Common Name (CN) : NA
Valid From : Oct 23 00:25:13 2019 GMT
Valid To : Apr 29 00:25:13 2129 GMT
Deleting Certificates
You can delete any of the certificates that you have uploaded.
Procedure
Step 2 Server /chassis# scope mctp Enters the MCTP SPDM security command
mode.
Step 3 Server /chassis/mctp# delete-certificate Successfully deletes the uploaded SPDM Root
Certificate-id CA Certificate with the certificate id 1.
If the certificate id corresponds to any internal
certificate, the following message is displayed:
The Certificate ID corresponds to
Internal certificate. Can’t delete
Internal certificates.
Example
This example deletes any of the chosen uploaded certificates.
Server# scope chassis
Server /chassis # scope mctp
Server /chassis/mctp # delete-certificate
Please provide Certificate ID to delete certificate
Server /chassis/mctp # delete-certificate 1
Successfully deleted the user uploaded MCTP Certificate
Server /chassis/mctp # delete-certificate 11
The Certificate ID corresponds to Internal certificate. Can’t delete Internal certificates.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
361
Managing Certificates and Server Security
Key Management Interoperability Protocol
Procedure
Example
This example enables KMIP:
Server # scope kmip
Server /kmip # set enabled yes
Server /kmip *# commit
Server /kmip # show detail
Enabled: yes
Server /kmip #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
362
Managing Certificates and Server Security
Creating a Client Private Key and Client Certificate for KMIP Configuration
Creating a Client Private Key and Client Certificate for KMIP Configuration
As an alternative to using a public Certificate Authority (CA) to generate and sign a server certificate, you
can operate your own CA and sign your own certificates. This section shows commands for creating a CA
and generating a server certificate using the OpenSSL certificate server running on Linux. For detailed
information about OpenSSL, see http://www.openssl.org.
Note These commands are to be entered on a Linux server with the OpenSSL package, not in the Cisco IMC.
Procedure
Step 2 openssl req -new -x509 -days numdays -key This command generates a new self-signed
Client_Privatekeyfilename -out client certificate using the client private key
Client_certfilename obtained from the previous step. The certificate
is valid for the specified period. The command
Example:
prompts the user for additional certificate
# openssl req -new -x509 -key information.
client_private.pem -out client.pem -days
365 A new self-signed client certificate is created.
Step 3 Obtain the KMIP root CA certificate from the Refer to the KMIP vendor documentation for
KMIP server. details on obtaining the root CA certificate.
What to do next
Upload the new certificate to the Cisco IMC.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
363
Managing Certificates and Server Security
Downloading a KMIP Client Certificate
Procedure
Step 4 Server/kmip # scope kmip-client-certificate Enters the KMIP client certificate command
mode.
Step 6 At the confirmation prompt, enter y. This begins the download of the KMIP client
certificate.
Step 7 (Optional) Server /kmip/kmip-client-certificate At the prompt, paste the content of the signed
# paste-client-certificate certificate and press CTRL+D.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
364
Managing Certificates and Server Security
Downloading a KMIP Client Certificate
Example
This example downloads the KMIP client certificate:
Server # scope kmip
Server /kmip # set enabled yes
Server /kmip *# commit
Server /kmip # scope kmip-client-certificate
Server /kmip/kmip-client-certificate # show detail
KMIP client certificate Available: 1
Download client certificate Status: COMPLETED
Export client certificate Status: NONE
Server /kmip/kmip-client-certificate # download-client-certificate tftp 10.10.10.10
KmipCertificates/
svbu-xx-blr-dn1-13_ClientCert.pem
You are going to overwrite the KMIP client certificate.
Are you sure you want to proceed and overwrite the KMIP client certificate? [y|N]y
KMIP client certificate downloaded successfully
You can either use the remote server method from the previous steps or use the paste option
to download the client certificate.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
365
Managing Certificates and Server Security
Exporting a KMIP Client Certificate
Procedure
Step 2 Server /kmip # scope kmip-client-certificate Enters the KMIP client certificate command
mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
366
Managing Certificates and Server Security
Deleting a KMIP Client Certificate
Example
This example exports the KMIP client certificate:
Server # scope kmip
Server /kmip # scope kmip-client-certificate
Server /kmip/kmip-client-certificate # export-client-certificate ftp 10.10.10.10
/TFTP_DIR/KmipCertificates
/svbu-xx-blr-dn1-13_ClientCert.pem_exported_ftp
Username: username
Password:
KMIP Client Certificate exported successfully
Server /kmip/kmip-client-certificate # show detail
KMIP Client Certificate Available: 1
Download KMIP Client Certificate Status: COMPLETED
Export KMIP Client Certificate Status: COMPLETED
Server /kmip/kmip-client-certificate #
Procedure
Step 2 Server# /kmip scope kmip-client-certificate Enters the KMIP client certificate binding
command mode.
Example
This example deletes the KMIP client certificate:
Server # scope kmip
Server /kmip # scope kmip-client-certificate
Server /kmip/kmip-client-certificate # delete-client-certificate
You are going to delete the KMIP Client Certificate.
Are you sure you want to proceed and delete the KMIP Client Certificate? [y|N]y
KMIP Client Certificate deleted successfully.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
367
Managing Certificates and Server Security
Downloading a KMIP Root CA Certificate
Procedure
Step 4 Server /kmip # scope kmip-root-ca-certificate Enters the KMIP root CA certificate command
mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
368
Managing Certificates and Server Security
Downloading a KMIP Root CA Certificate
Step 7 (Optional) Server /kmip/kmip-root-ca-certificate At the prompt, paste the content of the root CA
# paste-root-ca-certificate certificate and press CTRL+D.
Note You can either use the remote
server method from the previous
steps or use the paste option to
download the root CA certificate.
Example
This example downloads the KMIP root CA certificate:
Server # scope kmip
Server /kmip # set enabled yes
Server /kmip *# commit
Server /kmip # scope kmip-root-ca-certificate
Server /kmip/kmip-root-ca-certificate # show detail
KMIP Root CA Certificate Available: 1
Download Root CA Certificate Status: COMPLETED
Export Root CA Certificate Status: NONE
Server /kmip/kmip-root-ca-certificate # download-root-ca-certificate tftp 10.10.10.10
KmipCertificates/
svbu-xx-blr-dn1-13_ServerCert.pem
You are going to overwrite the KMIP Root CA Certificate.
Are you sure you want to proceed and overwrite the KMIP Root CA Certificate? [y|N]y
KMIP Root CA Certificate downloaded successfully
You can either use the remote server method from the previous steps or use the paste option
to download the client certificate.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
369
Managing Certificates and Server Security
Exporting a KMIP Root CA Certificate
y
Server /kmip/kmip-root-ca-certificate #
Procedure
Step 2 Server /kmip # scope kmip-root-ca-certificate Enters the KMIP root CA certificate command
mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
370
Managing Certificates and Server Security
Deleting a KMIP Root CA Certificate
Step 4 (Optional) Server /kmip/kmip-root-ca-certificate Displays the status of the certificate export.
# show detail
Example
This example exports the KMIP root CA certificate:
Server # scope kmip
Server /kmip # scope kmip-root-ca-certificate
Server /kmip/kmip-root-ca-certificate # export-root-ca-certificate tftp 10.10.10.10
KmipCertificates/
svbu-xx-blr-dn1-13_ServerCert.pem_exported_tftp
KMIP Root CA Certificate exported successfully
Server /kmip/kmip-root-ca-certificate # show detail
KMIP Root CA Certificate Available: 1
Download Root CA Certificate Status: COMPLETED
Export Root CA Certificate Status: COMPLETED
Server /kmip/kmip-root-ca-certificate #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
371
Managing Certificates and Server Security
Downloading a KMIP Client Private Key
Procedure
Step 2 Server# /kmip scope kmip-root-ca-certificate Enters the KMIP root CA certificate binding
command mode.
Example
This example deletes the KMIP root CA certificate:
Server # scope kmip
Server /kmip # scope kmip-root-ca-certificate
Server /kmip/kmip-root-ca-certificate # delete-root-ca-certificate
You are going to delete the KMIP root CA certificate.
Are you sure you want to proceed and delete the KMIP root CA certificate? [y|N]y
KMIP root CA certificate deleted successfully.
Procedure
Step 4 Server/kmip # scope kmip-client-private-key Enters the KMIP client private key command
mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
372
Managing Certificates and Server Security
Downloading a KMIP Client Private Key
Step 6 At the confirmation prompt, enter y. This begins the download of the KMIP client
private key.
Step 7 (Optional) Server /kmip/kmip-client-private-key At the prompt, paste the content of the private
# paste-client-pvt-key key and press CTRL+D.
Note You can either use the remote
server method from the previous
steps or use the paste option to
download the client private key.
Example
This example downloads the KMIP client private key:
Server # scope kmip
Server /kmip # set enabled yes
Server /kmip *# commit
Server /kmip # scope kmip-client-private-key
Server /kmip/kmip-client-private-key # show detail
KMIP Client Private Key Available: 1
Download Client Private Key Status: COMPLETED
Export Client Private Key Status: NONE
Server /kmip/kmip-client-private-key # download-client-pvt-key tftp 10.10.10.10
KmipCertificates/
svbu-xx-blr-dn1-13_ClientPvtKey.pem
You are going to overwrite the KMIP Client Private Key.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
373
Managing Certificates and Server Security
Exporting KMIP Client Private Key
Are you sure you want to proceed and overwrite the KMIP Client Private Key? [y|N]y
KMIP Client Private Key downloaded successfully
You can either use the remote server method from the previous steps or use the paste option
to download the client certificate.
Procedure
Step 2 Server /kmip # scope kmip-client-private-key Enters the KMIP client private key command
mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
374
Managing Certificates and Server Security
Exporting KMIP Client Private Key
Step 4 (Optional) Server /kmip/kmip-client-private-key Displays the status of the certificate export.
# show detail
Example
This example exports the KMIP client private key:
Server # scope kmip
Server /kmip # scope kmip-client-private-key
Server /kmip/kmip-client-private-key # export-client-pvt-key tftp 10.10.10.10
KmipCertificates
/svbu-xx-blr-dn1-13_ClientPvtKey.pem_exported_tftp
KMIP Client Private Key exported successfully
Server /kmip/kmip-client-private-key # show detail
KMIP Client Private Key Available: 1
Download Client Private Key Status: COMPLETED
Export Client Private Key Status: COMPLETED
Server /kmip/kmip-client-private-key #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
375
Managing Certificates and Server Security
Deleting a KMIP Client Private Key
Procedure
Step 2 Server# /kmip scope kmip-client-private-key Enters the KMIP client private key binding
command mode.
Example
This example deletes the KMIP client private key:
Server # scope kmip
Server /kmip # scope kmip-client-private-key
Server /kmip/kmip-client-private-key # delete-client-pvt-key
You are going to delete the KMIP client private key.
Are you sure you want to proceed and delete the KMIP client private key? [y|N]y
KMIP client private key deleted successfully.
Procedure
Step 2 Server /kmip # scope kmip-login Enters the KMIP login command mode.
Step 3 Server/kmip/kmip-login # set login username Sets the KMIP server user name.
Step 4 Server/kmip/kmip-login * # set password Enter the password at the prompt and enter the
same password again at the confirm password
prompt. This sets the KMIP server password.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
376
Managing Certificates and Server Security
Configuring KMIP Server Properties
Example
This example shows how to configure the KMIP server credentials:
Server /kmip # scope kmip-login
Server /kmip/kmip-login # set login username
Server /kmip/kmip-login *# set password
Please enter password:
Please confirm password:
Server /kmip/kmip-login *# set use-kmip-cred yes
Server /kmip/kmip-login *# commit
Server /kmip/kmip-login # show detail
Use KMIP Login: yes
Login name to KMIP server: username
Password to KMIP server: ******
You can restore the KMIP server credentials to default settings by preforming the following
step:
Procedure
Step 2 Server /kmip # scope kmip-server server ID Enters the chosen KMIP server command mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
377
Managing Certificates and Server Security
FIPS 140-2 Compliance in Cisco IMC
Step 5 Server /kmip/kmip-server # set kmip-timeout Sets the KMIP server timeout.
Step 7 (Optional) Server /kmip/kmip-server # show Displays the KMIP server details.
detail
Example
This example tests the KMIP server connection:
Server # scope kmip
Server /kmip # scope kmip-server 1
Server /kmip/kmip-server # set kmip-port 5696
Server /kmip/kmip-server * # set kmip-server kmipserver.com
Server /kmip/kmip-server * # set kmip-timeout 10
Server /kmip/kmip-server * # commit
Server /kmip/kmip-server # show detail
Server number 1:
Server domain name or IP address: kmipserver.com
Port: 5696
Timeout: 10
Server /kmip/kmip-server #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
378
Managing Certificates and Server Security
Enabling Security Configuration
Procedure
Step 2 Server /cimc # scope security-configuration Enters the security configuration command
mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
379
Managing Certificates and Server Security
Enabling Security Configuration
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
380
Managing Certificates and Server Security
Enabling Security Configuration
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
381
Managing Certificates and Server Security
Enabling Security Configuration
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
382
Managing Certificates and Server Security
Enabling Security Configuration
Example
This example shows how to view the controller information:
Server# scope cimc
Server /cimc # scope security-configuration
Server /cimc/security-configuration # set fips enabled
Enabling FIPS would
1. Disables support for SNMP V2 and V3 with No 'Auth/Priv' security level.
2. Disables support for 'MD5/DES' crypto algorithms in SNMP 'Auth/Priv' keys.
3. Ensures use of only FIPS-compliant ciphers in SSH, webserver and KVM connections.
Server /cimc/security-configuration* # commit
Server/cimc/security-configuration # set cc enabled
Enabling Common Criteria
Server /cimc/security-configuration* # commit
Warning: changing "fips" or "CC" will restart SSH, KVM, SNMP, webserver, XMLAPI and redfish
services.
Do you wish to continue? [y/N] y
Server /cimc/security-configuration #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
383
Managing Certificates and Server Security
Enabling Security Configuration
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
384
CHAPTER 13
Configuring Platform Event Filters
This chapter includes the following sections:
• Platform Event Filters, on page 385
• Configuring Platform Event Filters, on page 385
• Resetting Event Platform Filters, on page 386
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
385
Configuring Platform Event Filters
Resetting Event Platform Filters
Step 3 Server /fault/pef # set action {none | reboot | Selects the desired system action when this
power-cycle | power-off} event occurs. The action can be one of the
following:
• none —No system action is taken.
• reboot —The server is rebooted.
• power-cycle —The server is power cycled.
• power-off —The server is powered off.
Example
This example configures the platform event alert for an event:
Server# scope fault
Server /fault # scope pef 5
Server /fault/pef # set action reboot
Server /fault/pef *# commit
Server /fault/pef # show
Platform Event Filter Event Action
--------------------- --------------------------- -----------
5 Processor Assert Filter reboot
Server /fault/pef #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
386
Configuring Platform Event Filters
Resetting Event Platform Filters
Example
The following example enables platform event alerts:
Server# scope fault
Server /fault # set platform-event-enabled yes
Server /fault *# commit
Server /fault # show
Platform Event Enabled
-----------------------
yes
Server /fault #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
387
Configuring Platform Event Filters
Resetting Event Platform Filters
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
388
CHAPTER 14
Cisco IMC Firmware Management
This chapter includes the following sections:
• Overview of Firmware, on page 389
• Obtaining Firmware from Cisco, on page 390
• Introduction to Cisco IMC Secure Boot, on page 392
• Installing Cisco IMC Firmware, on page 395
• Activating Installed CIMC Firmware, on page 398
• Installing BIOS Firmware, on page 399
• Activating Installed BIOS Firmware, on page 402
• Canceling a Pending BIOS Activation, on page 404
• Installing VIC Firmware, on page 405
• Installing CMC Firmware from a Remote Server, on page 407
• Activating Installed CMC Firmware, on page 409
• Installing SAS Expander Firmware from a Remote Server, on page 410
• Activating Installed SAS Expander Firmware, on page 412
Overview of Firmware
C-Series servers use Cisco-certified firmware that is specific to the C-Series server model that you are using.
You can download new releases of the firmware for all supported server models from Cisco.com.
Caution When you install the new BIOS firmware, it must be from the same software release as the Cisco IMC firmware
that is running on the server. Do not install the new BIOS firmware until after you have activated the matching
Cisco IMC firmware or the server will not boot.
To avoid potential problems, we strongly recommend that you use the Cisco Host Upgrade Utility (HUU),
which upgrades the BIOS, Cisco IMC, and other firmware to compatible levels. For detailed information
about this utility, see the Cisco Host Upgrade Utility Guide for the version of the HUU that goes with the
Cisco IMC software release that you want to install. The HUU guides are available at the following URL:
http://www.cisco.com/en/US/products/ps10493/products_user_guide_list.html.
If you want to update the firmware manually, you must update the Cisco IMC firmware first. The Cisco IMC
firmware update process is divided into the following stages to minimize the amount of time that the server
is offline:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
389
Cisco IMC Firmware Management
Obtaining Firmware from Cisco
• Installation—During this stage, Cisco IMC installs the selected Cisco IMC firmware in the nonactive,
or backup, slot on the server.
• Activation—During this stage, Cisco IMC sets the nonactive firmware version as active, causing a
disruption in service. When the server reboots, the firmware in the new active slot becomes the running
version.
After you activate the Cisco IMC firmware, you can update the BIOS firmware. You must power off server
during the entire BIOS update process, so the process is not divided into stages. Instead, you only need to
enter one command and Cisco IMC installs and updates the BIOS firmware as quickly as possible. After the
Cisco IMC finishes rebooting, the server can be powered on and returned to service.
Note • You can either upgrade an older firmware version to a newer one, or downgrade a newer firmware version
to an older one.
• This procedure only applies to the Cisco UCS C-Series server running on Stand-Alone mode. Contact
Cisco Technical Assistance Center to upgrade firmware for UCS C-Series running on Cisco UCS Manager
integrated mode.
Cisco IMC in a secure mode ensures that all the firmware images prior to loading and execution are digitally
signed and are verified for authenticity and integrity to protect the device from running tampered software.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
390
Cisco IMC Firmware Management
Obtaining Firmware from Cisco
We recommend you upgrade the Cisco IMC and BIOS firmware on your server using this ISO file, which
contains the Cisco Host Upgrade Utility. For detailed information about this utility, see the Cisco Host Upgrade
Utility Guide for the version of the HUU that goes with the Cisco IMC software release that you want to
install. The HUU guides are available at the following URL:
http://www.cisco.com/en/US/products/ps10493/products_user_guide_list.html.
Step 11 (Optional) If you plan to upgrade the Cisco IMC and BIOS firmware manually, do the following:
Beginning with Release 3.0, the BIOS and Cisco IMC firmware files are no longer embedded inside the HUU
as a standalone .zip file. BIOS and Cisco IMC firmware must now be extracted using the getfw utility, which
is available in the GETFW folder of the HUU. Perform the following steps to extract the BIOS or Cisco IMC
firmware files:
Note To perform this:
• Openssl must be installed in the target system.
• Squashfs kernel module must be loaded in the target system.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
391
Cisco IMC Firmware Management
Introduction to Cisco IMC Secure Boot
Step 12 (Optional) If you plan to install the firmware from a remote server, copy the BIOS installation CAP file and
the Cisco IMC installation BIN file to the remote server you want to use.
The remote server can be one of the following:
• TFTP
• FTP
• SFTP
• SCP
• HTTP
The server must have read permission for the destination folder on the remote server.
Note The Cisco UCS C-Series server now supports fingerprint confirmation of the server when you
update firmware through a remote server. This option is available only if you choose SCP or
SFTP as the remote server type.
If you chose SCP or SFTP as the remote server type while performing this action, a prompt with
the message Server (RSA) key fingerprint is <server_finger_print _ID> Do you wish to continue?
Click y or n depending on the authenticity of the server fingerprint.
The fingerprint is based on the host's public key and helps you to identify or verify the host you
are connecting to.
What to do next
Use the Cisco Host Upgrade Utility to upgrade all firmware on the server or manually install the Cisco IMC
firmware on the server.
Note Cisco IMC secure boot mode is enabled by default only on some Cisco UCS C-Series servers.
You can update Cisco IMC to the latest version using Host Upgrade Utility (HUU), web UI, or CLI. If you
use HUU to upgrade Cisco IMC, you are prompted to enable secure boot mode. If you choose Yes, the system
enters a secure mode and install the firmware twice. If you choose No, it enters a nonsecure mode. If you use
either the web UI or CLI to upgrade Cisco IMC, you must upgrade to version 2.0(x). After you boot the system
with version 2.0(x), it boots in a nonsecure mode by default. You must enable secure mode. when you enable
secure mode, you are automatically reinstalling the firmware. In the web UI, the secure mode option is available
as a checkbox within the Cisco IMC firmware update page. In the CLI, you can enable the secure mode by
using the update-secure command.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
392
Cisco IMC Firmware Management
About Cisco IMC Secure Mode
During the first upgrade to Cisco IMC version 2.0, a warning message might display stating that some of the
features and applications are not installed correctly and a second upgrade is required. We recommend that
you perform the second upgrade with or without the secure boot option enabled to correctly install the Cisco
IMC firmware version 2.0(x) in a secure mode. After the installation is complete, you must activate the image.
After you boot your system with the secure boot option enabled, Cisco IMC remains in secure mode and you
cannot disable it later on. If you do not activate the image and reinstall any other firmware images, Cisco IMC
may become unresponsive.
Warning After you install the firmware with the secure boot migration, you must activate the image before performing
any other regular server-based tasks. If you do not activate this image, and if you reinstall any other firmware
images, Cisco IMC might become unresponsive.
The secure boot is enabled only when the firmware installation is complete and you have activated the image.
Supported Cisco IMC Version When Downgrading from the Latest Version
The following table lists the Cisco IMC versions in a secure mode that can be downgraded to prior versions.
Note When the Cisco IMC verison you are using is in a nonsecure mode, you can downgrade Cisco IMC to any
prior version.
Note If you use HUU to downgrade Cisco IMC versions prior to 1.5(4), you must first downgrade Cisco IMC and
then downgrade other firmware. Activate the firmware and then downgrade the BIOS firmware.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
393
Cisco IMC Firmware Management
Number of Updates Required for Cisco IMC Version 2.0(1)
Important This section is valid for Cisco IMC version 2.0(1) and prior releases.
From Cisco IMC Version To a Nonsecure Cisco IMC Version To a Secure Cisco IMC Version 2.0(x)
2.0(x)
Prior to 1.5(2) Double update Double update
1.5(2) Single update Double update
1.5(3) Single update Double update
1.5(3x) or Later Single update Double update
Important This section is valid for Cisco IMC version 2.0(1) and prior releases.
You can upgrade Cisco IMC to the latest version in a nonsecure mode with all the latest feature and applications
installed correctly. When you upgrade Cisco IMC to the latest version using the web UI or CLI, you might
need to update the firmware twice manually depending upon the version you are using. See, Supported Cisco
IMC Version when Upgrading to the Latest Version. If you use HUU to upgrade the Cisco IMC verison, it
gets upgraded to the latest verison automatically.
Note If you are installing from a Cisco IMC version prior to 1.5(2x), the following message is displayed:
Warning "Some of the Cisco IMC firmware components are not installed properly! Please reinstall Cisco IMC firmware
version 2.0(1) or higher to recover".
Note If you are in the middle of (HUU) update, we recommend that you reconnect any KVM
current status of the update.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
394
Cisco IMC Firmware Management
Installing Cisco IMC Firmware
• Cisco IMC firmware versions can be installed or booted to any prior versions.
Procedure
Step 2 server /cimc # scope firmware Enters Cisco IMC firmware command mode.
Step 3 server /cimc /firmware # update protocol IP Specifies the protocol, IP address of the remote
Address path server, and the file path to the firmware file on
the server. The protocol can be one of the
following:
• TFTP
• FTP
• SFTP
• SCP
• HTTP
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
395
Cisco IMC Firmware Management
Installing Cisco IMC Firmware
Step 4 server /cimc/firmware # update usb path and Updates the Cisco IMC firmware from the
firmware file name connected USB.
Step 5 (Optional) server /cimc/firmware # Migrates to the Cisco IMC secure boot option.
update-secure protocol IP Address path Migration implies the following:
• You can install and boot only signed Cisco
IMC firmware images on the server.
• You cannot install and boot Cisco IMC
firmware versions prior to 1.5(3x).
• You cannot disable Secure Boot later on.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
396
Cisco IMC Firmware Management
Installing Cisco IMC Firmware
Step 6 (Optional) server /cimc /firmware # show detail Displays the progress of the firmware update.
Example
This example shows how to update the Cisco IMC firmware and to migrate Cisco IMC from a
nonsecure boot to secure boot for Cisco IMC version 2.0:
server# scope cimc
server /cimc # scope firmware
server /cimc /firmware # update ftp 192.0.20.34 //test/dnld-ucs-k9-bundle.1.0.2h.bin
Firmware update has started.
Please check the status using "show detail"
Server /cimc /firmware # update-secure tftp 1.1.1.1 /cimc-pkg.bin
Migrating to Cisco IMC Secure Boot option implies:
-You can install and boot only signed Cisco IMC firmware images on the server.
-You cannot install and boot Cisco IMC firmware versions prior than 1.5(3x).
-You cannot disable Secure Boot later on.
After installing the firmware with the Secure Boot migration, you must
activate the image before performing any other regular server-based tasks.
The Secure Boot option is enabled only when the firmware installation
is complete and you have activated the image.
Continue?[y|N]y
Update to Secure Boot selected, proceed with update.
Firmware update initialized.
Please check the status using "show detail".
server /cimc /firmware # show detail
Firmware Image Information:
Update Stage: DOWNLOAD
Update Progress: 5
Current FW Version: 2.0(0.29)
FW Image 1 Version: 2.0(0.28)
FW Image 1 State: BACKUP INACTIVATED
FW Image 2 Version: 2.0(0.29)
FW Image 2 State: RUNNING ACTIVATED
Boot-loader Version: 2.0(0.9).35
Secure Boot: DISABLED
*+-----------------------------------------------------------------------+
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
397
Cisco IMC Firmware Management
Activating Installed CIMC Firmware
+ Some of the Cisco IMC firmware components are not installed properly! +
+ Please reinstall Cisco IMC firmware version 2.0 or higher to recover. +
+-----------------------------------------------------------------------+
server /cimc /firmware #
What to do next
Activate the new firmware.
Procedure
Step 2 Server /cimc # scope firmware Enters the firmware command mode.
Step 3 Server /cimc/firmware # show detail Displays the available firmware images and
status.
Step 5 At the prompt, enter y to activate the selected The BMC reboots, terminating all CLI and GUI
firmware image. sessions until the reboot completes.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
398
Cisco IMC Firmware Management
Installing BIOS Firmware
Example
This example activates firmware image 1 and then verifies the activation after the BMC reboots:
Server# scope cimc
Server /cimc # scope firmware
Server /cimc/firmware # show detail
Firmware Image Information:
Update Stage: NONE
Update Progress: 100
Current FW Version: 1.3(3a)
FW Image 1 Version: 1.4(3j)
FW Image 1 State: BACKUP INACTIVATED
FW Image 2 Version: 1.3(3a)
FW Image 2 State: RUNNING ACTIVATED
Boot-loader Version: 1.4(3.21).18
Note This procedure is not available on some servers. For other BIOS installation methods, see the Cisco UCS
C-Series Rack-Mount Server BIOS Upgrade Guide available at the following URL:
http://www.cisco.com/en/US/docs/unified_computing/ucs/c/sw/bios/b_Upgrading_BIOS_Firmware.html.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
399
Cisco IMC Firmware Management
Installing BIOS Firmware
Note • If you start an update while an update is already in process, both updates will fail.
• If you are updating the BIOS firmware through a front panel USB device, make sure that the Smart
Access USB option has been enabled.
Procedure
Step 2 Server /cimc # scope firmware Enters the firmware command mode.
Step 3 Server /cimc/firmware # show detail Displays the available firmware images and
status.
Step 4 Make sure the firmware version shown in the Important If the Cisco IMC firmware version
Current FW Version field matches the BIOS does not match, activate the Cisco
firmware version you are installing. IMC firmware before continuing
with this procedure or the server
will not boot. For details, see
Activating Installed CIMC
Firmware, on page 398.
Step 7 Server /bios # update protocol IP Address path It specifies the following:
• Protocol, it can be TFTP, FTP, SFTP, SCP,
or HTTP.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
400
Cisco IMC Firmware Management
Installing BIOS Firmware
Step 8 Server /bios # update usb path and firmware Updates the BIOS firmware from the connected
file name USB.
Example
This example updates the BIOS firmware:
Server# scope bios
Server /bios# show detail
BIOS:
BIOS Version: CxxMx.2.0.3.0.080720142114
Backup BIOS Version: CxxMx.2.0.2.68.073120141827
Boot Order: (none)
Boot Override Priority:
FW Update/Recovery Status: None, OK
UEFI Secure Boot: disabled
Configured Boot Mode: None
Actual Boot Mode: Unknown
Last Configured Boot Order Source: UNKNOWN
Server /bios # update ftp 10.10.10.10 //upgrade_bios_files/Cxx-BIOS-1-4-3j-0.CAP
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
401
Cisco IMC Firmware Management
Activating Installed BIOS Firmware
Note • Starting with release 4.0(1), you can activate BIOS when the server is on. When you active the firmware
while the server is on, activation will be in pending state and the firmware is activated after the next
server reboot.
• Activate BIOS Firmware (activate) option is available only for some C-Series servers. For servers that
do not have the this option, rebooting the server activates the installed BIOS firmware.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
402
Cisco IMC Firmware Management
Activating Installed BIOS Firmware
Procedure
Step 2 Server /bios # show detail Displays the available firmware images and
status.
Example
This example activates firmware and then verifies the activation:
Server# scope bios
Server /bios # show detail
BIOS
Version: C240M4.2.0.2.67.072320142231
Backup BIOS Version: C240M4.2.0.2.66.071820142034
Boot Order: (none)
Boot Override Priority:
FW Update/Recovery Status: None, OK
UEFI Secure Boot: disabled
Configured Boot Mode: None
Actual Boot Mode: Legacy
Last Configured Boot Order Source: BIOS
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
403
Cisco IMC Firmware Management
Canceling a Pending BIOS Activation
Procedure
Step 2 Server /bios # show detail Displays the available firmware images and
status.
Example
This example cancels a pending BIOS firmware activation:
Server# scope bios
Server /bios # show detail
BIOS:
BIOS Version: Cxxx.4.0.0.19.0528180450
Backup BIOS Version: Cxxx.4.0.0.23.0612180433
Boot Order: (none)
FW Update Status: Done, Activation pending
UEFI Secure Boot: disabled
Actual Boot Mode: Uefi
Last Configured Boot Order Source: BIOS
One time boot device: (none)
Server /bios # cancel-activate
This will cancel Pending BIOS activation[y|N]y
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
404
Cisco IMC Firmware Management
Installing VIC Firmware
Procedure
Step 2 server /chassis # update-adapter-fw protocol The VIC firmware will be stored at the specified
remote server address image file path and file name on a remote server at the
pathactivate|no-activatePCI slot number specified IPv4 or IPv6 address or a hostname.
The remote server could be one of the following
types:
• TFTP
• FTP
• SFTP
• SCP
• HTTP
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
405
Cisco IMC Firmware Management
Installing VIC Firmware
Step 3 server /chassis # update-adapter-fw usb image Provide the image file path in the USB device,
file path activate|no-activate PCI slot number and the VIC PCI slot number.
Step 4 (Optional) server /cimc # show adapter detail Displays the progress of the firmware update.
Example
This example shows how to update the VIC firmware:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
406
Cisco IMC Firmware Management
Installing CMC Firmware from a Remote Server
•
Note If you start an update while an update is already in process, both updates will
fail.
Procedure
Step 2 server /chassis # scope cmc 1|2 Enters CMC on the chosen SIOC controller
command mode.
Step 3 server /chassis/cmc # update protocol IP Specifies the protocol, IP address of the remote
Address path server, and the file path to the firmware file on
the server. The protocol can be one of the
following:
• TFTP
• FTP
• SFTP
• SCP
• HTTP
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
407
Cisco IMC Firmware Management
Installing CMC Firmware from a Remote Server
Step 4 (Optional) server /chassis/cmc # show detail Displays the progress of the firmware update.
Example
This example shows how to update the CMC firmware:
server # scope chassis
server /chassis # scope cmc 1
server /chassis/cmc # update http 10.104.236.99 colusa_cmc.2.0.2a.img
CMC Firmware update initialized.
Please check the status using "show detail"
Server /chassis/cmc # show detail
Firmware Image Information:
Name: CMC1
Update Stage: DOWNLOAD
Update Progress: 25
Current FW Version: 2.0(2a)
FW Image 1 Version: 2.0(2a)
FW Image 1 State: RUNNING ACTIVATED
FW Image 2 Version: 2.0(2a)
FW Image 2 State: BACKUP INACTIVATED
server /chassis/cmc #
What to do next
Activate the new firmware.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
408
Cisco IMC Firmware Management
Activating Installed CMC Firmware
Note CMCs are configured to have one in an active state while other acts as a backup, when you activate the backup
CMC the previously active CMC changes to backup CMC activating the other.
Procedure
Step 2 Server# scope cmc1|2 Enters the CMC of the chosen SIOC slot
command mode.
Step 3 Server /cmc # activate Activates the selected image for the chosen
CMC.
Step 4 At the prompt, enter y to activate the selected The CMC-1 reboots, terminating all CLI and
firmware image. GUI sessions until the reboot completes, but
CMC-2 reboot will not affect any active
sessions.
Example
This example activates CMC firmware on the SIOC slot 1:
Server # scope chassis
Server /chassis # scope cmc 1
Server /chassis/cmc # activate
Warning: The CMC will be rebooted immediately to complete the activation.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
409
Cisco IMC Firmware Management
Installing SAS Expander Firmware from a Remote Server
Procedure
Step 2 Server /chassis # scope sas-expander {1 | 2} Enters the SAS expander command mode.
Step 3 Server /chassis/sas-expander # show detail Displays the available firmware images and
status.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
410
Cisco IMC Firmware Management
Installing SAS Expander Firmware from a Remote Server
Example
This example updates the SAS expander firmware:
Server# scope chassis
Server /chassis # scope sas-expander 1
Server /chassis/sas-expander # show detail
Firmware Image Information:
ID: 1
Name: SASEXP1
Update Stage: NONE
Update Progress: 0
Current FW Version: 65103900
FW Image 1 Version: 65103900
FW Image 1 State: RUNNING ACTIVATED
FW Image 2 Version: 65103900
FW Image 2 State: BACKUP INACTIVATED
Server /chassis/sas-expander # update ftp 192.0.20.34
//upgrade_sas_expander_files/sas-expander-2-0-12a.fw
<CR> Press Enter key
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
411
Cisco IMC Firmware Management
Activating Installed SAS Expander Firmware
Procedure
Step 2 Server /chassis # scope sas-expander {1 | 2} Enters the SAS expander command mode.
Example
This example activates firmware and then verifies the activation:
Server# scope chassis
Server /chassis # scope sas-expander 1
Server /chassis/sas-expander # show detail
ID: 1
Name: SASEXP1
Update Stage: NONE
Update Progress: 0
Current FW Version: 65103900
FW Image 1 Version: 65103900
FW Image 1 State: RUNNING INACTIVATED
FW Image 2 Version: 65103900
FW Image 2 State: BACKUP INACTIVATED
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
412
Cisco IMC Firmware Management
Activating Installed SAS Expander Firmware
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
413
Cisco IMC Firmware Management
Activating Installed SAS Expander Firmware
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
414
CHAPTER 15
Viewing Faults and Logs
This chapter includes the following sections:
• Fault Summary, on page 415
• Fault History, on page 416
• Cisco IMC Log, on page 416
• System Event Log, on page 426
Fault Summary
Viewing the Faults and Logs Summary
Procedure
Example
This example displays a summary of faults:
Server # scope fault
Server /fault # show fault-entries
Time Severity Description
------------------------ ------------ -----------------
Sun Jun 27 04:00:52 2013 info Storage Local disk 12 missing
Sat Jun 26 05:00:22 2013 warning Power Supply redundancy is lost
Server /fault #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
415
Viewing Faults and Logs
Fault History
Fault History
Viewing the Fault History
Procedure
Example
This example displays the faults' history:
Server # scope fault
Server /fault # show fault-history
Time Severity Source Cause Description
------------------- --------- ------ --------------------
----------------------------------------
2014 Feb 6 23:24:49 error %CIMC PSU_REDUNDANCY-FAIL
"[F0743][major][psu-redundancy-fail].....
2014 Feb 6 23:24:49 error %CIMC EQUIPMENT_INOPERABLE
"[F0374][major][equipment-inoperable]...
2014 Feb 6 23:24:19 debug %CIMC 2014 Feb 6 23 "24:19:7:%CIMC::: SEL INIT DONE"
Server /fault #
Step 2 Server /cimc # scope log Enters the Cisco IMC log command mode.
Step 3 Server /cimc/log # show entries [detail] Displays Cisco IMC events, including
timestamp, the software module that logged the
event, and a description of the event.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
416
Viewing Faults and Logs
Clearing the Cisco IMC Log
Example
This example displays the log of Cisco IMC events:
Server# scope cimc
Server /cimc # scope log
Server /cimc/log # show entries
Time Severity Source Description
Order: 1
Trace Log:
Time: 2012 Jan 30 05:20:45
Severity: Informational
Source: BMC:ciscoNET:961
Description: " rpc_aim_callback_function_1_svc() - szFunctionName:netGetCurrentIfConfig
nSize:0 nMaxSize: 600 "
Order: 2
--More--
Server /cimc/log #
Step 2 Server /cimc # scope log Enters the Cisco IMC log command mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
417
Viewing Faults and Logs
Configuring the Cisco IMC Log Threshold
Example
The following example clears the log of Cisco IMC events:
Server# scope cimc
Server /cimc # scope log
Server /cimc/log # clear
Procedure
Step 2 Server /cimc # scope log Enters the Cisco IMC log command mode.
Step 3 Server /cimc/log # set local-syslog-severity The severity level can be one of the following,
level in decreasing order of severity:
• emergency
• alert
• critical
• error
• warning
• notice
• informational
• debug
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
418
Viewing Faults and Logs
Sending the Cisco IMC Log to a Remote Server
Example
This example shows how to configure the logging of messages with a minimum severity of Warning:
Server# scope cimc
Server /cimc # scope log
Server /cimc/log # set local-syslog-severity warning
Server /cimc/log *# commit
Server /cimc/log # show local-syslog-severity
Local Syslog Severity: warning
Server /cimc/log #
Procedure
Step 2 Server /cimc # scope log Enters the Cisco IMC log command mode.
Step 3 (Optional) Server /cimc/log # set The severity level can be one of the following,
remote-syslog-severity level in decreasing order of severity:
• emergency
• alert
• critical
• error
• warning
• notice
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
419
Viewing Faults and Logs
Sending the Cisco IMC Log to a Remote Server
Step 4 Server /cimc/log # scope server {1 | 2} Selects one of the two remote syslog server
profiles and enters the command mode for
configuring the profile.
Step 5 Server /cimc/log/server # set server-ip ipv4 or Specifies the remote syslog server address.
ipv6 address or domain name
Note You can set an IPv4 or IPv6
address or a domain name as the
remote server address.
Step 6 Server /cimc/log/server # set server-port port Sets the destination port number of the remote
number syslog server.
Step 7 Server /cimc/log/server # set enabled {yes | Enables the sending of Cisco IMC log entries
no} to this syslog server.
Example
This example shows how to configure a remote syslog server profile and enable the sending of Cisco
IMC log entries with a minimum severity level of Warning:
Server# scope cimc
Server /cimc # scope log
Server /cimc/log # set remote-syslog-severity warning
Server /cimc/log *# scope server 1
Server /cimc/log/server *# set server-ip www.abc.com
Server /cimc/log/server *# set server-port 514
Server /cimc/log/server *# set enabled yes
Server /cimc/log/server *# commit
Server /cimc/log/server # exit
Server /cimc/log # show server
Syslog Server 1:
Syslog Server Address: www.abc.com
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
420
Viewing Faults and Logs
Sending a Test Cisco IMC Log to a Remote Server
Server /cimc/log #
Procedure
Step 2 Server /cimc # scope log Enters the Cisco IMC log command mode.
Step 3 Server /cimc/log # send-test-syslog Sends a test Cisco IMC log to the configured
remote servers.
Example
This example shows how to send a test Cisco IMC syslog to the configured remote servers:
Server# scope cimc
Server /cimc # scope log
Server /cimc/log # send-test-syslog
Server /cimc/log #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
421
Viewing Faults and Logs
Uploading Remote Syslog Certificate
Procedure
Step 2 Server /cimc # scope log Enters the Cisco IMC log command mode.
Example
This example displays how to enable logging invalid usernames:
Server# scope cimc
Server /cimc # scope log
Server /cimc/log # set log-username-on-auth-fail enabled
Server /cimc/log* #commit
Server /cimc/log
Beginning with release 4.2(2a), you can upload a remote syslog certificate to Cisco UCS C-series servers.
You can upload the certificate to one or two Cisco UCS C-series servers.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
422
Viewing Faults and Logs
Uploading Remote Syslog Certificate
Selects one of the two remote syslog server profiles and enters the command mode for uploading the remote
syslog certificate and enabling secure remote syslog on the selected server.
Note If you enter the protocol as FTP, SCP or SFTP, you will be prompted to enter your username and
password.
Along with the remote protocol, enter the filepath from where you want to upload the remote syslog certificate.
After validating your remote server username and password, uploads the remote syslog certificate from the
remote server.
Step 5 (Optional) Server /cimc/log/server # paste-certificate
This is an additional option to upload the remote syslog certificate.
At the prompt, paste the content of the certificate and press CTRL+D.
Example
• This example uploads a remote syslog certificate from a remote server and enables secure remote
syslog on the selected server:
Server # scope cimc
Server /cimc # scope log
Server /cimc/log # scope server
Server /cimc/log/server # upload-certificate scp 10.10.10.10
/home/user-xyz/rem-sys-log-certif.cert
Server (RSA) key fingerprint is dd:b5:2b:07:ad:c0:30:b2:d5:6a:6a:78:80:85:93:b0
Do you wish to continue? [y/N]y
Username: user-xyz
Password:
Syslog Certificate uploaded successfully
Server /cimc/log/server # set secure-enabled yes
Server /cimc/log/server # commit
Server /cimc/log/server #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
423
Viewing Faults and Logs
Deleting Remote Syslog Certificate
• This example displays that the remote syslog certificate exists on the server and secure remote
sylog is enabled on the server:
Server # scope cimc
Server /cimc # scope log
Server /cimc/log # scope server
Server /cimc/log/server # show detail
Syslog Server 1:
Syslog Server Address: 10.10.10.10
Syslog Server Port: 514
Enabled: yes
Secure Enabled: yes
Syslog Server protocol: udp
Certificate Exists: yes
Server /cimc/log/server #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
424
Viewing Faults and Logs
Deleting Remote Syslog Certificate
Procedure
Example
• This example displays that the remote syslog certificate exists on the server:
Server # scope cimc
Server /cimc # scope log
Server /cimc/log # scope server
Server /cimc/log/server # show detail
Server /cimc/log/server # commit
Syslog Server 1:
Syslog Server Address: 10.10.10.10
Syslog Server Port: 514
Enabled: yes
Secure Enabled: yes
Syslog Server protocol: udp
Certificate Exists: yes
Server /cimc/log/server #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
425
Viewing Faults and Logs
System Event Log
Step 2 Server /sel # show entries [detail] For system events, displays timestamp, the
severity of the event, and a description of the
event. The detail keyword displays the
information in a list format instead of a table
format.
Example
This example displays the system event log:
Server# scope sel
Server /sel # show entries
Time Severity Description
------------------- ------------- ----------------------------------------
[System Boot] Informational " LED_PSU_STATUS: Platform sensor, OFF event was asserted"
[System Boot] Informational " LED_HLTH_STATUS: Platform sensor, GREEN was asserted"
[System Boot] Normal " PSU_REDUNDANCY: PS Redundancy sensor, Fully Redundant
was asserted"
[System Boot] Normal " PSU2 PSU2_STATUS: Power Supply sensor for PSU2, Power
Supply input lost (AC/DC) was deasserted"
[System Boot] Informational " LED_PSU_STATUS: Platform sensor, ON event was asserted"
[System Boot] Informational " LED_HLTH_STATUS: Platform sensor, AMBER was asserted"
[System Boot] Critical " PSU_REDUNDANCY: PS Redundancy sensor, Redundancy Lost
was asserted"
[System Boot] Critical " PSU2 PSU2_STATUS: Power Supply sensor for PSU2, Power
Supply input lost (AC/DC) was asserted"
[System Boot] Normal " HDD_01_STATUS: Drive Slot sensor, Drive Presence was
asserted"
[System Boot] Critical " HDD_01_STATUS: Drive Slot sensor, Drive Presence was
deasserted"
[System Boot] Informational " DDR3_P2_D1_INFO: Memory sensor, OFF event was asserted"
2001-01-01 08:30:16 Warning " PSU2 PSU2_VOUT: Voltage sensor for PSU2, failure event
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
426
Viewing Faults and Logs
Clearing the System Event Log
was deasserted"
2001-01-01 08:30:16 Critical " PSU2 PSU2_VOUT: Voltage sensor for PSU2, non-recoverable
event was deasserted"
2001-01-01 08:30:15 Informational " LED_PSU_STATUS: Platform sensor, ON event was asserted"
2001-01-01 08:30:15 Informational " LED_HLTH_STATUS: Platform sensor, AMBER was asserted"
2001-01-01 08:30:15 Informational " LED_HLTH_STATUS: Platform sensor, FAST BLINK event was
asserted"
2001-01-01 08:30:14 Non-Recoverable " PSU2 PSU2_VOUT: Voltage sensor for PSU2, non-recoverable
event was asserted"
2001-01-01 08:30:14 Critical " PSU2 PSU2_VOUT: Voltage sensor for PSU2, failure event
was asserted"
--More--
Step 2 Server /sel # clear You are prompted to confirm the action. If you
enter y at the prompt, the system event log is
cleared.
Example
This example clears the system event log:
Server# scope sel
Server /sel # clear
This operation will clear the whole sel.
Continue?[y|N]y
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
427
Viewing Faults and Logs
Clearing the System Event Log
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
428
CHAPTER 16
Server Utilities
This chapter includes the following sections:
• Enabling Or Disabling Smart Access USB, on page 429
• Exporting Technical Support Data, on page 431
• Exporting Technical Support Data to Front Panel USB Device, on page 433
• Rebooting the Cisco IMC, on page 434
• Clearing the BIOS CMOS, on page 435
• Recovering from a Corrupted BIOS, on page 435
• Resetting the Cisco IMC to Factory Defaults, on page 436
• Resetting to Factory Defaults, on page 437
• Exporting and Importing the Cisco IMC Configuration, on page 439
• Exporting VIC Adapter Configuration, on page 444
• Importing VIC Adapter Configuration, on page 445
• Adding Cisco IMC Banner, on page 447
• Deleting Cisco IMC Banner, on page 447
• Enabling Secure Adapter Update, on page 448
• Downloading and Viewing Inventory Details, on page 448
• Updating and Activating the Device Connector Firmware, on page 450
• Recovering a PCIe Switch, on page 451
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
429
Server Utilities
Enabling Or Disabling Smart Access USB
• FAT 16
• DOS
Note Huge file support is not supported in BMC. For EXT 4 file system, huge file support has to be turned off.
Procedure
Step 2 Server /cimc # scope smart-access-usb Enters the smart access USB command mode.
Step 3 Server /cimc/smart-access-usb # set enabled { set enabled yes enables smart access USB. set
yes | no } enabled no disables the smart access USB.
When you enable the smart access usb feature,
the front panel USB device disconnects from
the host operating system. When you disable
the smart access usb feature, the front panel
USB device disconnects from CIMC.
Step 5 Server /cimc/smart-access-usb # show detail Displays the properties of the smart access USB.
Example
This example shows how to enable smart access USB:
Server# scope cimc
Server /cimc # scope smart-access-usb
Server /cimc/smart-access-usb # set enabled yes
Enabling smart-access-usb feature will
disconnect front panel USB devices from
host operating system.
Do you wish to continue? [y/N] y
Server /cimc/smart-access-usb *# commit
Server /cimc/smart-access-usb # show detail
Enabled: yes
Storage Device attached: no
Server /cimc/smart-access-usb #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
430
Server Utilities
Exporting Technical Support Data
Important If any firmware or BIOS updates are in progress, do not export the technical support data until those tasks are
complete.
Procedure
Step 2 Server /cimc # scope tech-support Enters the tech-support command mode.
Step 3 Server /cimc/tech-support # set remote-ip Specifies the IP address of the remote server
ip-address on which the technical support data file should
be stored.
Step 4 Server /cimc/tech-support # set remote-path Specifies the file name in which the support
path/filename data should be stored on the remote server.
When you enter this name, include the relative
path for the file from the top of the server tree
to the desired location.
Tip To have the system auto-generate
the file name, enter the file name
as default.tar.gz.
Step 5 Server /cimc/tech-support # set Specifies the protocol to connect to the remote
remote-protocol protocol server. It can be of the following types:
• TFTP
• FTP
• SFTP
• SCP
• HTTP
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
431
Server Utilities
Exporting Technical Support Data
Step 6 Server /cimc/tech-support # set Specifies the user name on the remote server
remote-username name on which the technical support data file should
be stored. This field does not apply if the
protocol is TFTP or HTTP.
Step 7 Server /cimc/tech-support # set Specifies the password on the remote server
remote-password password on which the technical support data file should
be stored. This field does not apply if the
protocol is TFTP or HTTP.
Step 9 Server /cimc/tech-support # start Begins the transfer of the data file to the
remote server.
Step 10 (Optional) Server /cimc/tech-support # show Displays the progress of the transfer of the data
detail file to the remote server.
Step 11 (Optional) Server /cimc/tech-support # cancel Cancels the transfer of the data file to the
remote server.
Example
This example creates a technical support data file and transfers the file to a TFTP server:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
432
Server Utilities
Exporting Technical Support Data to Front Panel USB Device
Tech Support:
Server Address: 192.0.20.41
Path: default.tar.gz
Protocol: tftp
Username:
Password: *******
Progress (%): 5
Status: Collecting
Server /cimc/tech-support #
What to do next
Provide the generated report file to Cisco TAC.
Important • Make sure that the Smart USB option has been enabled and that the USB device is connected to the front
panel.
• If any firmware or BIOS updates are in progress, do not export the technical support data until those
tasks are complete.
Procedure
Step 2 Server /cimc # scope tech-support Enters the tech-support command mode.
Step 4 Server /cimc/tech-support /fp-usb # start Creates a technical support data file and
filename transfers the file to a USB device. If you do not
specify the file name, it will take a default file
name.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
433
Server Utilities
Rebooting the Cisco IMC
Example
This example creates a technical support data file and transfers the file to a USB device connected
to the front panel:
Tech Support:
Path(on USB device): techsupportUSB.tar.gz
Progress(%): 6
Status: COLLECTING
Server /cimc/tech-support/fp-usb #
What to do next
Provide the generated report file to Cisco TAC.
Note If you reboot the Cisco IMC while the server is performing power-on self test (POST) or is operating in the
Extensible Firmware Interface (EFI) shell, the server will be powered down until the Cisco IMC reboot is
complete.
Procedure
Example
This example reboots the Cisco IMC:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
434
Server Utilities
Clearing the BIOS CMOS
Procedure
Step 2 Server /bios # clear-cmos After a prompt to confirm, clears the CMOS
memory.
Example
This example clears the BIOS CMOS memory:
Server# scope bios
Server /bios # clear-cmos
Server /bios #
In addition to this procedure, there are three other methods for recovering from a corrupted BIOS:
• Use the Cisco Host Upgrade Utility (HUU). This is the recommended method.
• Use the Cisco IMC GUI interface.
• If your server model supports it, use the BIOS recovery function of the hardware jumper on the server
motherboard. For instructions, see the Cisco UCS Server Installation and Service Guide for your server
model.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
435
Server Utilities
Resetting the Cisco IMC to Factory Defaults
• Have the BIOS recovery ISO image ready. You will find the BIOS recovery ISO image under the Recovery
folder of the firmware distribution package.
• Schedule some down time for the server because it will be power cycled at the end of the recovery
procedure.
Procedure
Example
This example shows how to recover from a corrupted BIOS:
Server# scope bios
Server /bios # recover
This operation will automatically power on the server to perform BIOS FW recovery.
Continue?[y|N]y
What to do next
Power cycle or reset the server.
Note If you reset Cisco IMC 1.5(x), 2.0, and 2.0(3) versions to factory defaults, Shared LOM mode is configured
by default. For C3160 servers, if you reset Cisco IMC to factory defaults, Dedicated mode is configured to
Full duplex with 100 Mbps speed by default.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
436
Server Utilities
Resetting to Factory Defaults
Procedure
Step 2 Server /cimc # factory-default After a prompt to confirm, the Cisco IMC resets
to factory defaults.
Example
This example resets the Cisco IMC to factory defaults:
Server# scope cimc
Server /cimc # factory-default
This operation will reset the CIMC configuration to factory default.
All your configuration will be lost.
Continue?[y|N]y
Server /cimc #
Important When you move VIC adapters from other generation C-Series servers (for example M4 servers) to the M5
generation C-Series servers or M5 servers to other generation servers, you must reset the adapters to factory
defaults.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
437
Server Utilities
Resetting to Factory Defaults
Procedure
Step 2 Server /chassis # factory-default {all | bmc | Depending on the component that you choose
storage | vic } to rest to factory default, the configuration
parameters of that component is restored to
factory defaults. You can choose one of the
following components:
• all—Resets the storage controllers, VIC,
and BMC settings to factory defaults.
• bmc —Resets the BMC settings to factory
defaults.
• storage —Resets the storage controller
settings to factory default.
• vic —Resets the VICs settings to factory
default.
Step 3 (Optional) Server /chassis # show Displays the factory defaults status.
factory-reset-status
Example
This example resets to factory defaults:
Server# scope chassis
Server /chassis # factory-default vic
his factory-default operation does the following on these components without any back-up:
VIC – all user configured data will deleted and controller properties reset to default
values
(Host power-cycle is required for it to be effective)
Storage – all user configured data (including OS VD/drive if any) will be deleted,
controller properties and zoning settings reset to default values (Host power-cycle is
required for it to be effective)
BMC – all Server BMC configuration reset to factory default values
CMC – all user configured data (including admin password) will be deleted and CMC settings
reset to default values
Continue?[y|N]y
factory-default for ' vic' started. Please check the status using "show factory-reset-status".
Server /chassis # show factory-reset-status
Storage VIC BMC
----------------------------------- ----------------------------------- ----------
NA Pending NA
C240-FCH1828V0PN /chassis #
Server /chassis #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
438
Server Utilities
Exporting and Importing the Cisco IMC Configuration
• Network settings
• Technical support
• Logging control for local and remote logs
• Power policies
• BIOS - BIOS Parameters
• Communication services
• Remote presence
• User management - LDAP
• Event management
• SNMP
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
439
Server Utilities
Exporting the Cisco IMC Configuration
Note • If any firmware or BIOS updates are in progress, do not export the Cisco IMC configuration until those
tasks are complete.
• If you are exporting Cisco IMC configuration to a front panel USB device, make sure that the Smart
Access USB option has been enabled.
• For security reasons, this operation does not export user accounts or the server certificate.
Procedure
Step 2 Server /cimc # scope import-export The configuration file is exported to the
specified path and file name on the front panel
USB device.
Step 3 Server /cimc/import-export # export-config The configuration file will be stored at the
protocol ip-address path-and-filename specified path and file name on a remote server
at the specified IPv4 or IPv6 address or a
hostname. The remote server could be one of
the following types:
• TFTP
• FTP
• SFTP
• SCP
• HTTP
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
440
Server Utilities
Exporting the Cisco IMC Configuration
Step 4 Server /cimc/import-export # export-config Exports the configuration data to the connected
usb path-and-filename USB.
Step 5 Enter the Username, Password and Pass Phrase. Sets the username, password and the pass phrase
for the file being exported. Starts the backup
operation.
To determine whether the export operation has completed successfully, use the show detail command. To
abort the operation, type CTRL+C.
Example
This example shows how to back up the Cisco IMC configuration:
Server# scope cimc
Server /cimc # scope import-export
Server /cimc/import-export # export-config tftp 192.0.2.34 /ucs/backups/cimc5.xml
Username:pynj
Password:****
Passphrase:***
Export config started. Please check the status using "show detail".
Server /cimc/import-export # show detail
Import Export:
Operation: EXPORT
Status: COMPLETED
Error Code: 100 (No Error)
Diagnostic Message: NONE
Server /cimc/import-export #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
441
Server Utilities
Importing a Cisco IMC Configuration
Important • If any firmware or BIOS updates are in progress, do not import the Cisco IMC configuration until those
tasks are complete.
• If you are importing Cisco IMC configuration through a front panel USB device, make sure that the
Smart Access USB option has been enabled.
Procedure
Step 2 Server /cimc # scope import-export Enters the import-export command mode.
Step 3 Server /cimc/import-export # import-config The configuration file at the specified path and
protocol ip-address path-and-filename file name on the remote server at the specified
IPv4 or IPv6 address or a hostname will be
imported. The remote server can be one of the
following:
• TFTP
• FTP
• SFTP
• SCP
• HTTP
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
442
Server Utilities
Importing a Cisco IMC Configuration
Step 5 Enter the Username, Password and Pass Phrase. Sets the username, password and the pass phrase
for the file being imported. Starts the import
operation.
To determine whether the import operation has completed successfully, use the show detail command. To
abort the operation, type CTRL+C.
Example
This example shows how to import a Cisco IMC configuration:
Server# scope cimc
Server /cimc # scope import-export
Server /cimc/import-export # import-config tftp 192.0.2.34 /ucs/backups/cimc5.xml
Username:pynj
Password:****
Passphrase:***
Import config started. Please check the status using "show detail".
Server /cimc/import-export # show detail
Import Export:
Operation: Import
Status: COMPLETED
Error Code: 100 (No Error)
Diagnostic Message: NONE
Server /cimc/import-export #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
443
Server Utilities
Exporting VIC Adapter Configuration
Important If any firmware or BIOS updates are in progress, do not export the VIC adapter configuration until those tasks
are complete.
Procedure
Step 2 Server /chassis # export-all-adapters protocol The configuration file at the specified path and
ip-address path-and-filename file name on the remote server at the specified
IPv4 or IPv6 address or a hostname will be
imported. The remote server can be one of the
following:
• TFTP
• FTP
• SFTP
• SCP
• HTTP
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
444
Server Utilities
Importing VIC Adapter Configuration
To determine whether the export operation has completed successfully, use the show detail command. To
abort the operation, type CTRL+C.
Example
This example shows how to export a VIC adapter configuration:
Server# scope chassis
Server /chassis # export-all-adapters tftp 10.10.10.10 /ucs/backups/cfdes.xml
Do you wish to continue? [y/N]y
Username: draf
Password:
Export config for all Adapters is triggered. Please check status using show adapter-ie-status
detail.
Server /chassis # show adapter-ie-status detail
All VIC Import Export:
Operation: ALL-VIC-EXPORT
Status: COMPLETED
Error Code: 100 (No Error)
Diagnostic Message: NONE
Server /chassis #
Important If any firmware or BIOS updates are in progress, do not import the VIC Adapter configuration until those
tasks are complete.
Procedure
Step 2 Server /chassis # import-all-adapters protocol The configuration file at the specified path and
ip-address path-and-filename file name on the remote server at the specified
IPv4 or IPv6 address or a hostname will be
imported. The remote server can be one of the
following:
• TFTP
• FTP
• SFTP
• SCP
• HTTP
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
445
Server Utilities
Importing VIC Adapter Configuration
Step 3 Enter the username, and password. Starts the import operation.
To determine whether the import operation has completed successfully, use the show detail command. To
abort the operation, type CTRL+C.
Example
This example shows how to import the VIC adapter configuration:
Server# scope chassis
Server /chassis # import-all-adapters tftp 10.10.10.10 /ucs/backups/cfdes.xml
Do you wish to continue? [y/N]y
Username: gdts
Password:
Import config for all Adapters is triggered. Please check status using show adapter-ie-status
detail.
Server /chassis # show adapter-ie-status detail
All VIC Import Export:
Operation: ALL-VIC-IMPORT
Status: COMPLETED
Error Code: 100 (No Error)
Diagnostic Message: NONE
Server /chassis #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
446
Server Utilities
Adding Cisco IMC Banner
Step 3 Enter the banner and press CTRL+D. At the prompt, enter y. This results in a loss of
the current session, when you log back on again,
the new banner appears.
Step 4 (Optional) Server /chassis # show-banner The banner that you have added displays.
Example
This example shows how to add the Cisco IMC banner:
Server # scope chassis
Server /chassis # upload-banner
Please paste your custom banner here, when finished, press enter and CTRL+D.
hello world
This will terminate all open SSH session to take an immediate action.
Do you wish to continue? [y/N] yy
Server /chassis # show-banner
hello world
Server /chassis #
Step 2 Server /chassis # delete-banner At the prompt, enter y. This results in a loss of
the current session, when you log back on again,
the banner is deleted.
Step 3 (Optional) Server /chassis # show-banner The banner that you have added displays.
Example
This example shows how to delete the Cisco IMC banner:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
447
Server Utilities
Enabling Secure Adapter Update
Server /chassis #
Procedure
Example
This example shows how to enable the secure adapter update:
Server# scope cimc
Server /cimc # scope adapter-secure-update
Server /cimc/adapter-secure-update # enable-security-version-check yes
Server /cimc/adapter-secure-update # enable-security-version-check status
enable-security-version-check: Enabled
Server /cimc/adapter-secure-update #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
448
Server Utilities
Downloading and Viewing Inventory Details
Procedure
Step 2 Server /chassis # inventory-refresh Initiates the data collection activity and saves
the data in a file.
Example
This example shows the inventory details and the status of inventory collection :
Server# scope chassis
Server /chassis #inventory-refresh
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
449
Server Utilities
Updating and Activating the Device Connector Firmware
Procedure
Step 2 Server /cimc # scope device-connector Enters the device connector command mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
450
Server Utilities
Recovering a PCIe Switch
Example
This example shows how to upgrade and activate the device connector firmware:
Server # scope cimc
Server /cimc # scope device-connector
Server /cimc/device-connector # update-and-activate tftp 10.10.10.10
c240-m5-cimc.4.0.1.227-cloud-connector.bin
Device connector firmware update initialized.
Please check the status using "show detail".
Server /cimc/device-connector # show detail
Device Connector Information:
Update Stage: DOWNLOAD
Update Progress: 5
DC FW Version: 1.0.9-343
Server /cimc/device-connector # show detail
Device Connector Information:
Update Stage: INSTALL
Update Progress: 90
DC FW Version:
Server /cimc/device-connector # show detail
Device Connector Information:
Update Stage: NONE
Update Progress: 100
Server /cimc/device-connector #
Procedure
Step 2 Server /chassis # show nvmeadapter Displays the NVMe adapters and the name of
the PCIe switch.
Step 3 Server /chassis # recover-pcie-switch PCIe Enter y at the host reboot prompt. Recovers the
Switch Name selected PCIe Switch.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
451
Server Utilities
Recovering a PCIe Switch
Example
This example shows how to recover a PCIe switch:
Server # scope chassis
Server /chassis # show nvmeadapter
PCI Slot
----------------------------
PCIe-Switch
Server /chassis/persistent-memory # recover-pcie-switch PCIe-Switch
Host will be powered on for this operation.
Continue?[y|N]y
Server /chassis #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
452
APPENDIX A
BIOS Parameters by Server Model
• C220 M7 and C240 M7 Servers, on page 453
• C220 M6 and C240 M6 Servers, on page 488
• C225 M6 and C245 M6 Servers, on page 523
• For C125 Servers, on page 544
• C220 M5, C240 M5, C240 SD M5, and C480 M5 Servers, on page 559
• C460 M4 Servers, on page 590
• C220 M4 and C240 M4 Servers, on page 613
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
MLOM OptionROM drop-down list This options allows you to control the Option ROM
execution of the PCIe adapter connected to the MLOM
set PcieSlotMLOMOptionROM
slot. This can be one of the following:
• Disabled—Does not execute Option ROM of
the PCIe adapter connected to the MLOM slot.
• Enabled—Executes Option ROM of the PCIe
adapter connected to the MLOM slot.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
453
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
MLOM Link Speed drop-down list This option allows you to restrict the maximum speed
of an adapter card installed in PCIe MLOM slot. This
set PcieSlotMLOMLinkSpeed
can be one of the following:
• Disabled—The maximum speed is not restricted.
• Auto—System selects the maximum speed
allowed.
• GEN1—2.5GT/s (gigatransfers per second) is
the maximum speed allowed.
• GEN2—5GT/s is the maximum speed allowed.
• GEN3—8GT/s is the maximum speed allowed.
• GEN4—16GT/s is the maximum speed allowed.
PCIe Slotn OptionROM drop-down list Whether the server can use the Option ROMs present
in the PCIe card slot designated by n. This can be one
set PcieSlotnOptionROM
of the following:
• Disabled—Option ROM for slot n is not
available.
• Enabled—Option ROM for slot n is available.
PCIe Slotn Link Speed drop-down list System IO Controller n (SIOCn) add-on slot
(designated by n) link speed. This can be one of the
set PcieSlotnLinkSpeed
following:
• Disabled—Slot is disabled, and the card is not
enumerated.
• Auto— The default link speed. Link speed is
automatically assigned.
• GEN1—Link speed can reach up to first
generation.
• GEN2—Link speed can reach up to second
generation.
• GEN3—Link speed can reach up to third
generation.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
454
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
MRAID OptionROM drop-down list This options allows you to control the Option ROM
execution of the MRAID PCIe adapter connected.
set PcieSlotMRAIDOptionROM
This can be one of the following:
• Disabled—Does not execute Option ROM of
the MRAID PCIe adapter.
• Enabled—Executes Option ROM of the MRAID
PCIe adapter.
MRAID Link Speed drop-down list This option allows you to restrict the maximum speed
of an MRAID adapter card installed. This can be one
set PcieSlotMRAIDLinkSpeed
of the following:
• Disabled—The maximum speed is not restricted.
• Auto—System selects the maximum speed
allowed.
• GEN1—2.5GT/s (gigatransfers per second) is
the maximum speed allowed.
• GEN2—5GT/s is the maximum speed allowed.
• GEN3—8GT/s is the maximum speed allowed.
• GEN4—16GT/s is the maximum speed allowed.
Front NVME-n OptionROM drop-down list This options allows you to control the Option ROM
execution of the PCIe adapter connected to the
set PcieSlotFrontNvmenOptionROM
SSD:NVMe slot n. This can be one of the following:
• Disabled—Does not execute Option ROM of
the PCIe adapter connected to the SSD:NVMe1
slot.
• Enabled—Executes Option ROM of the PCIe
adapter connected to the SSD:NVMe1 slot
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
455
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Front NVME-n Link Speed drop-down list Link speed for NVMe front slot designated by slot n.
This can be one of the following:
set PcieSlotFrontNvmenLinkSpeed
• Disabled—Slot is disabled, and the card is not
enumerated.
• Auto—The default link speed. Link speed is
automatically assigned.
• GEN1—Link speed can reach up to first
generation.
• GEN2—Link speed can reach up to second
generation.
• GEN3—Link speed can reach up to third
generation.
• GEN4—Link speed can reach up to fourth
generation.
PCIe Slot MSTOR RAID OptionROM drop-down Whether the server can use the Option ROMs present
list in the PCIe MSTOR RAID. This can be one of the
following:
set PcieSlotMSTORRAIDOptionROM
• Disabled—Option ROM is not available.
• Enabled—Option ROM is available.
Intel VTD Coherency Support drop-down list Whether the processor supports Intel VT-d Coherency.
This can be one of the following:
set CoherencySupport
• Disabled—The processor does not support
coherency.
• Enabled—The processor uses VT-d Coherency
as required.
Intel VT for Directed IO drop-down list Whether the processor uses Intel Virtualization
Technology (VT), which allows a platform to run
set IntelVTD
multiple operating systems and applications in
independent partitions. This can be one of the
following:
• Disabled—The processor does not permit
virtualization.
• Enabled—The processor allows multiple
operating systems in independent partitions.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
456
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
VMD Enable drop-down list Intel Volume Management Device (VMD) is for PCIe
NVMe SSDs that provides hardware logic to manage
set VMDenable
and aggregate NVMe SSDs.
This can be one the following:
• Enabled— Enables benefits like robust surprise
hot-plug, status LED management.
• Disabled— Disables the feature.
PCIe RAS Support drop-down list Whether PCIe RAS Support is available on the PCIe
slot. This can be one of the following:
set PCIeRASSupport
• Disabled—PCIe RAS is not available on the
slot.
• Enabled—PCIe RAS is available on port.
USB Port Rear drop-down list Whether the rear panel USB devices are enabled or
disabled. This can be one of the following
set UsbPortRear
• Disabled— Disables the rear panel USB ports.
Devices connected to these ports are not detected
by the BIOS and operating system.
• Enabled— Enables the rear panel USB ports.
Devices connected to these ports are detected by
the BIOS and operating system.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
457
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
VGA Priority drop-down list Allows you to set the priority for VGA graphics
devices if multiple VGA devices are found in the
set VgaPriority
system. This can be one of the following:
• OnBoard—Priority is given to the onboard VGA
device. BIOS post screen and OS boot are driven
through the onboard VGA port.
• OffBoard—Priority is given to the PCIE
Graphics adapter. BIOS post screen and OS boot
are driven through the external graphics adapter
port.
• OnBoardDisabled—Priority is given to the PCIe
Graphics adapter, and the onboard VGA device
is disabled. The vKVM does not function when
the onboard VGA is disabled.
IPV6 PXE Support drop-down list Enables or disables IPv6 support for PXE. This can
be one of the following
set IPV6PXE
• disabled—IPv6 PXE support is not available.
• enabled—IPv6 PXE support is always available.
PCIe PLL SSC drop-down list Enable this feature to reduce EMI interference by
down spreading clock 0.5%. Disable this feature to
set PciePllSsc
centralize the clock without spreading.
This can be one of the following:
• auto—EMI interference is auto adjusted.
Disabled—EMI interference is auto adjusted.
• ZeroPointFive—EMI interference is reduced
by down spreading the clock 0.5%.
Network Stack drop-down list This option allows you to monitor IPv6 and IPv4. This
can be one of the following
set NetworkStack
• disabled—Network Stack support is not
available.
Note When disabled, the value set for
IPV4 PXE Support does not
impact the system.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
458
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
IPV4 PXE Support drop-down list Enables or disables IPv4 support for PXE. This can
be one of the following
set IPV4PXE
• disabled—IPv4 PXE support is not available.
• enabled—IPv4 PXE support is always available.
External SSC enable drop-down list This option allows you to reduce the EMI of your
motherboard by modulating the signals it generates
set EnableClockSpreadSpec
so that the spikes are reduced to flatter curves.
This can be one of the following:
• Disabled—Clock Spread Spectrum support is
not available.
• Enabled—Clock Spread Spectrum support is
always available.
IPV4 HTTP Support drop-down list Enables or disables IPv4 support for HTTP. This can
be one of the following:
set IPV4HTTP
• disabled—IPv4 HTTP support is not available.
• enabled—IPv4 HTTP support is always
available.
IIO eDPC Support drop-down list eDPC allows a downstream link to be disabled after
an uncorrectable error, making recovery possible in
set EdpEn
a controlled and robust manner.
This can be one of the following:
• Disabled—eDPC support is disabled.
• On Fatal Error—eDPC is enabled only for fatal
errors.
• On Fatal and Non-Fatal Errors—eDPC is enabled
for both fatal and non-fatal errors.
IPV6 HTTP Support drop-down list Enables or disables IPv6 support for HTTP. This can
be one of the following:
set IPV6HTTP
• disabled—IPv6 HTTP support is not available.
• enabled—IPv6 HTTP support is always
available.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
459
BIOS Parameters by Server Model
Server Management Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
OS Boot Watchdog Timer Policy drop-down list What action the system takes if the watchdog timer
expires. This can be one of the following:
set OSBootWatchdogTimerPolicy
• Power Off—The server is powered off if the
watchdog timer expires during OS boot.
• Reset—The server is reset if the watchdog timer
expires during OS boot.
FRB 2 Timer drop-down list Whether the FRB2 timer is used by Cisco IMC to
recover the system if it hangs during POST. This can
set FRB-2
be one of the following:
• Disabled—The FRB2 timer is not used.
• Enabled—The FRB2 timer is started during
POST and used to recover the system if
necessary.
OS Watchdog Timer drop-down list Whether the BIOS programs the watchdog timer with
a specified timeout value. This can be one of the
set OSBootWatchdogTimer
following:
• Disabled—The watchdog timer is not used to
track how long the server takes to boot.
• Enabled—The watchdog timer tracks how long
the server takes to boot. If the server does not
boot within the length of time specified in the
OS Boot Watchdog Timer Timeout field, the
Cisco IMC logs an error and takes the action
specified in the OS Boot Watchdog Policy field.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
460
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
OS Watchdog Timer Timeout drop-down list If OS does not boot within the specified time, OS
watchdog timer expires and system takes action
set OSBootWatchdogTimerTimeOut
according to timer policy. This can be one of the
following:
• 5 Minutes—The OS watchdog timer expires 5
minutes after it begins to boot.
• 10 Minutes—The OS watchdog timer expires
10 minutes after it begins to boot.
• 15 Minutes—The OS watchdog timer expires
15 minutes after it begins to boot.
• 20 Minutes—The OS watchdog timer expires
20 minutes after it begins to boot.
Baud Rate drop-down list What Baud rate is used for the serial port transmission
speed. If you disable Console Redirection, this option
set BaudRate
is not available. This can be one of the following:
• 9.6k—A 9,600 Baud rate is used.
• 19.2k—A 19,200 Baud rate is used.
• 38.4k—A 38,400 Baud rate is used.
• 57.6k—A 57,600 Baud rate is used.
• 115.2k—A 115,200 Baud rate is used.
Flow Control drop-down list Whether a handshake protocol is used for flow control.
Request to Send / Clear to Send (RTS/CTS) helps to
set FlowCtrl
reduce frame collisions that can be introduced by a
hidden terminal problem. This can be one of the
following:
• None—No flow control is used.
• RTS/CTS—RTS/CTS is used for flow control.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
461
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Console Redirection drop-down list Allows a serial port to be used for console redirection
during POST and BIOS booting. After the OS has
set ConsoleRedir
booted, console redirection is irrelevant. This can be
one of the following:
• COM 0—Enables console redirection on serial
port A during POST.
• COM 1—Enables console redirection on serial
port B during POST.
• Disabled—No console redirection occurs during
POST.
Terminal type drop-down list What type of character formatting is used for console
redirection. This can be one of the following:
set TerminalType
• PC-ANSI—The PC-ANSI terminal font is used.
• VT100—A supported VT100 video terminal and
its character set are used.
• VT100-PLUS—A supported VT100-plus video
terminal and its character set are used.
• VT-UTF8—A video terminal with the UTF-8
character set is used.
PCIe Slots CDN Control drop-down list Whether the Ethernet Network naming convention is
according to Consistent Device Naming (CDN) or the
set PcieSlotsCdnEnable
traditional way of naming conventions. This can be
one of the following:
• Disabled— CDN support for VIC cards is
disabled
• Enabled— CDN support is enabled for VIC
cards.
CDN Control drop-down list Whether the Ethernet Network naming convention is
according to Consistent Device Naming (CDN) or the
set cdnEnable
traditional way of naming conventions. This can be
one of the following:
• Disabled— CDN support for VIC cards is
disabled
• Enabled— CDN support is enabled for VIC
cards.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
462
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
OptionROM Launch Optimization When this option is Enabled, the OptionROMs only
for the controllers present in the boot order policy will
be launched.
Note Some controllers such as Onboard
storage controllers, Emulex FC adapters,
and GPU controllers though not listed
in the boot order policy will have the
OptionROM launched.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
463
BIOS Parameters by Server Model
Security Tab
Name Description
BIOS Techlog Level This option denotes the type of messages in BIOS
tech log file.
The log file can be one of the following types:
• Minimum - Critical messages will be displayed
in the log file.
• Normal - Warning and loading messages will
be displayed in the log file.
• Maximum - Normal and information related
messages will be displayed in the log file.
Security Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Trusted Platform Module State drop-down list Trusted Platform Module (TPM) is a microchip
designed to provide basic security-related functions
set TPMControl
primarily involving encryption keys. This option
allows you to control the TPM Security Device
support for the system. This can be one of the
following:
• Disabled—The server does not use the TPM.
• Enabled—The server uses the TPM.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
464
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Security Device Support drop-down list You should enable TPM support to enable security
device support. This can be one of the following:
set TpmSupport
• Disabled—Feature is disabled.
• Enabled—Feature is enabled if TPM is enabled.
SHA256 PCR Bank drop-down list PCR bank available for OS when BIOS is performing
measurements.
set SHA256PCRBank
• Disabled—SHA256 PCR Bank is not available
for BIOS.
• Enabled—SHA256 PCR Bank is available for
BIOS.
SHA-1 PCR Bank drop-down list PCR bank available for OS when BIOS is performing
measurements.
set SHA1PCRBank
• Disabled—SHA-1 PCR Bank is not available
for BIOS.
• Enabled—SHA-1 PCR Bank is available for
BIOS.
TPM Minimal Physical Presence drop-down list This token allows you to apply recommended
Microsoft default settings for TPM.
• Disabled—Support is disabled.
• Enabled—Support is enabled.
TPM Pending Operation drop-down list Trusted Platform Module (TPM) Pending Operation
option allows you to control the status of the pending
set TPMPendingOperation
operation. This can be one of the following:
• None—No action.
• TpmClear—Clears the pending operations.
Power on Password drop-down list This token requires that you set a BIOS password
before using the F2 BIOS configuration. If enabled,
set PowerOnPassword
password needs to be validated before you access
BIOS functions such as IO configuration, BIOS set
up, and booting to an operating system using BIOS.
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
465
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Intel Trusted Execution Technology Support Can be Enabled only when Trusted Platform Module
drop-down list (TPM) is Enabled. This can be one of the following:
set TXTSupport • Disabled—Support is disabled.
• Enabled—Support is enabled.
Multikey Total Memory Encryption (MK-TME) MK-TME allows you to have multiple encryption
drop-down list domains with one with own key. Different memory
pages can be encrypted with different keys. This can
set EnableMktme
be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Total Memory Encryption (TME) drop-down list Allows you to provide the capability to encrypt the
entirety of the physical memory of a system. This can
set EnableTme
be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
SGX Factory Reset drop-down list Allows the system to perform SGX factory reset on
subsequent boot. This deletes all registration data.
set SgxFactoryReset
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
SW Guard Extensions (SGX) drop-down list Allows you to enable Software Guard Extensions
(SGX) feature. This can be one of the following:
set EnableSgx
• Disabled—Support is disabled.
• Enabled—Support is enabled.
SGX QoS drop-down list Allows you to enable SGX QoS. This can be one of
the following:
set SgxQoS
• Disabled—Support is disabled.
• Enabled—Support is enabled.
SGX Pkg info In-Band Access drop-down list Allows you to enable SGX Package Info In-Band
Access. This can be one of the following:
set SgxPackageInfoInBandAccess
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
466
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
SGX Write Enable drop-down list Allows you to enable SGX Write feature. This can be
one of the following:
set SgxLeWr
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Select Owner EPOCH input type drop-down list Allows you to change the seed for the security key
used for the locked memory region that is created.
set EpochUpdate
This can be one of the following:
• SGX Owner EPOCH activated—Does not
change the current input type.
• Change to New Random Owner
EPOCHs—Changes EPOCH to a system
generated random number.
• Manual User Defined Owner
EPOCHs—Changes the EPOCH seed to a
hexadecimal value that you enter.
SProcessor Epoch n field Allows you to define the SGX EPOCH owner value
for the EPOCH number designated by n.
set SgxEpoch0
SGX Auto MP Registration Agent drop-down list Allows you to enable the registration authority service
to store the platform keys. This can be one of the
set SgxAutoRegistrationAgent
following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
SGX PUBKEY HASHn field Allows you to set the Software Guard Extensions
(SGX) value. This value can be set between:
set SgxLePubKeyHashn
• SGX PUBKEY HASH0—Between 7-0
• SGX PUBKEY HASH1—Between 15-8
• SGX PUBKEY HASH2—Between 23-16
• SGX PUBKEY HASH3—Between 31-24
®
LIMIT CPU PA to 46 Bits drop-down list Enable this option for Intel VT-d enabling boot to
boot with 2019 OS.
set CpuPaLimit
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
467
BIOS Parameters by Server Model
Memory Tab
Name Description
DMA Control Opt-In Flag drop-down list DMA Control Opt-In Flag - Enabling this token allows
the operating system to enable Input Output Memory
Management Unit (IOMMU) to prevent the DMA
attacks from possible malicious devices.
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Memory Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
468
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Select Memory RAS configuration drop-down list Determines how the memory reliability, availability,
and serviceability (RAS) is configured for the server.
set SelectMemoryRAS
This can be one of the following:
• Maximum Performance—System performance
is optimized.
• ADDDC Sparing—Adaptive virtual lockstep is
an algorithm implemented in the hardware and
firmware to support the ADDDC mode. When
selected, the system performance is optimized
till the algorithm is activated. The algorithm is
activated in case of DRAM device failure. Once
the algorithm is activated, the virtual lockstep
regions are activated to map out the failed region
during run-time dynamically, and the
performance impact is restricted at a region level.
• Mirror Mode 1LM—System reliability is
optimized by using half the system memory as
backup.
• Partial Mirror Mode 1LM—Partial DIMM
Mirroring creates a mirrored copy of a specific
region of memory cells, rather than keeping the
complete mirror copy. Partial Mirroring creates
a mirrored region in memory map with the
attributes of a partial mirror copy. Up to 50% of
the total memory capacity can be mirrored, using
up to 4 partial mirrors.
Partial Cache Line Sparing drop-down list Partial cache line sparing (PCLS) is an
error-prevention mechanism in memory controllers.
set PartialCacheLineSparing
PCLS statically encodes the locations of the faulty
nibbles of bits into a sparing directory along with the
corresponding data content for replacement during
memory accesses. This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
469
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Select PPR Type drop-down list Cisco IMC supports Hard-PPR, which permanently
remaps accesses from a designated faulty row to a
set SelectPprType
designated spare row.
This can be one of the following:
• Hard PPR—Support is enabled.
Note Hard PPR can be used only when
Memory RAS Configuration is
set to ADDDC Sparing. For other
RAS selections, this setting should
be set to Disabled.
• Disabled—Support is disabled.
BME DMA Mitigation drop-down list Allows you to disable the PCI BME bit to mitigate
the threat from an unauthorized external DMA. This
set BmeDmaMitigation
can be one of the following:
• Disabled—PCI BME bit is disabled in the BIOS.
• Enabled—PCI BME bit is enabled in the BIOS.
Above 4G Decoding drop-down list Enables or disables MMIO above 4GB or not. This
can be one of the following:
set MemoryMappedIOAbove4GB
• Disabled—The server does not map I/O of 64-bit
PCI devices to 4GB or greater address space.
• Enabled—The server maps I/O of 64-bit PCI
devices to 4GB or greater address space.
Partial Memory Mirror Mode drop-down list The partial memory size is either in percentage or in
GB. This can be one of the following:
set PartialMirrorModeConfig
• Percentage—The partial memory mirror is
defined in percentage.
• Value in GB—The partial memory mirror is
defined in GB.
• Disabled—Partial memory mirror is disabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
470
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
DCPMM Firmware Downgrade drop-down list Whether the BIOS supports downgrading the DCPMM
firmware. This can be one of the following:
set DCPMMFirmwareDowngrade
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Partial Mirrorn Size in GB field Size of the first partial nth memory mirror in GB.
set PartialMirrorValue1 n = 1, 2, or 3
Enter an integer between 0 and 65535.
Note The combined memory size of all the
partial mirror should not exceed 50% of
the physical memory size.
Memory Size Limit in GB field Use this option to reduce the size of the physical
memory limit in GB.
set MemorySizeLimit
Enter an integer between 0 and 65535.
NVM Performance Setting drop-down list Enables you to configure NVM baseline performance
settings depending on the workload behavior.
set NvmdimmPerformConfig
• BW Optimized
• Latency Optimized
• Balanced Profile
Snoopy mode for AD drop-down list Enables new AD specific feature to avoid directory
updates to DDRT memory from non-NUMA
set SnoopyModeForAD
optimized workloads.
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
471
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
CR FastGo Config drop-down list Enables you to select CR QoS configuration profiles.
set CrfastgoConfig This can be one of the following:
• Enable Optimization
• Disable Optimization
• Auto
Memory Refresh Rate drop-down list Enables you to increase or decrease memory refresh
rate. Increasing the DRAM refresh rate reduces the
set MemoryRefreshRate
maximum number of activates (hammers) that can
occur before the next refresh.
This can be one of the following:
• 1X Refresh—Refresh rate is at minimum.
• 2X Refresh —Refresh is 2X faster.
Snoopy mode for 2LM drop-down list Enables you to avoid directory updates to far-memory
from non-NUMA optimized workloads.
set SnoopyModeFor2LM
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Memory Thermal Throttling Mode drop-down list This function is used for adjusting memory
temperature. If memory temperature is excessively
set MemoryThermalThrottling
high after the function is enabled, the memory access
rate is reduced and Baseboard Management Controller
(BMC) adjusts the fan to cool down the memory to
avoid any DIMM damage.
This can be one of the following:
• Disabled—Support is disabled.
• CLTT with PECI—Enables Closed Loop
Thermal Throttling with Platform Environment
Control Interface.
Panic and High Watermark drop-down list When set to low, the memory controller does not
postpone refreshes while Memory Refresh Rate is
set PanicHighWatermark
set to 1X Refresh.
This can be one of the following:
• Low—Refresh rate is set to low.
• High —Refresh rate is set to high.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
472
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
UMA drop-down list Allows you to set UMA settings. This can be one of
the following:
set UmaBasedClustering
• Disable(All2All)
• Hemisphere(2-clusters)
Enhanced Memory Test drop-down list Note This feature is applicable only to
Samsung, Hynix and Micron DIMMs.
set AdvancedMemTest
You can enable advance DIMM testing during BIOS
POST using this feature. This can be one of the
following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Volatile Memory Mode drop-down list Volatile Memory Mode setting is displayed when the
® ™
BIOS supports Intel Optane PMem. This can be
set VolMemoryMode
one of the following:
®
• 1LM—This option can be used to set Intel
™
Optane PMem in App-Direct Mode.
• 2LM—This options allows 2LM to facilitate the
DDR4 memory operating as cache.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
473
BIOS Parameters by Server Model
Power/Performance Tab
Name Description
Adaptive Refresh Management Level drop-down Refresh management settings are read-only. Adaptive
list RFM allows the controller flexibility to choose
additional RFM threshold settings called RFM levels.
set AdaptiveRefreshMgmtLevel
The RFM levels permit alignment of the
controller-issued RFM commands with the in-DRAM
management of these commands.
This can be one of the following:
• Default
• Level A
• Level B
• Level C
Memory Bandwidth Boost drop-down list Intel® Memory Bandwidth Boost is a feature of the
Intel® Optane™ persistent memory that provides a
set MemoryBandwidthBoost
dynamic range of power and bandwidth when thermal
headroom is available. This can be one of the
following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Error Check Scrub drop-down list You can enable memory check with or without result
collection. This can be one of the following:
set ErrorCheckScrub
• Disabled
• Enabled without Result Collection
• Enabled with Result Collection
Rank Margin Tool drop-down list Indicates whether the rank margin tool is used and
whether a margin test (which tests the memory
set EnableRMT
sequence and voltage signals) is performed. This can
be one of the following:
• Disabled
• Enabled
Power/Performance Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
474
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Adjacent Cache Line Prefetcher drop-down list Whether the processor fetches cache lines in even or
odd pairs instead of fetching just the required line.
set AdjacentCacheLinePrefetch
This can be one of the following:
• Disabled—The processor only fetches the
required line.
• Enabled—The processor fetches both the
required line and its paired line.
Hardware Prefetcher drop-down list Whether the processor allows the Intel hardware
prefetcher to fetch streams of data and instruction
set HardwarePrefetch
from memory into the unified second-level cache
when necessary. This can be one of the following:
• Disabled—The hardware prefetcher is not used.
• Enabled—The processor uses the hardware
prefetcher when cache issues are detected.
DCU IP Prefetcher drop-down list Whether the processor uses the DCU IP Prefetch
mechanism to analyze historical cache access patterns
set DcuIpPrefetch
and preload the most relevant lines in the L1 cache.
This can be one of the following:
• Disabled—The processor does not preload any
cache data.
• Enabled—The DCU IP prefetcher preloads the
L1 cache with the data it determines to be the
most relevant.
DCU Streamer Prefetch drop-down list Whether the processor uses the DCU IP Prefetch
mechanism to analyze historical cache access patterns
set DcuStreamerPrefetch
and preload the most relevant lines in the L1 cache.
This can be one of the following:
• Disabled—The processor does not try to
anticipate cache read requirements and only
fetches explicitly requested lines.
• Enabled—The DCU prefetcher analyzes the
cache read pattern and prefetches the next line
in the cache if it determines that it may be
needed.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
475
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Virtual Numa drop-down list Virtual NUMA (virtual non-uniform memory access)
is a memory-access optimization method for VMware
set VirtualNuma
virtual machines (VMs), which helps prevent
memory-bandwidth bottlenecks.
This can be one of the following:
• Disabled—Functionality is disabled.
• Enabled—Functionality is enabled.
CPU Performance drop-down list Sets the CPU performance profile for the options listed
above. This can be one of the following:
set CPUPerformance
• Enterprise—All options are enabled.
• HPC—All options are enabled. This setting is
also known as high performance computing.
• Hight Throughput—Only the DCU IP
Prefetcher is enabled. The rest of the options are
disabled.
• Custom—All performance profile options can
be configured from the BIOS setup on the server.
In addition, the Hardware Prefetcher and
Adjacent Cache-Line Prefetch options can be
configured as well.
LLC Dead Line drop-down list In CPU non-inclusive cache scheme, MLC evictions
are filled into the LLC. When lines are evicted from
set LLCALLoc
the MLC, the core can flag them as dead (not likely
to be read again). The LLC has the option to drop
dead lines and not fill them in the LLC.
If this feature is disabled, dead lines are always
dropped and are never filled into the LLC.
If this feature is enabled, the LLC can fill dead lines
into the LLC if there is free space available.
This can be one of the following:
• Disabled—Feature is disabled.
• Enabled—Feature is enabled.
• Auto—CPU determines the LLC dead line
allocation.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
476
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
XPT Remote Prefetch drop-down list This feature allows an LLC request to be duplicated
and sent to an appropriate memory controller in a
set XPTRemotePrefetch
remote machine based on the recent LLC history to
reduce latency.
This can be one of the following:
• Disabled—Feature is disabled.
• Enabled—Feature is enabled.
• Auto—CPU determines the functionality.
UPI Link Enablement drop-down list Enables the minimum number of UPI links required
by the processor.
set UPILinkEnablement
This can be one of the following:
•1
•2
• Auto
Enhanced CPU Performance drop-down list Note Once you enable this functionality, you
cannot enable Enable Power
set EnhancedCPUPerformance
Characterization and Power Capping.
Enhances CPU performance by adjusting server
settings automatically.
Note Enabling this functionality may increase
power consumption.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
477
BIOS Parameters by Server Model
Processor Tab
Name Description
UPI Power Management drop-down list UPI power management is used to conserve power
on the server.
set UPIPowerManagement
This can be one of the following:
• Disabled—The processor does not run with this
functionality.
• Auto—Functionality is enabled.
Optimized Power Mode drop-down list Optimized Power Mode is used to save power while
having minimal impact on performance for certain
set OptimizedPowerMode
workloads that run at 30-40% CPU utilization.
This can be one of the following:
• Disabled—The processor does not run with this
functionality.
• Auto—Functionality is enabled.
Processor Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
478
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Extended APIC drop-down list Allows you to enable or disable extended APIC
support. This can be one of the following:
set LocalX2Apic
• Enabled—Enables APIC support.
• Disabled—Disables APIC support.
Intel Virtualization Technology drop-down list Whether the processor uses Intel Virtualization
Technology (VT), which allows a platform to run
set IntelVT
multiple operating systems and applications in
independent partitions. This can be one of the
following:
• Disabled—The processor does not permit
virtualization.
• Enabled—The processor allows multiple
operating systems in independent partitions.
Processor C6 Report drop-down list Whether the BIOS sends the C6 report to the operating
system. When the OS receives the report, it can
set ProcessorC6Report
transition the processor into the lower C6 power state
to decrease energy usage while maintaining optimal
processor performance. This can be one of the
following:
• Disabled—The BIOS does not send the C6
report.
• Enabled—The BIOS sends the C6 report,
allowing the OS to transition the processor to the
C6 low power state.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
479
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Processor C1E drop-down list Whether the CPU transitions to its minimum
frequency when entering the C1 state. This can be one
set ProcessorC1E
of the following:
• Disabled—The CPU continues to run at its
maximum frequency in C1 state.
• Enabled—The CPU transitions to its minimum
frequency. This option saves the maximum
amount of power in C1 state.
EIST PSD Function drop-down list EIST reduces the latency inherent with changing the
voltage-frequency pair (P-state), thus allowing those
set ExecuteDisable
transitions to occur more frequently. This allows for
more granular, demand-based switching and can
optimize the power-to-performance balance, based
on the demands of the applications. This can be one
of the following:
• HW ALL— The processor is coordinates the
P-state among logical processors dependencies.
The OS keeps the P-state request up to date on
all logical processors.
• SW ALL—The OS Power Manager coordinates
the P-state among logical processors with
dependencies and initiates the transition on all
of those Logical Processors.
Turbo Mode drop-down list Whether the processor uses Intel Turbo Boost
Technology, which allows the processor to
set IntelTurboBoostTech
automatically increase its frequency if it is running
below power, temperature, or voltage specifications.
This can be one of the following:
• Disabled—The processor does not increase its
frequency automatically.
• Enabled—The processor utilizes Turbo Boost
Technology if required.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
480
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Uncore Frequency Scaling drop-down list This feature allows you configure the scaling of
uncore frequency of the processor. This can be one
set UFSDisable
of the following:
• enabled—Uncore frequency of the processor
scales up or down based on the load.
• disabled—Uncore frequency of the processor
remains fixed.
®
Refer Intel Dear Customer Letter (DCL) to know
the fixed higher and lower values for Uncore
Frequency Scaling.
Boot Performance Mode drop-down list Allows you to select the BIOS performance state that
is set before the operating system handoff. This can
set BootPerformanceMode
be one of the following:
• Max Performance—Processor P-state ratio is
maximum
• Max Efficient—Processor P-state ratio is
minimum
• Set by Intel NM—Value is set automatically.
Configurable TDP Level drop-down list Configurable TDP Level feature allows adjustments
in processor thermal design power values. By
set ConfigTDPLevel
modifying the processor behavior and the performance
levels, power consumption of a processor can be
configured and TDP can be adjusted as the same time.
Hence, a processor operates at higher or lower
performance levels, depending on the available
cooling capacities and desired power consumption.
This can be one of the following:
• Normal
• Level 1
• Level 2
®
Refer Intel Dear Customer Letter (DCL) to know
the values for TDP level.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
481
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
SpeedStep (Pstates) drop-down list Whether the processor uses Enhanced Intel SpeedStep
Technology, which allows the system to dynamically
set EnhancedIntelSpeedStep
adjust processor voltage and core frequency. This
technology can result in decreased average power
consumption and decreased average heat production.
This can be one of the following:
• Disabled—The processor never dynamically
adjusts its voltage or frequency.
• Enabled—The processor utilizes Enhanced Intel
SpeedStep Technology and enables all supported
processor sleep states to further conserve power.
Processor CMCI drop-down list Allows the CPU to trigger interrupts on corrected
machine check events. The corrected machine check
set ProcessorCMCI
interrupt (CMCI) allows faster reaction than the
traditional polling timer. This can be one of the
following:
• Disabled—Disables CMCI.
• Enabled—Enables CMCI. This is the default
value.
HyperThreading [ALL] drop-down list Whether the processor uses Intel Hyper-Threading
Technology, which allows multithreaded software
set IntelHyperThread
applications to execute threads in parallel within each
processor. This can be one of the following:
• Disabled—The processor does not permit
hyperthreading.
• Enabled—The processor allows for the parallel
execution of multiple threads.
Workload Configuration drop-down list This feature allows for workload optimization. The
options are Balanced and I/O Sensitive:
set WorkLdConfig
• Balanced
• IO Sensitive
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
482
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Cores Enabled drop-down list Allows you to disable one or more of the physical
cores on the server. This can be one of the following:
set CoreMultiProcessing
• All—Enables all physical cores. This also
enables Hyper Threading on the associated
logical processor cores.
• 1 through 48—Specifies the number of physical
processor cores that can run on the server. Each
physical core has an associated logical core.
UPI Link Frequency Select drop-down list Note UPI Link Frequency Select token is
not applicable for single socket
set QpiLinkSpeed
configuration.
UPI Prefetch drop-down list UPI prefetch is a mechanism to get the memory read
started early on a DDR bus. This can be one of the
set KTIPrefetch
following:
• disabled—The processor does not preload any
cache data.
• enabled—The UPI prefetcher preloads the L1
cache with the data it determines to be the most
relevant.
• Auto —CPU determines the UPI Prefetch mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
483
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Sub NUMA Clustering drop-down list Whether the CPU supports sub NUMA clustering, in
which the tag directory and the memory channel are
set SNC
always in the same region. This can be one of the
following:
• disabled— Sub NUMA clustering does not
occur.
• enabled— Sub NUMA clustering occurs.
Power Performance Tuning drop-down list Determines if the BIOS or Operating System can turn
on the energy performance bias tuning. The options
set PwrPerfTuning
are BIOS and OS.
• BIOS—Chooses BIOS for energy performance
tuning.
• OS—Chooses OS for energy performance
tuning.
• PECI—Chooses Platform Environmental
Control Interface for energy performance tuning.
XPT Prefetch drop-down list Whether XPT prefetch is used to enable a read request
sent to the last level cache to issue a copy of that
set XPTPrefetch
request to the memory controller prefetcher. This can
be one of the following:
• disabled—The CPU does not use the XPT
Prefetch option.
• enabled—The CPU enables the XPT prefetch
option.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
484
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Energy Performance Bias Config drop-down list Allows you to determine whether system performance
or energy efficiency is more important on this server.
set CpuEngPerfBias
This can be one of the following:
• — The server provides all server components
with full power at all times. This option
maintains the highest level of performance and
requires the greatest amount of power.
• — The server provides all server components
with enough power to keep a balance between
performance and power.
• — The server provides all server components
with enough power to keep a balance between
performance and power.
• — The server provides all server components
with maximum power to keep reduce power
consumption.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
485
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Hardware P-States drop-down list Enables processor Hardware P-State. This can be one
of the following:
set CpuHWPM
• disabled—HWPM is disabled.
• hwpm-native-mode—HWPM native mode is
enabled.
• hwpm-oob-mode—HWPM Out-Of-Box mode
is enabled.
• Native Mode with no Legacy (only GUI)
LLC Prefetch drop-down list Whether the processor uses the LLC Prefetch
mechanism to fetch the date into the LLC. This can
set LLCPrefetch
be one of the following:
• disabled—The processor does not preload any
cache data.
• enabled—The LLC prefetcher preloads the L1
cache with the data it determines to be the most
relevant.
Autonomous Core C-state drop-down list Enables CPU Autonomous C-State, which converts
the HALT instructions to the MWAIT instructions.
set AutoCCState
This can be one of the following:
• Disabled—CPU Autonomous C-state is disabled.
• Enabled—CPU Autonomous C-state is enabled.
Energy Efficient Turbo drop-down list When energy efficient turbo is enabled, the optimal
turbo frequency of the CPU turns dynamic based on
set EnergyEfficientTurbo
CPU utilization. The power/performance bias setting
also influences energy efficient turbo. This can be one
of the following:
• Disabled—Energy Efficient Turbo is disabled.
• Enabled—Energy Efficient Turbo is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
486
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Patrol Scrub drop-down list Allows the system to actively search for, and correct,
single bit memory errors even in unused portions of
set PatrolScrub
the memory on the server. This can be one of the
following:
• Disabled—The system checks for memory ECC
errors only when the CPU reads or writes a
memory address.
• Enabled—The system periodically reads and
writes memory searching for ECC errors. If any
errors are found, the system attempts to fix them.
This option may correct single bit errors before
they become multi-bit errors, but it may
adversely affect performance when the patrol
scrub is running.
• Enable at End of POST—The system checks
for memory ECC errors after BIOS POST.
Processor EPP Profile drop-down list Allows you to determine whether system performance
or energy efficiency is more important on this server.
set EPPProfile
This can be one of the following:
• Performance
• Balanced Performance
• Balanced Power
• Power
Intel Dynamic Speed Select drop-down list Intel Dynamic Speed Select modes allow you to run
the CPU with different speed and cores in auto mode.
set IntelDynamicSpeedSelect
This can be one of the following:
• Disabled—Intel Dynamic Speed Select is
disabled.
• Enabled—Intel Dynamic Speed Select is
enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
487
BIOS Parameters by Server Model
C220 M6 and C240 M6 Servers
Name Description
Intel Speed Select drop-down list Intel Speed Select modes allows you to run the CPU
with different speed and cores.
set IntelSpeedSelect
This can be one of the following:
• Base— It will allow users to access maximum
core and Thermal Design Power (TDP) ratio.
• Config 3— It will allow users to access core and
TDP ratio lesser than Base.
• Config 4— It will allow users to access core and
TDP ratio lesser than Config 3.
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
MLOM OptionROM drop-down list This options allows you to control the Option ROM
execution of the PCIe adapter connected to the MLOM
set PcieSlotMLOMOptionROM
slot. This can be one of the following:
• Disabled—Does not execute Option ROM of
the PCIe adapter connected to the MLOM slot.
• Enabled—Executes Option ROM of the PCIe
adapter connected to the MLOM slot.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
488
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
MLOM Link Speed drop-down list This option allows you to restrict the maximum speed
of an adapter card installed in PCIe MLOM slot. This
set PcieSlotMLOMLinkSpeed
can be one of the following:
• Disabled—The maximum speed is not restricted.
• Auto—System selects the maximum speed
allowed.
• GEN1—2.5GT/s (gigatransfers per second) is
the maximum speed allowed.
• GEN2—5GT/s is the maximum speed allowed.
• GEN3—8GT/s is the maximum speed allowed.
• GEN4—16GT/s is the maximum speed allowed.
PCIe Slotn OptionROM drop-down list Whether the server can use the Option ROMs present
in the PCIe card slot designated by n. This can be one
set PcieSlotnOptionROM
of the following:
• Disabled—Option ROM for slot n is not
available.
• Enabled—Option ROM for slot n is available.
PCIe Slotn Link Speed drop-down list System IO Controller n (SIOCn) add-on slot
(designated by n) link speed. This can be one of the
set PcieSlotnLinkSpeed
following:
• Disabled—Slot is disabled, and the card is not
enumerated.
• Auto— The default link speed. Link speed is
automatically assigned.
• GEN1—Link speed can reach up to first
generation.
• GEN2—Link speed can reach up to second
generation.
• GEN3—Link speed can reach up to third
generation.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
489
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Front NVME-n OptionROM drop-down list This options allows you to control the Option ROM
execution of the PCIe adapter connected to the
set PcieSlotFrontNvmenOptionROM
SSD:NVMe slot n. This can be one of the following:
• Disabled—Does not execute Option ROM of
the PCIe adapter connected to the SSD:NVMe1
slot.
• Enabled—Executes Option ROM of the PCIe
adapter connected to the SSD:NVMe1 slot
Front NVME-n Link Speed drop-down list Link speed for NVMe front slot designated by slot n.
This can be one of the following:
set PcieSlotFrontNvmenLinkSpeed
• Disabled—Slot is disabled, and the card is not
enumerated.
• Auto—The default link speed. Link speed is
automatically assigned.
• GEN1—Link speed can reach up to first
generation.
• GEN2—Link speed can reach up to second
generation.
• GEN3—Link speed can reach up to third
generation.
• GEN4—Link speed can reach up to fourth
generation.
Rear NVME-n OptionROM drop-down list This options allows you to control the Option ROM
execution of the PCIe adapter connected to the rear
set PcieSlotRearNvmenOptionROM
SSD:NVMe slot n. This can be one of the following:
• Disabled—Does not execute Option ROM of
the PCIe adapter connected to the SSD:NVMe1
slot.
• Enabled—Executes Option ROM of the PCIe
adapter connected to the SSD:NVMe1 slot
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
490
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Rear NVME-n Link Speed drop-down list Link speed for NVMe rear slot designated by slot n.
This can be one of the following:
set PcieSlotRearNvmenLinkSpeed
• Disabled—Slot is disabled, and the card is not
enumerated.
• Auto—The default link speed. Link speed is
automatically assigned.
• GEN1—Link speed can reach up to first
generation.
• GEN2—Link speed can reach up to second
generation.
• GEN3—Link speed can reach up to third
generation.
• GEN4—Link speed can reach up to fourth
generation.
Legacy USB Support drop-down list Whether the system supports legacy USB devices.
This can be one of the following:
set UsbLegacySupport
• Disabled—USB devices are only available to
EFI applications.
• Enabled—Legacy USB support is always
available.
• Auto—Feature is is automatically assigned.
PCIe Slot MSTOR RAID OptionROM drop-down Whether the server can use the Option ROMs present
list in the PCIe MSTOR RAID. This can be one of the
following:
set PcieSlotMSTORRAIDOptionROM
• Disabled—Option ROM is not available.
• Enabled—Option ROM is available.
Intel VTD Coherency Support drop-down list Whether the processor supports Intel VT-d Coherency.
This can be one of the following:
set CoherencySupport
• Disabled—The processor does not support
coherency.
• Enabled—The processor uses VT-d Coherency
as required.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
491
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Intel VT for Directed IO drop-down list Whether the processor uses Intel Virtualization
Technology (VT), which allows a platform to run
set IntelVTD
multiple operating systems and applications in
independent partitions. This can be one of the
following:
• Disabled—The processor does not permit
virtualization.
• Enabled—The processor allows multiple
operating systems in independent partitions.
VMD Enable drop-down list Intel Volume Management Device (VMD) is for PCIe
NVMe SSDs that provides hardware logic to manage
set VMDenable
and aggregate NVMe SSDs.
This can be one the following:
• Enabled— Enables benefits like robust surprise
hot-plug, status LED management.
• Disabled— Disables benefits like robust surprise
hot-plug, status LED management.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
492
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Intel VTD ATS support drop-down list Whether the processor supports Intel VT-d Address
Translation Services (ATS). This can be one of the
set ATS
following:
• Disabled—The processor does not support ATS.
• Enabled—The processor uses VT-d ATS as
required.
LOM Port n OptionROM drop-down list Whether Option ROM is available on the LOM port
slot n. This can be one of the following:
set LomOpromControlPort0
• Disabled—Option ROM is not available on
LOM port 1.
• Enabled—Option ROM is available on LOM
port 1.
PCIe RAS Support drop-down list Whether PCIe RAS Support is available on the PCIe
slot. This can be one of the following:
set PCIeRASSupport
• Disabled—PCIe RAS is not available on the
slot.
• Enabled—PCIe RAS is available on port.
All Onboard LOM Ports drop-down list Whether Option ROM is available on all LOM ports.
This can be one of the following:
set AllLomPortControl
• Disabled—Option ROM is disabled on all the
ports.
• Enabled—Option ROM is enabled on all the
ports.
USB Port Rear drop-down list Whether the rear panel USB devices are enabled or
disabled. This can be one of the following
set UsbPortRear
• Disabled— Disables the rear panel USB ports.
Devices connected to these ports are not detected
by the BIOS and operating system.
• Enabled— Enables the rear panel USB ports.
Devices connected to these ports are detected by
the BIOS and operating system.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
493
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
VGA Priority drop-down list Allows you to set the priority for VGA graphics
devices if multiple VGA devices are found in the
set VgaPriority
system. This can be one of the following:
• OnBoard—Priority is given to the onboard VGA
device. BIOS post screen and OS boot are driven
through the onboard VGA port.
• OffBoard—Priority is given to the PCIE
Graphics adapter. BIOS post screen and OS boot
are driven through the external graphics adapter
port.
• OnBoardDisabled—Priority is given to the PCIe
Graphics adapter, and the onboard VGA device
is disabled. The vKVM does not function when
the onboard VGA is disabled.
IPV6 PXE Support drop-down list Enables or disables IPv6 support for PXE. This can
be one of the following
set IPV6PXE
• disabled—IPv6 PXE support is not available.
• enabled—IPv6 PXE support is always available.
USB Port Internal drop-down list Whether the internal USB devices are enabled or
disabled. This can be one of the following
set UsbPortInt
• Disabled— Disables the internal USB ports.
Devices connected to these ports are not detected
by the BIOS and operating system.
• Enabled— Enables the internal USB ports.
Devices connected to these ports are detected by
the BIOS and operating system.
PCIe PLL SSC drop-down list Enable this feature to reduce EMI interference by
down spreading clock 0.5%. Disable this feature to
set PciePllSsc
centralize the clock without spreading.
This can be one of the following:
• auto—EMI interference is auto adjusted.
Disabled—EMI interference is auto adjusted.
• ZeroPointFive—EMI interference is reduced
by down spreading the clock 0.5%.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
494
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Network Stack drop-down list This option allows you to monitor IPv6 and IPv4. This
can be one of the following
set NetworkStack
• disabled—Network Stack support is not
available.
Note When disabled, the value set for
IPV4 PXE Support does not
impact the system.
IPV4 PXE Support drop-down list Enables or disables IPv4 support for PXE. This can
be one of the following
set IPV4PXE
• disabled—IPv4 PXE support is not available.
• enabled—IPv4 PXE support is always available.
External SSC enable drop-down list This option allows you to reduce the EMI of your
motherboard by modulating the signals it generates
set EnableClockSpreadSpec
so that the spikes are reduced to flatter curves.
This can be one of the following:
• Disabled—Clock Spread Spectrum support is
not available.
• Enabled—Clock Spread Spectrum support is
always available.
IPV4 HTTP Support drop-down list Enables or disables IPv4 support for HTTP. This can
be one of the following:
set IPV4HTTP
• disabled—IPv4 HTTP support is not available.
• enabled—IPv4 HTTP support is always
available.
IIO eDPC Support drop-down list eDPC allows a downstream link to be disabled after
an uncorrectable error, making recovery possible in
set EdpEn
a controlled and robust manner.
This can be one of the following:
• Disabled—eDPC support is disabled.
• On Fatal Error—eDPC is enabled only for fatal
errors.
• On Fatal and Non-Fatal Errors—eDPC is enabled
for both fatal and non-fatal errors.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
495
BIOS Parameters by Server Model
Server Management Tab
Name Description
IPV6 HTTP Support drop-down list Enables or disables IPv6 support for HTTP. This can
be one of the following:
set IPV6HTTP
• disabled—IPv6 HTTP support is not available.
• enabled—IPv6 HTTP support is always
available.
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
OS Boot Watchdog Timer Policy drop-down list What action the system takes if the watchdog timer
expires. This can be one of the following:
set OSBootWatchdogTimerPolicy
• Power Off—The server is powered off if the
watchdog timer expires during OS boot.
• Reset—The server is reset if the watchdog timer
expires during OS boot.
FRB 2 Timer drop-down list Whether the FRB2 timer is used by Cisco IMC to
recover the system if it hangs during POST. This can
set FRB-2
be one of the following:
• Disabled—The FRB2 timer is not used.
• Enabled—The FRB2 timer is started during
POST and used to recover the system if
necessary.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
496
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
OS Watchdog Timer drop-down list Whether the BIOS programs the watchdog timer with
a specified timeout value. This can be one of the
set OSBootWatchdogTimer
following:
• Disabled—The watchdog timer is not used to
track how long the server takes to boot.
• Enabled—The watchdog timer tracks how long
the server takes to boot. If the server does not
boot within the length of time specified in the
OS Boot Watchdog Timer Timeout field, the
Cisco IMC logs an error and takes the action
specified in the OS Boot Watchdog Policy field.
OS Watchdog Timer Timeout drop-down list If OS does not boot within the specified time, OS
watchdog timer expires and system takes action
set OSBootWatchdogTimerTimeOut
according to timer policy. This can be one of the
following:
• 5 Minutes—The OS watchdog timer expires 5
minutes after it begins to boot.
• 10 Minutes—The OS watchdog timer expires
10 minutes after it begins to boot.
• 15 Minutes—The OS watchdog timer expires
15 minutes after it begins to boot.
• 20 Minutes—The OS watchdog timer expires
20 minutes after it begins to boot.
Baud Rate drop-down list What Baud rate is used for the serial port transmission
speed. If you disable Console Redirection, this option
set BaudRate
is not available. This can be one of the following:
• 9.6k—A 9,600 Baud rate is used.
• 19.2k—A 19,200 Baud rate is used.
• 38.4k—A 38,400 Baud rate is used.
• 57.6k—A 57,600 Baud rate is used.
• 115.2k—A 115,200 Baud rate is used.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
497
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Flow Control drop-down list Whether a handshake protocol is used for flow control.
Request to Send / Clear to Send (RTS/CTS) helps to
set FlowCtrl
reduce frame collisions that can be introduced by a
hidden terminal problem. This can be one of the
following:
• None—No flow control is used.
• RTS/CTS—RTS/CTS is used for flow control.
Console Redirection drop-down list Allows a serial port to be used for console redirection
during POST and BIOS booting. After the OS has
set ConsoleRedir
booted, console redirection is irrelevant. This can be
one of the following:
• COM 0—Enables console redirection on serial
port A during POST.
• COM 1—Enables console redirection on serial
port B during POST.
• Disabled—No console redirection occurs during
POST.
Terminal type drop-down list What type of character formatting is used for console
redirection. This can be one of the following:
set TerminalType
• PC-ANSI—The PC-ANSI terminal font is used.
• VT100—A supported VT100 video terminal and
its character set are used.
• VT100-PLUS—A supported VT100-plus video
terminal and its character set are used.
• VT-UTF8—A video terminal with the UTF-8
character set is used.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
498
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
PCIe Slots CDN Control drop-down list Note This option is available only on Cisco
UCS C240 M6 servers equipped with
set PcieSlotsCdnEnable
Mellanox cards in slots 2 or 5.
CDN Control drop-down list Whether the Ethernet Network naming convention is
according to Consistent Device Naming (CDN) or the
set cdnEnable
traditional way of naming conventions. This can be
one of the following:
• Disabled— CDN support for VIC cards is
disabled
• Enabled— CDN support is enabled for VIC
cards.
OptionROM Launch Optimization When this option is Enabled, the OptionROMs only
for the controllers present in the boot order policy will
be launched.
Note Some controllers such as Onboard
storage controllers, Emulex FC adapters,
and GPU controllers though not listed
in the boot order policy will have the
OptionROM launched.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
499
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
BIOS Techlog Level This option denotes the type of messages in BIOS
tech log file.
The log file can be one of the following types:
• Minimum - Critical messages will be displayed
in the log file.
• Normal - Warning and loading messages will
be displayed in the log file.
• Maximum - Normal and information related
messages will be displayed in the log file.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
500
BIOS Parameters by Server Model
Security Tab
Security Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
SHA-1 PCR Bank drop-down list PCR bank available for OS when BIOS is performing
measurements.
set SHA1PCRBank
• Disabled—SHA-1 PCR Bank is not available
for BIOS.
• Enabled—SHA-1 PCR Bank is available for
BIOS.
Trusted Platform Module State drop-down list Trusted Platform Module (TPM) is a microchip
designed to provide basic security-related functions
set TPMControl
primarily involving encryption keys. This option
allows you to control the TPM Security Device
support for the system. This can be one of the
following:
• Disabled—The server does not use the TPM.
• Enabled—The server uses the TPM.
DMA Control Opt-In Flag drop-down list DMA Control Opt-In Flag - Enabling this token allows
the operating system to enable Input Output Memory
Management Unit (IOMMU) to prevent the DMA
attacks from possible malicious devices.
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
501
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
TPM Pending Operation drop-down list Trusted Platform Module (TPM) Pending Operation
option allows you to control the status of the pending
set TPMPendingOperation
operation. This can be one of the following:
• None—No action.
• TpmClear—Clears the pending operations.
SHA256 PCR Bank drop-down list PCR bank available for OS when BIOS is performing
measurements.
set SHA256PCRBank
• Disabled—SHA256 PCR Bank is not available
for BIOS.
• Enabled—SHA256 PCR Bank is available for
BIOS.
Power on Password drop-down list This token requires that you set a BIOS password
before using the F2 BIOS configuration. If enabled,
set PowerOnPassword
password needs to be validated before you access
BIOS functions such as IO configuration, BIOS set
up, and booting to an operating system using BIOS.
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
TPM Minimal Physical Presence drop-down list This token allows you to apply recommended
Microsoft default settings for TPM.
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Intel Trusted Execution Technology Support Can be Enabled only when Trusted Platform Module
drop-down list (TPM) is Enabled. This can be one of the following:
set TXTSupport • Disabled—Support is disabled.
• Enabled—Support is enabled.
Multikey Total Memory Encryption (MK-TME) MK-TME allows you to have multiple encryption
drop-down list domains with one with own key. Different memory
pages can be encrypted with different keys. This can
set EnableMktme
be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
502
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Total Memory Encryption (TME) drop-down list Allows you to provide the capability to encrypt the
entirety of the physical memory of a system. This can
set EnableTme
be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
SGX Factory Reset drop-down list Allows the system to perform SGX factory reset on
subsequent boot. This deletes all registration data.
set SgxFactoryReset
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
SW Guard Extensions (SGX) drop-down list Allows you to enable Software Guard Extensions
(SGX) feature. This can be one of the following:
set EnableSgx
• Disabled—Support is disabled.
• Enabled—Support is enabled.
SGX QoS drop-down list Allows you to enable SGX QoS. This can be one of
the following:
set SgxQoS
• Disabled—Support is disabled.
• Enabled—Support is enabled.
SGX Pkg info In-Band Access drop-down list Allows you to enable SGX Package Info In-Band
Access. This can be one of the following:
set SgxPackageInfoInBandAccess
• Disabled—Support is disabled.
• Enabled—Support is enabled.
SGX Write Enable drop-down list Allows you to enable SGX Write feature. This can be
one of the following:
set SgxLeWr
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
503
BIOS Parameters by Server Model
Memory Tab
Name Description
Select Owner EPOCH input type drop-down list Allows you to change the seed for the security key
used for the locked memory region that is created.
set EpochUpdate
This can be one of the following:
• SGX Owner EPOCH activated—Does not
change the current input type.
• Change to New Random Owner
EPOCHs—Changes EPOCH to a system
generated random number.
• Manual User Defined Owner
EPOCHs—Changes the EPOCH seed to a
hexadecimal value that you enter.
SProcessor Epoch n field Allows you to define the SGX EPOCH owner value
for the EPOCH number designated by n.
set SgxEpoch0
SGX Auto MP Registration Agent drop-down list Allows you to enable the registration authority service
to store the platform keys. This can be one of the
set SgxAutoRegistrationAgent
following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
SGX PUBKEY HASHn field Allows you to set the Software Guard Extensions
(SGX) value. This value can be set between:
set SgxLePubKeyHashn
• SGX PUBKEY HASH0—Between 7-0
• SGX PUBKEY HASH1—Between 15-8
• SGX PUBKEY HASH2—Between 23-16
• SGX PUBKEY HASH3—Between 31-24
®
LIMIT CPU PA to 46 Bits drop-down list Enable this option for Intel VT-d enabling boot to
boot with 2019 OS.
set CpuPaLimit
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Memory Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
504
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Select Memory RAS configuration drop-down list Determines how the memory reliability, availability,
and serviceability (RAS) is configured for the server.
set SelectMemoryRAS
This can be one of the following:
• Maximum Performance—System performance
is optimized.
• ADDDC Sparing—Adaptive virtual lockstep is
an algorithm implemented in the hardware and
firmware to support the ADDDC mode. When
selected, the system performance is optimized
till the algorithm is activated. The algorithm is
activated in case of DRAM device failure. Once
the algorithm is activated, the virtual lockstep
regions are activated to map out the failed region
during run-time dynamically, and the
performance impact is restricted at a region level.
• Mirror Mode 1LM—System reliability is
optimized by using half the system memory as
backup.
• Partial Mirror Mode 1LM—Partial DIMM
Mirroring creates a mirrored copy of a specific
region of memory cells, rather than keeping the
complete mirror copy. Partial Mirroring creates
a mirrored region in memory map with the
attributes of a partial mirror copy. Up to 50% of
the total memory capacity can be mirrored, using
up to 4 partial mirrors.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
505
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Partial Cache Line Sparing drop-down list Partial cache line sparing (PCLS) is an
error-prevention mechanism in memory controllers.
set PartialCacheLineSparing
PCLS statically encodes the locations of the faulty
nibbles of bits into a sparing directory along with the
corresponding data content for replacement during
memory accesses. This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Select PPR Type drop-down list Cisco IMC supports Hard-PPR, which permanently
remaps accesses from a designated faulty row to a
set SelectPprType
designated spare row.
This can be one of the following:
• Hard PPR—Support is enabled.
Note Hard PPR can be used only when
Memory RAS Configuration is
set to ADDDC Sparing. For other
RAS selections, this setting should
be set to Disabled.
• Disabled—Support is disabled.
BME DMA Mitigation drop-down list Allows you to disable the PCI BME bit to mitigate
the threat from an unauthorized external DMA. This
set BmeDmaMitigation
can be one of the following:
• Disabled—PCI BME bit is disabled in the BIOS.
• Enabled—PCI BME bit is enabled in the BIOS.
Above 4G Decoding drop-down list Enables or disables MMIO above 4GB or not. This
can be one of the following:
set MemoryMappedIOAbove4GB
• Disabled—The server does not map I/O of 64-bit
PCI devices to 4GB or greater address space.
• Enabled—The server maps I/O of 64-bit PCI
devices to 4GB or greater address space.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
506
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Partial Memory Mirror Mode drop-down list The partial memory size is either in percentage or in
GB. This can be one of the following:
set PartialMirrorModeConfig
• Percentage—The partial memory mirror is
defined in percentage.
• Value in GB—The partial memory mirror is
defined in GB.
• Disabled—Partial memory mirror is disabled.
DCPMM Firmware Downgrade drop-down list Whether the BIOS supports downgrading the DCPMM
firmware. This can be one of the following:
set DCPMMFirmwareDowngrade
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Partial Mirrorn Size in GB field Size of the first partial nth memory mirror in GB.
set PartialMirrorValue1 n = 1, 2, or 3
Enter an integer between 0 and 65535.
Note The combined memory size of all the
partial mirror should not exceed 50% of
the physical memory size.
Memory Size Limit in GB field Use this option to reduce the size of the physical
memory limit in GB.
set MemorySizeLimit
Enter an integer between 0 and 65535.
NVM Performance Setting drop-down list Enables you to configure NVM baseline performance
settings depending on the workload behavior.
set NvmdimmPerformConfig
• BW Optimized
• Latency Optimized
• Balanced Profile
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
507
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Snoopy mode for AD drop-down list Enables new AD specific feature to avoid directory
updates to DDRT memory from non-NUMA
set SnoopyModeForAD
optimized workloads.
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
CR FastGo Config drop-down list Enables you to select CR QoS configuration profiles.
set CrfastgoConfig This can be one of the following:
• Enable Optimization
• Disable Optimization
• Auto
Memory Refresh Rate drop-down list Enables you to increase or decrease memory refresh
rate. Increasing the DRAM refresh rate reduces the
set MemoryRefreshRate
maximum number of activates (hammers) that can
occur before the next refresh.
This can be one of the following:
• 1X Refresh—Refresh rate is at minimum.
• 2X Refresh —Refresh is 2X faster.
Snoopy mode for 2LM drop-down list Enables you to avoid directory updates to far-memory
from non-NUMA optimized workloads.
set SnoopyModeFor2LM
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Memory Thermal Throttling Mode drop-down list This function is used for adjusting memory
temperature. If memory temperature is excessively
set MemoryThermalThrottling
high after the function is enabled, the memory access
rate is reduced and Baseboard Management Controller
(BMC) adjusts the fan to cool down the memory to
avoid any DIMM damage.
This can be one of the following:
• Disabled—Support is disabled.
• CLTT with PECI—Enables Closed Loop
Thermal Throttling with Platform Environment
Control Interface.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
508
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Panic and High Watermark drop-down list When set to low, the memory controller does not
postpone refreshes while Memory Refresh Rate is
set PanicHighWatermark
set to 1X Refresh.
This can be one of the following:
• Low—Refresh rate is set to low.
• High —Refresh rate is set to high.
UMA drop-down list Allows you to set UMA settings. This can be one of
the following:
set UmaBasedClustering
• Disable(All2All)
• Hemisphere(2-clusters)
Advanced Memory Test drop-down list Note This feature is applicable only to
Samsung, Hynix and Micron DIMMs.
set AdvancedMemTest
You can enable advance DIMM testing during BIOS
POST using this feature. This can be one of the
following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Volatile Memory Mode drop-down list Volatile Memory Mode setting is displayed when the
® ™
BIOS supports Intel Optane PMem. This can be
set VolMemoryMode
one of the following:
®
• 1LM—This option can be used to set Intel
™
Optane PMem in App-Direct Mode.
• 2LM—This options allows 2LM to facilitate the
DDR4 memory operating as cache.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
509
BIOS Parameters by Server Model
Power/Performance Tab
Name Description
Memory Bandwidth Boost drop-down list Intel® Memory Bandwidth Boost is a feature of the
Intel® Optane™ persistent memory that provides a
set MemoryBandwidthBoost
dynamic range of power and bandwidth when thermal
headroom is available. This can be one of the
following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Power/Performance Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Adjacent Cache Line Prefetcher drop-down list Whether the processor fetches cache lines in even or
odd pairs instead of fetching just the required line.
set AdjacentCacheLinePrefetch
This can be one of the following:
• Disabled—The processor only fetches the
required line.
• Enabled—The processor fetches both the
required line and its paired line.
Hardware Prefetcher drop-down list Whether the processor allows the Intel hardware
prefetcher to fetch streams of data and instruction
set HardwarePrefetch
from memory into the unified second-level cache
when necessary. This can be one of the following:
• Disabled—The hardware prefetcher is not used.
• Enabled—The processor uses the hardware
prefetcher when cache issues are detected.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
510
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
DCU IP Prefetcher drop-down list Whether the processor uses the DCU IP Prefetch
mechanism to analyze historical cache access patterns
set DcuIpPrefetch
and preload the most relevant lines in the L1 cache.
This can be one of the following:
• Disabled—The processor does not preload any
cache data.
• Enabled—The DCU IP prefetcher preloads the
L1 cache with the data it determines to be the
most relevant.
DCU Streamer Prefetch drop-down list Whether the processor uses the DCU IP Prefetch
mechanism to analyze historical cache access patterns
set DcuStreamerPrefetch
and preload the most relevant lines in the L1 cache.
This can be one of the following:
• Disabled—The processor does not try to
anticipate cache read requirements and only
fetches explicitly requested lines.
• Enabled—The DCU prefetcher analyzes the
cache read pattern and prefetches the next line
in the cache if it determines that it may be
needed.
Virtual Numa drop-down list Virtual NUMA (virtual non-uniform memory access)
is a memory-access optimization method for VMware
set VirtualNuma
virtual machines (VMs), which helps prevent
memory-bandwidth bottlenecks.
This can be one of the following:
• Disabled—Functionality is disabled.
• Enabled—Functionality is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
511
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
CPU Performance drop-down list Sets the CPU performance profile for the options listed
above. This can be one of the following:
set CPUPerformance
• Enterprise—All options are enabled.
• HPC—All options are enabled. This setting is
also known as high performance computing.
• Hight Throughput—Only the DCU IP
Prefetcher is enabled. The rest of the options are
disabled.
• Custom—All performance profile options can
be configured from the BIOS setup on the server.
In addition, the Hardware Prefetcher and
Adjacent Cache-Line Prefetch options can be
configured as well.
LLC Dead Line drop-down list In CPU non-inclusive cache scheme, MLC evictions
are filled into the LLC. When lines are evicted from
set LLCALLoc
the MLC, the core can flag them as dead (not likely
to be read again). The LLC has the option to drop
dead lines and not fill them in the LLC.
If this feature is disabled, dead lines are always
dropped and are never filled into the LLC.
If this feature is enabled, the LLC can fill dead lines
into the LLC if there is free space available.
This can be one of the following:
• Disabled—Feature is disabled.
• Enabled—Feature is enabled.
• Auto—CPU determines the LLC dead line
allocation.
XPT Remote Prefetch drop-down list This feature allows an LLC request to be duplicated
and sent to an appropriate memory controller in a
set XPTRemotePrefetch
remote machine based on the recent LLC history to
reduce latency.
This can be one of the following:
• Disabled—Feature is disabled.
• Enabled—Feature is enabled.
• Auto—CPU determines the functionality.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
512
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
UPI Link Enablement drop-down list Enables the minimum number of UPI links required
by the processor.
set UPILinkEnablement
This can be one of the following:
•1
•2
• Auto
Enhanced CPU Performance drop-down list Note Once you enable this functionality, you
cannot enable Enable Power
set EnhancedCPUPerformance
Characterization and Power Capping.
Enhances CPU performance by adjusting server
settings automatically.
Note Enabling this functionality may increase
power consumption.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
513
BIOS Parameters by Server Model
Processor Tab
Name Description
UPI Power Management drop-down list UPI power management is used to conserve power
on the server.
set UPIPowerManagement
This can be one of the following:
• Disabled—The processor does not run with this
functionality.
• Auto—Functionality is enabled.
Processor Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Extended APIC drop-down list Allows you to enable or disable extended APIC
support. This can be one of the following:
set LocalX2Apic
• Enabled—Enables APIC support.
• Disabled—Disables APIC support.
Intel Virtualization Technology drop-down list Whether the processor uses Intel Virtualization
Technology (VT), which allows a platform to run
set IntelVT
multiple operating systems and applications in
independent partitions. This can be one of the
following:
• Disabled—The processor does not permit
virtualization.
• Enabled—The processor allows multiple
operating systems in independent partitions.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
514
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Processor C6 Report drop-down list Whether the BIOS sends the C6 report to the operating
system. When the OS receives the report, it can
set ProcessorC6Report
transition the processor into the lower C6 power state
to decrease energy usage while maintaining optimal
processor performance. This can be one of the
following:
• Disabled—The BIOS does not send the C6
report.
• Enabled—The BIOS sends the C6 report,
allowing the OS to transition the processor to the
C6 low power state.
Processor C1E drop-down list Whether the CPU transitions to its minimum
frequency when entering the C1 state. This can be one
set ProcessorC1E
of the following:
• Disabled—The CPU continues to run at its
maximum frequency in C1 state.
• Enabled—The CPU transitions to its minimum
frequency. This option saves the maximum
amount of power in C1 state.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
515
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
EIST PSD Function drop-down list EIST reduces the latency inherent with changing the
voltage-frequency pair (P-state), thus allowing those
set ExecuteDisable
transitions to occur more frequently. This allows for
more granular, demand-based switching and can
optimize the power-to-performance balance, based
on the demands of the applications. This can be one
of the following:
• HW ALL— The processor is coordinates the
P-state among logical processors dependencies.
The OS keeps the P-state request up to date on
all logical processors.
• SW ALL—The OS Power Manager coordinates
the P-state among logical processors with
dependencies and initiates the transition on all
of those Logical Processors.
Turbo Mode drop-down list Whether the processor uses Intel Turbo Boost
Technology, which allows the processor to
set IntelTurboBoostTech
automatically increase its frequency if it is running
below power, temperature, or voltage specifications.
This can be one of the following:
• Disabled—The processor does not increase its
frequency automatically.
• Enabled—The processor utilizes Turbo Boost
Technology if required.
Uncore Frequency Scaling drop-down list This feature allows you configure the scaling of
uncore frequency of the processor. This can be one
set UFSDisable
of the following:
• enabled—Uncore frequency of the processor
scales up or down based on the load.
• disabled—Uncore frequency of the processor
remains fixed.
®
Refer Intel Dear Customer Letter (DCL) to know
the fixed higher and lower values for Uncore
Frequency Scaling.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
516
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Boot Performance Mode drop-down list Allows you to select the BIOS performance state that
is set before the operating system handoff. This can
set BootPerformanceMode
be one of the following:
• Max Performance—Processor P-state ratio is
maximum
• Max Efficient—Processor P-state ratio is
minimum
• Set by Intel NM—Value is set automatically.
Configurable TDP Level drop-down list Configurable TDP Level feature allows adjustments
in processor thermal design power values. By
set ConfigTDPLevel
modifying the processor behavior and the performance
levels, power consumption of a processor can be
configured and TDP can be adjusted as the same time.
Hence, a processor operates at higher or lower
performance levels, depending on the available
cooling capacities and desired power consumption.
This can be one of the following:
• Normal
• Level 1
• Level 2
®
Refer Intel Dear Customer Letter (DCL) to know
the values for TDP level.
SpeedStep (Pstates) drop-down list Whether the processor uses Enhanced Intel SpeedStep
Technology, which allows the system to dynamically
set EnhancedIntelSpeedStep
adjust processor voltage and core frequency. This
technology can result in decreased average power
consumption and decreased average heat production.
This can be one of the following:
• Disabled—The processor never dynamically
adjusts its voltage or frequency.
• Enabled—The processor utilizes Enhanced Intel
SpeedStep Technology and enables all supported
processor sleep states to further conserve power.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
517
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Processor CMCI drop-down list Allows the CPU to trigger interrupts on corrected
machine check events. The corrected machine check
set ProcessorCMCI
interrupt (CMCI) allows faster reaction than the
traditional polling timer. This can be one of the
following:
• Disabled—Disables CMCI.
• Enabled—Enables CMCI. This is the default
value.
HyperThreading [ALL] drop-down list Whether the processor uses Intel Hyper-Threading
Technology, which allows multithreaded software
set IntelHyperThread
applications to execute threads in parallel within each
processor. This can be one of the following:
• Disabled—The processor does not permit
hyperthreading.
• Enabled—The processor allows for the parallel
execution of multiple threads.
Workload Configuration drop-down list This feature allows for workload optimization. The
options are Balanced and I/O Sensitive:
set WorkLdConfig
• Balanced
• IO Sensitive
Cores Enabled drop-down list Allows you to disable one or more of the physical
cores on the server. This can be one of the following:
set CoreMultiProcessing
• All—Enables all physical cores. This also
enables Hyper Threading on the associated
logical processor cores.
• 1 through 48—Specifies the number of physical
processor cores that can run on the server. Each
physical core has an associated logical core.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
518
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
UPI Link Frequency Select drop-down list Note UPI Link Frequency Select token is
not applicable for single socket
set QpiLinkSpeed
configuration.
UPI Prefetch drop-down list UPI prefetch is a mechanism to get the memory read
started early on a DDR bus. This can be one of the
set KTIPrefetch
following:
• disabled—The processor does not preload any
cache data.
• enabled—The UPI prefetcher preloads the L1
cache with the data it determines to be the most
relevant.
• Auto —CPU determines the UPI Prefetch mode.
Sub NUMA Clustering drop-down list Whether the CPU supports sub NUMA clustering, in
which the tag directory and the memory channel are
set SNC
always in the same region. This can be one of the
following:
• disabled— Sub NUMA clustering does not
occur.
• enabled— Sub NUMA clustering occurs.
Power Performance Tuning drop-down list Determines if the BIOS or Operating System can turn
on the energy performance bias tuning. The options
set PwrPerfTuning
are BIOS and OS.
• BIOS—Chooses BIOS for energy performance
tuning.
• OS—Chooses OS for energy performance
tuning.
• PECI—Chooses Platform Environmental
Control Interface for energy performance tuning.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
519
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
XPT Prefetch drop-down list Whether XPT prefetch is used to enable a read request
sent to the last level cache to issue a copy of that
set XPTPrefetch
request to the memory controller prefetcher. This can
be one of the following:
• disabled—The CPU does not use the XPT
Prefetch option.
• enabled—The CPU enables the XPT prefetch
option.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
520
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Energy Performance Bias Config drop-down list Allows you to determine whether system performance
or energy efficiency is more important on this server.
set CpuEngPerfBias
This can be one of the following:
• — The server provides all server components
with full power at all times. This option
maintains the highest level of performance and
requires the greatest amount of power.
• — The server provides all server components
with enough power to keep a balance between
performance and power.
• — The server provides all server components
with enough power to keep a balance between
performance and power.
• — The server provides all server components
with maximum power to keep reduce power
consumption.
Hardware P-States drop-down list Enables processor Hardware P-State. This can be one
of the following:
set CpuHWPM
• disabled—HWPM is disabled.
• hwpm-native-mode—HWPM native mode is
enabled.
• hwpm-oob-mode—HWPM Out-Of-Box mode
is enabled.
• Native Mode with no Legacy (only GUI)
LLC Prefetch drop-down list Whether the processor uses the LLC Prefetch
mechanism to fetch the date into the LLC. This can
set LLCPrefetch
be one of the following:
• disabled—The processor does not preload any
cache data.
• enabled—The LLC prefetcher preloads the L1
cache with the data it determines to be the most
relevant.
Autonomous Core C-state drop-down list Enables CPU Autonomous C-State, which converts
the HALT instructions to the MWAIT instructions.
set AutoCCState
This can be one of the following:
• Disabled—CPU Autonomous C-state is disabled.
• Enabled—CPU Autonomous C-state is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
521
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Energy Efficient Turbo drop-down list When energy efficient turbo is enabled, the optimal
turbo frequency of the CPU turns dynamic based on
set EnergyEfficientTurbo
CPU utilization. The power/performance bias setting
also influences energy efficient turbo. This can be one
of the following:
• Disabled—Energy Efficient Turbo is disabled.
• Enabled—Energy Efficient Turbo is enabled.
Patrol Scrub drop-down list Allows the system to actively search for, and correct,
single bit memory errors even in unused portions of
set PatrolScrub
the memory on the server. This can be one of the
following:
• Disabled—The system checks for memory ECC
errors only when the CPU reads or writes a
memory address.
• Enabled—The system periodically reads and
writes memory searching for ECC errors. If any
errors are found, the system attempts to fix them.
This option may correct single bit errors before
they become multi-bit errors, but it may
adversely affect performance when the patrol
scrub is running.
• Enable at End of POST—The system checks
for memory ECC errors after BIOS POST.
Processor EPP Profile drop-down list Allows you to determine whether system performance
or energy efficiency is more important on this server.
set EPPProfile
This can be one of the following:
• Performance
• Balanced Performance
• Balanced Power
• Power
Intel Dynamic Speed Select drop-down list Intel Dynamic Speed Select modes allow you to run
the CPU with different speed and cores in auto mode.
set IntelDynamicSpeedSelect
This can be one of the following:
• Disabled—Intel Dynamic Speed Select is
disabled.
• Enabled—Intel Dynamic Speed Select is
enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
522
BIOS Parameters by Server Model
C225 M6 and C245 M6 Servers
Name Description
Intel Speed Select drop-down list Intel Speed Select modes allows you to run the CPU
with different speed and cores.
set IntelSpeedSelect
This can be one of the following:
• Base— It will allow users to access maximum
core and Thermal Design Power (TDP) ratio.
• Config 3— It will allow users to access core and
TDP ratio lesser than Base.
• Config 4— It will allow users to access core and
TDP ratio lesser than Config 3.
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
MLOM OptionROM drop-down list This options allows you to control the Option ROM
execution of the PCIe adapter connected to the MLOM
set PcieSlotMLOMOptionROM
slot. This can be one of the following:
• Disabled—Does not execute Option ROM of
the PCIe adapter connected to the MLOM slot.
• Enabled—Executes Option ROM of the PCIe
adapter connected to the MLOM slot.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
523
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
MLOM Link Speed drop-down list This option allows you to restrict the maximum speed
of an adapter card installed in PCIe MLOM slot. This
set PcieSlotMLOMLinkSpeed
can be one of the following:
• Disabled—The maximum speed is not restricted.
• Auto—System selects the maximum speed
allowed.
• GEN1—2.5GT/s (gigatransfers per second) is
the maximum speed allowed.
• GEN2—5GT/s is the maximum speed allowed.
• GEN3—8GT/s is the maximum speed allowed.
• GEN3—16GT/s is the maximum speed allowed.
PCIe Slotn OptionROM drop-down list Whether the server can use the Option ROMs present
in the PCIe card slot designated by n. This can be one
set PcieSlotnOptionROM
of the following:
• Disabled—Option ROM for slot n is not
available.
• Enabled—Option ROM for slot n is available.
PCIe Slotn Link Speed drop-down list System IO Controller n (SIOCn) add-on slot
(designated by n) link speed. This can be one of the
set PcieSlotnLinkSpeed
following:
• Disabled—Slot is disabled, and the card is not
enumerated.
• Auto— The default link speed. Link speed is
automatically assigned.
• GEN1—Link speed can reach up to first
generation.
• GEN2—Link speed can reach up to second
generation.
• GEN3—Link speed can reach up to third
generation.
• GEN4—Link speed can reach up to fourth
generation.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
524
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
MRAID OptionROM Whether the server can use the RAID Option ROMs
present in the PCIe card slot designated by n. This
set PcieSlotMRAIDnOptionROM
can be one of the following:
• Disabled—Option ROM for slot n is not
available.
• Enabled—Option ROM for slot n is available.
MRAID Link Speed drop-down list RAID IO Controller n (SIOCn) add-on slot
(designated by n) link speed. This can be one of the
set PcieSlotMRAIDnLinkSpeed
following:
• Disabled—Slot is disabled, and the card is not
enumerated.
• Auto— The default link speed. Link speed is
automatically assigned.
• GEN1—Link speed can reach up to first
generation.
• GEN2—Link speed can reach up to second
generation.
• GEN3—Link speed can reach up to third
generation.
• GEN4—Link speed can reach up to fourth
generation.
Front NVME-n OptionROM drop-down list This options allows you to control the Option ROM
execution of the PCIe adapter connected to the
set PcieSlotFrontNvmenOptionROM
SSD:NVMe slot n. This can be one of the following:
• Disabled—Does not execute Option ROM of
the PCIe adapter connected to the SSD:NVMe1
slot.
• Enabled—Executes Option ROM of the PCIe
adapter connected to the SSD:NVMe1 slot
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
525
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Front NVME-n Link Speed drop-down list Link speed for NVMe front slot designated by slot n.
This can be one of the following:
set PcieSlotFrontNvmenLinkSpeed
• Disabled—Slot is disabled, and the card is not
enumerated.
• Auto—The default link speed. Link speed is
automatically assigned.
• GEN1—Link speed can reach up to first
generation.
• GEN2—Link speed can reach up to second
generation.
• GEN3—Link speed can reach up to third
generation.
• GEN4—Link speed can reach up to fourth
generation.
Rear NVME-n OptionROM drop-down list Note This options is applicable only to Cisco
UCS C245 M6 servers.
set PcieSlotRearNvmenOptionROM
This options allows you to control the Option ROM
execution of the PCIe adapter connected to the
SSD:NVMe slot n. This can be one of the following:
• Disabled—Does not execute Option ROM of
the PCIe adapter connected to the SSD:NVMe1
slot.
• Enabled—Executes Option ROM of the PCIe
adapter connected to the SSD:NVMe1 slot
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
526
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Rear NVME-n Link Speed drop-down list Note This options is applicable only to Cisco
UCS C245 M6 servers.
set PcieSlotRearNvmenLinkSpeed
Link speed for NVMe front slot designated by slot n.
This can be one of the following:
• Disabled—Slot is disabled, and the card is not
enumerated.
• Auto—The default link speed. Link speed is
automatically assigned.
• GEN1—Link speed can reach up to first
generation.
• GEN2—Link speed can reach up to second
generation.
• GEN3—Link speed can reach up to third
generation.
• GEN4—Link speed can reach up to fourth
generation.
PCIe Slot MSTOR RAID OptionROM drop-down Whether the server can use the Option ROMs present
list in the PCIe MSTOR RAID. This can be one of the
following:
set PcieSlotMSTORRAIDOptionROM
• Disabled—Option ROM is not available.
• Enabled—Option ROM is available.
PCIe Slot MSTOR Link Speed drop-down list Link speed for PCIe front slot designated by slot n.
This can be one of the following:
set PcieSlotMSTORRAIDLinkSpeed
• Disabled—Slot is disabled, and the card is not
enumerated.
• Auto—The default link speed. Link speed is
automatically assigned.
• GEN1—Link speed can reach up to first
generation.
• GEN2—Link speed can reach up to second
generation.
• GEN3—Link speed can reach up to third
generation.
• GEN4—Link speed can reach up to fourth
generation.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
527
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
IPV6 PXE Support drop-down list Enables or disables IPv6 support for PXE. This can
be one of the following
set IPV6PXE
• disabled—IPv6 PXE support is not available.
• enabled—IPv6 PXE support is always available.
IPV4 PXE Support drop-down list Enables or disables IPv4 support for PXE. This can
be one of the following
set IPV4PXE
• disabled—IPv4 PXE support is not available.
• enabled—IPv4 PXE support is always available.
PCIe ARI Support drop-down list Whether PCI Alternative Routing ID Interpretation
(ARI) support in Windows is enabled. This can be
set PcieARISupport
one of the following:
• auto—ARI support is set to auto controlled by
the system.
• disabled—ARI support is not available.
• enabled—ARI support is always available.
SR-IOV Support drop-down list SR-IOV feature allows a PCIe device to appear to be
multiple separate physical PCIe devices. This can be
set SrIov
one of the following:
• Disabled—SR-IOV feature is disabled.
• Enabled—SR-IOV feature is enabled.
IPV6 HTTP Support drop-down list Enables or disables IPv6 support for HTTP. This can
be one of the following:
set IPV6HTTP
• disabled—IPv6 HTTP support is not available.
• enabled—IPv6 HTTP support is always
available.
IPV4 HTTP Support drop-down list Enables or disables IPv4 support for HTTP. This can
be one of the following:
set IPV4HTTP
• disabled—IPv4 HTTP support is not available.
• enabled—IPv4 HTTP support is always
available.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
528
BIOS Parameters by Server Model
Server Management Tab
Name Description
Network Stack drop-down list This option allows you to monitor IPv6 and IPv4. This
can be one of the following
set NetworkStack
• disabled—Network Stack support is not
available.
Note When disabled, the value set for
IPV4 PXE Support does not
impact the system.
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
OS Boot Watchdog Timer Policy drop-down list What action the system takes if the watchdog timer
expires. This can be one of the following:
set OSBootWatchdogTimerPolicy
• Power Off—The server is powered off if the
watchdog timer expires during OS boot.
• Reset—The server is reset if the watchdog timer
expires during OS boot.
FRB 2 Timer drop-down list Whether the FRB2 timer is used by Cisco IMC to
recover the system if it hangs during POST. This can
set FRB-2
be one of the following:
• Disabled—The FRB2 timer is not used.
• Enabled—The FRB2 timer is started during
POST and used to recover the system if
necessary.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
529
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
OS Watchdog Timer drop-down list Whether the BIOS programs the watchdog timer with
a specified timeout value. This can be one of the
set OSBootWatchdogTimer
following:
• Disabled—The watchdog timer is not used to
track how long the server takes to boot.
• Enabled—The watchdog timer tracks how long
the server takes to boot. If the server does not
boot within the length of time specified in the
OS Boot Watchdog Timer Timeout field, the
Cisco IMC logs an error and takes the action
specified in the OS Boot Watchdog Policy field.
OS Watchdog Timer Timeout drop-down list If OS does not boot within the specified time, OS
watchdog timer expires and system takes action
set OSBootWatchdogTimerTimeOut
according to timer policy. This can be one of the
following:
• 5 Minutes—The OS watchdog timer expires 5
minutes after it begins to boot.
• 10 Minutes—The OS watchdog timer expires
10 minutes after it begins to boot.
• 15 Minutes—The OS watchdog timer expires
15 minutes after it begins to boot.
• 20 Minutes—The OS watchdog timer expires
20 minutes after it begins to boot.
Baud Rate drop-down list What Baud rate is used for the serial port transmission
speed. If you disable Console Redirection, this option
set BaudRate
is not available. This can be one of the following:
• 9.6k—A 9,600 Baud rate is used.
• 19.2k—A 19,200 Baud rate is used.
• 38.4k—A 38,400 Baud rate is used.
• 57.6k—A 57,600 Baud rate is used.
• 115.2k—A 115,200 Baud rate is used.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
530
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Flow Control drop-down list Whether a handshake protocol is used for flow control.
Request to Send / Clear to Send (RTS/CTS) helps to
set FlowCtrl
reduce frame collisions that can be introduced by a
hidden terminal problem. This can be one of the
following:
• None—No flow control is used.
• RTS/CTS—RTS/CTS is used for flow control.
Console Redirection drop-down list Allows a serial port to be used for console redirection
during POST and BIOS booting. After the OS has
set ConsoleRedir
booted, console redirection is irrelevant. This can be
one of the following:
• COM 0—Enables console redirection on COM
1 during POST.
• COM 1—Enables console redirection on COM
1 during POST.
• Disabled—No console redirection occurs during
POST.
Terminal type drop-down list What type of character formatting is used for console
redirection. This can be one of the following:
set TerminalType
• PC-ANSI—The PC-ANSI terminal font is used.
• VT100—A supported VT100 video terminal and
its character set are used.
• VT100-PLUS—A supported VT100-plus video
terminal and its character set are used.
• VT-UTF8—A video terminal with the UTF-8
character set is used.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
531
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
PCIe Slots CDN Control drop-down list Note This option is available only on Cisco
UCS C245 M6 servers equipped with
set PcieSlotsCdnEnable
Mellanox cards in slots 2 or 5.
CDN Control drop-down list Whether the Ethernet Network naming convention is
according to Consistent Device Naming (CDN) or the
set cdnEnable
traditional way of naming conventions. This can be
one of the following:
• Disabled— CDN support for VIC cards is
disabled
• Enabled— CDN support is enabled for VIC
cards.
OptionROM Launch Optimization When this option is Enabled, the OptionROMs only
for the controllers present in the boot order policy will
set CiscoOpromLaunchOptimization
be launched.
Note Some controllers such as Onboard
storage controllers, Emulex FC adapters,
and GPU controllers though not listed
in the boot order policy will have the
OptionROM launched.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
532
BIOS Parameters by Server Model
Security Tab
Name Description
BIOS Techlog Level This option denotes the type of messages in BIOS
tech log file.
set CiscoDebugLevel
The log file can be one of the following types:
• Minimum - Critical messages will be displayed
in the log file.
• Normal - Warning and loading messages will
be displayed in the log file.
• Maximum - Normal and information related
messages will be displayed in the log file.
Security Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Trusted Platform Module State drop-down list Trusted Platform Module (TPM) is a microchip
designed to provide basic security-related functions
set TPMControl
primarily involving encryption keys. This option
allows you to control the TPM Security Device
support for the system. This can be one of the
following:
• Disabled—The server does not use the TPM.
• Enabled—The server uses the TPM.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
533
BIOS Parameters by Server Model
Memory Tab
Name Description
SHA-1 PCR Bank drop-down list Enable or Disable SHA-1 PCR Bank. This can be one
of the following:
set SHA1PCRBank
• Disabled—The server does not use this feature.
• Enabled—The server uses this feature.
SHA256 PCR Bank drop-down list Enable or Disable SHA256 PCR Bank. This can be
one of the following:
set SHA256PCRBank
• Disabled—The server does not use this feature.
• Enabled—The server uses this feature.
Power on Password drop-down list This token requires that you set a BIOS password
before using the F2 BIOS configuration. If enabled,
set PowerOnPassword
password needs to be validated before you access
BIOS functions such as IO configuration, BIOS set
up, and booting to an operating system using BIOS.
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Memory Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
534
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
NUMA Nodes per Socket drop-down list Allows you to configure the memory NUMA domains
per socket. This can be one of the following:
set CbsDfCmnDramNps
• Auto—Number of channels is set to auto.
• NPS0—One NUMA node per system.
• NPS1—One NUMA node per socket.
• NPS2—Two NUMA nodes per socket, one per
Left/Right Half of the SoC.
• NPS4—Four NUMA nodes per socket, one per
Quadrant.
Above 4G Decoding drop-down list Enables or disables MMIO above 4GB or not. This
can be one of the following:
set MemoryMappedIOAbove4GB
• Disabled—The server does not map I/O of 64-bit
PCI devices to 4GB or greater address space.
• Enabled—The server maps I/O of 64-bit PCI
devices to 4GB or greater address space.
Chipselect Interleaving drop-down list Whether memory blocks across the DRAM chip
selects for node 0 are interleaved. This can be one of
set CbsCmnMemMapBankInterleaveDdr4
the following:
• Disabled—Chip selects are not interleaved
within the memory controller.
• Auto—The CPU automatically determines how
to interleave chip selects.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
535
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Memory interleaving Size drop-down list Determines the size of the memory blocks to be
interleaved. It also determines the starting address of
set CbsDfCmnMemIntlvSize
the interleave (bit 8,9,10 or 11). This can be one of
the following:
• Auto
• 256 Bytes
• 512 Bytes
• 1 KB
• 2 KB
• 4 KB
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
536
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
SMEE drop-down list Whether the processor uses the Secure Memory
Encryption Enable (SMEE) function, which provides
set CbsCmnCpuSmee
memory encryption support. This can be one of the
following:
• Auto—The CPU determines how map these
addresses.
• Disabled—The processor does not use the SMEE
function.
• Enabled—The processor uses the SMEE
function.
SNP Memory Coverage drop-down list Allows you to configure SNP memory coverage. This
can be one of the following:
set CbsDbgCpuSnpMemCover
• Auto—System decides the memory coverage.
• Disabled—The processor does not use this
function.
• Enabled—This feature is enabled.
• Custom—Custom size can be defined in SNP
Memory Size to Cover.
SEV-SNP Support drop-down list Allows you to enable Secure Nested Paging feature.
This can be one of the following:
set CbsSevSnpSupport
• Disabled—The processor does not use the
SEV-SNP function.
• Enabled—The processor uses the SEV-SNP
function.
BME DMA Mitigation drop-down list Allows you to disable the PCI BME bit to mitigate
the threat from an unauthorized external DMA. This
set BmeDmaMitigation
can be one of the following:
• Disabled—PCI BME bit is disabled in the BIOS.
• Enabled—PCI BME bit is enabled in the BIOS.
SNP Memory Size to Cover in MB field Allows you to configure SNP memory size.
set CbsDbgCpuSnpMemSizeCover
Burst and Postponed Refresh field • disabled—The processor does not use the
function.
set BurstAndPostponedRefresh
• enabled—The processor uses the function.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
537
BIOS Parameters by Server Model
Power/Performance Tab
Name Description
Post Package Repair field Cisco IMC supports Hard-PPR, which permanently
remaps accesses from a designated faulty row to a
set PostPackageRepair
designated spare row. This can be one of the
following:
• Hard PPR—Support is enabled.
• Disabled—Support is disabled.
Power/Performance Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Core Performance Boost drop-down list Whether the AMD processor increases its frequency
on some cores when it is idle or not being used much.
set CbsCmnCpuCpb
This can be one of the following:
• auto—The CPU automatically determines how
to boost performance.
• disabled—Core performance boost is disabled.
Global C-state Control drop-down list Whether the AMD processors control IO-based C-state
generation and DF C-states This can be one of the
set CbsCmnCpuGlobalCstateCtrl
following:
• auto—The CPU automatically determines how
to control IO-based C-state generation.
• disabled—Global C-state control is disabled.
• enabled—Global C-state control is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
538
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
L1 Stream HW Prefetcher drop-down list Whether the processor allows the AMD hardware
prefetcher to speculatively fetch streams of data and
set CbsCmnCpuL1StreamHwPrefetcher
instruction from memory into the L1 cache when
necessary. This can be one of the following:
• auto—The CPU determines how to place data
from I/O devices into the processor cache.
• disabled—The hardware prefetcher is not used.
• enabled—The processor uses the hardware
prefetcher when cache issues are detected.
L2 Stream HW Prefetcher drop-down list Whether the processor allows the AMD hardware
prefetcher to speculatively fetch streams of data and
set CbsCmnCpuL2StreamHwPrefetcher
instruction from memory into the L2 cache when
necessary. This can be one of the following:
• auto—The CPU determines how to place data
from I/O devices into the processor cache.
• disabled—The hardware prefetcher is not used.
• enabled—The processor uses the hardware
prefetcher when cache issues are detected.
Determinism Slider drop-down list Allows AMD processors to determine how to operate.
This can be one of the following:
set CbsCmnDeterminismSlider
• auto—The CPU automatically uses default
power determinism settings.
• performance—Processor operates at the best
performance in a consistent manner.
• power—Processor operates at the maximum
allowable performance on a per die basis.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
539
BIOS Parameters by Server Model
Processor Tab
Name Description
Efficiency Mode Enable drop-down list Allows you to configure power consumption based
on efficiency.
set CbsCmnEfficiencyModeEn
This can be one of the following:
• auto—The CPU automatically uses default
settings.
• enabled—Efficiency mode is enabled.
Processor Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately check box If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
SVM Mode drop-down list Whether the processor uses AMD Secure Virtual
Machine Technology. This can be one of the
set SvmMode
following: This can be one of the following:
• disabled—The processor does not use SVM
Technology.
• enabled—The processor uses SVM Technology.
SMT Mode drop-down list Whether the processor uses AMD Simultaneous
MultiThreading Technology, which allows
set CbsCpuSmtCtrl
multithreaded software applications to execute threads
in parallel within each processor. This can be one of
the following:
• auto—The processor allows for the parallel
execution of multiple threads.
• disabled—The processor does not use SMT
Mode.
• enabled—The processor uses SMT Mode.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
540
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Downcore control 7xx2 drop-down list Note This Token is applicable for Tehama
servers with 7xx2 Model processors
set CbsCmnCpuGenDowncoreCtrl
only.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
541
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
CPU Downcore control 7xx3 drop-down list Note This Token is applicable for Tehama
servers with 7xx3 Model processors
set CbsCpuCoreCtrl
only.
Fixed SOC P-State drop-down list This option defines the target PState when APBDIS
is set. Px – Specify a valid PState for the processor
set CbsCmnFixedSocPstate
installed. This can be one of the following:
• P0
• P1
• P2
• P3
• Auto
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
542
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
APBDIS drop-down list Allows you to select the APB Disable value for the
SMU. This can be one of the following:
set CbsCmnApbdis
• 0—Clear ApbDis to SMU
• 1—Set ApbDis to SMU.
• auto—The CPU determines the value.
CCD Control drop-down list Allows you to specify the number of CCDs that are
desired to be enable in the system. This can be one of
set CbsCpuCcdCtrlSsp
the following:
• Auto—The maximum CCDs provided by the
processor is enabled.
• 2 CCDs
• 3 CCDs
• 4 CCDs
• 6 CCDs
Cisco xGMI Max Speed drop-down list This option enables 18 Gbps XGMI link speed. This
can be one of the following:
set CiscoXgmiMaxSpeed
• Disabled—Feature is disabled.
• Enabled—Feature is enabled.
ACPI SRAT L3 Cache As NUMA Domain Creates a layer of virtual domains on top of the
drop-down list physical domains in which each CCX is declared to
be in its on domain. This can be one of the following:
set CbsDfCmnAcpiSratL3Numa
• Auto—Set to auto mode.
• Disabled—Use NPS settings for domain
configuration.
• Enabled— Each CCX is declared to be in its
own domain.
Streaming Stores Control drop-down list Enables the streaming stores functionality. This can
be one of the following:
set CbsCmnCpuStreamingStoresCtrl
• Auto—Set to auto mode.
• Disabled—Feature is disabled.
• Enabled—Feature is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
543
BIOS Parameters by Server Model
For C125 Servers
Name Description
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately checkbox If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
OS Boot Watchdog Timer Policy drop-down list What action the system takes if the watchdog timer
expires. This can be one of the following:
set OSBootWatchdogTimerPolicy
• Power Off—The server is powered off if the
watchdog timer expires during OS boot.
• Reset—The server is reset if the watchdog timer
expires during OS boot.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
544
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
OS Watchdog Timer drop-down list Whether the BIOS programs the watchdog timer with
a specified timeout value. This can be one of the
set OSBootWatchdogTimer
following:
• Disabled—The watchdog timer is not used to
track how long the server takes to boot.
• Enabled—The watchdog timer tracks how long
the server takes to boot. If the server does not
boot within the length of time specified in the
OS Boot Watchdog Timer Timeout field, the
Cisco IMC logs an error and takes the action
specified in the OS Boot Watchdog Policy field.
Baud Rate drop-down list What Baud rate is used for the serial port transmission
speed. If you disable Console Redirection, this option
set BaudRate
is not available. This can be one of the following:
• 9.6k—A 9,600 Baud rate is used.
• 19.2k—A 19,200 Baud rate is used.
• 38.4k—A 38,400 Baud rate is used.
• 57.6k—A 57,600 Baud rate is used.
• 115.2k—A 115,200 Baud rate is used.
Console Redirection drop-down list Allows a serial port to be used for console redirection
during POST and BIOS booting. After the OS has
set ConsoleRedir
booted, console redirection is irrelevant. This can be
one of the following:
• Serial Port A—Enables console redirection on
serial port A during POST.
• Serial Port B—Enables console redirection on
serial port B during POST.
• Disabled—No console redirection occurs during
POST.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
545
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
BIOS Techlog Level This option denotes the type of messages in BIOS
tech log file.
The log file can be one of the following types:
• Minimum - Critical messages will be displayed
in the log file.
• Normal - Warning and loading messages will
be displayed in the log file.
• Maximum - Normal and information related
messages will be displayed in the log file.
OptionROM Launch Optimization When this option is Enabled, the OptionROMs only
for the controllers present in the boot order policy will
be launched.
Note Onboard storage controllers though not
listed in the boot order policy will have
the OptionROM launched.
FRB 2 Timer drop-down list Whether the FRB2 timer is used by Cisco IMC to
recover the system if it hangs during POST. This can
set FRB-2
be one of the following:
• Disabled—The FRB2 timer is not used.
• Enabled—The FRB2 timer is started during
POST and used to recover the system if
necessary.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
546
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
OS Watchdog Timer Timeout drop-down list If OS does not boot within the specified time, OS
watchdog timer expires and system takes action
set OSBootWatchdogTimerTimeOut
according to timer policy. This can be one of the
following:
• 5 Minutes—The OS watchdog timer expires 5
minutes after it begins to boot.
• 10 Minutes—The OS watchdog timer expires
10 minutes after it begins to boot.
• 15 Minutes—The OS watchdog timer expires
15 minutes after it begins to boot.
• 20 Minutes—The OS watchdog timer expires
20 minutes after it begins to boot.
Flow Control drop-down list Whether a handshake protocol is used for flow control.
Request to Send / Clear to Send (RTS/CTS) helps to
set FlowCtrl
reduce frame collisions that can be introduced by a
hidden terminal problem. This can be one of the
following:
• None—No flow control is used.
• RTS/CTS—RTS/CTS is used for flow control.
Terminal type drop-down list What type of character formatting is used for console
redirection. This can be one of the following:
set TerminalType
• PC-ANSI—The PC-ANSI terminal font is used.
• VT100—A supported VT100 video terminal and
its character set are used.
• VT100-PLUS—A supported VT100-plus video
terminal and its character set are used.
• VT-UTF8—A video terminal with the UTF-8
character set is used.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
547
BIOS Parameters by Server Model
Security Tab
Name Description
CDN Control drop-down list Whether the Ethernet Network naming convention is
according to Consistent Device Naming (CDN) or the
set cdnEnable
traditional way of naming conventions. This can be
one of the following:
• Disabled— CDN support for VIC cards is
disabled.
• Enabled— CDN support is enabled for VIC
cards.
Security Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately checkbox If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Trusted Platform Module Support drop-down list Trusted Platform Module (TPM ) is a microchip
designed to provide basic security-related functions
set TPMAdminCtrl
primarily involving encryption keys. This option
allows you to control the TPM Security Device
support for the system. It can be one of the following:
• Disabled—The server does not use the TPM.
• Enabled—The server uses the TPM.
Power on Password drop-down list This token requires that you set a BIOS password
before using the F2 BIOS configuration. If enabled,
set PowerOnPassword
password needs to be validated before you access
BIOS functions such as IO configuration, BIOS set
up, and booting to an operating system using BIOS.
It can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
548
BIOS Parameters by Server Model
Memory Tab
Memory Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately checkbox Upon checking, reboots the host server immediately.
You must check the checkbox after saving changes.
Above 4G Decoding drop-down list Enables or disables MMIO above 4GB or not. This
can be one of the following:
set MemoryMappedIOAbove4GB
• Disabled—The server does not map I/O of 64-bit
PCI devices to 4GB or greater address space.
• Enabled—The server maps I/O of 64-bit PCI
devices to 4GB or greater address space.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
549
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Memory Interleaving drop-down list Whether the AMD CPU interleaves the physical
memory so that the memory can be accessed while
another is being refreshed. This controls fabric level
memory interleaving. Channel, die and socket have
requirements based on memory populations and will
be ignored if the memory does not support the selected
option.This can be one of the following:
• auto—The CPU determines how to interleave
memory.
• channel—Interleaves the physical address space
over multiple channels, as opposed to each
channel owning single consecutive address
spaces.
• die—Interleaves the physical address space over
multiple dies, as opposed to each die owning
single consecutive address spaces.
• none—Consecutive memory blocks are accessed
from the same physical memory.
• socket—Interleaves the physical address space
over multiple sockets, as opposed to each socket
owning single consecutive address spaces.
• platform-default —The BIOS uses the value
for this attribute contained in the BIOS defaults
for the server type and vendor.
Memory Interleaving Size drop-down list Determines the size of the memory blocks to be
interleaved. It also determines the starting address of
the interleave (bit 8,9,10 or 11). This can be one of
the following:
• 1 KB
• 2 KB
• 256 Bytes
• 512 Bytes
• auto—The CPU determines the size of the
memory block.
• platform-default —The BIOS uses the value
for this attribute contained in the BIOS defaults
for the server type and vendor.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
550
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Chipselect Interleaving drop-down list Whether memory blocks across the DRAM chip
selects for node 0 are interleaved. This can be one of
the following:
• auto—The CPU automatically determines how
to interleave chip selects.
• disabled—Chip selects are not interleaved within
the memory controller.
• platform-default —The BIOS uses the value
for this attribute contained in the BIOS defaults
for the server type and vendor.
Bank Group Swap drop-down list Determines how physical addresses are assigned to
applications. This can be one of the following:
• auto—The CPU automatically determines how
to assign physical addresses to applications.
• disabled—Bank group swap is not used.
• enabled—Bank group swap is used to improve
the performance of applications.
• platform-default —The BIOS uses the value
for this attribute contained in the BIOS defaults
for the server type and vendor.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
551
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
SMEE drop-down list Whether the processor uses the Secure Memory
Encryption Enable (SMEE) function, which provides
memory encryption support. This can be one of the
following:
• disabled—The processor does not use the SMEE
function.
• enabled—The processor uses the SMEE
function.
• platform-default —The BIOS uses the value
for this attribute contained in the BIOS defaults
for the server type and vendor.
TSME drop-down list Whether the processor uses the Transparent Secure
Memory Encryption (TSME) function, which provides
memory encryption support. This can be one of the
following:
• disabled—The processor does not use the TSME
function.
• enabled—The processor uses the TSME
function.
• auto —The BIOS uses the value for this attribute
contained in the BIOS defaults for the server type
and vendor.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
552
BIOS Parameters by Server Model
I/O Tab
Name Description
DRAM SW Thermal Throttling drop-down list Provides a protective mechanism to ensure that the
software functions within the temperature limits.
When the temperature exceeds the maximum threshold
value, the performance is permitted to drop allowing
to cool down to the minimum threshold value. This
can be one of the following:
• disabled—The processor does not use the
function.
• enabled—The processor uses the function.
• auto —The BIOS uses the value for this attribute
contained in the BIOS defaults for the server type
and vendor.
Burst and Postponed Refresh drop-down list • disabled—The processor does not use the
function.
• enabled—The processor uses the function.
• auto —The BIOS uses the value for this attribute
contained in the BIOS defaults for the server type
and vendor.
I/O Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately Upon checking, reboots the host server immediately. You must check
checkbox the checkbox after saving changes.
Pcie Slotn Oprom drop-down list Whether the server can use the Option ROMs present in the PCIe card
slot designated by n. This can be one of the following:
set PcieSlotnOptionROM
• Disabled—Option ROM for slot n is not available.
• Enabled—Option ROM for slot n is available.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
553
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
PCIe Slotn Link Speed drop-down System IO Controller n (SIOCn) add-on slot (designated by n) link
list speed. This can be one of the following:
set PcieSlotnLinkSpeed • Disabled—Slot is disabled, and the card is not enumerated.
• Auto— The default link speed. Link speed is automatically
assigned.
• GEN1—Link speed can reach up to first generation.
• GEN2—Link speed can reach up to second generation.
• GEN3—Link speed can reach up to third generation.
IPV6 PXE Support drop-down list Enables or disables IPV6 support for PXE. This can be one of the
following
set IPV6PXE
• disabled—IPV6 PXE support is not available.
• enabled—IPV6 PXE support is always available.
IPV4 PXE Support drop-down list Enables or disables IPV4 support for PXE. This can be one of the
following
set IPV4PXE
• disabled—IPV4 PXE support is not available.
• enabled—IPV4 PXE support is always available.
SR-IOV Support drop-down list Whether SR-IOV (Single Root I/O Virtualization) is enabled or disabled
on the server. This can be one of the following:
set SrIov
• Disabled—SR-IOV is disabled.
• Enabled—SR-IOV is enabled.
Front NVME n OptionROM This options allows you to control the Option ROM execution of the
drop-down list PCIe adapter connected to the SSD:NVMe n slot. This can be one of
the following:
set PcieSlot nOptionROM
• disabled—Does not execute Option ROM of the PCIe adapter
connected to the SSD:NVMe n slot.
• enabled—Executes Option ROM of the PCIe adapter connected
to the SSD:NVMe n slot
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
554
BIOS Parameters by Server Model
Power/Performance Tab
Name Description
Front NVME n Link Speed Link speed for NVMe front slot n. This can be one of the following:
drop-down list
• Disabled—Slot is disabled, and the card is not enumerated.
set
PcieSlotFrontNvme1LinkSpeed • Auto—The default link speed. Link speed is automatically assigned.
• GEN1—Link speed can reach up to first generation.
• GEN2—Link speed can reach up to second generation.
• GEN3—Link speed can reach up to third generation.
PCIe Slot MSTOR RAID Whether the server can use the Option ROMs present in the PCIe
OptionROM drop-down list MSTOR RAID. This can be one of the following:
set • Disabled—Option ROM is not available.
PcieSlotMSTORRAIDOptionROM
• Enabled—Option ROM is available.
PCIe ARI Support drop-down list Beginning with release 4.1(2a), Cisco IMC supports PCIe Alternative
Routing ID (ARI) Interpretation feature. The PCIe specification supports
set PcieARISupport
greater numbers of virtual funtions through the implementation of ARI,
which reinterprets the device number field in the PCIe header allowing
for more than eight functions. This can be one of the following:
• Disabled—PCIe ARI Support is not available.
• Enabled—PCIe ARI Support is available.
• Auto—PCIe ARI Support is in auto mode.
IPV6 HTTP Support drop-down Enables or disables IPv6 support for HTTP. This can be one of the
list following:
set IPV6HTTP • disabled—IPv6 HTTP support is not available.
• enabled—IPv6 HTTP support is always available.
IPV4 HTTP Support drop-down Enables or disables IPv4 support for HTTP. This can be one of the
list following:
set IPV4HTTP • disabled—IPv4 HTTP support is not available.
• enabled—IPv4 HTTP support is always available.
Power/Performance Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
555
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Reboot Host Immediately Upon checking, reboots the host server immediately. You must check
checkbox the checkbox after saving changes.
Core Performance Boost Whether the AMD processor increases its frequency on some cores
drop-down list when it is idle or not being used much. This can be one of the following:
• auto—The CPU automatically determines how to boost
performance.
• disabled—Core performance boost is disabled.
• platform-default —The BIOS uses the value for this attribute
contained in the BIOS defaults for the server type and vendor.
Global C-state Control drop-down Whether the AMD processors control IO-based C-state generation and
list DF C-states This can be one of the following:
• auto—The CPU automatically determines how to control IO-based
C-state generation.
• disabled—Global C-state control is disabled.
• enabled—Global C-state control is enabled.
• platform-default —The BIOS uses the value for this attribute
contained in the BIOS defaults for the server type and vendor.
L1 Stream HW Prefetcher Whether the processor allows the AMD hardware prefetcher to
drop-down list speculatively fetch streams of data and instruction from memory into
the L1 cache when necessary. This can be one of the following:
• auto—The CPU determines how to place data from I/O devices
into the processor cache.
• disabled—The hardware prefetcher is not used.
• enabled—The processor uses the hardware prefetcher when cache
issues are detected.
• platform-default —The BIOS uses the value for this attribute
contained in the BIOS defaults for the server type and vendor.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
556
BIOS Parameters by Server Model
Processor Tab
Name Description
L2 Stream HW Prefetcher Whether the processor allows the AMD hardware prefetcher to
drop-down list speculatively fetch streams of data and instruction from memory into
the L2 cache when necessary. This can be one of the following:
• auto—The CPU determines how to place data from I/O devices
into the processor cache.
• disabled—The hardware prefetcher is not used.
• enabled—The processor uses the hardware prefetcher when cache
issues are detected.
• platform-default —The BIOS uses the value for this attribute
contained in the BIOS defaults for the server type and vendor.
Determinism Slider drop-down Allows AMD processors to determine how to operate. This can be one
list of the following:
• auto—The CPU automatically uses default power determinism
settings.
• performance—Processor operates at the best performance in a
consistent manner.
• power—Processor operates at the maximum allowable performance
on a per die basis.
• platform-default —The BIOS uses the value for this attribute
contained in the BIOS defaults for the server type and vendor.
Processor Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately checkbox If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
557
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
SMT Mode drop-down list Whether the processor uses AMD Simultaneous
MultiThreading Technology, which allows
multithreaded software applications to execute threads
in parallel within each processor. This can be one of
the following:
• auto—The processor allows for the parallel
execution of multiple threads.
• off—The processor does not permit
multithreading.
• platform-default —The BIOS uses the value
for this attribute contained in the BIOS defaults
for the server type and vendor.
SVM Mode drop-down list Whether the processor uses AMD Secure Virtual
Machine Technology. This can be one of the
following: This can be one of the following:
• disabled—The processor does not use SVM
Technology.
• enabled—The processor uses SVM Technology.
• platform-default —The BIOS uses the value
for this attribute contained in the BIOS defaults
for the server type and vendor.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
558
BIOS Parameters by Server Model
C220 M5, C240 M5, C240 SD M5, and C480 M5 Servers
Name Description
Downcore control drop-down list Allows AMD processors to disable cores and, thus,
select how many cores to enable. This can be one of
the following:
• FOUR (2+2)—Two cores enabled on each CPU
complex.
• FOUR (4+0)—Four cores enabled on one CPU
complex.
• SIX (3+3)—Three cores enabled on each CPU
complex.
• THREE (3+0)—Three cores enabled on one CPU
complex.
• TWO (1+1)—Two cores enabled on each CPU
complex.
• TWO (2+0)—Two cores enabled on one CPU
complex.
• auto—The CPU determines how many cores
need to be enabled.
• platform-default —The BIOS uses the value
for this attribute contained in the BIOS defaults
for the server type and vendor.
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Upon checking, reboots the host server immediately. You must check the
Immediately checkbox checkbox after saving changes.
Legacy USB Support Whether the system supports legacy USB devices. This can be one of the
drop-down list following:
set UsbLegacySupport • Disabled—USB devices are only available to EFI applications.
• Enabled—Legacy USB support is always available.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
559
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Intel VT for directed IO Whether the processor uses Intel Virtualization Technology (VT), which allows
drop-down list a platform to run multiple operating systems and applications in independent
partitions. This can be one of the following:
set IntelVTD
• Disabled—The processor does not permit virtualization.
• Enabled—The processor allows multiple operating systems in independent
partitions.
Note If you change this option, you must power cycle the server before
the setting takes effect.
Intel VTD coherency Whether the processor supports Intel VT-d Coherency. This can be one of the
support drop-down list following:
set CoherencySupport • Disabled—The processor does not support coherency.
• Enabled—The processor uses VT-d Coherency as required.
Intel VTD ATS support Whether the processor supports Intel VT-d Address Translation Services (ATS).
drop-down list This can be one of the following:
set ATS • Disabled—The processor does not support ATS.
• Enabled—The processor uses VT-d ATS as required.
VMD Enable drop-down Intel Volume Management Device (VMD) is for PCIe NVMe SSDs that provides
list hardware logic to manage and aggregate NVMe SSDs.
This can be one the following:
• Enabled— Enables benefits like robust surprise hot-plug, status LED
management.
• Disabled— Disables benefits like robust surprise hot-plug, status LED
management.
PCIe RAS Support Whether PCIe RAS Support is available on the PCIe slot. This can be one of the
drop-down list following:
• Enabled— PCIe RAS is available on the slot.
• Disabled— PCIe RAS is not available on port.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
560
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Details of VMD supported and unsupported ports for Cisco UCS C480 M5
servers:
Cisco UCS C480 NVMe SKU (32 drive NVME System)
• DMI connected ports 7, 8, and 23 do not support VMD.
• All other twenty nine ports support VMD.
All Onboard LOM Ports Whether all LOM ports are enabled or disabled. This can be one of the following:
drop-down list
• Enabled— All LOM ports are enabled.
• Disabled— All LOM ports are disabled.
LOM Port 0 Whether Option ROM is available on the LOM port 0. This can be one of the
OptionROM drop-down following:
list
• Disabled—Option ROM is not available on LOM port 0.
• Enabled—Option ROM is available on LOM port 0.
LOM Port 1 Whether Option ROM is available on the LOM port 1. This can be one of the
OptionROM following:
• Disabled—Option ROM is not available on LOM port 1.
• Enabled—Option ROM is available on LOM port 1.
PCIe Slot Whether the server can use the Option ROMs present in the PCIe Cards.
nOptionROMdrop-down
This can be one of the following:
list
• Disabled—Option ROM is not available on slot n.
• Enabled—Option ROM is available on slot n.
MRAID OptionROM Whether the server can use the RAID Option ROMs present in the PCIe card slot
designated by n. This can be one of the following:
• Disabled—Option ROM for slot n is not available.
• Enabled—Option ROM for slot n is available.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
561
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
MLOM Oprom This options allows you to control the Option ROM execution of the PCIe adapter
drop-down list connected to the MLOM slot. This can be one of the following:
set • Disabled—Does not execute Option ROM of the PCIe adapter connected
PcieSlotMLOMOptionROM to the MLOM slot.
• Enabled—Executes Option ROM of the PCIe adapter connected to the
MLOM slot.
HBA Oprom drop-down This options allows you to control the Option ROM execution of the PCIe adapter
list connected to the HBA slot. This can be one of the following:
set • Disabled—Does not execute Option ROM of the PCIe adapter connected
PcieSlotHBAOptionROM to the HBA slot.
• Enabled—Executes Option ROM of the PCIe adapter connected to the
HBA slot.
Front NVME1 Oprom This options allows you to control the Option ROM execution of the PCIe adapter
drop-down list connected to the SSD:NVMe1 slot. This can be one of the following:
set • Disabled—Does not execute Option ROM of the PCIe adapter connected
PcieSlotN1OptionROM to the SSD:NVMe1 slot.
• Enabled—Executes Option ROM of the PCIe adapter connected to the
SSD:NVMe1 slot
Front NVME2 Oprom This options allows you to control the Option ROM execution of the PCIe adapter
drop-down list connected to the SSD:NVMe2 slot. This can be one of the following:
set • Disabled—Does not execute Option ROM of the PCIe adapter connected
PcieSlotN2OptionROM to the SSD:NVMe2 slot.
• Enabled—Executes Option ROM of the PCIe adapter connected to the
SSD:NVMe2 slot
HBA Link Speed This option allows you to restrict the maximum speed of an adapter card installed
drop-down list in PCIe HBA slot. This can be one of the following:
set • Disabled—The maximum speed is not restricted.
PcieSlotHBALinkSpeed
• Auto—System selects the maximum speed allowed.
• GEN1—2.5GT/s (gigatransfers per second) is the maximum speed allowed.
• GEN2—5GT/s is the maximum speed allowed.
• GEN3—8GT/s is the maximum speed allowed.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
562
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
MLOM Link Speed This option allows you to restrict the maximum speed of an adapter card installed
drop-down list in PCIe MLOM slot. This can be one of the following:
set • Disabled—The maximum speed is not restricted.
PcieSlotMLOMLinkSpeed
• Auto—System selects the maximum speed allowed.
• GEN1—2.5GT/s (gigatransfers per second) is the maximum speed allowed.
• GEN2—5GT/s is the maximum speed allowed.
• GEN3—8GT/s is the maximum speed allowed.
MRAID Link Speed This option allows you to restrict the maximum speed of an adapter card installed
drop-down list in MRAID slot. This can be one of the following:
• Disabled—The maximum speed is not restricted.
• Auto—System selects the maximum speed allowed.
• GEN1—2.5GT/s (gigatransfers per second) is the maximum speed allowed.
• GEN2—5GT/s is the maximum speed allowed.
• GEN3—8GT/s is the maximum speed allowed.
PCIe Slotn Link Speed System IO Controller n (SIOCn) add-on slot (designated by n) link speed. This
drop-down list can be one of the following:
set PcieSlotnLinkSpeed • Disabled—Slot is disabled, and the card is not enumerated.
• Auto— The default link speed. Link speed is automatically assigned.
• GEN1—Link speed can reach up to first generation.
• GEN2—Link speed can reach up to second generation.
• GEN3—Link speed can reach up to third generation.
Front NVME1 Link Link speed for NVMe front slot 1. This can be one of the following:
Speed drop-down list
• Disabled—Slot is disabled, and the card is not enumerated.
set
PcieSlotFrontNvme1LinkSpeed • Auto—The default link speed. Link speed is automatically assigned.
• GEN1—Link speed can reach up to first generation.
• GEN2—Link speed can reach up to second generation.
• GEN3—Link speed can reach up to third generation.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
563
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Front NVME2 Link Link speed for NVMe front slot 2. This can be one of the following:
Speed drop-down list
• Disabled—Slot is disabled, and the card is not enumerated.
set
PcieSlotFrontNvme2LinkSpeed • Auto—The default link speed. Link speed is automatically assigned.
• GEN1—Link speed can reach up to first generation.
• GEN2—Link speed can reach up to second generation.
• GEN3—Link speed can reach up to third generation.
Rear NVME1 Link Link speed for NVMe rear slot 1. This can be one of the following:
Speed drop-down list
• Disabled—Slot is disabled, and the card is not enumerated.
set
PcieSlotRearNvme1LinkSpeed • Auto—The default link speed. Link speed is automatically assigned.
• GEN1—Link speed can reach up to first generation.
• GEN2—Link speed can reach up to second generation.
• GEN3—Link speed can reach up to third generation.
Rear NVME2 Link Link speed for NVMe rear slot 2. This can be one of the following:
Speed drop-down list
• Disabled—Slot is disabled, and the card is not enumerated.
set
PcieSlotRearNvme2LinkSpeed • Auto—The default link speed. Link speed is automatically assigned.
• GEN1—Link speed can reach up to first generation.
• GEN2—Link speed can reach up to second generation.
• GEN3—Link speed can reach up to third generation.
VGA Priority drop-down Allows you to set the priority for VGA graphics devices if multiple VGA devices
list are found in the system. This can be one of the following:
set VgaPriority • OnBoard—Priority is given to the onboard VGA device. BIOS post screen
and OS boot are driven through the onboard VGA port.
• OffBoard—Priority is given to the PCIE Graphics adapter. BIOS post screen
and OS boot are driven through the external graphics adapter port.
• OnBoard VGA Disabled—Priority is given to the PCIe Graphics adapter,
and the onboard VGA device is disabled. The vKVM does not function
when the onboard VGA is disabled.
P-SATA OptionROM Allows you to select the PCH SATA optionROM mode. This can be one of the
drop-down list following:
set pSATA • LSI SW Raid— Sets both SATA and sSATA controllers to raid mode for
LSI SW Raid.
• Disabled— Disables both SATA and sSATA controllers.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
564
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
M2.SATA OptionROM Mode of operation of Serial Advanced Technology Attachment (SATA) Solid
drop-down list State Drives (SSD). This can be one of the following:
set SataModeSelect • AHCI—
Sets both SATA and sSATA controllers to AHCI mode.
• LSI SW Raid— Sets both SATA and sSATA controllers to raid mode for
LSI SW Raid.
• Disabled— Disables both SATA and sSATA controllers.
USB Port Rear Whether the rear panel USB devices are enabled or disabled. This can be one of
drop-down list the following
set UsbPortRear • Disabled— Disables the rear panel USB ports. Devices connected to these
ports are not detected by the BIOS and operating system.
• Enabled— Enables the rear panel USB ports. Devices connected to these
ports are detected by the BIOS and operating system.
USB Port Front Whether the front panel USB devices are enabled or disabled. This can be one
drop-down list of the following
set UsbPortFront • Disabled— Disables the front panel USB ports. Devices connected to these
ports are not detected by the BIOS and operating system.
• Enabled— Enables the front panel USB ports. Devices connected to these
ports are detected by the BIOS and operating system.
USB Port Internal Whether the internal USB devices are enabled or disabled. This can be one of
drop-down list the following
set UsbPortInt • Disabled— Disables the internal USB ports. Devices connected to these
ports are not detected by the BIOS and operating system.
• Enabled— Enables the internal USB ports. Devices connected to these ports
are detected by the BIOS and operating system.
USB Port KVM Whether the vKVM ports are enabled or disabled. This can be one of the following
drop-down list
• Disabled— Disables the vKVM keyboard and/or mouse devices. Keyboard
set UsbPortKVM and/or mouse will not work in the KVM window.
• Enabled— Enables the vKVM keyboard and/or mouse devices.
USB Port Internal Whether the USB Port Internal is enabled or disabled. This can be one of the
drop-down list following
• Disabled— Disables the USB Port Internal. Devices connected to these
ports are not detected by the BIOS and operating system.
• Enabled— Enables the USB Port Internal. Devices connected to these ports
are detected by the BIOS and operating system.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
565
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
IPV6 PXE Support Enables or disables IPv6 support for PXE. This can be one of the following
drop-down list
• disabled—IPv6 PXE support is not available.
set IPV6PXE
• enabled—IPv6 PXE support is always available.
IPv4 HTTP Support Enables or disables IPv4 support for HTTP. This can be one of the following
• disabled—IPv4 HTTP support is not available.
• enabled—IPv4 HTTP support is always available.
IPv6 HTTP Support Enables or disables IPv6 support for HTTP. This can be one of the following
• disabled—IPv6 PXE support is not available.
• enabled—IPv6 PXE support is always available.
PCIe PLL SSC Enable this feature to reduce EMI interference by down spreading clock 0.5%.
drop-down list Disable this feature to centralize the clock without spreading.
set PciePllSsc This can be one of the following:
• auto—EMI interference is auto adjusted.
Disabled—EMI interference is auto adjusted.
• ZeroPointFive—EMI interference is reduced by down spreading the clock
0.5%.
IPV4 PXE Support Enables or disables IPv4 support for PXE. This can be one of the following
drop-down list
• disabled—IPv4 PXE support is not available.
set IPV4PXE
• enabled—IPv4 PXE support is always available.
Network Stack This option allows you to monitor IPv6 and IPv4. This can be one of the following
drop-down list
• disabled—Network Stack support is not available.
set NetworkStack
Note When disabled, the value set for IPV4 PXE Support does not
impact the system.
External SSC enable This option allows you to reduce the EMI of your motherboard by modulating
drop-down list the signals it generates so that the spikes are reduced to flatter curves.
set This can be one of the following:
EnableClockSpreadSpec
• Disabled—Clock Spread Spectrum support is not available.
• Enabled—Clock Spread Spectrum support is always available.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
566
BIOS Parameters by Server Model
Server Management Tab
Name Description
PCIe Slot MSTOR Whether the server can use the Option ROMs present in the PCIe MSTOR RAID.
RAID OptionROM This can be one of the following:
drop-down list
• Disabled—Option ROM is not available.
set
PcieSlotMSTORRAIDOptionROM • Enabled—Option ROM is available.
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately checkbox If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
OS Boot Watchdog Timer Policy drop-down list What action the system takes if the watchdog timer
expires. This can be one of the following:
set OSBootWatchdogTimerPolicy
• Power Off—The server is powered off if the
watchdog timer expires during OS boot.
• Reset—The server is reset if the watchdog timer
expires during OS boot.
OS Watchdog Timer drop-down list Whether the BIOS programs the watchdog timer with
a specified timeout value. This can be one of the
set OSBootWatchdogTimer
following:
• Disabled—The watchdog timer is not used to
track how long the server takes to boot.
• Enabled—The watchdog timer tracks how long
the server takes to boot. If the server does not
boot within the length of time specified in the
OS Boot Watchdog Timer Timeout field, the
Cisco IMC logs an error and takes the action
specified in the OS Boot Watchdog Policy field.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
567
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
OS Watchdog Timer Timeout drop-down list If OS does not boot within the specified time, OS
watchdog timer expires and system takes action
set OSBootWatchdogTimerTimeOut
according to timer policy. This can be one of the
following:
• 5 Minutes—The OS watchdog timer expires 5
minutes after it begins to boot.
• 10 Minutes—The OS watchdog timer expires
10 minutes after it begins to boot.
• 15 Minutes—The OS watchdog timer expires
15 minutes after it begins to boot.
• 20 Minutes—The OS watchdog timer expires
20 minutes after it begins to boot.
Baud Rate drop-down list What Baud rate is used for the serial port transmission
speed. If you disable Console Redirection, this option
set BaudRate
is not available. This can be one of the following:
• 9.6k—A 9,600 Baud rate is used.
• 19.2k—A 19,200 Baud rate is used.
• 38.4k—A 38,400 Baud rate is used.
• 57.6k—A 57,600 Baud rate is used.
• 115.2k—A 115,200 Baud rate is used.
Console Redirection drop-down list Allows a serial port to be used for console redirection
during POST and BIOS booting. After the OS has
set ConsoleRedir
booted, console redirection is irrelevant. This can be
one of the following:
• Serial Port A—Enables console redirection on
serial port A during POST.
• Serial Port B—Enables console redirection on
serial port B during POST.
• Disabled—No console redirection occurs during
POST.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
568
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Adaptive Memory Training When this option is Enabled:
The Memory training will not happen in every boot
but the BIOS will use the saved memory training
result in every re-boot.
Some exceptions when memory training happens in
every boot are:
BIOS update, CMOS reset, CPU or Memory
configuration change, SPD or run-time uncorrectable
error or the last boot has occurred more than 24 hours
before.
When this option is Disabled, the Memory training
happens in every boot.
Default value: Enabled.
Note To disable the Fast Boot option, the end
user must set the following tokens as
mentioned below:
Adaptive Memory Training to Disabled
BIOS Techlog level to Normal
OptionROM Launch Optimization to
Disabled.
BIOS Techlog Level This option denotes the type of messages in BIOS
tech log file.
The log file can be one of the following types:
• Minimum - Critical messages will be displayed
in the log file.
• Normal - Warning and loading messages will
be displayed in the log file.
• Maximum - Normal and information related
messages will be displayed in the log file.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
569
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
OptionROM Launch Optimization When this option is Enabled, the OptionROMs only
for the controllers present in the boot order policy will
be launched.
Note Some controllers such as Onboard
storage controllers, Emulex FC adapters,
and GPU controllers though not listed
in the boot order policy will have the
OptionROM launched.
CDN Control drop-down list Whether the Ethernet Network naming convention is
according to Consistent Device Naming (CDN) or the
set cdnEnable
traditional way of naming conventions. This can be
one of the following:
• Disabled— CDN support for VIC cards is
disabled
• Enabled— CDN support is enabled for VIC
cards.
FRB 2 Timer drop-down list Whether the FRB2 timer is used by Cisco IMC to
recover the system if it hangs during POST. This can
set FRB-2
be one of the following:
• Disabled—The FRB2 timer is not used.
• Enabled—The FRB2 timer is started during
POST and used to recover the system if
necessary.
Flow Control drop-down list Whether a handshake protocol is used for flow control.
Request to Send / Clear to Send (RTS/CTS) helps to
set FlowCtrl
reduce frame collisions that can be introduced by a
hidden terminal problem. This can be one of the
following:
• None—No flow control is used.
• RTS/CTS—RTS/CTS is used for flow control.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
570
BIOS Parameters by Server Model
Security Tab
Name Description
Terminal type drop-down list What type of character formatting is used for console
redirection. This can be one of the following:
set TerminalType
• PC-ANSI—The PC-ANSI terminal font is used.
• VT100—A supported VT100 video terminal and
its character set are used.
• VT100-PLUS—A supported VT100-plus video
terminal and its character set are used.
• VT-UTF8—A video terminal with the UTF-8
character set is used.
PCIe Slots CDN Control drop-down list Note This option is available only on Cisco
UCS C240 M5 servers equipped with
set PcieSlotsCdnEnable
Qlogic cards in slots 2 or 5.
Security Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
571
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Reboot Host Immediately checkbox If the Reboot Host Immediately check box is checked,
the server is rebooted immediately and the new BIOS
settings go into effect. Otherwise the changes are
saved until the server is manually rebooted.
Trusted Platform Module State drop-down list Trusted Platform Module (TPM ) is a microchip
designed to provide basic security-related functions
set TPMAdminCtrl
primarily involving encryption keys. This option
allows you to control the TPM Security Device
support for the system. It can be one of the following:
• Disabled—The server does not use the TPM.
• Enabled—The server uses the TPM.
SHA-1 PCR Bank Enable or Disable SHA-1 PCR Bank. This can be one
of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
SHA256 PCR Bank Enable or Disable SHA256 PCR Bank. This can be
one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Intel Trusted Execution Technology Support Can be Enabled only when Trusted Platform Module
(TPM) is Enabled. This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Power ON Password drop-down list This token requires that you set a BIOS password
before using the F2 BIOS configuration. If enabled,
set PowerOnPassword
password needs to be validated before you access
BIOS functions such as IO configuration, BIOS set
up, and booting to an operating system using BIOS.
It can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
572
BIOS Parameters by Server Model
Processor Tab
Processor Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Intel Virtualization Technology drop-down list Whether the processor uses Intel Virtualization
Technology (VT), which allows a platform to run
set IntelVT
multiple operating systems and applications in
independent partitions. This can be one of the
following:
• Disabled—The processor does not permit
virtualization.
• Enabled—The processor allows multiple
operating systems in independent partitions.
Extended APIC drop-down list Allows you to enable or disable extended APIC
support. This can be one of the following:
set LocalX2Apic
• Enabled—Enables APIC support
• Disabled—Disables APIC support.
Processor C1E drop-down list Whether the CPU transitions to its minimum
frequency when entering the C1 state. This can be one
set ProcessorC1E
of the following:
• Disabled—The CPU continues to run at its
maximum frequency in C1 state.
• Enabled—The CPU transitions to its minimum
frequency. This option saves the maximum
amount of power in C1 state.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
573
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Processor C6 Report drop-down list Whether the BIOS sends the C6 report to the operating
system. When the OS receives the report, it can
set ProcessorC6Report
transition the processor into the lower C6 power state
to decrease energy usage while maintaining optimal
processor performance. This can be one of the
following:
• Disabled—The BIOS does not send the C6
report.
• Enabled—The BIOS sends the C6 report,
allowing the OS to transition the processor to the
C6 low power state.
Execute Disable Bit drop-down list Classifies memory areas on the server to specify where
application code can execute. As a result of this
set ExecuteDisable
classification, the processor disables code execution
if a malicious worm attempts to insert code in the
buffer. This setting helps to prevent damage, worm
propagation, and certain classes of malicious buffer
overflow attacks. This can be one of the following:
• Disabled—The processor does not classify
memory areas.
• Enabled—The processor classifies memory
areas.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
574
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Turbo Mode drop-down list Whether the processor uses Intel Turbo Boost
Technology, which allows the processor to
set IntelTurboBoostTech
automatically increase its frequency if it is running
below power, temperature, or voltage specifications.
This can be one of the following:
• Disabled—The processor does not increase its
frequency automatically.
• Enabled—The processor utilizes Turbo Boost
Technology if required.
EIST PSD Function drop-down list EIST reduces the latency inherent with changing the
voltage-frequency pair (P-state), thus allowing those
transitions to occur more frequently. This allows for
more granular, demand-based switching and can
optimize the power-to-performance balance, based
on the demands of the applications. This can be one
of the following:
• HW ALL: The processor is coordinates the
P-state among logical processors dependencies.
The OS keeps the P-state request up to date on
all logical processors.
• SW ALL: The OS Power Manager coordinates
the P-state among logical processors with
dependencies and initiates the transition on all
of those Logical Processors.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
575
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
SpeedStep (Pstates) drop-down list Whether the processor uses Enhanced Intel SpeedStep
Technology, which allows the system to dynamically
set EnhancedIntelSpeedStep
adjust processor voltage and core frequency. This
technology can result in decreased average power
consumption and decreased average heat production.
This can be one of the following:
• Disabled—The processor never dynamically
adjusts its voltage or frequency.
• Enabled—The processor utilizes Enhanced Intel
SpeedStep Technology and enables all supported
processor sleep states to further conserve power.
HyperThreading [ALL] drop-down list Whether the processor uses Intel Hyper-Threading
Technology, which allows multithreaded software
set IntelHyperThread
applications to execute threads in parallel within each
processor. This can be one of the following:
• Disabled—The processor does not permit
hyperthreading.
• Enabled—The processor allows for the parallel
execution of multiple threads.
Cores Enabled drop-down list Allows you to disable one or more of the physical
cores on the server. This can be one of the following:
set CoreMultiProcessing
• All—Enables all physical cores. This also
enables Hyper Threading on the associated
logical processor cores.
• 1 through 27—Specifies the number of physical
processor cores that can run on the server. Each
physical core has an associated logical core.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
576
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Processor CMCI drop-down list Allows the CPU to trigger interrupts on corrected
machine check events. The corrected machine check
set ProcessorCMCI
interrupt (CMCI) allows faster reaction than the
traditional polling timer. This can be one of the
following:
• Disabled—Disables CMCI.
• Enabled—Enables CMCI. This is the default
value.
Enhanced Intel SpeedStep Tech drop-down list Whether the processor uses Enhanced Intel SpeedStep
Technology, which allows the system to dynamically
set EnhancedIntelSpeedStep
adjust processor voltage and core frequency. This
technology can result in decreased average power
consumption and decreased average heat production.
This can be one of the following:
• Disabled—The processor never dynamically
adjusts its voltage or frequency.
• Enabled—The processor utilizes Enhanced Intel
SpeedStep Technology and enables all supported
processor sleep states to further conserve power.
Workload Configuration drop-down list This feature allows for workload optimization. The
options are Balanced and I/O Sensitive:
set WorkLdConfig
• NUMA
• UMA
Sub NUMA Clustering drop-down list Whether the CPU supports sub NUMA clustering, in
which the tag directory and the memory channel are
always in the same region. This can be one of the
following:
• disabled— Sub NUMA clustering does not
occur.
• enabled— Sub NUMA clustering occurs.
• auto — The BIOS determines what Sub NUMA
clustering is done.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
577
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
XPT Prefetch drop-down list Whether XPT prefetch is used to enable a read request
sent to the last level cache to issue a copy of that
request to the memory controller prefetcher. This can
be one of the following:
• disabled—The CPU does not use the XPT
Prefetch option.
• enabled—The CPU enables the XPT prefetch
option.
UPI Prefetch drop-down list UPI prefetch is a mechanism to get the memory read
started early on a DDR bus. This can be one of the
following:
• disabled—The processor does not preload any
cache data.
• enabled—The UPI prefetcher preloads the L1
cache with the data it determines to be the most
relevant.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
578
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Energy Performance Bias Config drop-down list Allows you to determine whether system performance
or energy efficiency is more important on this server.
set CpuEngPerfBias
This can be one of the following:
• — The server provides all server components
with full power at all times. This option
maintains the highest level of performance and
requires the greatest amount of power.
• — The server provides all server components
with enough power to keep a balance between
performance and power.
• — The server provides all server components
with enough power to keep a balance between
performance and power.
• — The server provides all server components
with maximum power to keep reduce power
consumption.
Power Performance Tuning drop-down list Determines if the BIOS or Operating System can turn
on the energy performance bias tuning. The options
set PwrPerfTuning
are BIOS and OS.
• bios—
Chooses BIOS for energy performance tuning.
• os—
Chooses OS for energy performance tuning.
LLC Prefetch drop-down list Whether the processor uses the LLC Prefetch
mechanism to fetch the date into the LLC. This can
be one of the following:
• disabled—The processor does not preload any
cache data.
• enabled—The LLC prefetcher preloads the L1
cache with the data it determines to be the most
relevant.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
579
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Hardware P-States drop-down list Enables processor Hardware P-State. This can be one
of the following:
set CpuHWPM
• disabled—HWPM is disabled.
• hwpm-native-mode—HWPM native mode is
enabled.
• hwpm-oob-mode—HWPM Out-Of-Box mode
is enabled.
• Native Mode with no Legacy (only GUI)
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
580
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Intel Speed Select drop-down list Intel Speed Select modes will allow users to run the
CPU with different speed and cores.
set IntelSpeedSelect
This can be one of the following:
• Base— It will allow users to access maximum
core and Thermal Design Power (TDP) ratio.
• Config 1— It will allow users to access core and
TDP ratio lesser than Base.
• Config 2— It will allow users to access core and
TDP ratio lesser than Config 1.
Uncore Frequency Scaling drop-down list This feature allows you configure the scaling of
uncore frequency of the processor. This can be one
set UFSDisable
of the following:
• enabled—Uncore frequency of the processor
scales up or down based on the load.
• disabled—Uncore frequency of the processor
remains fixed.
®
Refer Intel Dear Customer Letter (DCL) to know
the fixed higher and lower values for Uncore
Frequency Scaling.
Configurable TDP Level drop-down list Configurable TDP Level feature allows adjustments
in processor thermal design power values. By
set ConfigTDPLevel
modifying the processor behavior and the performance
levels, power consumption of a processor can be
configured and TDP can be adjusted as the same time.
Hence, a processor operates at higher or lower
performance levels, depending on the available
cooling capacities and desired power consumption.
This can be one of the following:
• Normal
• Level 1
• Level 2
®
Refer Intel Dear Customer Letter (DCL) to know
the values for TDP level.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
581
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
UPI Link Speed drop-down list Note UPI Link Frequency Select token is
not applicable for single socket
set QpiLinkSpeed
configuration.
Energy Efficient Turbo drop-down list When energy efficient turbo is enabled, the optimal
turbo frequency of the CPU turns dynamic based on
set EnergyEfficientTurbo
CPU utilization. The power/performance bias setting
also influences energy efficient turbo. This can be one
of the following:
• Disabled—Energy Efficient Turbo is disabled.
• Enabled—Energy Efficient Turbo is enabled.
Processor EPP Enable Displays the selected value for Processor EPP Enable.
• Disabled—Processor EPP Enable is disabled.
• Enabled—Processor EPP Enable is enabled.
Autonomous Core C-state drop-down list Enables CPU Autonomous C-State, which converts
the HALT instructions to the MWAIT instructions.
set AutoCCState
This can be one of the following:
• Disabled—CPU Autonomous C-state is disabled.
• Enabled—CPU Autonomous C-state is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
582
BIOS Parameters by Server Model
Memory Tab
Name Description
Patrol Scrub drop-down list Allows the system to actively search for, and correct,
single bit memory errors even in unused portions of
set PatrolScrub
the memory on the server. This can be one of the
following:
• Disabled—The system checks for memory ECC
errors only when the CPU reads or writes a
memory address.
• Enabled—The system periodically reads and
writes memory searching for ECC errors. If any
errors are found, the system attempts to fix them.
This option may correct single bit errors before
they become multi-bit errors, but it may
adversely affect performance when the patrol
scrub is running.
• Enable at End of POST—The system checks
for memory ECC errors after BIOS POST.
Processor EPP Profile drop-down list Allows you to determine whether system performance
or energy efficiency is more important on this server.
set EPPProfile
This can be one of the following:
• Performance
• Balanced Performance
• Balanced Power
• Power
Memory Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately checkbox Upon checking, reboots the host server immediately.
You must check the checkbox after saving changes.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
583
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Select Memory RAS configuration drop-down list Determines how the memory reliability, availability,
and serviceability (RAS) is configured for the server.
set SelectMemoryRAS
This can be one of the following:
• Maximum Performance—System performance
is optimized.
• ADDDC Sparing—Adaptive virtual lockstep is
an algorithm implemented in the hardware and
firmware to support the ADDDC mode. When
selected, the system performance is optimized
till the algorithm is activated. The algorithm is
activated in case of DRAM device failure. Once
the algorithm is activated, the virtual lockstep
regions are activated to map out the failed region
during run-time dynamically, and the
performance impact is restricted at a region level.
• Mirror Mode 1LM—System reliability is
optimized by using half the system memory as
backup.
• Partial Mirror Mode 1LM—Partial DIMM
Mirroring creates a mirrored copy of a specific
region of memory cells, rather than keeping the
complete mirror copy. Partial Mirroring creates
a mirrored region in memory map with the
attributes of a partial mirror copy. Up to 50% of
the total memory capacity can be mirrored, using
up to 4 partial mirrors.
Above 4G Decoding drop-down list Enables or disables MMIO above 4GB or not. This
can be one of the following:
set MemoryMappedIOAbove4GB
• Disabled—The server does not map I/O of 64-bit
PCI devices to 4GB or greater address space.
• Enabled—The server maps I/O of 64-bit PCI
devices to 4GB or greater address space.
DCPMM Firmware Downgrade drop-down list Whether the BIOS supports downgrading the DCPMM
firmware. This can be one of the following:
set DCPMMFirmwareDowngrade
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
584
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Partial Memory Mirror Mode drop-down list The partial memory size is either in percentage or in
GB. This can be one of the following:
set PartialMirrorModeConfig
• Percentage—The partial memory mirror is
defined in percentage.
• Value in GB—The partial memory mirror is
defined in GB.
• Disabled—Partial memory mirror is disabled.
Partial Mirror1 Size in GB field Size of the first partial memory mirror in GB.
set PartialMirrorValue1 Enter an integer between 0 and 65535.
Note The combined memory size of all the
partial mirror should not exceed 50% of
the physical memory size.
Partial Mirror2 Size in GB field Size of the second partial memory mirror in GB.
set PartialMirrorValue2 Enter an integer between 0 and 65535.
Note The combined memory size of all the
partial mirror should not exceed 50% of
the physical memory size.
Partial Mirror3 Size in GB field Size of the third partial memory mirror in GB.
set PartialMirrorValue3 Enter an integer between 0 and 65535.
Note The combined memory size of all the
partial mirror should not exceed 50% of
the physical memory size.
Partial Mirror4 Size in GB field Size of the fourth partial memory mirror in GB.
set PartialMirrorValue4 Enter an integer between 0 and 65535.
Note The combined memory size of all the
partial mirror should not exceed 50% of
the physical memory size.
Memory Size Limit in GB field Use this option to reduce the size of the physical
memory limit in GB.
set MemorySizeLimit
Enter an integer between 0 and 65535.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
585
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
BME DMA Mitigation drop-down list Allows you to disable the PCI BME bit to mitigate
the threat from an unauthorized external DMA. This
set BmeDmaMitigation
can be one of the following:
• Disabled—PCI BME bit is disabled in the BIOS.
• Enabled—PCI BME bit is enabled in the BIOS.
Select PPR Type drop-down list Cisco IMC supports Hard-PPR, which permanently
remaps accesses from a designated faulty row to a
set SelectPprType
designated spare row.
This can be one of the following:
• Hard PPR—Support is enabled.
Note Hard PPR can be used only when
Memory RAS Configuration is
set to ADDDC Sparing. For other
RAS selections, this setting should
be set to Disabled.
• Disabled—Support is disabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
586
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Snoopy mode for AD drop-down list Enables new AD specific feature to avoid directory
updates to DDRT memory from non-NUMA
SnoopyModeForAD
optimized workloads.
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
CR FastGo Config drop-down list Enables you to select CR QoS configuration profiles.
CrfastgoConfig This can be one of the following:
• Default
• Option 1
• Option 2
• Option 3
• Option 4
• Option 5
• Auto
NVM Performance Setting drop-down list Enables you to configure NVM baseline performance
settings depending on the workload behavior.
NvmdimmPerformConfig
• BW Optimized
• Latency Optimized
• Balanced Profile
Snoopy mode for 2LM drop-down list Enables you to avoid directory updates to far-memory
from non-NUMA optimized workloads.
SnoopyModeFor2LM
This can be one of the following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
587
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Memory Thermal Throttling Mode drop-down list This function is used for adjusting memory
temperature. If memory temperature is excessively
MemoryThermalThrottling
high after the function is enabled, the memory access
rate is reduced and Baseboard Management Controller
(BMC) adjusts the fan to cool down the memory to
avoid any DIMM damage.
This can be one of the following:
• Disabled—Support is disabled.
• CLTT with PECI—Enables Closed Loop
Thermal Throttling with Platform Environment
Control Interface.
Memory Refresh Rate drop-down list Enables you to increase or decrease memory refresh
rate. Increasing the DRAM refresh rate reduces the
MemoryRefreshRate
maximum number of activates (hammers) that can
occur before the next refresh.
This can be one of the following:
• 1X Refresh—Refresh rate is at minimum.
• 2X Refresh —Refresh is 2X faster.
Panic and High Watermark drop-down list When set to low, the memory controller does not
postpone refreshes while Memory Refresh Rate is
PanicHighWatermark
set to 1X Refresh.
This can be one of the following:
• Low—Refresh rate is set to low.
• High —Refresh rate is set to high.
Advanced Memory Test drop-down list Note This feature is applicable only to
Samsung, Hynix and Micron DIMMs.
AdvancedMemTest
You can enable advance DIMM testing during BIOS
POST using this feature. This can be one of the
following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Enhanced Memory Test drop-down list This can be one of the following:
• Auto—Support is set to Auto.
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
588
BIOS Parameters by Server Model
Power/Performance Tab
Power/Performance Tab
Note BIOS parameters listed in this tab may vary depending on the server.
Name Description
Reboot Host Immediately Upon checking, reboots the host server immediately. You must check
checkbox the checkbox after saving changes.
Hardware Prefetcher drop-down Whether the processor allows the Intel hardware prefetcher to fetch
list streams of data and instruction from memory into the unified
second-level cache when necessary. This can be one of the following:
set HardwarePrefetch
• Disabled—The hardware prefetcher is not used.
• Enabled—The processor uses the hardware prefetcher when cache
issues are detected.
Adjacent Cache Line Prefetcher Whether the processor fetches cache lines in even or odd pairs instead
drop-down list of fetching just the required line. This can be one of the following:
set AdjacentCacheLinePrefetch • Disabled—The processor only fetches the required line.
• Enabled—The processor fetches both the required line and its
paired line.
DCU Streamer Prefetch Whether the processor uses the DCU IP Prefetch mechanism to analyze
drop-down list historical cache access patterns and preload the most relevant lines in
the L1 cache. This can be one of the following:
set DcuStreamerPrefetch
• Disabled—The processor does not try to anticipate cache read
requirements and only fetches explicitly requested lines.
• Enabled—The DCU prefetcher analyzes the cache read pattern
and prefetches the next line in the cache if it determines that it may
be needed.
DCU IP Prefetcher drop-down list Whether the processor uses the DCU IP Prefetch mechanism to analyze
historical cache access patterns and preload the most relevant lines in
set DcuIpPrefetch
the L1 cache. This can be one of the following:
• Disabled—The processor does not preload any cache data.
• Enabled—The DCU IP prefetcher preloads the L1 cache with the
data it determines to be the most relevant.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
589
BIOS Parameters by Server Model
C460 M4 Servers
Name Description
CPU Performance drop-down list Sets the CPU performance profile for the options listed above. This can
be one of the following:
set CPUPerformance
• Enterprise—All options are enabled.
• HPC—All options are enabled. This setting is also known as high
performance computing.
• Hight Throughput—Only the DCU IP Prefetcher is enabled. The
rest of the options are disabled.
• Custom—All performance profile options can be configured from
the BIOS setup on the server. In addition, the Hardware Prefetcher
and Adjacent Cache-Line Prefetch options can be configured as
well.
C460 M4 Servers
Main Tab for C460 M4 Servers
Main BIOS Parameters
Name Description
Reboot Host Immediately Upon checking, reboots the host server immediately. You must check
checkbox the checkbox after saving changes.
Power ON Password Support This token requires that you set a BIOS password before using the F2
drop-down BIOS configuration. If enabled, password needs to be validated before
you access BIOS functions such as IO configuration, BIOS set up, and
booting to an operating system using BIOS. It can be one of the
following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
590
BIOS Parameters by Server Model
Advanced Tab for C460 M4 Servers
Actions Area
Name Description
Save button Saves the settings for the BIOS parameter and closes the dialog box.
If the Reboot Host Immediately check box is checked, the server is
rebooted immediately and the new BIOS settings go into effect.
Otherwise the changes are saved until the server is manually rebooted.
Reset button Resets the values for the BIOS parameters on all three tabs to the settings
that were in effect when this dialog box was first opened.
Restore Defaults button Sets the BIOS parameters on all three tabs to their default settings.
Note If there are existing BIOS parameter changes pending, Cisco IMC automatically overwrites the stored values
with the current settings when you click Save Changes.
Name Description
Intel Hyper-Threading Technology Whether the processor uses Intel Hyper-Threading Technology,
which allows multithreaded software applications to execute
set IntelHyperThread
threads in parallel within each processor. This can be one of the
following:
• Disabled—The processor does not permit hyperthreading.
• Enabled—The processor allows for the parallel execution
of multiple threads.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
591
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Number of Enabled Cores Allows you to disable one or more of the physical cores on the
server. This can be one of the following:
set CoreMultiProcessing
• All—Enables all physical cores. This also enables Hyper
Threading on the associated logical processor cores.
• 1 through n—Specifies the number of physical processor
cores that can run on the server. Each physical core has an
associated logical core.
Intel VT-d Whether the processor uses Intel Virtualization Technology for
Directed I/O (VT-d). This can be one of the following:
set IntelVTD
• Disabled—The processor does not use virtualization
technology.
• Enabled—The processor uses virtualization technology.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
592
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Intel(R) Interrupt Remapping drop-down Whether the processor supports Intel VT-d Interrupt Remapping.
list This can be one of the following:
set InterruptRemap • Disabled—The processor does not support remapping.
• Enabled—The processor uses VT-d Interrupt Remapping
as required.
Intel(R) Passthrough DMA drop-down Whether the processor supports Intel VT-d Pass-through DMA.
list This can be one of the following:
set PassThroughDMA • Disabled—The processor does not support pass-through
DMA.
• Enabled—The processor uses VT-d Pass-through DMA
as required.
Intel VT-d Coherency Support Whether the processor supports Intel VT-d Coherency. This can
be one of the following:
set CoherencySupport
• Disabled—The processor does not support coherency.
• Enabled—The processor uses VT-d Coherency as required.
Intel VT-d ATS Support Whether the processor supports Intel VT-d Address Translation
Services (ATS). This can be one of the following:
set ATS
• Disabled—The processor does not support ATS.
• Enabled—The processor uses VT-d ATS as required.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
593
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
CPU Performance Sets the CPU performance profile for the server. The
performance profile consists of the following options:
set CPUPerformance
• DCU Streamer Prefetcher
• DCU IP Prefetcher
• Hardware Prefetcher
• Adjacent Cache-Line Prefetch
Hardware Prefetcher Whether the processor allows the Intel hardware prefetcher to
fetch streams of data and instruction from memory into the
set HardwarePrefetch
unified second-level cache when necessary. This can be one of
the following:
• Disabled—The hardware prefetcher is not used.
• Enabled—The processor uses the hardware prefetcher
when cache issues are detected.
Adjacent Cache Line Prefetcher Whether the processor fetches cache lines in even/odd pairs
instead of fetching just the required line. This can be one of the
set AdjacentCacheLinePrefetch
following:
• Disabled—The processor only fetches the required line.
• Enabled— The processor fetches both the required line
and its paired line.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
594
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
DCU Streamer Prefetch Whether the processor uses the DCU IP Prefetch mechanism to
analyze historical cache access patterns and preload the most
set DcuStreamerPrefetch
relevant lines in the L1 cache. This can be one of the following:
• Disabled—The processor does not try to anticipate cache
read requirements and only fetches explicitly requested
lines.
• Enabled—The DCU prefetcher analyzes the cache read
pattern and prefetches the next line in the cache if it
determines that it may be needed.
DCU IP Prefetcher Whether the processor uses the DCU IP Prefetch mechanism to
analyze historical cache access patterns and preload the most
set DcuIpPrefetch
relevant lines in the L1 cache. This can be one of the following:
• Disabled—The processor does not preload any cache data.
• Enabled—The DCU IP prefetcher preloads the L1 cache
with the data it determines to be the most relevant.
Direct Cache Access Support Allows processors to increase I/O performance by placing data
from I/O devices directly into the processor cache. This setting
set DirectCacheAccess
helps to reduce cache misses. This can be one of the following:
• Disabled—Data from I/O devices is not placed directly
into the processor cache.
• Enabled—Data from I/O devices is placed directly into
the processor cache.
Power Technology Enables you to configure the CPU power management settings
for the following options:
set CPUPowerManagement
• Enhanced Intel Speedstep Technology
• Intel Turbo Boost Technology
• Processor Power State C6
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
595
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Enhanced Intel Speedstep Technology Whether the processor uses Enhanced Intel SpeedStep
Technology, which allows the system to dynamically adjust
set EnhancedIntelSpeedStep
processor voltage and core frequency. This technology can result
in decreased average power consumption and decreased average
heat production. This can be one of the following:
• Disabled—The processor never dynamically adjusts its
voltage or frequency.
• Enabled—The processor utilizes Enhanced Intel SpeedStep
Technology and enables all supported processor sleep states
to further conserve power.
Intel Turbo Boost Technology Whether the processor uses Intel Turbo Boost Technology, which
allows the processor to automatically increase its frequency if
set IntelTurboBoostTech
it is running below power, temperature, or voltage specifications.
This can be one of the following:
• Disabled—The processor does not increase its frequency
automatically.
• Enabled—The processor utilizes Turbo Boost Technology
if required.
Processor C3 Report Whether the BIOS sends the C3 report to the operating system.
When the OS receives the report, it can transition the processor
set ProcessorC3Report
into the lower C3 power state to decrease energy usage while
maintaining optimal processor performance. This can be one of
the following:
• Disabled—BIOS does not send C3 report.
• Enabled—BIOS sends the C3 report, allowing the OS to
transition the processor to the C3 low power state.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
596
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Processor C6 Report Whether the BIOS sends the C6 report to the operating system.
When the OS receives the report, it can transition the processor
set ProcessorC6Report
into the lower C6 power state to decrease energy usage while
maintaining optimal processor performance. This can be one of
the following:
• Disabled—The BIOS does not send the C6 report.
• Enabled—The BIOS sends the C6 report, allowing the OS
to transition the processor to the C6 low power state.
Processor Power State C1 Enhanced Whether the CPU transitions to its minimum frequency when
entering the C1 state. This can be one of the following:
set ProcessorC1EReport
• Disabled—The CPU continues to run at its maximum
frequency in C1 state.
• Enabled—The CPU transitions to its minimum frequency.
This option saves the maximum amount of power in C1
state.
P-STATE Coordination Allows you to define how BIOS communicates the P-state
support model to the operating system. There are 3 models as
set PsdCoordType
defined by the Advanced Configuration and Power Interface
(ACPI) specification.
• HW_ALL—The processor hardware is responsible for
coordinating the P-state among logical processors with
dependencies (all logical processors in a package).
• SW_ALL—The OS Power Manager (OSPM) is responsible
for coordinating the P-state among logical processors with
dependencies (all logical processors in a physical package),
and must initiate the transition on all of the logical
processors.
• SW_ANY—The OS Power Manager (OSPM) is responsible
for coordinating the P-state among logical processors with
dependencies (all logical processors in a package), and may
initiate the transition on any of the logical processors in the
domain.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
597
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
SINGLE_PCTL drop-down list Facilitates single PCTL support for better processor power
management. This can be one of the following:
get SinglePCTLEn
• No
• Yes
Config TDP drop-down list Allows you to configure the Thermal Design Power (TDP)
settings for the system. TDP is the maximum amount of power
get ConfigTDP
allowed for running applications without triggering an
overheating event. This can be one of the following:
• Disabled—Disables the TDP settings. This is the default
value.
• Enabled—Enables the TDP settings.
Energy Performance Tuning Allows you to choose BIOS or Operating System for energy
performance bias tuning. This can be one of the following:
set PwrPerfTuning
• OS— Chooses OS for energy performance tuning.
• BIOS— Chooses BIOS for energy performance tuning.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
598
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Package C State Limit The amount of power available to the server components when
they are idle. This can be one of the following:
set PackageCStateLimit
• C0_state—The server provides all server components with
full power at all times. This option maintains the highest
level of performance and requires the greatest amount of
power.
• C1_state—When the CPU is idle, the system slightly
reduces the power consumption. This option requires less
power than C0 and allows the server to return quickly to
high performance mode.
• C3_state—When the CPU is idle, the system reduces the
power consumption further than with the C1 option. This
requires less power than C1 or C0, but it takes the server
slightly longer to return to high performance mode.
• C6_state—When the CPU is idle, the system reduces the
power consumption further than with the C3 option. This
option saves more power than C0, C1, or C3, but there may
be performance issues until the server returns to full power.
• C7_state—When the CPU is idle, the server makes a
minimal amount of power available to the components.
This option saves the maximum amount of power but it
also requires the longest time for the server to return to high
performance mode.
• No_Limit—The server may enter any available C state.
Extended APIC Allows you to enable or disable extended APIC support. This
can be one of the following:
set LocalX2Apic
• XAPIC—Enables APIC support.
• X2APIC—Enables APIC and also enables Intel VT-d and
Interrupt Remapping .
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
599
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
IIO Error Enable drop-down list Allows you to generate the IIO-related errors. This can be one
of the following:
get IohErrorEn
• Yes
• No
Name Description
Select Memory RAS How the memory reliability, availability, and serviceability
(RAS) is configured for the server. This can be one of the
set SelectMemoryRAS
following:
• Maximum_Performance—System performance is
optimized.
• Mirroring—System reliability is optimized by using half
the system memory as backup.
• Lockstep—If the DIMM pairs in the server have an
identical type, size, and organization and are populated
across the SMI channels, you can enable lockstep mode to
minimize memory access latency and provide better
performance. This option offers better system performance
than Mirroring and better reliability than Maximum
Performance but lower reliability than Mirroring and lower
system performance than Maximum Performance.
DRAM Clock Throttling Allows you to tune the system settings between the memory
bandwidth and power consumption. This can be one of the
set DRAMClockThrottling
following:
• Balanced— DRAM clock throttling is reduced, providing
a balance between performance and power.
• Performance—DRAM clock throttling is disabled,
providing increased memory bandwidth at the cost of
additional power.
• Energy_Efficient—DRAM clock throttling is increased
to improve energy efficiency.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
600
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Low Voltage DDR Mode Whether the system prioritizes low voltage or high frequency
memory operations. This can be one of the following:
set LvDDRMode
• Power_Saving_Mode—The system prioritizes low voltage
memory operations over high frequency memory operations.
This mode may lower memory frequency in order to keep
the voltage low.
• Performance_Mode—The system prioritizes high
frequency operations over low voltage operations.
Closed Loop Therm Throt drop-down list Allows for the support of Closed-Loop Thermal Throttling,
which improves reliability and reduces CPU power consumption
set closedLoopThermThrotl
through the automatic voltage control while the CPUs are in the
idle state. This can be one of the following:
• Disabled—Disables closed loop thermal throttling.
• Enabled—Enables closed loop thermal throttling. This is
the default value.
Channel Interleaving Whether the CPU divides memory blocks and spreads contiguous
portions of data across interleaved channels to enable
set ChannelInterLeave
simultaneous read operations. This can be one of the following:
• Auto—The CPU determines what interleaving is done.
• 1_Way—Some channel interleaving is used.
• 2_Way
• 3_Way
• 4_Way—The maximum amount of channel interleaving
is used.
Rank Interleaving Whether the CPU interleaves physical ranks of memory so that
one rank can be accessed while another is being refreshed. This
set RankInterLeave
can be one of the following:
• Auto—The CPU determines what interleaving is done.
• 1_Way—Some rank interleaving is used.
• 2_Way
• 4_Way
• 8_Way—The maximum amount of rank interleaving is
used.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
601
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Patrol Scrub Whether the system actively searches for, and corrects, single
bit memory errors even in unused portions of the memory on
set PatrolScrub
the server. This can be one of the following:
• Disabled—The system checks for memory ECC errors
only when the CPU reads or writes a memory address.
• Enabled—The system periodically reads and writes
memory searching for ECC errors. If any errors are found,
the system attempts to fix them. This option may correct
single bit errors before they become multi-bit errors, but it
may adversely affect performance when the patrol scrub is
running.
Demand Scrub Whether the system corrects single bit memory errors
encountered when the CPU or I/O makes a demand read. This
set DemandScrub
can be one of the following:
• Disabled— Single bit memory errors are not corrected.
• Enabled— Single bit memory errors are corrected in
memory and the corrected data is set in response to the
demand read.
Altitude The approximate number of meters above sea level at which the
physical server is installed. This can be one of the following:
set Altitude
• Auto—The CPU determines the physical elevation.
• 300_M—The server is approximately 300 meters above
sea level.
• 900_M—The server is approximately 900 meters above
sea level.
• 1500_M—The server is approximately 1500 meters above
sea level.
• 3000_M—The server is approximately 3000 meters above
sea level.
Panic and High Watermark drop-down When set to low, the memory controller does not postpone
list refreshes while Memory Refresh Rate is set to 1X Refresh.
PanicHighWatermark This can be one of the following:
• Low—Refresh rate is set to low.
• High —Refresh rate is set to high.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
602
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
QPI Link Frequency Select The Intel QuickPath Interconnect (QPI) link frequency, in gigatransfers
per second (GT/s). This can be one of the following:
set QPILinkFrequency
• Auto—The CPU determines the QPI link frequency.
• 6.4_GT/s
• 7.2_GT/s
• 8.0_GT/s
QPI Snoop Mode The Intel QuickPath Interconnect (QPI) snoop mode. This can be one
of the following:
set QpiSnoopMode
• Disabled—Disables the QPI snoop mode.
• Cluster on Die—Enables Cluster On Die. When enabled LLC is
split into two parts with an independent caching agent for each.
This helps increase the performance in some workloads. This mode
is available only for processors that have 10 or more cores. It is the
best mode for highly NUMA optimized workloads.
• Auto—The CPU automatically recognizes this as Early Snoop
mode. This is the default value.
Name Description
Legacy USB Support Whether the system supports legacy USB devices. This can be one of
the following:
set LegacyUSBSupport
• Disabled—USB devices are only available to EFI applications.
• Enabled—Legacy USB support is always available.
• Auto—Disables legacy USB support if no USB devices are
connected.
Port 60/64 Emulation Whether the system supports 60h/64h emulation for complete USB
keyboard legacy support. This can be one of the following:
set UsbEmul6064
• Disabled—60h/64 emulation is not supported.
• Enabled—60h/64 emulation is supported.
You should select this option if you are using a non-USB aware
operating system on the server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
603
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
All USB Devices Whether all physical and virtual USB devices are enabled or disabled.
This can be one of the following:
set AllUsbDevices
• Disabled—All USB devices are disabled.
• Enabled—All USB devices are enabled.
USB Port: Rear Whether the rear panel USB devices are enabled or disabled. This can
be one of the following:
set UsbPortRear
• Disabled—Disables the rear panel USB ports. Devices connected
to these ports are not detected by the BIOS and operating system.
• Enabled—Enables the rear panel USB ports. Devices connected
to these ports are detected by the BIOS and operating system.
USB Port: Internal Whether the internal USB devices are enabled or disabled. This can be
one of the following:
set UsbPortInt
• Disabled—Disables the internal USB ports. Devices connected to
these ports are not detected by the BIOS and operating system.
• Enabled—Enables the internal USB ports. Devices connected to
these ports are detected by the BIOS and operating system.
USB Port: KVM Whether the vKVM ports are enabled or disabled. This can be one of
the following:
set UsbPortKVM
• Disabled—Disables the vKVM keyboard and/or mouse devices.
Keyboard and/or mouse will not work in the vKVM window.
• Enabled—Enables the vKVM keyboard and/or mouse devices.
USB Port: vMedia Whether the virtual media devices are enabled or disabled. This can be
one of the following:
set UsbPortVMedia
• Disabled—Disables the vMedia devices.
• Enabled—Enables the vMedia devices.
xHCI Mode Whether the xHCI controller legacy support is enabled or disabled. This
can be one of the following:
set PchUsb30Mode
• Disabled—Disables the xHCI controller legacy support.
• Enabled—Enables the xHCI controller legacy support.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
604
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Memory Mapped I/O Above 4GB Whether to enable or disable MMIO above 4GB or not. This
can be one of the following:
set MemoryMappedIOAbove4GB
• Disabled—The server does not map I/O of 64-bit PCI
devices to 4GB or greater address space.
• Enabled—The server maps I/O of 64-bit PCI devices to
4GB or greater address space.
SR-IOV Support drop-down list Whether SR-IOV (Single Root I/O Virtualization) is enabled or
disabled on the server. This can be one of the following:
set SrIov
• Disabled—SR-IOV is disabled.
• Enabled—SR-IOV is enabled.
Name Description
Out-of-Band Mgmt Port Allows you to configure the COM port 0 that can be used for Windows
Emergency Management services. ACPI SPCR table is reported based
set comSpcrEnable
on this setup option. This can be one of the following:
• Disabled—Configures the COM port 0 as a general purpose port
for use with the Windows Operating System.
• Enabled—Configures the COM port 0 as a remote management
port for Windows Emergency Management services.
Console Redirection Allows a serial port to be used for console redirection during POST and
BIOS booting. After the BIOS has booted and the operating system is
set ConsoleRedir
responsible for the server, console redirection is irrelevant and has no
effect. This can be one of the following:
• Disabled—No console redirection occurs during POST.
• COM_0—Enables console redirection on COM port 0 during
POST.
• COM_1—Enables console redirection on COM port 1 during
POST.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
605
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Terminal Type What type of character formatting is used for console redirection. This
can be one of the following:
set TerminalType
• PC-ANSI—The PC-ANSI terminal font is used.
• VT100—A supported vt100 video terminal and its character set
are used.
• VT100+—A supported vt100-plus video terminal and its character
set are used.
• VT-UTF8—A video terminal with the UTF-8 character set is used.
Note This setting must match the setting on the remote terminal
application.
Bits per second What BAUD rate is used for the serial port transmission speed. If you
disable Console Redirection, this option is not available. This can be
set BaudRate
one of the following:
• 9600—A 9,600 BAUD rate is used.
• 19200—A 19,200 BAUD rate is used.
• 38400—A 38,400 BAUD rate is used.
• 57600—A 57,600 BAUD rate is used.
• 115200—A 115,200 BAUD rate is used.
Note This setting must match the setting on the remote terminal
application.
Flow Control Whether a handshake protocol is used for flow control. Request to Send
/ Clear to Send (RTS/CTS) helps to reduce frame collisions that can be
set FlowCtrl
introduced by a hidden terminal problem. This can be one of the
following:
• None—No flow control is used.
• Hardware_RTS/CTS—RTS/CTS is used for flow control.
Note This setting must match the setting on the remote terminal
application.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
606
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Putty KeyPad Allows you to change the action of the PuTTY function keys and the
top row of the numeric keypad. This can be one of the following:
set PuttyFunctionKeyPad
• VT100—The function keys generate ESC OP through ESC O[.
• LINUX—Mimics the Linux virtual console. Function keys F6 to
F12 behave like the default mode, but F1 to F5 generate ESC [[A
through ESC [[E.
• XTERMR6—Function keys F5 to F12 behave like the default
mode. Function keys F1 to F4 generate ESC OP through ESC OS,
which are the sequences produced by the top row of the keypad on
Digital terminals.
• SCO—The function keys F1 to F12 generate ESC [M through
ESC [X. The function and shift keys generate ESC [Y through
ESC [j. The control and function keys generate ESC [k through
ESC [v. The shift, control and function keys generate ESC [w
through ESC [{.
• ESCN—The default mode. The function keys match the general
behavior of Digital terminals. The function keys generate sequences
such as ESC [11~ and ESC [12~.
• VT400—The function keys behave like the default mode. The top
row of the numeric keypad generates ESC OP through ESC OS.
Redirection After BIOS POST Whether BIOS console redirection should be active after BIOS POST
is complete and control given to the OS bootloader. This can be one of
set RedirectionAfterPOST
the following:
• Always_Enable—BIOS Legacy console redirection is active during
the OS boot and run time.
• Bootloader—BIOS Legacy console redirection is disabled before
giving control to the OS boot loader.
Name Description
CDN Support for VIC Whether the Ethernet Network naming convention is according to
Consistent Device Naming (CDN) or the traditional way of naming
set CdnEnable
conventions. This can be one of the following:
• Disabled— CDN support for VIC cards is disabled.
• Enabled— CDN support is enabled for VIC cards.
Note CDN support for VIC cards work with Windows 2012
or the latest OS only.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
607
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
PCI ROM CLP PCI ROM Command Line Protocol (CLP) controls the execution of
different Option ROMs such as PxE and iSCSI that are present in the
set PciRomClp
card. By default, it is disabled.
• Enabled— Enables you to configure execution of different option
ROMs such as PxE and iSCSI for an individual ports separately.
• Disabled—The default option. You cannot choose different option
ROMs. A default option ROM is executed during PCI enumeration.
PCH SATA Mode This options allows you to select the PCH SATA mode. This can be one
of the following:
set SataModeSelect
• AHCI—Sets both SATA and sSATA controllers to AHCI mode.
• Disabled—Disables both SATA and sSATA controllers.
• LSI SW Raid— Sets both SATA and sSATA controllers to raid
mode for LSI SW Raid
All Onboard LOM Ports Whether all LOM ports are enabled or disabled. This can be one of the
following:
set AllLomPortControl
• Disabled—All LOM ports are disabled.
• Enabled—All LOM ports are enabled.
LOM Port n OptionROM Whether Option ROM is available on the LOM port designated by n.
This can be one of the following:
set LomOpromControlPortn
• Disabled—The Option ROM for slot n is not available.
• Enabled—The Option ROM for slot n is available.
• UEFI_Only—The Option ROM for slot n is available for UEFI
only.
• Legacy_Only—The Option ROM for slot n is available for legacy
only.
All PCIe Slots OptionROM Whether the server can use Option ROM present in the PCIe Cards.
This can be one of the following:
set PcieOptionROMs
• Disabled—The Option ROM for slot n is not available.
• Enabled—The Option ROM for slot n is available.
• UEFI_Only—The Option ROM for slot n is available for UEFI
only.
• Legacy_Only—The Option ROM for slot n is available for legacy
only.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
608
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
PCIe Slot:n OptionROM Whether the server can use the Option ROMs present in the PCIe Cards.
This can be one of the following:
set PcieSlotnOptionROM
• Disabled—The Option ROM for slot n is not available.
• Enabled—The Option ROM for slot n is available.
• UEFI_Only—The Option ROM for slot n is available for UEFI
only.
• Legacy_Only—The Option ROM for slot n is available for legacy
only.
PCIe Slot:MLOM OptionROM This options allows you to control the Option ROM execution of the
PCIe adapter connected to the MLOM slot. This can be one of the
set PcieSlotMLOMOptionROM
following:
• Enabled—Executes both legacy and UEFI Option ROM.
• Disabled—Both legacy and UEFI Option ROM will not be
executed.
• UEFI Only—Executes only UEFI Option ROM.
• Legacy Only—Executes only Legacy Option ROM.
PCIe Slot:HBA OptionROM This options allows you to control the Option ROM execution of the
PCIe adapter connected to the HBA slot. This can be one of the
set PcieSlotHBAOptionROM
following:
• Enabled—Executes both legacy and UEFI Option ROM.
• Disabled—Both legacy and UEFI Option ROM will not be
executed.
• UEFI Only—Executes only UEFI Option ROM.
• Legacy Only—Executes only Legacy Option ROM.
PCIe Slot:N1 OptionROM This options allows you to control the Option ROM execution of the
PCIe adapter connected to the SSD:NVMe1 slot. This can be one of the
set PcieSlotN1OptionROM
following:
• Enabled—Executes both legacy and UEFI Option ROM.
• Disabled—Both legacy and UEFI Option ROM will not be
executed.
• UEFI Only—Executes only UEFI Option ROM.
• Legacy Only—Executes only Legacy Option ROM.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
609
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
PCIe Slot:N2 OptionROM This options allows you to control the Option ROM execution of the
PCIe adapter connected to the SSD:NVMe2 slot. This can be one of the
set PcieSlotN2OptionROM
following:
• Enabled—Executes both legacy and UEFI Option ROM.
• Disabled—Both legacy and UEFI Option ROM will not be
executed.
• UEFI Only—Executes only UEFI Option ROM.
• Legacy Only—Executes only Legacy Option ROM.
PCIe Slot:N2 OptionROM This options allows you to control the Option ROM execution of the
PCIe adapter connected to the SSD:NVMe2 slot. This can be one of the
set PcieSlotN2OptionROM
following:
• Enabled—Executes both legacy and UEFI Option ROM.
• Disabled—Both legacy and UEFI Option ROM will not be
executed.
• UEFI Only—Executes only UEFI Option ROM.
• Legacy Only—Executes only Legacy Option ROM.
PCIe Slot:HBA Link Speed This option allows you to restrict the maximum speed of an adapter card
installed in PCIe HBA slot. This can be one of the following:
PCIe SlotHBALinkSpeed
• Auto— System selects the maximum speed allowed.
• GEN1—2.5GT/s (gigatransfers per second) is the maximum speed
allowed.
• GEN2—5GT/s is the maximum speed allowed.
• GEN3—8GT/s is the maximum speed allowed.
• Disabled—The maximum speed is not restricted.
Important The buttons in this dialog box affect all BIOS parameters on all available tabs, not just the parameters on the
tab that you are viewing.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
610
BIOS Parameters by Server Model
Server Management Tab for C460 M4 Servers
Name Description
Save Changes button Saves the settings for the BIOS parameters on all three tabs and closes
the dialog box.
If the Reboot Host Immediately check box is checked, the server is
rebooted immediately and the new BIOS settings go into effect.
Otherwise the changes are saved until the server is manually rebooted.
Reset Values button Restores the values for the BIOS parameters on all three tabs to the
settings that were in effect when this dialog box was first opened.
Restore Defaults button Sets the BIOS parameters on all three tabs to their default settings.
Cancel button Closes the dialog box without making any changes.
Note If there are existing BIOS parameter changes pending, Cisco IMC automatically overwrites the stored values
with the current settings when you click Save Changes.
Name Description
FRB-2 Timer Whether the FRB2 timer is used by Cisco IMC to recover the
system if it hangs during POST. This can be one of the following:
set FRB-2
• Disabled—The FRB2 timer is not used.
• Enabled—The FRB2 timer is started during POST and
used to recover the system if necessary.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
611
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
OS Watchdog Timer Whether the BIOS programs the watchdog timer with a specified
timeout value. This can be one of the following:
set OSBootWatchdogTimer
• Disabled—The watchdog timer is not used to track how
long the server takes to boot.
• Enabled—The watchdog timer tracks how long the server
takes to boot. If the server does not boot within the length
of time specified by the set
OSBootWatchdogTimerTimeout command, the Cisco
IMC logs an error and takes the action specified by the set
OSBootWatchdogTimerPolicy command.
OS Watchdog Timer Timeout If OS does not boot within the specified time, OS watchdog
timer expires and system takes action according to timer policy.
set OSBootWatchdogTimerTimeOut
This can be one of the following:
• 5_Minutes—The OS watchdog timer expires 5 minutes
after it begins to boot.
• 10_Minutes—The OS watchdog timer expires 10 minutes
after it begins to boot.
• 15_Minutes—The OS watchdog timer expires 15 minutes
after it begins to boot.
• 20_Minutes—The OS watchdog timer expires 20 minutes
after it begins to boot.
OS Watchdog Timer Policy What action the system takes if the watchdog timer expires. This
can be one of the following:
set OSBootWatchdogTimerPolicy
• Do_Nothing—The server takes no action if the watchdog
timer expires during OS boot.
• Power_Down—The server is powered off if the watchdog
timer expires during OS boot.
• Reset—The server is reset if the watchdog timer expires
during OS boot.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
612
BIOS Parameters by Server Model
C220 M4 and C240 M4 Servers
Important The buttons in this dialog box affect all BIOS parameters on all available tabs, not just the parameters on the
tab that you are viewing.
Name Description
Save Changes button Saves the settings for the BIOS parameters on all three tabs and closes
the dialog box.
If the Reboot Host Immediately check box is checked, the server is
rebooted immediately and the new BIOS settings go into effect.
Otherwise the changes are saved until the server is manually rebooted.
Reset Values button Restores the values for the BIOS parameters on all three tabs to the
settings that were in effect when this dialog box was first opened.
Restore Defaults button Sets the BIOS parameters on all three tabs to their default settings.
Cancel button Closes the dialog box without making any changes.
Name Description
Reboot Host Immediately Upon checking, reboots the host server immediately. You must check
checkbox the checkbox after saving changes.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
613
BIOS Parameters by Server Model
Advanced Tab for C220M4 and C240M4 Servers
Name Description
Power ON Password Support This token requires that you set a BIOS password before using the F2
drop-down BIOS configuration. If enabled, password needs to be validated before
you access BIOS functions such as IO configuration, BIOS set up, and
booting to an operating system using BIOS. It can be one of the
following:
• Disabled—Support is disabled.
• Enabled—Support is enabled.
Actions Area
Name Description
Save button Saves the settings for the BIOS parameters and closes the dialog box.
If the Reboot Host Immediately check box is checked, the server is
rebooted immediately and the new BIOS settings go into effect.
Otherwise the changes are saved until the server is manually rebooted.
Reset button Resets the values for the BIOS parameters on all three tabs to the settings
that were in effect when this dialog box was first opened.
Restore Defaults button Sets the BIOS parameters on all three tabs to their default settings.
Note If there are existing BIOS parameter changes pending, Cisco IMC automatically overwrites the stored values
with the current settings when you click Save Changes.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
614
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Intel Hyper-Threading Technology Whether the processor uses Intel Hyper-Threading Technology,
which allows multithreaded software applications to execute
set IntelHyperThread
threads in parallel within each processor. This can be one of the
following:
• Disabled—The processor does not permit hyperthreading.
• Enabled—The processor allows for the parallel execution
of multiple threads.
Number of Enabled Cores Allows you to disable one or more of the physical cores on the
server. This can be one of the following:
set CoreMultiProcessing
• All—Enables all physical cores. This also enables Hyper
Threading on the associated logical processor cores.
• 1 through n—Specifies the number of physical processor
cores that can run on the server. Each physical core has an
associated logical core.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
615
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Intel VT-d Whether the processor uses Intel Virtualization Technology for
Directed I/O (VT-d). This can be one of the following:
set IntelVTD
• Disabled—The processor does not use virtualization
technology.
• Enabled—The processor uses virtualization technology.
Intel VT-d Interrupt Remapping Whether the processor supports Intel VT-d Interrupt Remapping.
This can be one of the following:
set InterruptRemap
• Disabled—The processor does not support remapping.
• Enabled—The processor uses VT-d Interrupt Remapping
as required.
Intel VT-d PassThrough DMA Whether the processor supports Intel VT-d Pass-through DMA.
This can be one of the following:
set PassThroughDMA
• Disabled—The processor does not support pass-through
DMA.
• Enabled—The processor uses VT-d Pass-through DMA
as required.
Intel VT-d Coherency Support Whether the processor supports Intel VT-d Coherency. This can
be one of the following:
set CoherencySupport
• Disabled—The processor does not support coherency.
• Enabled—The processor uses VT-d Coherency as required.
Intel VT-d ATS Support Whether the processor supports Intel VT-d Address Translation
Services (ATS). This can be one of the following:
set ATS
• Disabled—The processor does not support ATS.
• Enabled—The processor uses VT-d ATS as required.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
616
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
CPU Performance Sets the CPU performance profile for the server. The
performance profile consists of the following options:
set CPUPerformance
• DCU Streamer Prefetcher
• DCU IP Prefetcher
• Hardware Prefetcher
• Adjacent Cache-Line Prefetch
Hardware Prefetcher Whether the processor allows the Intel hardware prefetcher to
fetch streams of data and instruction from memory into the
set HardwarePrefetch
unified second-level cache when necessary. This can be one of
the following:
• Disabled—The hardware prefetcher is not used.
• Enabled—The processor uses the hardware prefetcher
when cache issues are detected.
Adjacent Cache Line Prefetcher Whether the processor fetches cache lines in even/odd pairs
instead of fetching just the required line. This can be one of the
set AdjacentCacheLinePrefetch
following:
• Disabled—The processor only fetches the required line.
• Enabled— The processor fetches both the required line
and its paired line.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
617
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
DCU Streamer Prefetch Whether the processor uses the DCU IP Prefetch mechanism to
analyze historical cache access patterns and preload the most
set DcuStreamerPrefetch
relevant lines in the L1 cache. This can be one of the following:
• Disabled—The processor does not try to anticipate cache
read requirements and only fetches explicitly requested
lines.
• Enabled—The DCU prefetcher analyzes the cache read
pattern and prefetches the next line in the cache if it
determines that it may be needed.
DCU IP Prefetcher Whether the processor uses the DCU IP Prefetch mechanism to
analyze historical cache access patterns and preload the most
set DcuIpPrefetch
relevant lines in the L1 cache. This can be one of the following:
• Disabled—The processor does not preload any cache data.
• Enabled—The DCU IP prefetcher preloads the L1 cache
with the data it determines to be the most relevant.
Direct Cache Access Support Allows processors to increase I/O performance by placing data
from I/O devices directly into the processor cache. This setting
set DirectCacheAccess
helps to reduce cache misses. This can be one of the following:
• Disabled—Data from I/O devices is not placed directly
into the processor cache.
• Enabled—Data from I/O devices is placed directly into
the processor cache.
Power Technology Enables you to configure the CPU power management settings
for the following options:
set CPUPowerManagement
• Enhanced Intel Speedstep Technology
• Intel Turbo Boost Technology
• Processor Power State C6
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
618
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Enhanced Intel Speedstep Technology Whether the processor uses Enhanced Intel SpeedStep
Technology, which allows the system to dynamically adjust
set EnhancedIntelSpeedStep
processor voltage and core frequency. This technology can result
in decreased average power consumption and decreased average
heat production. This can be one of the following:
• Disabled—The processor never dynamically adjusts its
voltage or frequency.
• Enabled—The processor utilizes Enhanced Intel SpeedStep
Technology and enables all supported processor sleep states
to further conserve power.
Intel Turbo Boost Technology Whether the processor uses Intel Turbo Boost Technology, which
allows the processor to automatically increase its frequency if
set IntelTurboBoostTech
it is running below power, temperature, or voltage specifications.
This can be one of the following:
• Disabled—The processor does not increase its frequency
automatically.
• Enabled—The processor utilizes Turbo Boost Technology
if required.
Processor C3 Report Whether the BIOS sends the C3 report to the operating system.
When the OS receives the report, it can transition the processor
set ProcessorC3Report
into the lower C3 power state to decrease energy usage while
maintaining optimal processor performance. This can be one of
the following:
• Disabled—BIOS does not send C3 report.
• Enabled—BIOS sends the C3 report, allowing the OS to
transition the processor to the C3 low power state.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
619
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Processor C6 Report Whether the BIOS sends the C6 report to the operating system.
When the OS receives the report, it can transition the processor
set ProcessorC6Report
into the lower C6 power state to decrease energy usage while
maintaining optimal processor performance. This can be one of
the following:
• Disabled—The BIOS does not send the C6 report.
• Enabled—The BIOS sends the C6 report, allowing the OS
to transition the processor to the C6 low power state.
Processor Power State C1 Enhanced Whether the CPU transitions to its minimum frequency when
entering the C1 state. This can be one of the following:
set ProcessorC1EReport
• Disabled—The CPU continues to run at its maximum
frequency in C1 state.
• Enabled—The CPU transitions to its minimum frequency.
This option saves the maximum amount of power in C1
state.
P-STATE Coordination Allows you to define how BIOS communicates the P-state
support model to the operating system. There are 3 models as
set PsdCoordType
defined by the Advanced Configuration and Power Interface
(ACPI) specification.
• HW_ALL—The processor hardware is responsible for
coordinating the P-state among logical processors with
dependencies (all logical processors in a package).
• SW_ALL—The OS Power Manager (OSPM) is responsible
for coordinating the P-state among logical processors with
dependencies (all logical processors in a physical package),
and must initiate the transition on all of the logical
processors.
• SW_ANY—The OS Power Manager (OSPM) is responsible
for coordinating the P-state among logical processors with
dependencies (all logical processors in a package), and may
initiate the transition on any of the logical processors in the
domain.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
620
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Boot Performance Mode drop-down list Allows the user to select the BIOS performance state that is set
before the operating system handoff. This can be one of the
set BootPerformanceMode
following:
• Max Performance—Processor P-state ratio is maximum
• Max Efficient— Processor P-state ratio is minimum
Energy Performance Tuning Allows you to choose BIOS or Operating System for energy
performance bias tuning. This can be one of the following:
set PwrPerfTuning
• OS— Chooses OS for energy performance tuning.
• BIOS— Chooses BIOS for energy performance tuning.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
621
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Package C State Limit The amount of power available to the server components when
they are idle. This can be one of the following:
set PackageCStateLimit
• C0_state—The server provides all server components with
full power at all times. This option maintains the highest
level of performance and requires the greatest amount of
power.
• C1_state—When the CPU is idle, the system slightly
reduces the power consumption. This option requires less
power than C0 and allows the server to return quickly to
high performance mode.
• C3_state—When the CPU is idle, the system reduces the
power consumption further than with the C1 option. This
requires less power than C1 or C0, but it takes the server
slightly longer to return to high performance mode.
• C6_state—When the CPU is idle, the system reduces the
power consumption further than with the C3 option. This
option saves more power than C0, C1, or C3, but there may
be performance issues until the server returns to full power.
• C7_state—When the CPU is idle, the server makes a
minimal amount of power available to the components.
This option saves the maximum amount of power but it
also requires the longest time for the server to return to high
performance mode.
• No_Limit—The server may enter any available C state.
Extended APIC Allows you to enable or disable extended APIC support. This
can be one of the following:
set LocalX2Apic
• XAPIC—Enables APIC support.
• X2APIC—Enables APIC and also enables Intel VT-d and
Interrupt Remapping .
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
622
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
CPU HWPM drop-down list Enables the Hardware Power Management (HWPM) interface
for better CPU performance and energy efficiency. This can be
set HWPMEnable
one of the following:
• Disabled—The P-States are controlled the same way as on
predecessor processor generations.
• Native Mode—HWPM works with the operating system
through a software interface.
• OOB Mode—The CPU autonomously controls its
frequency based on the operating system energy efficiency.
CPU Autonomous Cstate drop-down list Enables CPU Autonomous C-State, which converts the HALT
instructions to the MWAIT instructions. This can be one of the
set AutonumousCstateEnable
following:
• Disabled—CPU Autonomous C-state is disabled. This is
the default value.
• Enabled—CPU Autonomous C-state is enabled.
Processor CMCI drop-down list Allows the CPU to trigger interrupts on corrected machine check
events. The corrected machine check interrupt (CMCI) allows
set CmciEnable
faster reaction than the traditional polling timer. This can be one
of the following:
• Disabled—Disables CMCI.
• Enabled—Enables CMCI. This is the default value.
Name Description
Select Memory RAS How the memory reliability, availability, and serviceability
(RAS) is configured for the server. This can be one of the
set SelectMemoryRAS
following:
• Maximum_Performance—System performance is
optimized.
• Mirroring—System reliability is optimized by using half
the system memory as backup.
• Lockstep—If the DIMM pairs in the server have an
identical type, size, and organization and are populated
across the SMI channels, you can enable lockstep mode to
minimize memory access latency and provide better
performance. This option offers better system performance
than Mirroring and better reliability than Maximum
Performance but lower reliability than Mirroring and lower
system performance than Maximum Performance.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
623
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
NUMA Whether the BIOS supports Non-Uniform Memory Access
(NUMA). This can be one of the following:
set NUMAOptimize
• Disabled—The BIOS does not support NUMA.
• Enabled—The BIOS includes the ACPI tables that are
required for NUMA-aware operating systems. If you enable
this option, the system must disable Inter-Socket Memory
interleaving on some platforms.
Channel Interleaving Whether the CPU divides memory blocks and spreads contiguous
portions of data across interleaved channels to enable
set ChannelInterLeave
simultaneous read operations. This can be one of the following:
• Auto—The CPU determines what interleaving is done.
• 1_Way—Some channel interleaving is used.
• 2_Way
• 3_Way
• 4_Way—The maximum amount of channel interleaving
is used.
Rank Interleaving Whether the CPU interleaves physical ranks of memory so that
one rank can be accessed while another is being refreshed. This
set RankInterLeave
can be one of the following:
• Auto—The CPU determines what interleaving is done.
• 1_Way—Some rank interleaving is used.
• 2_Way
• 4_Way
• 8_Way—The maximum amount of rank interleaving is
used.
Patrol Scrub Whether the system actively searches for, and corrects, single
bit memory errors even in unused portions of the memory on
set PatrolScrub
the server. This can be one of the following:
• Disabled—The system checks for memory ECC errors
only when the CPU reads or writes a memory address.
• Enabled—The system periodically reads and writes
memory searching for ECC errors. If any errors are found,
the system attempts to fix them. This option may correct
single bit errors before they become multi-bit errors, but it
may adversely affect performance when the patrol scrub is
running.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
624
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Demand Scrub Whether the system corrects single bit memory errors
encountered when the CPU or I/O makes a demand read. This
set DemandScrub
can be one of the following:
• Disabled— Single bit memory errors are not corrected.
• Enabled— Single bit memory errors are corrected in
memory and the corrected data is set in response to the
demand read.
Altitude The approximate number of meters above sea level at which the
physical server is installed. This can be one of the following:
set Altitude
• Auto—The CPU determines the physical elevation.
• 300_M—The server is approximately 300 meters above
sea level.
• 900_M—The server is approximately 900 meters above
sea level.
• 1500_M—The server is approximately 1500 meters above
sea level.
• 3000_M—The server is approximately 3000 meters above
sea level.
Panic and High Watermark drop-down When set to low, the memory controller does not postpone
list refreshes while Memory Refresh Rate is set to 1X Refresh.
PanicHighWatermark This can be one of the following:
• Low—Refresh rate is set to low.
• High —Refresh rate is set to high.
Name Description
QPI Link Frequency Select The Intel QuickPath Interconnect (QPI) link frequency, in gigatransfers
per second (GT/s). This can be one of the following:
set QPILinkFrequency
• Auto—The CPU determines the QPI link frequency.
• 6.4_GT/s
• 7.2_GT/s
• 8.0_GT/s
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
625
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
QPI Snoop Mode The Intel QuickPath Interconnect (QPI) snoop mode. This can be one
of the following:
set QpiSnoopMode
• Auto—The CPU automatically recognizes this as Early Snoop
mode.
• Early Snoop—The distributed cache ring stops can send a snoop
probe or a request to another caching agent directly. This mode has
lower latency and it is best for workloads that have shared data sets
across threads and can benefit from a cache-to-cache transfer, or
for workloads that are not NUMA optimized.
• Home Snoop—The snoop is always spawned by the home agent
(centralized ring stop) for the memory controller. This mode has
a higher local latency than early snoop, but it provides extra
resources for a larger number of outstanding transactions.
• Home Directory Snoop— The home directory is an optional
enabled feature that is implemented at both the HA and iMC logic
in the processor. The goal of the directory is to filter snoops to the
remote sockets and a node controller in scalable platforms and 2S
and 4S configurations.
• Home Directory Snoop with OSB— In the Opportunistic Snoop
Broadcast (OSB) directory mode, the HA could choose to do
speculative home snoop broadcast under very lightly loaded
conditions even before the directory information has been collected
and checked.
• Cluster on Die—Enables Cluster On Die. When enabled LLC is
split into two parts with an independent caching agent for each.
This helps increase the performance in some workloads. This mode
is available only for processors that have 10 or more cores. It is the
best mode for highly NUMA optimized workloads.
Name Description
Legacy USB Support Whether the system supports legacy USB devices. This can be one of
the following:
set LegacyUSBSupport
• Disabled—USB devices are only available to EFI applications.
• Enabled—Legacy USB support is always available.
• Auto—Disables legacy USB support if no USB devices are
connected.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
626
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Port 60/64 Emulation Whether the system supports 60h/64h emulation for complete USB
keyboard legacy support. This can be one of the following:
set UsbEmul6064
• Disabled—60h/64 emulation is not supported.
• Enabled—60h/64 emulation is supported.
You should select this option if you are using a non-USB aware
operating system on the server.
xHCI Mode Whether the xHCI controller legacy support is enabled or disabled. This
can be one of the following:
set PchUsb30Mode
• Disabled—Disables the xHCI controller legacy support.
• Enabled—Enables the xHCI controller legacy support.
xHCI Legacy Support drop-down Whether the system supports legacy xHCI controller. This can be one
list of the following:
set UsbXhciSupport • Disabled—Disables xHCI legacy support.
• Enabled—Enables xHCI legacy support. This is the default value.
All USB Devices Whether all physical and virtual USB devices are enabled or disabled.
This can be one of the following:
set AllUsbDevices
• Disabled—All USB devices are disabled.
• Enabled—All USB devices are enabled.
USB Port: Rear Whether the rear panel USB devices are enabled or disabled. This can
be one of the following:
set UsbPortRear
• Disabled—Disables the rear panel USB ports. Devices connected
to these ports are not detected by the BIOS and operating system.
• Enabled—Enables the rear panel USB ports. Devices connected
to these ports are detected by the BIOS and operating system.
USB Port: Front Whether the front panel USB devices are enabled or disabled. This can
be one of the following:
set UsbPortFront
• Disabled—Disables the front panel USB ports. Devices connected
to these ports are not detected by the BIOS and operating system
• Enabled—Enables the front panel USB ports. Devices connected
to these ports are detected by the BIOS and operating system.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
627
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
USB Port: Internal Whether the internal USB devices are enabled or disabled. This can be
one of the following:
set UsbPortInt
• Disabled—Disables the internal USB ports. Devices connected to
these ports are not detected by the BIOS and operating system.
• Enabled—Enables the internal USB ports. Devices connected to
these ports are detected by the BIOS and operating system.
USB Port: KVM Whether the vKVM ports are enabled or disabled. This can be one of
the following:
set UsbPortKVM
• Disabled—Disables the vKVM keyboard and/or mouse devices.
Keyboard and/or mouse will not work in the vKVM window.
• Enabled—Enables the vKVM keyboard and/or mouse devices.
USB Port: vMedia Whether the virtual media devices are enabled or disabled. This can be
one of the following:
set UsbPortVMedia
• Disabled—Disables the vMedia devices.
• Enabled—Enables the vMedia devices.
Name Description
Memory Mapped I/O Above 4GB Whether to enable or disable MMIO above 4GB or not. This
can be one of the following:
set MemoryMappedIOAbove4GB
• Disabled—The server does not map I/O of 64-bit PCI
devices to 4GB or greater address space.
• Enabled—The server maps I/O of 64-bit PCI devices to
4GB or greater address space.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
628
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
ASPM Support drop-down list Allows you to set the level of ASPM (Active Power State
Management) support in the BIOS. This can be one of the
set ASPMSupport
following:
• Disabled—ASPM support is disabled in the BIOS.
• Force L0s—Force all links to L0 standby (L0s) state.
• Auto—The CPU determines the power state
NVMe SSD Hot-Plug Support drop-down Allows you to replace an NVMe SSD without powering down
list the server. This can be one of the following:
set PCIeSSDHotPlugSupport • Disabled—NVMe SSD hot-plug support is disabled. This
is the default value.
• Enabled—NVMe SSD hot-plug support is enabled.
VGA Priority drop-down list Allows you to set the priority for VGA graphics devices if
multiple VGA devices are found in the system. This can be one
set VgaPriority
of the following:
• Onboard—Priority is given to the onboard VGA device.
BIOS post screen and OS boot are driven through the
onboard VGA port.
• Offboard—Priority is given to the PCIE Graphics adapter.
BIOS post screen and OS boot are driven through the
external graphics adapter port.
• Onboard VGA Disabled—Priority is given to the PCIE
Graphics adapter, and the onboard VGA device is disabled.
Name Description
Out-of-Band Mgmt Port Allows you to configure the COM port 0 that can be used for Windows
Emergency Management services. ACPI SPCR table is reported based
set comSpcrEnable
on this setup option. This can be one of the following:
• Disabled—Configures the COM port 0 as a general purpose port
for use with the Windows Operating System.
• Enabled—Configures the COM port 0 as a remote management
port for Windows Emergency Management services.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
629
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Console Redirection Allows a serial port to be used for console redirection during POST and
BIOS booting. After the BIOS has booted and the operating system is
set ConsoleRedir
responsible for the server, console redirection is irrelevant and has no
effect. This can be one of the following:
• Disabled—No console redirection occurs during POST.
• COM_0—Enables console redirection on COM port 0 during
POST.
• COM_1—Enables console redirection on COM port 1 during
POST.
Terminal Type What type of character formatting is used for console redirection. This
can be one of the following:
set TerminalType
• PC-ANSI—The PC-ANSI terminal font is used.
• VT100—A supported vt100 video terminal and its character set
are used.
• VT100+—A supported vt100-plus video terminal and its character
set are used.
• VT-UTF8—A video terminal with the UTF-8 character set is used.
Note This setting must match the setting on the remote terminal
application.
Bits per second What BAUD rate is used for the serial port transmission speed. If you
disable Console Redirection, this option is not available. This can be
set BaudRate
one of the following:
• 9600—A 9,600 BAUD rate is used.
• 19200—A 19,200 BAUD rate is used.
• 38400—A 38,400 BAUD rate is used.
• 57600—A 57,600 BAUD rate is used.
• 115200—A 115,200 BAUD rate is used.
Note This setting must match the setting on the remote terminal
application.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
630
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
Flow Control Whether a handshake protocol is used for flow control. Request to Send
/ Clear to Send (RTS/CTS) helps to reduce frame collisions that can be
set FlowCtrl
introduced by a hidden terminal problem. This can be one of the
following:
• None—No flow control is used.
• Hardware_RTS/CTS—RTS/CTS is used for flow control.
Note This setting must match the setting on the remote terminal
application.
Putty KeyPad Allows you to change the action of the PuTTY function keys and the
top row of the numeric keypad. This can be one of the following:
set PuttyFunctionKeyPad
• VT100—The function keys generate ESC OP through ESC O[.
• LINUX—Mimics the Linux virtual console. Function keys F6 to
F12 behave like the default mode, but F1 to F5 generate ESC [[A
through ESC [[E.
• XTERMR6—Function keys F5 to F12 behave like the default
mode. Function keys F1 to F4 generate ESC OP through ESC OS,
which are the sequences produced by the top row of the keypad on
Digital terminals.
• SCO—The function keys F1 to F12 generate ESC [M through
ESC [X. The function and shift keys generate ESC [Y through
ESC [j. The control and function keys generate ESC [k through
ESC [v. The shift, control and function keys generate ESC [w
through ESC [{.
• ESCN—The default mode. The function keys match the general
behavior of Digital terminals. The function keys generate sequences
such as ESC [11~ and ESC [12~.
• VT400—The function keys behave like the default mode. The top
row of the numeric keypad generates ESC OP through ESC OS.
Redirection After BIOS POST Whether BIOS console redirection should be active after BIOS POST
is complete and control given to the OS bootloader. This can be one of
set RedirectionAfterPOST
the following:
• Always_Enable—BIOS Legacy console redirection is active during
the OS boot and run time.
• Bootloader—BIOS Legacy console redirection is disabled before
giving control to the OS boot loader.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
631
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
CDN Support for VIC Whether the Ethernet Network naming convention is according to
Consistent Device Naming (CDN) or the traditional way of naming
set CdnEnable
conventions. This can be one of the following:
• Disabled— CDN support for VIC cards is disabled.
• Enabled— CDN support is enabled for VIC cards.
Note CDN support for VIC cards work with Windows 2012
or the latest OS only.
PCI ROM CLP PCI ROM Command Line Protocol (CLP) controls the execution of
different Option ROMs such as PxE and iSCSI that are present in the
set PciRomClp
card. By default, it is disabled.
• Enabled— Enables you to configure execution of different option
ROMs such as PxE and iSCSI for an individual ports separately.
• Disabled—The default option. You cannot choose different option
ROMs. A default option ROM is executed during PCI enumeration.
PCH SATA Mode This options allows you to select the PCH SATA mode. This can be one
of the following:
set SataModeSelect
• AHCI—Sets both SATA and sSATA controllers to AHCI mode.
• Disabled—Disables both SATA and sSATA controllers.
• LSI SW Raid— Sets both SATA and sSATA controllers to raid
mode for LSI SW Raid
All Onboard LOM Ports Whether all LOM ports are enabled or disabled. This can be one of the
following:
set AllLomPortControl
• Disabled—All LOM ports are disabled.
• Enabled—All LOM ports are enabled.
LOM Port n OptionROM Whether Option ROM is available on the LOM port designated by n.
This can be one of the following:
set LomOpromControlPortn
• Disabled—The Option ROM for slot n is not available.
• Enabled—The Option ROM for slot n is available.
• UEFI_Only—The Option ROM for slot n is available for UEFI
only.
• Legacy_Only—The Option ROM for slot n is available for legacy
only.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
632
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
All PCIe Slots OptionROM Whether the server can use Option ROM present in the PCIe Cards.
This can be one of the following:
set PcieOptionROMs
• Disabled—The Option ROM for slot n is not available.
• Enabled—The Option ROM for slot n is available.
• UEFI_Only—The Option ROM for slot n is available for UEFI
only.
• Legacy_Only—The Option ROM for slot n is available for legacy
only.
PCIe Slot:n OptionROM Whether the server can use the Option ROMs present in the PCIe Cards.
This can be one of the following:
set PcieSlotnOptionROM
• Disabled—The Option ROM for slot n is not available.
• Enabled—The Option ROM for slot n is available.
• UEFI_Only—The Option ROM for slot n is available for UEFI
only.
• Legacy_Only—The Option ROM for slot n is available for legacy
only.
PCIe Slot:MLOM OptionROM This options allows you to control the Option ROM execution of the
PCIe adapter connected to the MLOM slot. This can be one of the
set PcieSlotMLOMOptionROM
following:
• Enabled—Executes both legacy and UEFI Option ROM.
• Disabled—Both legacy and UEFI Option ROM will not be
executed.
• UEFI Only—Executes only UEFI Option ROM.
• Legacy Only—Executes only Legacy Option ROM.
PCIe Slot:HBA OptionROM This options allows you to control the Option ROM execution of the
PCIe adapter connected to the HBA slot. This can be one of the
set PcieSlotHBAOptionROM
following:
• Enabled—Executes both legacy and UEFI Option ROM.
• Disabled—Both legacy and UEFI Option ROM will not be
executed.
• UEFI Only—Executes only UEFI Option ROM.
• Legacy Only—Executes only Legacy Option ROM.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
633
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
PCIe Slot:N1 OptionROM This options allows you to control the Option ROM execution of the
PCIe adapter connected to the SSD:NVMe1 slot. This can be one of the
set PcieSlotN1OptionROM
following:
• Enabled—Executes both legacy and UEFI Option ROM.
• Disabled—Both legacy and UEFI Option ROM will not be
executed.
• UEFI Only—Executes only UEFI Option ROM.
• Legacy Only—Executes only Legacy Option ROM.
PCIe Slot:N2 OptionROM This options allows you to control the Option ROM execution of the
PCIe adapter connected to the SSD:NVMe2 slot. This can be one of the
set PcieSlotN2OptionROM
following:
• Enabled—Executes both legacy and UEFI Option ROM.
• Disabled—Both legacy and UEFI Option ROM will not be
executed.
• UEFI Only—Executes only UEFI Option ROM.
• Legacy Only—Executes only Legacy Option ROM.
PCIe Slot:HBA Link Speed This option allows you to restrict the maximum speed of an adapter card
installed in PCIe HBA slot. This can be one of the following:
PCIe SlotHBALinkSpeed
• Auto— System selects the maximum speed allowed.
• GEN1—2.5GT/s (gigatransfers per second) is the maximum speed
allowed.
• GEN2—5GT/s is the maximum speed allowed.
• GEN3—8GT/s is the maximum speed allowed.
• Disabled—The maximum speed is not restricted.
Important The buttons in this dialog box affect all BIOS parameters on all available tabs, not just the parameters on the
tab that you are viewing.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
634
BIOS Parameters by Server Model
Server Management Tab for C220M4 and C240M4 Servers
Name Description
Save Changes button Saves the settings for the BIOS parameters on all three tabs and closes
the dialog box.
If the Reboot Host Immediately check box is checked, the server is
rebooted immediately and the new BIOS settings go into effect.
Otherwise the changes are saved until the server is manually rebooted.
Reset Values button Restores the values for the BIOS parameters on all three tabs to the
settings that were in effect when this dialog box was first opened.
Restore Defaults button Sets the BIOS parameters on all three tabs to their default settings.
Cancel button Closes the dialog box without making any changes.
Note If there are existing BIOS parameter changes pending, Cisco IMC automatically overwrites the stored values
with the current settings when you click Save Changes.
Name Description
FRB-2 Timer Whether the FRB2 timer is used by Cisco IMC to recover the
system if it hangs during POST. This can be one of the following:
set FRB-2
• Disabled—The FRB2 timer is not used.
• Enabled—The FRB2 timer is started during POST and
used to recover the system if necessary.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
635
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Name Description
OS Watchdog Timer Whether the BIOS programs the watchdog timer with a specified
timeout value. This can be one of the following:
set OSBootWatchdogTimer
• Disabled—The watchdog timer is not used to track how
long the server takes to boot.
• Enabled—The watchdog timer tracks how long the server
takes to boot. If the server does not boot within the length
of time specified by the set
OSBootWatchdogTimerTimeout command, the Cisco
IMC logs an error and takes the action specified by the set
OSBootWatchdogTimerPolicy command.
OS Watchdog Timer Timeout If OS does not boot within the specified time, OS watchdog
timer expires and system takes action according to timer policy.
set OSBootWatchdogTimerTimeOut
This can be one of the following:
• 5_Minutes—The OS watchdog timer expires 5 minutes
after it begins to boot.
• 10_Minutes—The OS watchdog timer expires 10 minutes
after it begins to boot.
• 15_Minutes—The OS watchdog timer expires 15 minutes
after it begins to boot.
• 20_Minutes—The OS watchdog timer expires 20 minutes
after it begins to boot.
OS Watchdog Timer Policy What action the system takes if the watchdog timer expires. This
can be one of the following:
set OSBootWatchdogTimerPolicy
• Do_Nothing—The server takes no action if the watchdog
timer expires during OS boot.
• Power_Down—The server is powered off if the watchdog
timer expires during OS boot.
• Reset—The server is reset if the watchdog timer expires
during OS boot.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
636
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Important The buttons in this dialog box affect all BIOS parameters on all available tabs, not just the parameters on the
tab that you are viewing.
Name Description
Save Changes button Saves the settings for the BIOS parameters on all three tabs and closes
the dialog box.
If the Reboot Host Immediately check box is checked, the server is
rebooted immediately and the new BIOS settings go into effect.
Otherwise the changes are saved until the server is manually rebooted.
Reset Values button Restores the values for the BIOS parameters on all three tabs to the
settings that were in effect when this dialog box was first opened.
Restore Defaults button Sets the BIOS parameters on all three tabs to their default settings.
Cancel button Closes the dialog box without making any changes.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
637
BIOS Parameters by Server Model
BIOS Parameters by Server Model
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.3
638