Cisco CIMC CLI Configuration Guide
Cisco CIMC CLI Configuration Guide
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco IronPort, the Cisco logo, Cisco Nurse Connect, Cisco Pulse, Cisco SensorBase, Cisco StackPower, Cisco StadiumVision,
Cisco TelePresence, Cisco Unified Computing System, Cisco WebEx, DCE, Flip Channels, Flip for Good, Flip Mino, Flipshare (Design), Flip Ultra, Flip Video, Flip Video (Design),
Instant Broadband, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn, Cisco Capital, Cisco Capital (Design), Cisco:Financed
(Stylized), Cisco Store, Flip Gift Card, and One Million Acts of Green are service marks; and Access Registrar, Aironet, AllTouch, AsyncOS, Bringing the Meeting To You, Catalyst,
CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Lumin, Cisco Nexus, Cisco Press, Cisco Systems, Cisco
Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, Continuum, EtherFast, EtherSwitch, Event Center, Explorer, Follow Me Browsing, GainMaker,
iLYNX, IOS, iPhone, IronPort, the IronPort logo, Laser Link, LightStream, Linksys, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, PCNow, PIX,
PowerKEY, PowerPanels, PowerTV, PowerTV (Design), PowerVu, Prisma, ProConnect, ROSA, SenderBase, SMARTnet, Spectrum Expert, StackWise, WebEx, and the WebEx logo are
registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco
and any other company. (0910R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown
for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© 2009 Cisco Systems, Inc. All rights reserved.
CONTENTS
Preface vii
Audience vii
Organization vii
Conventions viii
Related Documentation x
Documentation Feedback x
Obtaining Documentation and Submitting a Service Request x
Overview 1
Overview of the Cisco UCS C-Series Rack-Mount Servers 1
Cisco Integrated Management Controller 1
CIMC CLI 3
Command Modes 3
Command Mode Table 3
Complete a Command 4
Command History 5
Committing, Discarding, and Viewing Pending Commands 5
Command Output Formats 5
Online Help for the CLI 6
Managing the Server 7
Toggling the Locator LED 7
Resetting the Server Boot Order 8
Powering On the Server 8
Powering Off the Server 9
Power Cycling the Server 9
Resetting the Server 10
Shutting Down the Server 10
Viewing Server Properties 11
Viewing CPU Properties 11
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 iii
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
iv OL-21105-01
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 v
Contents
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
vi OL-21105-01
Preface
This preface includes the following sections:
Audience
This guide is intended primarily for data center administrators with responsibilities and expertise in one or
more of the following:
• Server administration
• Storage administration
• Network administration
• Network security
Organization
This document includes the following parts:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 vii
Preface
Conventions
Part 3 Viewing Server Contains chapters that describe how to view the CPU, memory,
Properties power supply, and storage properties of the server.
Part 4 Viewing Server Contains chapters that describe how to view the power supply,
Sensors fan, temperature, and voltage sensors.
Part 5 Managing Remote Contains chapters that describe how to configure and manage the
Presence virtual KVM, virtual media, and the serial over LAN connection.
Part 6 Managing User Contains chapters that describe how to add, delete, and
Accounts authenticate users, and how to manage user sessions.
Part 10 Configuring Contains chapters that describe how to configure and manage
Platform Event platform event filters and SNMP settings.
Filters
Part 11 CIMC Firmware Contains chapters that describe how to obtain, install, and activate
Management firmware images.
Part 12 Viewing Logs Contains chapters that describe how to view and clear log
messages.
Part 13 Server Utilities Contains chapters that describe how to export support data, how
to reset the server configuration to factory defaults, and how to
reboot the management interface.
Conventions
This document uses the following conventions:
Convention Indication
bold font Commands, keywords, GUI elements, and user-entered text
appear in bold font.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
viii OL-21105-01
Preface
Conventions
Convention Indication
italic font Document titles, new or emphasized terms, and arguments for
which you supply values are in italic font.
courier font Terminal sessions and information the system displays appear
in courier font.
Tip Means the following information will help you solve a problem.
Caution Means reader be careful. In this situation, you might perform an action that could result in equipment
damage or loss of data.
Timesaver Means the described action saves time. You can save time by performing the action described in the
paragraph.
Warning Means reader be warned. In this situation, you might perform an action that could result in bodily injury.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 ix
Preface
Related Documentation
Related Documentation
Documentation for Cisco Unified Computing System (Cisco UCS) is available at the following URL:
http://www.cisco.com
The following are related Cisco UCS documents:
• Cisco UCS Documentation Roadmap
• Cisco UCS C-Series Rack-Mount Servers Configuration Guide
• Cisco UCS Manager CLI Configuration Guide
• Cisco UCS Manager XML API Programmer's Guide
• Cisco UCS Manager Troubleshooting Guide
• Cisco UCS Site Preparation Guide
• Cisco UCS 6100 Series Fabric Interconnect Hardware Installation Guide
• Cisco UCS 5108 Server Chassis Hardware Installation Guide
• Regulatory Compliance and Safety Information for Cisco UCS
• Release Notes for Cisco UCS
Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments
to ucs-docfeedback@cisco.com. We appreciate your feedback.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
x OL-21105-01
CHAPTER 1
Overview
This chapter includes the following sections:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 1
Overview
Cisco Integrated Management Controller
Management Interfaces
You can use a web-based GUI or SSH-based CLI to access, configure, administer, and monitor the server.
Almost all tasks can be performed in either interface, and the results of tasks performed in one interface are
displayed in another. However, you cannot do the following:
• Use CIMC GUI to invoke CIMC CLI
• View a command that has been invoked through CIMC CLI in CIMC GUI
• Generate CIMC CLI output from CIMC GUI
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
2 OL-21105-01
Command Modes
CIMC CLI
CIMC CLI
The CIMC CLI is a command-line management interface for Cisco UCS C-Series servers. You can launch
the CIMC CLI and manage the server by the serial port or over the network by SSH or Telnet. By default,
Telnet access is disabled.
A user of the CLI will be one of three roles: admin, user (can control, cannot configure), and read-only.
Note To recover from a lost admin password, see the Cisco UCS C-Series server installation and service guide
for your platform.
Command Modes
The CLI is organized into a hierarchy of command modes, with the EXEC mode being the highest-level mode
of the hierarchy. Higher-level modes branch into lower-level modes. You use the scope command to move
from higher-level modes to modes in the next lower level , and the exit command to move up one level in the
mode hierarchy. The top command returns to the EXEC mode.
Note Most command modes are associated with managed objects. The scope command does not create managed
objects, and can only access modes for which managed objects already exist.
Each mode contains a set of commands that can be entered in that mode. Most of the commands available in
each mode pertain to the associated managed object. Depending on your assigned role, you may have access
to only a subset of the commands available in a mode; commands to which you do not have access are hidden.
The CLI prompt for each mode shows the full path down the mode hierarchy to the current mode. This helps
you to determine where you are in the command mode hierarchy and can be an invaluable tool when you need
to navigate through the hierarchy.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 3
Overview
Complete a Command
Complete a Command
You can use the Tab key in any mode to complete a command. Partially typing a command name and pressing
Tab causes the command to be displayed in full, or to the point where another keyword must be chosen or an
argument value must be entered.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
4 OL-21105-01
Overview
Command History
Command History
The CLI stores all previously used commands in the current session. You can step through the previously
used commands by using the Up Arrow or Down Arrow keys. The Up Arrow key steps to the previous
command in the history, and the Down Arrow key steps to the next command in the history. If you get to the
end of the history, pressing the Down Arrow key does nothing.
All commands in the history can be entered again by simply stepping through the history to recall the desired
command and pressing Enter. The command is entered as if you had manually typed it. You can also recall
a command and change it before you enter it.
You can accumulate pending changes in multiple command modes and apply them together with a single
commit command. You can view the pending commands by entering the show configuration pending
command in any command mode.
Note Committing multiple commands together is not an atomic operation. If any command fails, the successful
commands are applied despite the failure. Failed commands are reported in an error message.
Server /chassis #
• YAML—For easy parsing by scripts, the command output is presented in the YAML™ (YAML Ain't
Markup Language) data serialization language, delimited by defined character strings.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 5
Online Help for the CLI
Command Output Formats
---
name: HDD_02_STATUS
hdd-status: present
---
name: HDD_03_STATUS
hdd-status: present
---
name: HDD_04_STATUS
hdd-status: present
...
Server /chassis #
For detailed information about YAML, see http://www.yaml.org/about.html.
In most CLI command modes, you can enter set cli output default to configure the default format, or set cli
output yaml to configure the YAML format.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
6 OL-21105-01
CHAPTER 2
Managing the Server
This chapter includes the following sections:
Procedure
Step 2 Server /chassis # set locator-led {on | off} Enables or disables the chassis locator LED.
This example disables the chassis locator LED and commits the transaction:
Server# scope chassis
Server /chassis # set locator-led off
Server /chassis *# commit
Server /chassis #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 7
Managing the Server
Resetting the Server Boot Order
Step 2 Server /bios # set boot-order Specifies the boot device options and order. You can
device1[,device2[,device3 select one or more of the following:
[,device4[,device5]]]]
• cdrom—Bootable CD-ROM
• fdd—Floppy disk drive
• hdd—Hard disk drive
• pxe—PXE boot
• efi—Extensible Firmware Interface
Step 3 Server /bios # commit Commits the transaction to the system configuration.
This example sets the boot order and commits the transaction:
Server# scope bios
Server /bios # set boot-order hdd,cdrom,fdd,pxe,efi
Server /bios *# commit
Server /bios # show detail
BIOS:
Boot Order: HDD,CDROM,FDD,PXE,EFI
Server /bios #
Note If the server was powered off other than through the CIMC, the server will not become active immediately
when powered on. In this case, the server will enter standby mode until the CIMC completes initialization.
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
8 OL-21105-01
Managing the Server
Powering Off the Server
Continue?[y|N]y
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 9
Managing the Server
Resetting the Server
Step 2 Server /chassis # power hard-reset After a prompt to confirm, resets the server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
10 OL-21105-01
CHAPTER 3
Viewing Server Properties
This chapter includes the following sections:
Procedure
Server /chassis #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 11
Viewing Server Properties
Viewing Memory Properties
Procedure
Server /chassis #
Procedure
Step 2 Server /chassis # show psu [detail] Displays power supply properties.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
12 OL-21105-01
Viewing Server Properties
Viewing Storage Properties
Server /chassis #
Procedure
Server /chassis #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 13
Viewing Server Properties
Viewing Storage Properties
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
14 OL-21105-01
CHAPTER 4
Viewing Server Sensors
This chapter includes the following sections:
Step 2 Server /sensor # show psu [detail] Displays power supply sensor statistics for the
server.
Step 3 Server /sensor # show psu-redundancy Displays power supply redundancy sensor status
[detail] for the server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 15
Viewing Server Sensors
Viewing Fan Sensors
Server /sensor #
Step 2 Server /sensor # show fan [detail] Displays fan sensor statistics for the server.
Server /sensor #
Step 2 Server /sensor # show temperature [detail] Displays temperature sensor statistics for the
server.
Server /sensor #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
16 OL-21105-01
Viewing Server Sensors
Viewing Voltage Sensors
Step 2 Server /sensor # show voltage [detail] Displays voltage sensor statistics for the
server.
Server /sensor #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 17
Viewing Server Sensors
Viewing Voltage Sensors
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
18 OL-21105-01
CHAPTER 5
Managing Remote Presence
This chapter includes the following sections:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 19
Disabling the Virtual KVM
Managing the Virtual KVM
Procedure
Step 2 Server /kvm # set enabled yes Enables the virtual KVM.
Step 4 Server /kvm # show [detail] (Optional) Displays the virtual KVM
configuration.
Server /kvm #
Procedure
Step 4 Server /kvm # show [detail] (Optional) Displays the virtual KVM configuration.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
20 OL-21105-01
Configuring the Virtual KVM
Managing the Virtual KVM
Server /kvm #
Procedure
Step 2 Server /kvm # set enabled {yes | no} Enables or disables the virtual KVM.
Step 3 Server /kvm # set encrypted {yes | If encryption is enabled, the server encrypts all video
no} information sent through the KVM.
Step 4 Server /kvm # set kvm-port port Specifies the port used for KVM communication.
Step 5 Server /kvm # set local-video {yes | If local video is yes, the KVM session is also
no} displayed on any monitor attached to the server.
Step 6 Server /kvm # set max-sessions Specifies the maximum number of concurrent KVM
sessions sessions allowed. The sessions argument is an integer
between 1 and 4.
Step 7 Server /kvm # commit Commits the transaction to the system configuration.
Step 8 Server /kvm # show [detail] (Optional) Displays the virtual KVM configuration.
This example configures the virtual KVM and displays the configuration:
Server# scope kvm
Server /kvm # set enabled yes
Server /kvm *# set encrypted no
Server /kvm *# set kvm-port 2068
Server /kvm *# set max-sessions 4
Server /kvm *# set local-video yes
Server /kvm *# commit
Server /kvm # show detail
KVM Settings:
Encryption Enabled: no
Max Sessions: 4
Local Video: yes
Active Sessions: 0
Enabled: yes
KVM Port: 2068
Server /kvm #
What to Do Next
Launch the virtual KVM from the GUI.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 21
Serial Over LAN
Configuring Virtual Media
Procedure
Step 2 Server /vmedia # set enabled {yes | Enables or disables virtual media. By default, virtual
no} media is disabled.
Note Disabling virtual media detaches the virtual
CD, virtual floppy, and virtual HDD devices
from the host.
Step 3 Server /vmedia # set encryption {yes Enables or disables virtual media encryption.
| no}
Step 4 Server /vmedia # commit Commits the transaction to the system configuration.
Step 5 Server /vmedia # show [detail] (Optional) Displays the virtual media configuration.
Server /vmedia #
What to Do Next
Use the KVM to attach virtual media devices to a host.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
22 OL-21105-01
Configuring Serial Over LAN
Guidelines and Restrictions for Serial Over LAN
The SoL session will display line-oriented information such as boot messages, and character-oriented screen
menus such as BIOS setup menus. If the server boots an operating system or application with a bitmap-oriented
display, such as Windows, the SoL session will no longer display. If the server boots a command-line-oriented
operating system (OS), such as Linux, you may need to perform additional configuration of the OS in order
to properly display in an SoL session.
In the SoL session, your keystrokes are transmitted to the console except for the function key F2. To send an
F2 to the console, press the Escape key, then press 2.
Procedure
Step 2 Server /sol # set enabled {yes | no} Enables or disables SoL on this server.
Step 3 Server /sol # set baud-rate {9600 | Sets the serial baud rate the system uses for SoL
19200 | 38400 | 57600 | 115200} communication.
Note The baud rate must match the baud rate
configured in the server serial console.
Step 4 Server /sol # commit Commits the transaction to the system
configuration.
Step 5 Server /sol # show [detail] (Optional) Displays the SoL settings.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 23
Launching Serial Over LAN
Guidelines and Restrictions for Serial Over LAN
yes 115200
Server /sol #
What to Do Next
To end the SoL session, you must close the CLI session. For example, to end an SoL session over an SSH
connection, disconnect the SSH connection.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
24 OL-21105-01
CHAPTER 6
Managing User Accounts
This chapter includes the following sections:
Procedure
Step 2 Server /user # set enabled {yes Enables or disables the user account on the CIMC.
| no}
Step 3 Server /user # set name Specifies the username for the user.
username
Step 4 Server /user # set password You are prompted to enter the password twice.
Step 5 Server /user # set role {readonly Specifies the role assigned to the user. The roles are as
| user | admin} follows:
• readonly—This user can view information but cannot
make any changes.
• user—This user can do the following:
• View all information
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 25
Active Directory
Configuring Active Directory
Step 6 Server /user # commit Commits the transaction to the system configuration.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
26 OL-21105-01
Managing User Accounts
Configuring Active Directory
attribute ID of 1.3.6.1.4.1.9.287247.1. For more information about altering the Active Directory schema, see
the article at http://technet.microsoft.com/en-us/library/bb727064.aspx.
The following steps are to be performed on the Active Directory server.
Note This example creates a custom attribute named CiscoAVPair, but you can also use an existing LDAP
attribute that is mapped to the CIMC user roles and locales.
Procedure
Description CiscoAVPair
Step 3 Add the CiscoAVPair attribute to the user class using the Active Directory snap-in:
a) Expand the Classes node in the left pane and type U to select the user class.
b) Click the Attributes tab and click Add.
c) Type C to select the CiscoAVPair attribute.
d) Click OK.
Step 4 Add the following user role values to the CiscoAVPair attribute, for the users that you want to have access
to CIMC:
Role CiscoAVPair Attribute Value
admin shell:roles="admin"
user shell:roles="user"
read-only shell:roles="read-only"
Note For more information about adding values to attributes, see the article at http://technet.microsoft.com/
en-us/library/bb727064.aspx.
What to Do Next
Use the CIMC to configure Active Directory.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 27
Configuring Active Directory in the CIMC
Configuring Active Directory
Procedure
Step 2 Server /ldap # set enabled Enables or disables Active Directory. When Active Directory
{yes | no} is enabled, all user authentication and role authorization is
performed by Active Directory, and the CIMC ignores the local
user database.
Note If the CIMC cannot establish a connection to Active
Directory, the CIMC reverts to using the local user
database.
Step 3 Server /ldap # set server-ip Specifies the Active Directory server IP address.
ip-address
Step 4 Server /ldap # set timeout Specifies the number of seconds the CIMC waits until it assumes
seconds the connection to Active Directory cannot be established.
Step 5 Server /ldap # set encrypted If encryption is enabled, the server encrypts all information sent
{yes | no} to Active Directory.
Step 6 Server /ldap # set base-dn Specifies the domain that all users must be in.
domain-name
Step 7 Server /ldap # set attribute Specify an LDAP attribute that contains the role and locale
name information for the user. This property is always a name-value
pair. The system queries the user record for the value that
matches this attribute name.
You can use an existing LDAP attribute that is mapped to the
CIMC user roles and locales or you can create a custom
attribute, such as the CiscoAVPair attribute, which has the
following attribute ID:
1.3.6.1.4.1.9.287247.1
Step 9 Server /ldap # show [detail] (Optional) Displays the Active Directory configuration.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
28 OL-21105-01
Managing User Accounts
Viewing User Sessions
Server /ldap #
The command output displays the following information about current user sessions:
Name Description
ID The unique identifier for the session.
IP Address The IP address from which the user accessed the server.
Killable If your user account has admin privileges, this column displays yes if
you can force the associated user session to end. Otherwise it displays
N/A.
Note You cannot terminate your current
session.
Server /user #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 29
Managing User Accounts
Terminating a User Session
Procedure
Step 2 Server /user-session # scope Enters user session command mode for the numbered
user-session session-number user session that you want to terminate.
This example shows how the admin at user session 10 terminates user session 15:
Server# show user-session
ID Name IP Address Type Killable
------ ---------------- ----------------- ------------ --------
10 admin 10.20.41.234 CLI yes
15 admin 10.20.30.138 CLI yes
Server# scope user-session 15
Server /user-session # terminate
User session 15 terminated.
Server /user-session #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
30 OL-21105-01
CHAPTER 7
Configuring Network-Related Settings
This chapter includes the following sections:
Note The available NIC modes may vary depending on your platform.
Set the NIC redundancy mode in the CIMC network command mode to determine how NIC redundancy is
handled:
• None—No redundancy
• Active-Active—Use both ports simultaneously
Active-Active provides a throughput improvement by utilizing both host ports simultaneously.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 31
Configuring NICs
Server NIC Configuration
Note The available NIC redundancy modes may vary depending on your platform.
Configuring NICs
Configure a server NIC when you want to set the NIC mode and NIC redundancy.
Procedure
Step 2 Server /cimc # scope Enters the CIMC network command mode.
network
Step 3 Server /cimc/network # set Sets the NIC mode to one of the following:
mode {dedicated |
• Dedicated—The management port is used to access the CIMC.
shared_lom}
• Shared LOM—The LOM (LAN On Motherboard) ports are
used to access the CIMC.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
32 OL-21105-01
Configuring Network-Related Settings
Configuring Common Properties
Procedure
Step 2 Server /cimc # scope network Enters the CIMC network command mode.
Step 3 Server /cimc/network # set hostname Specifies the name of the host.
host-name
Step 4 Server /cimc/network # commit Commits the transaction to the system
configuration.
Configuring IPv4
Before You Begin
You must log in as a user with admin privileges to configure IPv4 network settings.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 33
Configuring Network-Related Settings
Configuring IPv4
Procedure
Step 2 Server /cimc # scope network Enters the CIMC network command mode.
Step 3 Server /cimc/network # set dhcp-enabled Selects whether the CIMC uses DHCP.
{yes | no}
Step 4 Server /cimc/network # set v4-addr Specifies the IP address for the CIMC.
ipv4-address
Step 5 Server /cimc/network # set v4-netmask Specifies the subnet mask for the IP address.
ipv4-netmask
Step 6 Server /cimc/network # set v4-gateway Specifies the gateway for the IP address.
gateway-ipv4-address
Step 7 Server /cimc/network # set dns-use-dhcp Selects whether the CIMC retrieves the DNS
{yes | no} server addresses from DHCP.
Step 8 Server /cimc/network # set Specifies the IP address of the primary DNS
preferred-dns-server dns1-ipv4-address server.
Step 11 Server /cimc/network # show [detail] (Optional) Displays the IPv4 network
settings.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
34 OL-21105-01
Configuring Network-Related Settings
Configuring the Server VLAN
Server /cimc/network #
Procedure
Step 2 Server /cimc # scope network Enters the CIMC network command mode.
Step 3 Server /cimc/network # set vlan-enabled Selects whether the CIMC is connected to a
{yes | no} VLAN.
Step 5 Server /cimc/network # set vlan-priority Specifies the priority of this system on the
priority VLAN.
Step 7 Server /cimc/network # show [detail] (Optional) Displays the network settings.
Server /cimc/network #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 35
Network Security
Network Security Configuration
Procedure
Step 2 Server /cimc # scope network Enters the CIMC network command mode.
Step 6 Server /cimc/network/ipblocking # Sets the length of time, in seconds, in which the
set fail-window fail-seconds unsuccessful login attempts must occur in order for the
user to be locked out.
Enter an integer between 60 and 120.
Step 7 Server /cimc/network/ipblocking # Sets the number of seconds the user remains locked out
set penalty-time penalty-seconds if they exceed the maximum number of login attempts
within the specified time window.
Enter an integer between 300 and 900.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
36 OL-21105-01
Configuring Network-Related Settings
Network Security Configuration
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 37
Configuring Network-Related Settings
Network Security Configuration
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
38 OL-21105-01
CHAPTER 8
Configuring Communication Services
This chapter includes the following sections:
Configuring HTTP
Before You Begin
You must log in as a user with admin privileges to configure HTTP.
Procedure
Step 2 Server /http # set enabled {yes | Enables or disables HTTP and HTTPS service on the
no} CIMC.
Step 3 Server /http # set http-port number Sets the port to use for HTTP communication. The
default is 80.
Step 4 Server /http # set https-port Sets the port to use for HTTPS communication. The
number default is 443.
Step 5 Server /http # set timeout seconds Sets the number of seconds to wait between HTTP
requests before the CIMC times out and terminates the
session.
Enter an integer between 60 and 10,800. The default is
1,800 seconds.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 39
Configuring Communication Services
Configuring SSH
Server /http #
Configuring SSH
Before You Begin
You must log in as a user with admin privileges to configure SSH.
Procedure
Step 2 Server /ssh # set enabled {yes | no} Enables or disables SSH on the CIMC.
Step 3 Server /ssh # set ssh-port number Sets the port to use for secure shell access. The default
is 22.
Step 4 Server /ssh # set timeout seconds Sets the number of seconds to wait before the system
considers an SSH request to have timed out.
Enter an integer between 60 and 10,800. The default
is 300 seconds.
Step 5 Server /ssh # commit Commits the transaction to the system configuration.
Step 6 Server /ssh # show [detail] (Optional) Displays the SSH configuration.
Server /ssh #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
40 OL-21105-01
IPMI Over LAN
IPMI Over LAN Configuration
Procedure
Step 2 Server /ipmi # set enabled Enables or disables IPMI access on this server.
{yes | no}
Step 3 Server /ipmi # set Specifies the user role that must be assigned to users accessing the
privilege-level {readonly | system though IPMI. The user roles are as follows:
user | admin}
• readonly—This user can view information but cannot make
any changes.
• user—This user can do the following:
• View all information
• Manage the power control options such as power on,
power cycle, and power off
• Launch the KVM console and virtual media
• Clear all logs
• Toggle the locator LED
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 41
Configuring Communication Services
IPMI Over LAN Configuration
Step 4 Server /ipmi # set Sets the IMPI encryption key to use for IPMI communications.
encryption-key key The key value must be 40 hexadecimal numbers.
Step 5 Server /ipmi # commit Commits the transaction to the system configuration.
Server /ipmi #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
42 OL-21105-01
CHAPTER 9
Managing Certificates
This chapter includes the following sections:
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 43
Managing Certificates
Generating a Certificate Signing Request
Procedure
Step 2 Server /certificate # generate-csr Launches a dialog for the generation of a certificate
signing request (CSR).
You will be prompted to enter the following information for the certificate signing request:
Country Code (CC) The two-letter ISO country code for the country in
which the company is headquartered.
After you have entered the requested information, the system will generate and display a certificate signing
request in the console output. A CSR file will not be created, but you can copy the CSR information from the
console output and paste the information into a text file.
This example generates a certificate signing request:
Server# scope certificate
Server /certificate # generate-csr
Common Name (CN): test.example.com
Organization Name (O): Example, Inc.
Organization Unit (OU): Test Department
Locality (L): San Jose
StateName (S): CA
Country Code (CC): US
Email: user@example.com
Continue to generate CSR?[y|N]y
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
44 OL-21105-01
Managing Certificates
Creating a Self-Signed Certificate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-----END CERTIFICATE REQUEST-----
What to Do Next
Perform one of the following tasks:
• If you do not want to obtain a certificate from a public certificate authority, and if your organization
does not operate its own certificate authority, you can allow CIMC to internally generate a self-signed
certificate from the CSR and upload it immediately to the server. Type y after the final prompt in the
example to perform this action.
• If your organization operates its own certificate server for generating self-signed certificates, copy the
command output from "-----BEGIN ..." to "END CERTIFICATE REQUEST-----" and paste to a file
named csr.txt. Input the CSR file to your certificate server to generate a self-signed certificate.
• If you will obtain a certificate from a public certificate authority, copy the command output from
"-----BEGIN ..." to "END CERTIFICATE REQUEST-----" and paste to a file named csr.txt. Submit the
CSR file to the certificate authority to obtain a signed certificate.
If you did not use the first option, in which CIMC internally generates and uploads a self-signed certificate,
you must upload the new certificate using the upload command in certificate command mode.
Note These commands are to be entered on a Linux server with the OpenSSL package, not in the CIMC CLI.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 45
Managing Certificates
Creating a Self-Signed Certificate
Procedure
Step 2 openssl req -new -x509 -days numdays This command generates a new self-signed certificate
-key CA_keyfilename -out CA_certfilename for the CA using the specified key. The certificate is
valid for the specified period. The command prompts
Example: the user for additional certificate information.
# openssl req -new -x509 -days 365
-key ca.key -out ca.crt The certificate server is an active CA.
Step 3 echo "nsCertType = server" > This command adds a line to the OpenSSL configuration
openssl.conf file to designate the certificate as a server-only
certificate. This designation is a defense against a
Example: man-in-the-middle attack, in which an authorized client
# echo "nsCertType = server" > attempts to impersonate the server.
openssl.conf
The OpenSSL configuration file openssl.conf contains
the statement "nsCertType = server".
Step 4 openssl x509 -req -days numdays -in This command directs the CA to use your CSR file to
CSR_filename -CA CA_certfilename generate a server certificate.
-set_serial 04 -CAkey CA_keyfilename Your server certificate is contained in the output file.
-out server_certfilename -extfile
openssl.conf
Example:
# openssl x509 -req -days 365 -in
csr.txt -CA ca.crt -set_serial 04
-CAkey ca.key -out myserver05.crt
-extfile openssl.conf
This example shows how to create a CA and to generate a server certificate signed by the new CA. These
commands are entered on a Linux server running OpenSSL.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
46 OL-21105-01
Managing Certificates
Uploading a Server Certificate
What to Do Next
Upload the new certificate to the CIMC.
Note You must first generate a CSR using the CIMC certificate management CSR generation procedure, and
you must use that CSR to obtain the certificate for uploading. Do not upload a certificate that was not
obtained by this method.
Note All current HTTPS and SSH sessions are disconnected when the new server certificate is uploaded.
Procedure
Step 2 Server /certificate # upload Launches a dialog for entering and uploading the
new server certificate.
Copy the certificate text, paste it into the console when prompted, and type CTRL+D to upload the certificate.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 47
Managing Certificates
Uploading a Server Certificate
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
48 OL-21105-01
CHAPTER 10
Configuring Platform Event Filters
This chapter includes the following sections:
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 49
Configuring Platform Event Filters
Disabling Platform Event Alerts
Server /fault #
Step 4 Server /fault # show [detail] (Optional) Displays the platform event alert
configuration.
Server /fault #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
50 OL-21105-01
Configuring Platform Event Filters
Configuring Platform Event Filters
Procedure
Step 2 Server /fault # scope pef id Enters the platform event filter command mode for the
specified event.
See the Platform Event Filter table for event ID numbers.
Step 3 Server /fault/pef # set action Selects the desired system action when this event occurs. The
{none | reboot | power-cycle | action can be one of the following:
power-off}
• none—An alert is sent but no other action is taken.
• reboot—An alert is sent and the server is rebooted.
• power-cycle—An alert is sent and the server is power
cycled.
• power-off—An alert is sent and the server is powered
off.
Step 4 Server /fault/pef # set Enables or disables the sending of a platform event alert for
send-alert {yes | no} this event.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 51
Configuring Platform Event Filters
Configuring SNMP Trap Settings
Server /fault/pef #
What to Do Next
If you configure any PEFs to send an alert, complete the following tasks:
• Enable platform event alerts
• Configure SNMP trap settings
Step 2 Server /fault # set community-str Enter the name of the SNMP community to which
string trap information should be sent.
Step 3 Server /fault # scope trap-destination Enters the SNMP trap destination command mode
number for the specified destination. Four SNMP trap
destinations are available. The destination number is
an integer between 1 and 4.
Step 4 Server /fault/trap-destination # set Enables or disables the SNMP trap destination.
enabled {yes | no}
Step 5 Server /fault/trap-destination # set addr Specifies the destination IP address to which SNMP
ip-address trap information is sent.
Step 6 Server /fault/trap-destination # commit Commits the transaction to the system configuration.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
52 OL-21105-01
Configuring Platform Event Filters
Configuring SNMP Trap Settings
Server /fault/trap-destination #
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 53
Configuring Platform Event Filters
Configuring SNMP Trap Settings
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
54 OL-21105-01
CHAPTER 11
CIMC Firmware Management
This chapter includes the following sections:
Overview of Firmware
C-Series servers use firmware obtained from and certified by Cisco to upgrade firmware on the server. After
you have obtained a firmware image from Cisco, you can use it to update the firmware on your server. Cisco
also provides release notes with each image, which you can obtain from the same website from which you
obtained the image.
Note When you update the firmware, you can either upgrade an older firmware version to a newer one, or
downgrade a newer firmware version to an older one.
The CIMC separates the firmware update process into stages to ensure that you can install the firmware to a
component while the server is running without affecting its uptime. Because you do not need to reboot the
server until after you activate, you can perform that task overnight or during other maintenance periods. When
you update firmware, the following stages occur:
Install
During this stage, the CIMC transfers the selected firmware version to the server. The install process always
overwrites the firmware in the non-active slot on the server. You can install the firmware using either of the
following methods:
• Through a browser client—this method allows you to browse for a firmware image on your computer
and install it on the server.
• From a TFTP server—this method allows you to install a firmware image residing on a TFTP server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 55
CIMC Firmware Management
Obtaining CIMC Firmware from Cisco
Activate
During this stage, the CIMC sets the non-active firmware version as active and reboots the server. When the
server reboots, the non-active slot becomes the active slot, and the active slot becomes the non-active slot.
The firmware in the new active slot becomes the running version.
Step 1 In a web browser, navigate to the web link provided by Cisco to obtain firmware images for your server.
Step 2 Select one or more firmware images and copy them to a network server.
Step 3 Read the release notes provided with the image or images.
What to Do Next
Install the CIMC firmware on the server.
Note If you start an update while an update is already in process, both updates will fail.
Procedure
Step 2 Server /cimc # scope firmware Enters the CIMC firmware command mode.
Step 3 Server /cimc/firmware # update Starts the firmware update. The server will obtain
tftp-ip-address path-and-filename the update firmware at the specified path and file
name from the TFTP server at the specified IP
address.
Step 4 (Optional) Server /cimc/firmware # show Displays the progress of the firmware update.
detail
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
56 OL-21105-01
CIMC Firmware Management
Activating Installed Firmware
What to Do Next
Activate the new firmware.
Note If you start an activation while an update is in process, the activation will fail.
Procedure
Step 2 Server /cimc # scope firmware Enters the firmware command mode.
Step 3 Server /cimc/firmware # show [detail] Displays the available firmware images and status.
Step 4 Server /cimc/firmware # activate [1 | Activates the selected image. If no image number
2] is specified, the server activates the currently
inactive image.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 57
CIMC Firmware Management
Activating Installed Firmware
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
58 OL-21105-01
CHAPTER 12
Viewing Logs
This chapter includes the following sections:
CIMC Log
Viewing the CIMC Log
Procedure
Step 2 Server /cimc # scope log Enters the CIMC log command mode.
Step 3 Server /cimc/log # show entries Displays CIMC events, including timestamp, the
[detail] software module that logged the event, and a
description of the event.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 59
Clearing the CIMC Log
System Event Log
Step 2 Server /cimc # scope log Enters the CIMC log command mode.
Step 2 Server /sel # show entries For system events, displays timestamp, the severity of the
[detail] event, and a description of the event. The detail keyword
displays the information in a list format instead of a table
format.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
60 OL-21105-01
Clearing the System Event Log
System Event Log
[System Boot] Informational " LED_HLTH_STATUS: Platform sensor, GREEN was asserted"
[System Boot] Normal " PSU_REDUNDANCY: PS Redundancy sensor, Fully Redundant
was asserted"
[System Boot] Normal " PSU2 PSU2_STATUS: Power Supply sensor for PSU2, Power
Supply input lost (AC/DC) was deasserted"
[System Boot] Informational " LED_PSU_STATUS: Platform sensor, ON event was asserted"
[System Boot] Informational " LED_HLTH_STATUS: Platform sensor, AMBER was asserted"
[System Boot] Critical " PSU_REDUNDANCY: PS Redundancy sensor, Redundancy Lost
was asserted"
[System Boot] Critical " PSU2 PSU2_STATUS: Power Supply sensor for PSU2, Power
Supply input lost (AC/DC) was asserted"
[System Boot] Normal " HDD_01_STATUS: Drive Slot sensor, Drive Presence was
asserted"
[System Boot] Critical " HDD_01_STATUS: Drive Slot sensor, Drive Presence was
deasserted"
[System Boot] Informational " DDR3_P2_D1_INFO: Memory sensor, OFF event was asserted"
2001-01-01 08:30:16 Warning " PSU2 PSU2_VOUT: Voltage sensor for PSU2, failure event
was deasserted"
2001-01-01 08:30:16 Critical " PSU2 PSU2_VOUT: Voltage sensor for PSU2, non-recoverable
event was deasserted"
2001-01-01 08:30:15 Informational " LED_PSU_STATUS: Platform sensor, ON event was asserted"
2001-01-01 08:30:15 Informational " LED_HLTH_STATUS: Platform sensor, AMBER was asserted"
2001-01-01 08:30:15 Informational " LED_HLTH_STATUS: Platform sensor, FAST BLINK event was
asserted"
2001-01-01 08:30:14 Non-Recoverable " PSU2 PSU2_VOUT: Voltage sensor for PSU2, non-recoverable
event was asserted"
2001-01-01 08:30:14 Critical " PSU2 PSU2_VOUT: Voltage sensor for PSU2, failure event
was asserted"
--More--
Step 2 Server /sel # clear You are prompted to confirm the action. If you enter y at
the prompt, the system event log is cleared.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 61
Clearing the System Event Log
System Event Log
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
62 OL-21105-01
CHAPTER 13
Server Utilities
This chapter includes the following sections:
Procedure
Step 2 Server /cimc # scope tech-support Enters the tech-support command mode.
Step 3 Server /cimc/tech-support # set Specifies the IP address of the TFTP server on which
tftp-ip ip-address the support data file should be stored.
Step 4 Server /cimc/tech-support # set path Specifies the file name in which the support data
path/filename should be stored on the server. When you enter this
name, include the relative path for the file from the
top of the TFTP tree to the desired location.
Step 5 Server /cimc/tech-support # commit Commits the transaction to the system configuration.
Step 6 Server /cimc/tech-support # start Begins the transfer of the support data file to the TFTP
server.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 63
Server Utilities
Resetting the CIMC to Factory Defaults
This example creates a support data file and transfers the file to a TFTP server:
Server# scope cimc
Server /cimc # scope tech-support
Server /cimc/tech-support # set tftp-ip 10.20.30.41
Server /cimc/tech-support *# set path /user/user1/supportfile
Server /cimc/tech-support *# commit
Server /cimc/tech-support # start
What to Do Next
Provide the generated report file to Cisco TAC.
Procedure
Step 2 Server /cimc # factory-default After a prompt to confirm, the CIMC resets to
factory defaults.
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
64 OL-21105-01
Server Utilities
Rebooting the CIMC
Procedure
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 65
Server Utilities
Rebooting the CIMC
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
66 OL-21105-01
INDEX
certificate management
uploading a certificate 47
CIMC
F
clearing log 60 fan sensors 16
firmware firmware
about 55 about 55
activating 57 activating 57
installing from TFTP server 56 installing from TFTP server 56
obtaining from Cisco 56 obtaining from Cisco 56
resetting to factory defaults 64 floppy disk emulation 22
viewing log 59
CIMC CLI 3
CIMC overview 1
common properties 33 H
communication services properties HTTP properties 39
HTTP properties 39
IPMI over LAN properties 41
SSH properties 40
CPU properties 11 I
IP blocking 36
IPMI over LAN 41
D IPMI over LAN properties 41
IPv4 properties 33
disabling KVM 20
K
E
KVM
enabling KVM 19, 21 configuring 21
encrypting virtual media 22 disabling 20
event filters, platform enabling 19, 21
about 49 KVM console 19
configuring 50
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 IN-1
Index
L sensors (continued)
temperature 16
local users 25 voltage 17
serial over LAN 22, 23, 24
configuring 23
M launching 24
server management
memory properties 12 power cycling the server 9
powering off the server 9
powering on the server 8
resetting the boot order 8
N resetting the server 10
network properties shutting down the server 10
common properties 33 toggling the locator LED 7
IPv4 properties 33 server NIC 31
NIC properties 32 server overview 1
VLAN properties 35 shutting down the server 10
network security 36 SNMP trap configuration 52
NIC properties 32 SSH properties 40
storage properties 13
system event log
clearing 61
P viewing 60
platform event filters
about 49
configuring 50 T
Platform events
diabling alerts 50 technical support data, exporting 63
enabling alerts 49 temperature sensors 16
power cycling the server 9 toggling the locator LED 7
power supply properties 12
power supply sensors 15
powering off the server 9 U
powering on the server 8
uploading a server certificate 47
user management
active directory 28
R local users 25
remote presence terminating user sessions 30
configuring serial over LAN 23 viewing user sessions 29
launching serial over LAN 24 user sessions
virtual KVM 19, 20, 21 terminating 30
virtual media 22 viewing 29
resetting the boot order 8
resetting the server 10
V
virtual KVM 19, 20, 21
S virtual media 22
self-signed certificate 45 VLAN properties 35
sensors voltage sensors 17
fan 16
power supply 15
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
IN-2 OL-21105-01
Index
Y YAML 5
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
OL-21105-01 IN-3
Index
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.0(1)
IN-4 OL-21105-01