B Command Reference 2 0 PDF
B Command Reference 2 0 PDF
0
First Published: September 06, 2011
Last Modified: June 20, 2012
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown
for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Oversubscription 25
Oversubscription Considerations 25
Guidelines for Estimating Oversubscription 26
Pinning 27
Pinning Server Traffic to Server Ports 27
Guidelines for Pinning 29
Quality of Service 29
System Classes 29
Quality of Service Policy 30
Flow Control Policy 30
Opt-In Features 30
Stateless Computing 31
Multi-Tenancy 32
Virtualization in Cisco UCS 33
Overview of Virtualization 33
Overview of Cisco Virtual Machine Fabric Extender 33
Virtualization with Network Interface Cards and Converged Network Adapters 33
Virtualization with a Virtual Interface Card Adapter 34
Setting the Web Session Limit for Cisco UCS Manager from the CLI 44
Pre-Login Banner 44
Creating the Pre-Login Banner 45
Modifying the Pre-Login Banner 46
Deleting the Pre-Login Banner 47
CHAPTER 4 Commands 49
acknowledge chassis 92
acknowledge fex 93
acknowledge fault 94
acknowledge server 95
acknowledge slot 96
activate firmware 97
activate firmware (fabric) 99
activate internal firmware 101
add alertgroups 102
add backup action 104
add privilege 105
apply pending-changes immediate 108
associate server 109
associate server-pool 111
backup sel 112
cd 113
clear alertgroups 115
clear auth-server-group 116
clear backup action 117
clear cores 118
clear file 119
clear message 120
clear password-history 121
clear sel (/chassis/server) 122
clear sel (/chassis/server) 123
clear sshkey 124
cluster force primary 125
cluster lead 126
commit-buffer 128
connect adapter 129
connect bmc 130
connect clp 131
connect iom 132
connect local-mgmt 133
connect nxos 134
copy 135
create adapter 137
create auth-domain 138
create auth-profile 139
create auth-server-group 141
create auto-target-if 142
create backup 143
create bios-policy 145
create bladeserver-disc-policy 146
create block 147
create boot-definition 149
create boot-policy 150
create boot-target 151
create cap-qual 152
create certreq 154
create chassis 156
create class chassis-stats 157
create class cmc-stats 158
create class cpu-env-stats 159
create class dimm-env-stats 160
create class dimm-stats 161
create class env-stats 162
create class ether-error-stats 163
create class ether-if-stats 164
create class ether-loss-stats 165
create class ether-pause-stats 166
create class ethernet-port-err-stats 167
create class ethernet-port-multicast-stats 168
Audience
This guide is intended primarily for data center administrators with responsibilities and expertise in one or
more of the following:
• Server administration
• Storage administration
• Network administration
• Network security
Organization
This document includes the following parts:
Part 3 Network Contains chapters that describe how to configure named VLANs,
Configuration LAN pin groups, MAC pools, and Quality of Service (QoS).
Part 4 Storage Contains chapters that describe how to configure named VSANs,
Configuration SAN pin groups, and WWN pools.
Part 5 Server Configuration Contains chapters that describe how to configure server-related
policies, server-related pools, service profiles, and server power
usage.
Part 6 System Management Contains chapters that describe how to manage a Cisco UCS
domain, including managing the chassis, servers, and I/O modules,
and how to back up and restore the configuration.
Part 7 System Monitoring Contains chapters that describe how use Cisco UCS Manager to
monitor a Cisco UCS domain, including configuring Call Home,
monitoring data traffic, monitoring hardware, configuring
statistics-related policies, and configuring faults, events, and logs.
For more information about Cisco UCS faults and logs, see the
Cisco UCS Manager B-Series Troubleshooting Guide and the
Cisco UCS Faults and Error Messages Reference.
Conventions
This document uses the following conventions:
Convention Indication
bold font Commands, keywords, GUI elements, and user-entered text
appear in bold font.
italic font Document titles, new or emphasized terms, and arguments for
which you supply values are in italic font.
Convention Indication
[x | y | z] Optional alternative keywords are grouped in brackets and
separated by vertical bars.
Tip Means the following information will help you solve a problem.
Caution Means reader be careful. In this situation, you might perform an action that could result in equipment
damage or loss of data.
Timesaver Means the described action saves time. You can save time by performing the action described in the
paragraph.
Warning Means reader be warned. In this situation, you might perform an action that could result in bodily injury.
Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments
to ucs-docfeedback@external.cisco.com. We appreciate your feedback.
Architectural Simplification
The simplified architecture of Cisco UCS reduces the number of required devices and centralizes switching
resources. By eliminating switching inside a chassis, network access-layer fragmentation is significantly
reduced.
Cisco UCS implements Cisco unified fabric within racks and groups of racks, supporting Ethernet and Fibre
Channel protocols over 10 Gigabit Cisco Data Center Ethernet and Fibre Channel over Ethernet (FCoE) links.
This radical simplification reduces the number of switches, cables, adapters, and management points by up
to two-thirds. All devices in a Cisco UCS domain remain under a single management domain, which remains
highly available through the use of redundant components.
High Availability
The management and data plane of Cisco UCS is designed for high availability and redundant access layer
fabric interconnects. In addition, Cisco UCS supports existing high availability and disaster recovery solutions
for the data center, such as data replication and application-level clustering technologies.
Scalability
A single Cisco UCS domain supports multiple chassis and their servers, all of which are administered through
one Cisco UCS Manager. For more detailed information about the scalability, speak to your Cisco representative.
Flexibility
A Cisco UCS domain allows you to quickly align computing resources in the data center with rapidly changing
business requirements. This built-in flexibility is determined by whether you choose to fully implement the
stateless computing feature.
Pools of servers and other system resources can be applied as necessary to respond to workload fluctuations,
support new applications, scale existing software and business services, and accommodate both scheduled
and unscheduled downtime. Server identity can be abstracted into a mobile service profile that can be moved
from server to server with minimal downtime and no need for additional network configuration.
With this level of flexibility, you can quickly and easily scale server capacity without having to change the
server identity or reconfigure the server, LAN, or SAN. During a maintenance window, you can quickly do
the following:
• Deploy new servers to meet unexpected workload demand and rebalance resources and traffic.
• Shut down an application, such as a database management system, on one server and then boot it up
again on another server with increased I/O capacity and memory resources.
Unified Fabric
With unified fabric, multiple types of data center traffic can run over a single Data Center Ethernet (DCE)
network. Instead of having a series of different host bus adapters (HBAs) and network interface cards (NICs)
present in a server, unified fabric uses a single converged network adapter. This type of adapter can carry
LAN and SAN traffic on the same cable.
Cisco UCS uses Fibre Channel over Ethernet (FCoE) to carry Fibre Channel and Ethernet traffic on the same
physical Ethernet connection between the fabric interconnect and the server. This connection terminates at a
converged network adapter on the server, and the unified fabric terminates on the uplink ports of the fabric
interconnect. On the core network, the LAN and SAN traffic remains separated. Cisco UCS does not require
that you implement unified fabric across the data center.
The converged network adapter presents an Ethernet interface and Fibre Channel interface to the operating
system. At the server, the operating system is not aware of the FCoE encapsulation because it sees a standard
Fibre Channel HBA.
At the fabric interconnect, the server-facing Ethernet port receives the Ethernet and Fibre Channel traffic. The
fabric interconnect (using Ethertype to differentiate the frames) separates the two traffic types. Ethernet frames
and Fibre Channel frames are switched to their respective uplink interfaces.
Important At any given time, each server can be associated with only one service profile. Similarly, each service
profile can be associated with only one server at a time.
After you associate a service profile with a server, the server is ready to have an operating system and
applications installed, and you can use the service profile to review the configuration of the server. If the
server associated with a service profile fails, the service profile does not automatically fail over to another
server.
When a service profile is disassociated from a server, the identity and connectivity information for the server
is reset to factory defaults.
• Fabric interconnects
You can disassociate this service profile from one server and then associate it with another server. This
re-association can be done either manually or through an automated server pool policy. The burned-in settings,
such as UUID and MAC address, on the new server are overwritten with the configuration in the service
profile. As a result, the change in server is transparent to your network. You do not need to reconfigure any
component or application on your network to begin using the new server.
This profile allows you to take advantage of and manage system resources through resource pools and policies,
such as the following:
• Virtualized identity information, including pools of MAC addresses, WWN addresses, and UUIDs
• Ethernet and Fibre Channel adapter profile policies
• Firmware package policies
• Operating system boot order policies
Unless the service profile contains power management policies, a server pool qualification policy, or another
policy that requires a specific hardware configuration, the profile can be used for any type of server in the
Cisco UCS domain.
You can associate these service profiles with either a rack-mount server or a blade server. The ability to
migrate the service profile depends upon whether you choose to restrict migration of the service profile.
Note If you choose not to restrict migration, Cisco UCS Manager does not perform any compatibility checks
on the new server before migrating the existing service profile. If the hardware of both servers are not
similar, the association might fail.
Important The server identity and configuration information inherited through this service profile may not be the
values burned into the server hardware at manufacture if those values were changed before this profile is
associated with the server.
Tip If you need only one service profile with similar values to an existing service profile, you can clone a
service profile in the Cisco UCS Manager GUI.
For example, if you need several service profiles with similar values to configure servers to host database
software, you can create a service profile template, either manually or from an existing service profile. You
then use the template to create the service profiles.
Cisco UCS supports the following types of service profile templates:
Initial template
Service profiles created from an initial template inherit all the properties of the template. However,
after you create the profile, it is no longer connected to the template. If you need to make changes to
one or more profiles created from this template, you must change each profile individually.
Updating template
Service profiles created from an updating template inherit all the properties of the template and remain
connected to the template. Any changes to the template automatically update the service profiles created
from the template.
Policies
Policies determine how Cisco UCS components will act in specific circumstances. You can create multiple
instances of most policies. For example, you might want different boot policies, so that some servers can PXE
boot, some can SAN boot, and others can boot from local storage.
Policies allow separation of functions within the system. A subject matter expert can define policies that are
used in a service profile, which is created by someone without that subject matter expertise. For example, a
LAN administrator can create adapter policies and quality of service policies for the system. These policies
can then be used in a service profile that is created by someone who has limited or no subject matter expertise
with LAN administration.
You can create and use two types of policies in Cisco UCS Manager:
• Configuration policies that configure the servers and other components
• Operational policies that control certain management, monitoring, and access control functions
Configuration Policies
Boot Policy
The boot policy determines the following:
For example, you can choose to have associated servers boot from a local device, such as a local disk or
CD-ROM (VMedia), or you can select a SAN boot or a LAN (PXE) boot.
You must include this policy in a service profile, and that service profile must be associated with a server for
it to take effect. If you do not include a boot policy in a service profile, the server uses the default settings in
the BIOS to determine the boot order.
Important Changes to a boot policy may be propagated to all servers created with an updating service profile template
that includes that boot policy. Reassociation of the service profile with the server to rewrite the boot order
information in the BIOS is auto-triggered.
Chassis Links
If you have a Cisco UCS domain that has some chassis wired with 1 link, some with 2 links, some with 4
links, and some with 8 links we recommend that you configure the chassis discovery policy for the minimum
number links in the domain so that Cisco UCS Manager can discover all chassis.
Tip For Cisco UCS implementations that mix IOMs with different numbers of links, we recommend using
the platform max value. Using platform max insures that Cisco UCS Manager uses the maximum number
of IOM uplinks available.
After the initial discovery, you must reacknowledge the chassis that are wired for a greater number of links
and Cisco UCS Manager configures the chassis to use all available links.
Cisco UCS Manager cannot discover any chassis that is wired for fewer links than are configured in the chassis
discovery policy. For example, if the chassis discovery policy is configured for 4 links, Cisco UCS Manager
cannot discover any chassis that is wired for 1 link or 2 links. Reacknowledgement of the chassis does not
resolve this issue.
The following table provides an overview of how the chassis discovery policy works in a multi-chassis Cisco
UCS domain:
Number of 1-Link Chassis 2-Link Chassis 4-Link Chassis 8-Link Chassis Platform-Max
Links Wired Discovery Discovery Discovery Discovery Policy Discovery Policy
for the Chassis Policy Policy Policy
1 link between Chassis is Chassis cannot Chassis cannot Chassis cannot be Chassis is
IOM and discovered by be discovered be discovered discovered by discovered by
fabric Cisco UCS by Cisco UCS by Cisco UCS Cisco UCS Cisco UCS
interconnects Manager and Manager and is Manager and is Manager and is not Manager and added
added to the not added to not added to added to the Cisco to the Cisco UCS
Cisco UCS the Cisco UCS the Cisco UCS UCS domain. domain as a chassis
domain as a domain. domain. wired with 1 link.
chassis wired
with 1 link.
Number of 1-Link Chassis 2-Link Chassis 4-Link Chassis 8-Link Chassis Platform-Max
Links Wired Discovery Discovery Discovery Discovery Policy Discovery Policy
for the Chassis Policy Policy Policy
4 links Chassis is Chassis is Chassis is Chassis cannot be If the IOM has 4
between IOM discovered by discovered by discovered by discovered by links, the chassis is
and fabric Cisco UCS Cisco UCS Cisco UCS Cisco UCS discovered by
interconnects Manager and Manager and Manager and Manager and is not Cisco UCS
added to the added to the added to the added to the Cisco Manager and added
Cisco UCS Cisco UCS Cisco UCS UCS domain. to the Cisco UCS
domain as a domain as a domain as a domain as a chassis
chassis wired chassis wired chassis wired wired with 4 links.
with 1 link. with 2 links. with 4 link. If the IOM has 8
After initial After initial links, the chassis is
discovery, discovery, not fully
reacknowledge reacknowledge discovered by
the chassis and the chassis and Cisco UCS
Cisco UCS Cisco UCS Manager.
Manager Manager
recognizes and recognizes and
uses the uses the
additional additional
links. links.
Link Grouping
For hardware configurations that support fabric port channels, link grouping determines whether all of the
links from the IOM to the fabric interconnect are grouped into a fabric port channel during chassis discovery.
If the link grouping preference is set to port channel, all of the links from the IOM to the fabric interconnect
are grouped in a fabric port channel. If set to no group, links from the IOM to the fabric interconnect are not
grouped in a fabric port channel.
Once a fabric port channel is created, links can be added or removed by changing the link group preference
and reacknowledging the chassis, or by enabling or disabling the chassis from the port channel.
Note The link grouping preference only takes effect if both sides of the links between an IOM or FEX and the
fabric interconnect support fabric port channels. If one side of the links does not support fabric port
channels, this preference is ignored and the links are not grouped in a port channel.
Note If you migrate a server that is configured with dynamic vNICs, the dynamic interface used by the vNICs
fails and Cisco UCS Manager notifies you of that failure.
When the server comes back up, Cisco UCS Manager assigns new dynamic vNICs to the server. If you
are monitoring traffic on the dynamic vNIC, you must reconfigure the monitoring source.
Note For Fibre Channel adapter policies, the values displayed by Cisco UCS Manager may not match those
displayed by applications such as QLogic SANsurfer. For example, the following values may result in an
apparent mismatch between SANsurfer and Cisco UCS Manager:
• Max LUNs Per Target—SANsurfer has a maximum of 256 LUNs and does not display more than
that number. Cisco UCS Manager supports a higher maximum number of LUNs.
• Link Down Timeout—In SANsurfer, you configure the timeout threshold for link down in seconds.
In Cisco UCS Manager, you configure this value in milliseconds. Therefore, a value of 5500 ms in
Cisco UCS Manager displays as 5s in SANsurfer.
• Max Data Field Size—SANsurfer has allowed values of 512, 1024, and 2048. Cisco UCS Manager
allows you to set values of any size. Therefore, a value of 900 in Cisco UCS Manager displays as
512 in SANsurfer.
Important We recommend that you use the values in these policies for the applicable operating system. Do not modify
any of the values in the default policies unless directed to do so by Cisco Technical Support.
However, if you are creating an Ethernet adapter policy for a Windows OS (instead of using the default
Windows adapter policy), you must use the following formulas to calculate values that work with Windows:
Completion Queues = 1 + 8 = 9
Interrupt Count = (9 + 2) rounded up to the nearest power of 2 = 16
Important Any change to the manual blade-level power cap configuration will result in the loss of any groups or
configuration options set for policy-driven chassis group power capping.
Tip You can include more than one type of firmware in the same host firmware package. For example, a host
firmware package can include both BIOS firmware and storage controller firmware or adapter firmware
for two different models of adapters. However, you can only have one firmware version with the same
type, vendor, and model number. The system recognizes which firmware version is required for an endpoint
and ignores all other firmware versions.
The firmware package is pushed to all servers associated with service profiles that include this policy.
This policy ensures that the host firmware is identical on all servers associated with service profiles which
use the same policy. Therefore, if you move the service profile from one server to another, the firmware
versions are maintained. Also, if you change the firmware version for an endpoint in the firmware package,
new versions are applied to all the affected service profiles immediately, which could cause server reboots.
You must include this policy in a service profile, and that service profile must be associated with a server for
it to take effect.
Prerequisites
This policy is not dependent upon any other policies. However, you must ensure that the appropriate firmware
has been downloaded to the fabric interconnect. If the firmware image is not available when Cisco UCS
Manager is associating a server with a service profile, Cisco UCS Manager ignores the firmware upgrade and
completes the association.
You must include this policy in a service profile, and that service profile must be associated with a server for
the policy to take effect.
Important In the event of a management interface failure on a fabric interconnect, the managing instance may not
change if one of the following occurs:
• A path to the end-point through the subordinate fabric interconnect does not exist.
• The management interface for the subordinate fabric interconnect has failed.
• The path to the end-point through the subordinate fabric interconnect has failed.
Ethernet and FCoE traffic, such as Cisco UCS CNA M72KR-Q and the Cisco UCS CNA M72KR-E, this
default behavior directs Cisco UCS Manager to bring the remote Ethernet interface down if the associated
border port fails. In this scenario, any vFibreChannel interfaces that are bound to the remote Ethernet interface
are brought down as well.
Note Cisco UCS Manager, release 1.4(2) and earlier did not enforce the Action on Uplink Fail property for
those types of non-VM-FEX capable converged network adapters mentioned above. If the Action on
Uplink Fail property was set to link-down, Cisco UCS Manager would ignore this setting and instead
issue a warning. In the current version of Cisco UCS Manager this setting is enforced. Therefore, if your
implementation includes one of those converged network adapters and the adapter is expected to handle
both Ethernet and FCoE traffic, we recommend that you configure the Action on Uplink Fail property
with a value of warning.
Please note that this configuration may result in an Ethernet teaming driver not being able to detect a link
failure when the border port goes down.
Note If a trunking driver is being run on the host and the interface is in promiscuous mode, we recommend that
you set the Mac Registration Mode to All VLANs.
Note You must include this policy in a service profile and that service profile must be associated with a server
for it to take effect.
Power Policy
The power policy is a global policy that specifies the redundancy for power supplies in all chassis in the Cisco
UCS domain. This policy is also known as the PSU policy.
For more information about power supply redundancy, see Cisco UCS 5108 Server Chassis Hardware
Installation Guide.
2 If the server meets the required qualifications, Cisco UCS Manager applies the following to the server:
• Depending upon the option selected for the action, either discovers the new server immediately or
waits for a user to acknowledge the new server
• Applies the scrub policy to the server
You cannot migrate a service profile created with this policy to another server.
Depending upon the implementation, you may configure several policies with server pool policy qualifications
including the following:
• Autoconfiguration policy
• Chassis discovery policy
• Server discovery policy
• Server inheritance policy
• Server pool policy
vHBA Template
This template is a policy that defines how a vHBA on a server connects to the SAN. It is also referred to as
a vHBA SAN connectivity template.
You need to include this policy in a service profile for it to take effect.
VM Lifecycle Policy
The VM lifecycle policy determines how long Cisco UCS Manager retains offline VMs and offline dynamic
vNICs in its database. If a VM or dynamic vNIC remains offline after that period, Cisco UCS Manager deletes
the object from its database.
All virtual machines (VMs) on Cisco UCS servers are managed by vCenter. Cisco UCS Manager cannot
determine whether an inactive VM is temporarily shutdown, has been deleted, or is in some other state that
renders it inaccessible. Therefore, Cisco UCS Manager considers all inactive VMs to be in an offline state.
Cisco UCS Manager considers a dynamic vNIC to be offline when the associated VM is shutdown, or the
link between the fabric interconnect and the I/O module fails. On rare occasions, an internal error can also
cause Cisco UCS Manager to consider a dynamic vNIC to be offline.
The default VM and dynamic vNIC retention period is 15 minutes. You can set that for any period of time
between 1 minute and 7200 minutes (or 5 days).
Note The VMs that Cisco UCS Manager displays are for information and monitoring only. You cannot manage
VMs through Cisco UCS Manager. Therefore, when you delete a VM from the Cisco UCS Manager
database, you do not delete the VM from the server or from vCenter.
vNIC Template
This policy defines how a vNIC on a server connects to the LAN. This policy is also referred to as a vNIC
LAN connectivity policy.
Beginning in Cisco UCS, Release 2.0(2), Cisco UCS Manager does not automatically create a VM-FEX port
profile with the correct settings when you create a vNIC template. If you want to create a VM-FEX port
profile, you must configure the target of the vNIC template as a VM.
You need to include this policy in a service profile for it to take effect.
Note If your server has two Emulex or QLogic NICs (Cisco UCS CNA M71KR-E or Cisco UCS CNA
M71KR-Q), you must configure vNIC policies for both adapters in your service profile to get a user-defined
MAC address for both NICs. If you do not configure policies for both NICs, Windows still detects both
of them in the PCI bus. Then because the second eth is not part of your service profile, Windows assigns
it a hardware MAC address. If you then move the service profile to a different server, Windows sees
additional NICs because one NIC did not have a user-defined MAC address.
Operational Policies
Maintenance Policy
A maintenance policy determines how Cisco UCS Manager reacts when a change that requires a server reboot
is made to a service profile associated with a server or to an updating service profile bound to one or more
service profiles.
The maintenance policy specifies how Cisco UCS Manager deploys the service profile changes. The deployment
can occur in one of the following ways:
• Immediately
• When acknowledged by a user with admin privileges
• Automatically at the time specified in the schedule
If the maintenance policy is configured to deploy the change during a scheduled maintenance window, the
policy must include a valid schedule. The schedule deploys the changes in the first available maintenance
window.
Scrub Policy
This policy determines what happens to local data and to the BIOS settings on a server during the discovery
process and when the server is disassociated from a service profile. Depending upon how you configure a
scrub policy, the following can occur at those times:
Disk Scrub
One of the following occurs to the data on any local drives on disassociation:
• If enabled, destroys all data on any local drives
• If disabled, preserves all data on any local drives, including local storage configuration
Note Cisco UCS Manager has one default statistics collection policy for each of the five functional areas. You
cannot create additional statistics collection policies and you cannot delete the existing default policies.
You can only modify the default policies.
the policy to raise an alarm if the CPU temperature exceeds a certain value, or if a server is overutilized or
underutilized.
These threshold policies do not control the hardware or device-level thresholds enforced by endpoints, such
as the CIMC. Those thresholds are burned in to the hardware components at manufacture.
Cisco UCS enables you to configure statistics threshold policies for the following components:
• Servers and server components
• Uplink Ethernet ports
• Ethernet server ports, chassis, and fabric interconnects
• Fibre Channel port
Note You cannot create or delete a statistics threshold policy for Ethernet server ports, uplink Ethernet ports,
or uplink Fibre Channel ports. You can only configure the existing default policy.
Pools
Pools are collections of identities, or physical or logical resources, that are available in the system. All pools
increase the flexibility of service profiles and allow you to centrally manage your system resources.
You can use pools to segment unconfigured servers or available ranges of server identity information into
groupings that make sense for the data center. For example, if you create a pool of unconfigured servers with
similar characteristics and include that pool in a service profile, you can use a policy to associate that service
profile with an available, unconfigured server.
If you pool identifying information, such as MAC addresses, you can pre-assign ranges for servers that will
host specific applications. For example, all database servers could be configured within the same range of
MAC addresses, UUIDs, and WWNs.
Server Pools
A server pool contains a set of servers. These servers typically share the same characteristics. Those
characteristics can be their location in the chassis, or an attribute such as server type, amount of memory,
local storage, type of CPU, or local drive configuration. You can manually assign a server to a server pool,
or use server pool policies and server pool policy qualifications to automate the assignment.
If your system implements multi-tenancy through organizations, you can designate one or more server pools
to be used by a specific organization. For example, a pool that includes all servers with two CPUs could be
assigned to the Marketing organization, while all servers with 64 GB memory could be assigned to the Finance
organization.
A server pool can include servers from any chassis in the system. A given server can belong to multiple server
pools.
MAC Pools
A MAC pool is a collection of network identities, or MAC addresses, that are unique in their layer 2
environment and are available to be assigned to vNICs on a server. If you use MAC pools in service profiles,
you do not have to manually configure the MAC addresses to be used by the server associated with the service
profile.
In a system that implements multi-tenancy, you can use the organizational hierarchy to ensure that MAC pools
can only be used by specific applications or business services. Cisco UCS Manager uses the name resolution
policy to assign MAC addresses from the pool.
To assign a MAC address to a server, you must include the MAC pool in a vNIC policy. The vNIC policy is
then included in the service profile assigned to that server.
You can specify your own MAC addresses or use a group of MAC addresses provided by Cisco.
WWN Pools
A WWN pool is a collection of WWNs for use by the Fibre Channel vHBAs in a Cisco UCS domain. You
create separate pools for the following:
• WW node names assigned to the server
• WW port names assigned to the vHBA
Important A WWN pool can include only WWNNs or WWPNs in the ranges from 20:00:00:00:00:00:00:00 to
20:FF:FF:FF:FF:FF:FF:FF or from 50:00:00:00:00:00:00:00 to 5F:FF:FF:FF:FF:FF:FF:FF. All other
WWN ranges are reserved. To ensure the uniqueness of the Cisco UCS WWNNs and WWPNs in the SAN
fabric, we recommend that you use the following WWN prefix for all blocks in a pool:
20:00:00:25:B5:XX:XX:XX
If you use WWN pools in service profiles, you do not have to manually configure the WWNs that will be
used by the server associated with the service profile. In a system that implements multi-tenancy, you can use
a WWN pool to control the WWNs used by each organization.
You assign WWNs to pools in blocks. For each block or individual WWN, you can assign a boot target.
WWNN Pools
A WWNN pool is a WWN pool that contains only WW node names. If you include a pool of WWNNs in a
service profile, the associated server is assigned a WWNN from that pool.
WWPN Pools
A WWPN pool is a WWN pool that contains only WW port names. If you include a pool of WWPNs in a
service profile, the port on each vHBA of the associated server is assigned a WWPN from that pool.
Management IP Pool
The management IP pool is a collection of external IP addresses. Cisco UCS Manager reserves each block of
IP addresses in the management IP pool for external access that terminates in the CIMC on a server.
You can configure service profiles and service profile templates to use IP addresses from the management IP
pool. You cannot configure servers to use the management IP pool.
All IP addresses in the management IP pool must be in the same subnet as the IP address of the fabric
interconnect.
Note The management IP pool must not contain any IP addresses that have been assigned as static IP addresses
for a server or service profile.
Traffic Management
Oversubscription
Oversubscription occurs when multiple network devices are connected to the same fabric interconnect port.
This practice optimizes fabric interconnect use, since ports rarely run at maximum speed for any length of
time. As a result, when configured correctly, oversubscription allows you to take advantage of unused
bandwidth. However, incorrectly configured oversubscription can result in contention for bandwidth and a
lower quality of service to all services that use the oversubscribed port.
For example, oversubscription can occur if four servers share a single uplink port, and all four servers attempt
to send data at a cumulative rate higher than available bandwidth of uplink port.
Oversubscription Considerations
The following elements can impact how you configure oversubscription in a Cisco UCS domain:
to ensure that all servers and NICs to have access to the LAN. The number of LAN uplinks should be determined
by the aggregate bandwidth needed by all Cisco UCS servers.
For the 6100 series fabric interconnects, Fibre Channel uplink ports are available on the expansion slots only.
You must add more expansion slots to increase number of available Fibre Channel uplinks. Ethernet uplink
ports can exist on the fixed slot and on expansion slots.
For the 6200 series fabric interconnects running Cisco UCS Manager, version 2.0 and higher, Ethernet uplink
ports and Fibre Channel uplink ports are both configurable on the base module, as well as on the expansion
module.
For example, if you have two Cisco UCS 5100 series chassis that are fully populated with half width Cisco
UCS B200-M1 servers, you have 16 servers. In a cluster configuration, with one LAN uplink per fabric
interconnect, these 16 servers share 20GbE of LAN bandwidth. If more capacity is needed, more uplinks from
the fabric interconnect should be added. We recommend that you have symmetric configuration of the uplink
in cluster configurations. In the same example, if 4 uplinks are used in each fabric interconnect, the 16 servers
are sharing 80 GB of bandwidth, so each has approximately 5 GB of capacity. When multiple uplinks are
used on a Cisco UCS fabric interconnect the network design team should consider using a port channel to
make best use of the capacity.
Cost/Performance Slider
The prioritization of cost and performance is different for each data center and has a direct impact on the
configuration of oversubscription. When you plan hardware usage for oversubscription, you need to know
where the data center is located on this slider. For example, oversubscription can be minimized if the data
center is more concerned with performance than cost. However, cost is a significant factor in most data centers,
and oversubscription requires careful planning.
Bandwidth Usage
The estimated bandwidth that you expect each server to actually use is important when you determine the
assignment of each server to a fabric interconnect port and, as a result, the oversubscription ratio of the ports.
For oversubscription, you must consider how many GBs of traffic the server will consume on average, the
ratio of configured bandwidth to used bandwidth, and the times when high bandwidth use will occur.
Network Type
The network type is only relevant to traffic on uplink ports, because FCoE does not exist outside Cisco UCS.
The rest of the data center network only differentiates between LAN and SAN traffic. Therefore, you do not
need to take the network type into consideration when you estimate oversubscription of a fabric interconnect
port.
Pinning
Pinning in Cisco UCS is only relevant to uplink ports. You can pin Ethernet or FCoE traffic from a given
server to a specific uplink Ethernet port or uplink FC port.
When you pin the NIC and HBA of both physical and virtual servers to uplink ports, you give the fabric
interconnect greater control over the unified fabric. This control ensures more optimal utilization of uplink
port bandwidth.
Cisco UCS uses pin groups to manage which NICs, vNICs, HBAs, and vHBAs are pinned to an uplink port.
To configure pinning for a server, you can either assign a pin group directly, or include a pin group in a vNIC
policy, and then add that vNIC policy to the service profile assigned to that server. All traffic from the vNIC
or vHBA on the server travels through the I/O module to the same uplink port.
Note You must review the allocation of ports to links before you allocate servers to slots. The cabled ports are
not necessarily port 1 and port 2 on the I/O module. If you change the number of links between the fabric
interconnect and the I/O module, you must reacknowledge the chassis to have the traffic rerouted.
All port numbers refer to the fabric interconnect-side ports on the I/O module.
Chassis with One I/O Module (Not Configured for Fabric Port Channels)
Note If the adapter in a server supports and is configured for adapter port channels, those port channels are
pinned to the same link as described in the following table. If the I/O module in the chassis supports and
is configured for fabric port channels, the server slots are pinned to a fabric port channel rather than to an
individual link.
Fabric All server N/A N/A N/A N/A N/A N/A N/A
Port slots
Channel
Quality of Service
Cisco UCS provides the following methods to implement quality of service:
• System classes that specify the global configuration for certain types of traffic across the entire system
• QoS policies that assign system classes for individual vNICs
• Flow control policies that determine how uplink Ethernet ports handle pause frames
System Classes
Cisco UCS uses Data Center Ethernet (DCE) to handle all traffic inside a Cisco UCS domain. This industry
standard enhancement to Ethernet divides the bandwidth of the Ethernet pipe into eight virtual lanes. Two
virtual lanes are reserved for internal system and management traffic. You can configure quality of service
for the other six virtual lanes. System classes determine how the DCE bandwidth in these six virtual lanes is
allocated across the entire Cisco UCS domain.
Each system class reserves a specific segment of the bandwidth for a specific type of traffic. This provides a
level of traffic management, even in an oversubscribed system. For example, you can configure the Fibre
Channel Priority system class to determine the percentage of DCE bandwidth allocated to FCoE traffic.
The following table describes the system classes that you can configure:
Best Effort A system class that sets the quality of service for the lane reserved for Basic
Ethernet traffic.
Some properties of this system class are preset and cannot be modified. For
example, this class has a drop policy that allows it to drop data packets if
required. You cannot disable this system class.
Opt-In Features
Each Cisco UCS domain is licensed for all functionality. Depending upon how the system is configured, you
can decide to opt in to some features or opt out of them for easier integration into existing environment. If a
process change happens, you can change your system configuration and include one or both of the opt-in
features.
The opt-in features are as follows:
• Stateless computing, which takes advantage of mobile service profiles with pools and policies where
each component, such as a server or an adapter, is stateless.
• Multi-tenancy, which uses organizations and role-based access control to divide the system into smaller
logical segments.
Stateless Computing
Stateless computing allows you to use a service profile to apply the personality of one server to a different
server in the same Cisco UCS domain. The personality of the server includes the elements that identify that
server and make it unique in the Cisco UCS domain. If you change any of these elements, the server could
lose its ability to access, use, or even achieve booted status.
The elements that make up a server's personality include the following:
• Firmware versions
• UUID (used for server identification)
• MAC address (used for LAN connectivity)
• World Wide Names (used for SAN connectivity)
• Boot settings
Stateless computing creates a dynamic server environment with highly flexible servers. Every physical server
in a Cisco UCS domain remains anonymous until you associate a service profile with it, then the server gets
the identity configured in the service profile. If you no longer need a business service on that server, you can
shut it down, disassociate the service profile, and then associate another service profile to create a different
identity for the same physical server. The "new" server can then host another business service.
To take full advantage of the flexibility of statelessness, the optional local disks on the servers should only
be used for swap or temp space and not to store operating system or application data.
You can choose to fully implement stateless computing for all physical servers in a Cisco UCS domain, to
not have any stateless servers, or to have a mix of the two types.
Multi-Tenancy
Multi-tenancy allows you to divide up the large physical infrastructure of an Cisco UCS domain into logical
entities known as organizations. As a result, you can achieve a logical isolation between organizations without
providing a dedicated physical infrastructure for each organization.
You can assign unique resources to each tenant through the related organization, in the multi-tenant
environment. These resources can include different policies, pools, and quality of service definitions. You
can also implement locales to assign or restrict user privileges and roles by organization, if you do not want
all users to have access to all organizations.
If you set up a multi-tenant environment, all organizations are hierarchical. The top-level organization is
always root. The policies and pools that you create in root are system-wide and are available to all organizations
in the system. However, any policies and pools created in other organizations are only available to organizations
that are above it in the same hierarchy. For example, if a system has organizations named Finance and HR
that are not in the same hierarchy, Finance cannot use any policies in the HR organization, and HR cannot
access any policies in the Finance organization. However, both Finance and HR can use policies and pools
in the root organization.
If you create organizations in a multi-tenant environment, you can also set up one or more of the following
for each organization or for a sub-organization in the same hierarchy:
• Resource pools
• Policies
• Service profiles
• Service profile templates
You can create locales to ensure that users have access only to those organizations that they are authorized
to administer.
Overview of Virtualization
Virtualization allows the creation of multiple virtual machines (VMs) to run in isolation, side by side on the
same physical machine.
Each virtual machine has its own set of virtual hardware (RAM, CPU, NIC) upon which an operating system
and fully configured applications are loaded. The operating system sees a consistent, normalized set of hardware
regardless of the actual physical hardware components.
In a virtual machine, both hardware and software are encapsulated in a single file for rapid copying,
provisioning, and moving between physical servers. You can move a virtual machine, within seconds, from
one physical server to another for zero-downtime maintenance and continuous workload consolidation.
The virtual hardware makes it possible for many servers, each running in an independent virtual machine, to
run on a single physical server. The advantages of virtualization include better use of computing resources,
greater server density, and seamless server migration.
Almost all tasks can be performed in any of the interfaces, and the results of tasks performed in one interface
are automatically displayed in another.
However, you cannot do the following:
• Use Cisco UCS Manager GUI to invoke Cisco UCS Manager CLI.
• View the results of a command invoked through Cisco UCS Manager CLI in Cisco UCS Manager GUI.
• Generate CLI output from Cisco UCS Manager GUI.
Centralized Management
Cisco UCS Manager centralizes the management of resources and devices, rather than using multiple
management points. This centralized management includes management of the following devices in a Cisco
UCS domain:
• Fabric interconnects.
• Software switches for virtual servers.
• Power and environmental management for chassis and servers.
• Configuration and firmware updates for server network interfaces (Ethernet NICs and converged network
adapters).
• Firmware and BIOS settings for servers.
Cisco UCS is multi-tenancy ready, exposing primitives that allow systems management software using the
API to get controlled access to Cisco UCS resources. In a multi-tenancy environment, Cisco UCS Manager
enables you to create locales for user roles that can limit the scope of a user to a particular organization.
• Ports
• Interface cards
• I/O modules
Server Administration
A server administrator can use Cisco UCS Manager to perform server management tasks within a Cisco UCS
domain, including the following:
• Create server pools and policies related to those pools, such as qualification policies
• Create policies for the servers, such as discovery policies, scrub policies, and IPMI policies
• Create service profiles and, if desired, service profile templates
• Apply service profiles to servers
• Monitor faults, alarms, and the status of equipment
Network Administration
A network administrator can use Cisco UCS Manager to perform tasks required to create LAN configuration
for a Cisco UCS domain, including the following:
• Configure uplink ports, port channels, and LAN PIN groups
• Create VLANs
• Configure the quality of service classes and definitions
• Create the pools and policies related to network configuration, such as MAC address pools and Ethernet
adapter profiles
Storage Administration
A storage administrator can use Cisco UCS Manager to perform tasks required to create SAN configuration
for a Cisco UCS domain, including the following:
• Configure ports, port channels, and SAN PIN groups
• Create VSANs
• Configure the quality of service classes and definitions
• Create the pools and policies related to the network configuration, such as WWN pools and Fibre Channel
adapter profiles
No Cross-System Management
You cannot use Cisco UCS Manager to manage systems or devices that are outside the Cisco UCS domain
where Cisco UCS Manager is located. For example, you cannot manage heterogeneous environments, such
as non-Cisco UCS x86 systems, SPARC systems, or PowerPC systems.
Managed Objects
Cisco UCS uses a managed object model, where managed objects are abstract representations of physical or
logical entities that can be managed. For example, servers, chassis, I/O cards, and processors are physical
entities represented as managed objects, and resource pools, user roles, service profiles, and policies are logical
entities represented as managed objects.
Managed objects may have one or more associated properties that can be configured.
Command Modes
The CLI is organized into a hierarchy of command modes, with the EXEC mode being the highest-level mode
of the hierarchy. Higher-level modes branch into lower-level modes. You use create, enter, and scope
commands to move from higher-level modes to modes in the next lower level , and you use the exit command
to move up one level in the mode hierarchy.
Note Most command modes are associated with managed objects, so you must create an object before you can
access the mode associated with that object. You use create and enter commands to create managed
objects for the modes being accessed. The scope commands do not create managed objects and can only
access modes for which managed objects already exist.
Each mode contains a set of commands that can be entered in that mode. Most of the commands available in
each mode pertain to the associated managed object. Depending on your assigned role and locale, you may
have access to only a subset of the commands available in a mode; commands to which you do not have access
are hidden.
The CLI prompt for each mode shows the full path down the mode hierarchy to the current mode. This helps
you to determine where you are in the command mode hierarchy, and it can be an invaluable tool when you
need to navigate through the hierarchy.
The following table lists the main command modes, the commands used to access each mode, and the CLI
prompt associated with each mode.
Object Commands
Four general commands are available for object management:
• create object
• delete object
• enter object
• scope object
You can use the scope command with any managed object, whether a permanent object or a user-instantiated
object. The other commands allow you to create and manage user-instantiated objects. For every create object
command, a corresponding delete object and enter object command exists.
In the management of user-instantiated objects, the behavior of these commands depends on whether the
object exists, as described in the following tables:
Command Behavior
create object The object is created and its configuration mode, if
applicable, is entered.
Command Behavior
create object An error message is generated.
Complete a Command
You can use the Tab key in any mode to complete a command. Partially typing a command name and pressing
Tab causes the command to be displayed in full or to the point where another keyword must be chosen or an
argument value must be entered.
Command History
The CLI stores all commands used in the current session. You can step through the previously used commands
by using the Up Arrow or Down Arrow keys. The Up Arrow key steps to the previous command in the history,
and the Down Arrow key steps to the next command in the history. If you get to the end of the history, pressing
the Down Arrow key does nothing.
All commands in the history can be entered again by simply stepping through the history to recall the desired
command and pressing Enter. The command is entered as if you had manually typed it. You can also recall
a command and change it before you enter it.
Note Committing multiple commands together is not an atomic operation. If any command fails, the successful
commands are applied despite the failure. Failed commands are reported in an error message.
While any commands are pending, an asterisk (*) appears before the command prompt. The asterisk disappears
when you enter the commit-buffer command, as shown in this example:
switch-1# scope chassis 1
switch-1 /chassis # enable locator-led
switch-1 /chassis* # show configuration pending
scope chassis 1
+ enable locator-led
exit
switch-1 /chassis* # commit-buffer
switch-1 /chassis #
Setting the Web Session Limit for Cisco UCS Manager from the CLI
SUMMARY STEPS
DETAILED STEPS
Step 3 UCS-A /system/services # scope web-session-limits Enters system services web session limits mode.
Step 4 UCS-A /system/services/web-session-limits # set total The maximum number of concurrent HTTP and HTTPS
num-of-logins-total sessions allowed for all users within the system.
Enter an integer between 1 and 256.
Examples The following example sets the maximum number of HTTP and HTTPS sessions allowed by the system to
200 and commits the transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # scope web-session-limits
UCS-A /system/services/web-session-limits* # set total 200
UCS-A /system/services/web-session-limits* # commit-buffer
UCS-A /system/services/web-session-limits #
Pre-Login Banner
With a pre-login banner, when a user logs into Cisco UCS Manager GUI, Cisco UCS Manager displays the
banner text in the Create Pre-Login Banner dialog box and waits until the user dismisses that dialog box
before it prompts for the username and password. When a user logs into Cisco UCS Manager CLI, Cisco UCS
Manager displays the banner text in a dialog box and waits for the user to dismiss that dialog box before it
prompts for the password. It then repeats the banner text above the copyright block that it displays to the user.
DETAILED STEPS
Step 5 At the prompt, type a pre-login banner message On the line following your input, type ENDOFBUF to finish.
and press Enter. Press Ctrl and C to cancel out of the set message dialog.
DETAILED STEPS
Step 5 At the prompt, modify the pre-login banner On the line following your input, type ENDOFBUF to finish.
message and press Enter. Press Ctrl and C to cancel out of the set message dialog.
DETAILED STEPS
Step 3 UCS-A /security/banner # delete pre-login-banner Deletes the pre-login banner from the system.
Step 4 UCS-A /security/banner # commit-buffer Commits the transaction to the system configuration.
acknowledge chassis
To acknowledge a chassis, use the acknowledge chassis command.
acknowledge chassis id
Syntax Description id Chassis identification number. The range of valid values is 1 to 255.
Usage Guidelines Use this command to verify the existence of devices in your network. For example, you can acknowledge a
chassis that was recently commissioned, to ensure that it exists.
switch-A* # commit-buffer
switch-A #
acknowledge fex
To acknowledge the fabric extender module (fex), use the acknowledge fex command.
acknowledge fex id
Usage Guidelines Active links between the chassis and the Fabric interconnect must exist to use this command.
Examples This example shows how to acknowledge the fabric extender module.
Switch-A # acknowledge fex 2
Switch-A * # commit-buffer
Switch-A #
acknowledge fault
To acknowledge a fault, use the acknowledge fault command.
acknowledge fault id
Syntax Description id Fault identification number. The range of valid values is 0 to 9223372036854775807.
switch-A* # commit-buffer
switch-A #
acknowledge server
To acknowledge a server, use the acknowledge server command.
Usage Guidelines Use this command to verify the existence of devices in your network. For example, you can acknowledge a
server that was recently commissioned, to ensure that it exists. slot -id is used only in /chassis mode.
Examples The following example shows how to acknowledge a server in /chassis mode:
switch-A /chassis #
acknowledge slot
To acknowledge a slot, use the acknowledge slot command.
Usage Guidelines Use this command to verify the existence of devices in your network. For example, you can acknowledge a
chassis that was recently commissioned using slot -id , to ensure that it exists. slot -id is used only in /chassis
mode.
Examples The following example shows how to acknowledge a slot in /chassis mode:
switch-A /chassis #
activate firmware
To activate firmware for a device, use the activate firmware command.
Usage Guidelines Use the ignorecompcheck keyword to ignore the results of the automatic compatibility check when you
activate the firmware.
Use the set-startup-only keyword to activate the specified Input output module (IOM) firmware version
only on the next startup of the IOM. The system will not restart at this time. This keyword is available only
in the IOM command mode.
Examples The following example shows how to activate a specific version of system software, ignoring the compatibility
check:
UCS-A # scope system
UCS-A /system # activate firmware 3.0 ignorecompcheck
UCS-A /system* # commit-buffer
UCS-A /system #
Usage Guidelines Use the ignorecompcheck keyword to ignore the results of the automatic compatability check when you
activate the firmware.
Examples The following example shows how to activate a specific version of kernal software on fabric interconnect A,
ignoring the compatibility check:
switch-A# scope fabric-interconnect a
switch-A /fabric-interconnect # activate firmware kernel-version 3.0 ignorecompcheck
switch-A /fabric-interconnect* # commit-buffer
switch-A /fabric-interconnect #
Command Description
show version
Syntax Description version The version number of the internal firmware version that you want to upgrade
the system to. The maximum length of the version string is 512 characters.
ignorecompcheck (Optional) Use this option to ignore the compatibility check between the
versions.
Examples This example shows how to activate the internal firmware version.
Switch-A # scope system
Switch-A /system # activate internal firmware 1.4(1) ignorecompcheck
Switch-A /system #
add alertgroups
To add more alert groups to a Call Home profile, use the add alertgroups command.
Syntax Description ciscotac Specifies the Cisco Technical Assistance Center (TAC) alert group.
Usage Guidelines Use this command to add more predefined Call Home alert groups to an existing alert group list within a Call
Home profile.
Examples This example shows how to add diagnostic and license alert groups to an existing Call Home profile:
switch-A /monitoring/callhome/profile #
Syntax Description log-full Specifies that the log is backed up when it is full.
on-change-of-association Specifies that the log is backed up when the server changes associations.
Usage Guidelines Use this command to add an additional action or actions that will trigger a backup of the system event log.
Previously configured actions are retained.
Examples This example shows how to add an action to trigger a backup of the system event log when the log is full:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # add backup action log-full
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
add privilege
To add privileges, use the add privilege command.
switch-A /security/role #
Examples This example shows how to immediately apply pending changes to a service profile.
Switch-A # scope org
Switch-A /org # scope service-profile example
Switch-A /org/service-profile # apply pending-changes immediate
Switch-A /org/service-profile* # commit-buffer
Switch-A /org/server-profile #
associate server
To associate a server, use the associate server command.
1.4(1) The option ID has been introduced to associate a server to the service profile
using the slot ID.
The option restrict-migration has been introduced.
switch-A /org/service-profile #
show assoc
show server
associate server-pool
To associate a server pool with a service profile, use the associate server-pool command.
Syntax Description server-pool Server pool name. The range of valid values is 1 to 16.
restrict-migration (Optional) Qualifier. Use this option to ensure that the operating system boots
appropriately when the service profile is moved to a new server.
switch-A /org/service-profile #
backup sel
To back up the system event log (SEL), use the backup sel command.
Syntax Description ID Specifies the server ID. It must be a value between 1 and
255.
chassis-id / blade-id Specifies the chassis number and server number in the format
A/B.
1.4(1) This command was modified to include the ID chassis-id / blade-id options.
Usage Guidelines Use this command to back up the system event log (SEL) for a server.
In the command mode of a specific server (/chassis/server), you can run this command without any options.
Examples This example shows how to back up the SEL for server 4 in chassis 2:
switch-A# backup sel 2/4
switch-A* # commit-buffer
switch-A#
cd
To change directories, use the cd command in local management command mode.
1.1(1) This command was modified. The bootflash: keyword is replaced by the
workspace: keyword.
Usage Guidelines This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
This command operates on either the workspace (FLASH) or volatile (RAM) file system. To specify the file
system, include the workspace: or volatile: keyword in the path. If the file system is not specified, the
current working file system is assumed.
switch-A(local-mgmt)# cd volatile:/temp
Pubs-A(local-mgmt)# pwd
volatile:temp
switch-A(local-mgmt)#
clear alertgroups
To clear all selected alert groups in a Call Home profile, use the clear alertgroups command.
clear alertgroups
Usage Guidelines Use this command to clear any previously configured alert group list within the Call Home profile.
Examples This example shows how to clear alert groups in a Call Home profile:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # scope profile profileOne
switch-A /monitoring/callhome/profile # clear alertgroups
switch-A /monitoring/callhome/profile* # commit-buffer
switch-A /monitoring/callhome/profile #
clear auth-server-group
To clear an authentication server group, use the clear auth-server-group command.
clear auth-server-group
Examples This example shows how to clear the authentication server group from an authentication domain.
UCS-A # scope security
UCS-A /security # scope auth-domain testing
UCS-A /security/auth-domain # clear auth-server-group
UCS-A /security/auth-domain* # commit-buffer
UCS-A /security/auth-domain #
scope auth-server-group
show auth-server-group
set auth-server-group
Usage Guidelines Use this command to delete any previously configured list of actions that will trigger a backup of the system
event log.
Examples This example shows how to clear all selected actions that will trigger a backup of the system event log:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # clear backup action
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
clear cores
To clear core files, use the clear cores command.
clear cores
Usage Guidelines Core files are records of core dumps. Use the clear cores command to clear information out of core dump
records.
clear file
To clear a license file, use the clear file command.
clear message
To clear the pre-login banner message, use the clear message command.
clear message
Usage Guidelines A pre-login banner message must be set earlier on to use this command.
Examples This example shows how to clear the pre-login banner message.
UCS-A # scope security
UCS-A /security # scope banner
UCS-A /security/banner # scope pre-login-banner
UCS-A /security/banner/pre-login-banner # clear message
UCS-A /security/banner/pre-login-banner #
scope banner
scope pre-login-banner
clear password-history
To clear the password history for a local user, use the clear password-history command.
clear password-history
Usage Guidelines You must be an administrator user or have aaa privileges to use this command.
You must create a local user and set the set clear password-history command to yes before you use this
command.
Examples This example shows how to clear the password history for a user:
UCS-A # scope security
UCS-A /security # scope local-user test
UCS-A /security/local-user # clear password-history
UCS-A /security/local-user* # commit-buffer
UCS-A /security/local-user #
clear sel
Syntax Description
This command has no arguments or keywords.
Usage Guidelines Use this command to clear the contents of the system event log (SEL).
Examples This example shows how to clear the contents of the SEL:
switch-A# scope server 2/4
switch-A /chassis/server # clear sel
switch-A /chassis/server* # commit-buffer
switch-A /chassis/server #
clear sel
Syntax Description
This command has no arguments or keywords.
Usage Guidelines Use this command to clear the contents of the system event log (SEL).
Examples This example shows how to clear the contents of the SEL:
switch-A# scope server 2/4
switch-A /chassis/server # clear sel
switch-A /chassis/server* # commit-buffer
switch-A /chassis/server #
clear sshkey
To clear from cache the SSH public key of a remote host, use the clear sshkey command in local management
mode.
Syntax Description host-name Host name or IP address. Specify the IP address in the format A.B.C.D.
Usage Guidelines Use this command to clear from cache the SSH public key of a remote host that supports SSH.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
Examples This example shows how to clear the SSH public key of a remote host:
switch-A # connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
Usage Guidelines The cluster commands are switch-specific local management commands. You have to execute a connect
local-mgmt command to connect to the management port.
Examples This example shows how to force a cluster to be the primary cluster:
switch-A#
cluster lead
To designate a cluster leader, use the cluster lead command.
b Specifies switch B.
Usage Guidelines The cluster commands are switch-specific local management commands. You must first execute a connect
local-mgmt command to connect to the management port.
switch-A#
commit-buffer
To save or verify configuration changes, use the commit-buffer command.
commit-buffer [verify-only]
Usage Guidelines Use this command to execute all pending configuration changes. While any configuration commands are
pending, an asterisk (*) appears before the command prompt. When you enter the commit-buffer command,
the pending commands are committed and the asterisk disappears.
switch-A /org #
connect adapter
To connect to an adapter, use the connect adapter command.
adapter 1/1 #
connect bmc
To connect to the BMC (Baseboard Management Controller), use the connect bmc command.
Examples The following example shows how to connect to the Baseboard Management Controller:
Trying 127.5.1.1...
Connected to 127.5.1.1.
Escape character is '^]'.
NUOVA-IBMC login:
connect clp
To connect to DMTF CLP, use the connect clp command.
connect clp
connect iom
To connect to an IO module, use the connect iom command.
connect iom id
Syntax Description id Chassis identification number. The valid range of values is 1 to 255.
connect local-mgmt
To connect to the local management port, use the connect local-mgmt command.
b Specifies switch B.
Usage Guidelines If no switch is specified, a connection will be made to the local management port of the current active switch.
Examples This example shows how to connect to the local management port of switch B:
switch-A# connect local-mgmt b
Cisco UCS 6100 Series Fabric Interconnect
connect nxos
To connect to the NX-OS, use the connect nxos command.
connect nxos [a | b]
copy
To copy a file from one directory to another, use the copy command in local management command mode.
Syntax Description from-filesystem: File system containing the file to be copied. See the Usage
Guidelines for valid values.
to-filesystem: File system to contain the copied file. See the Usage Guidelines
for valid values.
Usage Guidelines Use this command to copy a file in local management command mode.
If a dest-filename is specified, the copied file is renamed at the destination location.
If no file system is specified, the current working file system is assumed. If no path is specified, the current
working directory is assumed.
To specify the file system location, use the appropriate syntax from the following table:
ftp:[//[username@]server]
scp:[//[username@]server]
sftp:[//[username@]server]
tftp:[//server[:port]]
volatile:
workspace:
Either the source or destination file system must be local; you cannot copy a file from one remote file system
to another.
If a remote protocol is specified with no server name, you are prompted to enter the server name.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
This command operates on either the workspace (FLASH) or volatile (RAM) file system. To specify the file
system, include the workspace: or volatile: keyword in the path. If the file system is not specified, the
current working file system is assumed.
You can use the cp command as an alias for this command.
Examples This example shows how to copy a file from the current working directory to a directory in the volatile file
system:
switch-A # connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
create adapter
To create an adapter, use the create adapter command.
create adapter
switch-A /org/server-qual/adapter #
create auth-domain
To create an authentication domain, use the create auth-domain command.
Syntax Description name The name of the authentication domain. This name can include a maximum of 16
characters.
Usage Guidelines The name of the authentication domain can include alphanumeric characters, but cannot include special
characters.
Examples This example shows how to create an authentication domain for the system:
Switch-A # scope security
Switch-A /security # create auth-domain Default
Switch-A /security/auth-domain* # commit-buffer
Switch-A /security/auth-domain #
create auth-profile
To create an iSCSI authorization profile in the organization mode, use the create auth-profile command.
Syntax Description iscsi-auth-profile-name The name of the iSCSI authorization profile. The name can include a maximum
of 16 characters. The name can be alphanumeric and can include special
characters as well.
Usage Guidelines The name of the iSCSI authorization profile can include a maximum of 16 characters only. The name can be
alphanumeric and can include special characters as well.
Examples This example shows how to create an iSCSI authorization profile in the organization command mode.
UCS-A # scope org test
UCS-A /org # create auth-profile sample
UCS-A /org/auth-profile* # set user-id exampleuser
UCS-A /org/auth-profile* # set password
Enter password:
Confirm password:
UCS-A /org/auth-profile* # commit-buffer
UCS-A /org/auth-profile #
enter auth-profile
show auth-profile
delete auth-profile
set user-id
Command Description
set password (auth-profile)
create auth-server-group
To create an authentication server group, use the create auth-server-group command.
Syntax Description Authentication server group The name of the authentication server group. This name can include
a maximum of 127 characters.
Usage Guidelines The name of the authentication server group can be alphanumeric, but special characters cannot be used.
create auto-target-if
To configure an automatic target for the Ethernet interface of an iSCSI VNIC, use the create auto-target-if
command.
create auto-target-if
Command Modes Ethernet interface within the iSCSI VNIC mode (/org/service-profile/vnic-iscsi/eth-if)
Usage Guidelines You must create an iSCSI VNIC, and an Ethernet interface for the iSCSI VNIC before you can use this
command.
Examples This example shows how to create an automatic target interface for the Ethernet interface of the iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # create auto-target-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/auto-target-if* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if/auto-target-if #
enter auto-target-if
scope auto-target-if
delete auto-target-if
show auto-target-if
create backup
To create a backup, use the create backup command.
Syntax Description file Managment file name. Use one of the following keywords for file
type: ftp, scp, sftp, or tftp.
Usage Guidelines No more than one backup can be created and committed.
When you specify disabled, backup functionality is disabled. When you specify enabled, backup functionality
is enabled.
Password:
switch-A /system/backup* # commit-buffer
switch-A /system/backup #
create bios-policy
To create a BIOS policy, use the create bios-policy command.
Syntax Description policy-name Policy name. The name can contain up to 16 characters.
Usage Guidelines Use this command to create a BIOS policy and enter org BIOS policy mode.
Examples The following example shows how to create a BIOS policy and enter org BIOS policy mode:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
create bladeserver-disc-policy
To create a compute blade discovery policy, use the create bladeserver-disc-policy command.
Syntax Description name Name of the compute blade discovery policy. This name can include a maximum of
16 characters.
Usage Guidelines The name of the policy can include alphanumeric characters, but cannot include special characters.
Examples This example shows how to create a computer blade discovery policy.
Switch-A # scope org
Switch-A /org # create bladeserver-disc-policy Sample
Switch-A /org/bladeserver-disc-policy* # commit buffer
Switch-A /org/bladeserver-disc-policy #
create block
To create a block, use the create block command.
IP pool configuration
create block from to default-gw subnet-mask
to To address, identifier, or
world-wide name. Specify a MAC
address in the format
NN:NN:NN:NN:NN:NN. Specify
a UUID in the format
NNNN-NNNNNNNNNNNN.
Specify a WWN in the format
HH:HH:HH:HH:HH:HH:HH:HH.
Specify an IP address in the format
A.B.C.D.
For an IQN pool, you must specify
a number between 0 and 65535.
Usage Guidelines Use this command to create addresses, identifiers, and world-wide names.
Use IP pool configuration mode to create IP address blocks. Use WWN pool, UUID pool, and MAC pool
configuration mode to create addresses, UUIDs, and WWNs.
show pooled
show iqn-pool
create boot-definition
To create a boot definition, use the create boot-definition command.
create boot-definition
switch-A /org/service-profile/boot-definition #
create boot-policy
To create a boot policy, use the create boot-policy command.
Syntax Description name Policy name. The range of valid values is 1 to 16.
switch-A /org/boot-policy #
create boot-target
To create a boot-target object, use the create boot-target command.
Usage Guidelines Use this command to specify a boot target for a WWN initiator.
Examples The following example shows how to create a secondary boot target:
server# scope org
server /org # scope wwn-pool default
server /org/wwn-pool # scope initiator 20:00:00:25:B5:00:00:00
server /org/wwn-pool/initiator # create boot-target secondary
server /org/wwn-pool/initiator/boot-target* # commit-buffer
server /org/wwn-pool/initiator/boot-target #
create cap-qual
To create a capacity qualification, use the create cap-qual command.
Usage Guidelines Creates an adapter capacity qualification for the specified adapter type and enters organization server
qualification adapter mode.
create certreq
To create a keyring certificate request, use the create certreq command.
Usage Guidelines Before you create a certreq, you must set modulus.
set dns
set e-mail
set ip
Command Description
set locality
set org-name
set org-unit-name
set password
set state
set subject-name
show certreq
show keyring
create chassis
To create a chassis, use the create chassis command.
Syntax Description min-id Minimum chassis identification number. The range of valid values is 1 to 255.
max-id Maximum chassis identification number. The range of valid values is 1 to 255.
Usage Guidelines Creates a chassis with the specified name, and enters organization chassis mode.
switch-A /org/server-qual/chassis #
Usage Guidelines Use classes to place thresholds on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for chassis statistics.
switch-A /eth-server/stats-threshold-policy #
Usage Guidelines Use classes to place thresholds on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for CMC statistics.
switch-A /eth-server/stats-threshold-policy #
Usage Guidelines When you create the class, you enter organization statistics threshold policy CPU environment class mode.
You can then create properties for this class with the create property command in the mode.
Examples This example shows how to create a CPU environment statistics class:
switch-A# scope org org100
switch-A /org # scope stats-threshold-policy stp100
switch-A /org/stats-threshold-policy # create class cpu-env-stats
switch-A /org/stats-threshold-policy/class* # commit-buffer
switch-A /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to create a DIMM environment statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # create class dimm-env-stats
server /org/stats-threshold-policy/class* # commit-buffer
server /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for DIMMs.
switch-A /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Usage Guidelines Use classes to place thresholds on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for Ethernet error statistics.
Examples This example shows how to create an Ethernet error statistics class:
switch-A /eth-uplink/stats-threshold-policy #
Usage Guidelines Use classes to place a threshold on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for Ethernet interface statistics.
Examples This example shows how to create an Ethernet interface statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to place a threshold on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for Ethernet loss statistics.
Examples This example shows how to create an Ethernet loss statistics class:
switch-A /eth-server/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to create a class for Ethernet pause statistics:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # create class ether-pause-stats
server /eth-server/stats-threshold-policy/class* # commit-buffer
server /eth-server/stats-threshold-policy/class #
Usage Guidelines Use classes to place a threshold on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for Ethernet port error statistics.
Examples This example shows how to create an Ethernet port error statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to place a threshold on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for Ethernet port multicast statistics.
Examples This example shows how to create an Ethernet port multicast statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to place a threshold on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for Ethernet port over-under-sized statistics.
Examples This example shows how to create an Ethernet port statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to place a threshold on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for Ethernet port statistics.
Examples This example shows how to create an Ethernet port statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to place thresholds on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for Ethernet port small packet statistics.
Examples This example shows how to create an Ethernet port large packet statistics class:
swicth-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to place thresholds on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for Ethernet port small packet statistics.
Examples This example shows how to create an Ethernet port small packet statistics class:
swicth-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to place a threshold on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for Ethernet recieve statistics.
Examples This example shows how to create an Ethernet recieve statistics class:
switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines Use classes to place a threshold on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for Ethernet transmission statistics.
Examples This example shows how to create an Ethernet transmission statistics class:
switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for fan module statistics.
Examples This example shows how to create a fan module statistics class:
switch-A /eth-server/stats-threshold-policy #
Usage Guidelines Use classes to place thresholds on statistics. For example, you might want to define a threshold on a port that
raises a fault if the average number of packets dropped exceeds a certain amount. For this class, you would
create thresholds for fan statistics.
switch-A /eth-server/stats-threshold-policy #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Fibre Channel error statistics.
Examples This example shows how to create a Fibre Channel error statistics class:
Pubs-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Fibre Channel event statistics.
switch-A /org/stats-threshold-policy #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Fibre Channel counter statistics.
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Fibre Channel frame statistics.
Examples This example shows how to create a Fibre Channel frame statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Fibre Channel port statistics.
Examples This example shows how to create a Fibre Channel port statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Fibre Channel statistics.
Examples This example shows how to create a Fibre Channel statistics class:
switch-A /fc-uplink/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to create an Fex environment statistics class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # create class fex-env-stats
Switch-A /eth-server/stats-threshold-policy/class* # commit-buffer
Switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to create an Fex power summary statistics class.
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # create class fex-power-summary
Switch-A /eth-server/stats-threshold-policy/class* # commit-buffer
Switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to create an Fex power supply input statistics class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # create class fex-psu-input-stats
Switch-A /eth-server/stats-threshold-policy/class* # commit-buffer
Switch-A /eth-server/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for mother board power statistics.
Examples This example shows how to create a mother board power statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Mb statistics.
Examples This example shows how to create a temporary mother board statistics class:
switch-A /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to create a class to store the memory array environment statistics:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # create class memory-array-env-stats
server /org/stats-threshold-policy/class* # commit-buffer
server /org/stats-threshold-policy/class #
switch-A /org/stats-threshold-policy #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Menlo Ethernet port statistics.
Examples This example shows how to create a Menlo port statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Menlo Ethernet error statistics.
Examples This example shows how to create a Menlo Ethernet error statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Menlo Ethernet statistics.
Examples This example shows how to create a Menlo Ethernet statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Menlo Fibre Channel error statistics.
Examples This example shows how to create Menlo Fibre Channel error statistics:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Menlo Fibre Channel statistics.
Examples This example shows how to create Menlo Fibre Channel statistics:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Menlo host port statistics.
Examples This example shows how to create Menlo host port statistics:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Menlo CPU error statistics.
Examples This example shows how to create a Menlo CPU error statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Menlo CPU statistics.
Examples This example shows how to create a Menlo CPU statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Menlo network egress traffic statistics.
Examples This example shows how to create a Menlo network egress statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Menlo network ingress traffic statistics.
Examples This example shows how to create a Menlo network ingress statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Menlo Qlogic error statistics.
Examples This example shows how to create a Menlo Qlogic error statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Menlo Qlogic statistics.
Examples This example shows how to create a Menlo Qlogic statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy must be created in the organization mode to use this command.
Examples This example shows how to create a motherboard temperature statistics class.
UCS-A # scope org Test
UCS-A /org # scope stats-threshold-policy sample
UCS-A /org/stats-threshold-policy # create class motherboard-temp-stats
UCS-A /org/stats-threshold-policy/class* # commit-buffer
UCS-A /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to create a PCIe fatal completion error statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # create class pcie-fatal-completion-error-stats
server /org/stats-threshold-policy/class* # commit-buffer
server /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to create a PCIe fatal error statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # create class pcie-fatal-error-stats
server /org/stats-threshold-policy/class* # commit-buffer
server /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to create a PCIe fatal protocol error statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # create class pcie-fatal-protocol-error-stats
server /org/stats-threshold-policy/class* # commit-buffer
server /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to create a PCIe fatal receive errors statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # create class pcie-fatal-receiving-error-stats
server /org/stats-threshold-policy/class* # commit-buffer
server /org/stats-threshold-policy/class #
Examples This example shows how to create a processor runtime statistics class:
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for power supply input statistics.
Examples This example shows how to create a power supply input statistics class:
switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for power supply statistics.
Examples This example shows how to create power supply statistics class:
switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to create a rack unit fan statistics class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # create class rack-unit-fan-stats
Switch-A /eth-server/stats-threshold-policy/class* # commit-buffer
Switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to create a rack unit power supply statistics class:
Switch-A # scope org
Switch-A /org # scope stats-threshold-policy Default
Switch-A /org/stats-threshold-policy # create class rack-unit-psu-stats
Switch-A /org/stats-threshold-policy/class* # commit-buffer
Switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for system statistics.
switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines Use classes to threshold statistics. For example, you might want to define a threshold on a port that raises a
fault if the average number of packets dropped exceeds a certain amount. For this class, you would create
thresholds for Virtual NIC statistics.
Examples This example shows how to create a Virtual NIC statistics class:
switch-A /org/stats-threshold-policy/class #
create client
To create a client, use the create client command in port-profile mode.
Syntax Description client-name The name of the client. A unique set of numbers or letters that identifies the
client. The range of valid values is 1 to 16.
Usage Guidelines Creates a client for a port profile. It also enters you into system VM management VMware profile set port
profile mode. This command is used along with other commands to configure port profiles.
create cluster
To create a distributed virtual switch, use the create cluster command.
Syntax Description name The name of the distributed virtual switch. The name can include a maximum of 16
characters.
Usage Guidelines The name of the distributed virtual switch can include a maximum of 16 characters.
scope cluster
show cluster
delete cluster
create cpu
To create a CPU qualifier for a server pool policy, use the create cpu command.
create cpu
Usage Guidelines Use this command create a CPU qualifier for a server pool policy, and to enter organization CPU mode.
Only one CPU qualifier can be created.
create data-center
To create a data center, use the create data-center command in vcenter mode. You can also create a data
center in folder mode.
Syntax Description datacenter-name The name of the data center. A unique set of numbers or letters that identifies
the data center. The range of valid values is 1 to 16.
create default-auth
To create a default authentication method for an authentication domain, use the create default-auth command.
create default-auth
Examples This example shows how to create a default authentication method for an authentication domain:
Switch-A # scope security
Switch-A /security # scope auth-domain Default
Switch-A /security/auth-domain # create default-auth
Switch-A /security/auth-domain/default-auth* # commit-buffer
Switch-A /security/auth-domain/default-auth #
create default-behavior
To create a default behavior mode, use the create default-behavior command.
Usage Guidelines Use this command to create a default behavior, and enter organization default-behavior mode.
hw-inherit sets
Examples This example shows how to create a vNIC default behavior mode:
switch-A# scope org org10
switch-A /org # scope service-profile sp10
switch-A /org/service-profile # create default-behavior vnic
switch-A /org/service-profile/default-behavior* # commit-buffer
switch-A /org/service-profile/default-behavior #
create destination
To create an email destination, use the create destination command.
switch-A /monitoring/callhome/profile #
create dest-interface
To create a destination interface for the Fibre Channel traffic monitoring session or the Ethernet traffic
monitoring session, use the create dest-interface command.
Syntax Description slotid The slot ID of the interface. It must be a value between 1-5
Usage Guidelines A Fibre Channel traffic monitoring session or an Ethernet traffic monitoring session must be created prior to
using this command.
Examples This example shows how to create a destination interface for the Ethernet traffic monitoring session.
To create a destination interface for the Fibre Channel traffic monitoring session, replace eth-traffic-mon
with fc-traffic-mon , and eth-mon-session with fc-mon-session .
Switch-A # scope eth-traffic-mon
Switch-A /eth-traffic-mon # scope fabric a
Switch-A /eth-traffic-mon/fabric # scope eth-mon-session Default
Switch-A /eth-traffic-mon/fabric/eth-mon-session # create dest-interface 2 33
Switch-A /eth-traffic-mon/fabric/eth-mon-session/dest-interface* # commit buffer
Switch-A /eth-traffic-mon/fabric/eth-mon-session/dest-interface #
create dhcp-ip-params
To configure DHCP for initiator IP parameters, use the create dhcp-ip-params command.
create dhcp-ip-params
Usage Guidelines You must create an IPv4 interface for an iSCSI VNIC before you use this command.
Examples This example shows how to configure the DHCP for initiator IP parameters:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if # create dhcp-ip-params
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if/dhcp-ip-params* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if/dhcp-ip-params #
scope dhcp-ip-params
delete dhcp-ip-params
create pooled-ip-params
create static-ip-params
create ip-if
create distributed-virtual-switch
To create a distributed virtual switch, use the create distributed-virtual-switch command in folder mode.
Syntax Description dvs-name The name of the switch. A unique set of numbers or letters that identifies the
switch. The range of valid values is 1 to 16.
Command Default
• Admin State is disabled
• UUID is 00000000-0000-0000-0000-000000000000
• Extension key is blank
create dns
To create a DNS host name , use the create dns command.
Syntax Description name DNS host name. The range of valid values is 1 to 16.
switch-A /system/services #
create dynamic-vnic-conn
To create a dynamic vNIC connection, use the create dynamic-vnic-conn command.
create dynamic-vnic-conn
Usage Guidelines The vNIC connection policy determines how the VN-link connectivity between VMs and dynamic vNICs is
configured. This policy is required for Cisco UCS domains that include servers with Cisco UCS M81KR
Virtual Interface Card adapters that host VMs and dynamic vNICs.
Each dynamic vNIC connection policy must include an adapter policy and designate the number of vNICs
that can be configured for any server associated with a service profile that includes the policy.
create dynamic-vnic-conn-policy
To create a dynamic vNIC connection policy, use the create dynamic-vnic-conn-policy command.
Syntax Description policy-name The name of the vNIC connection policy. The range of valid values is 1 to
16.
Usage Guidelines The vNIC connection policy determines how the VN-link connectivity between VMs and dynamic vNICs is
configured. This policy is required for Cisco UCS domains that include servers with Cisco UCS M81KR
Virtual Interface Card adapters that host VMs and dynamic vNICs.
Each dynamic vNIC connection policy must include an adapter policy and designate the number of vNICs
that can be configured for any server associated with a service profile that includes the policy.
Examples This example shows how to create a dynamic VNIC connection policy:
create egress-policy
To create an egress policy, use the create data-center command in vcenter mode. You can also create a
data center in folder mode.
Syntax Description policy-name The name of the policy. A unique set of numbers or letters that identifies the
policy. The range of valid values is 1 to 16.
create eth-if
To create an Ethernet interface, use the create eth-if command.
Syntax Description name Interface name. The range of valid values is 1 to 16.
switch-A /org/service-profile/vnic/eth-if #
create eth-if
Usage Guidelines You must create a service profile and an iSCSI VNIC for the service profile before you use this command.
Examples This example shows how to create an Ethernet interface for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-isci testing
UCS-A /org/service-profile/vnic-iscsi # create eth-if
UCS-A /org/service-profile/vnic-iscsi* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if #
scope eth-if
create ip-if
create eth-mon-session
To create an Ethernet traffic monitoring session mode, use the create eth-mon-session command.
Syntax Description name The name of the Ethernet traffic monitoring session. The name can include a maximum
of 16 characters.
Usage Guidelines The name of the session can include alphanumeric characters. You cannot include special characters.
Examples This example shows how to create an Ethernet traffic monitoring session:
Switch-A # scope eth-traffic-mon
Switch-A /eth-traffic-mon # scope fabric a
Switch-A /eth-traffic-mon/fabric # create eth-mon-session Default
Switch-A /eth-traffic-mon/fabric/eth-mon-session* # commit-buffer
Switch-A /eth-traffic-mon/fabric/eth-mon-session #
create eth-policy
To create an Ethernet policy, use the create eth-policy command.
Syntax Description policy-name The name of the Ethernet policy. The range of valid values is 1 to 16.
Examples This example shows how to create Ethernet policy ep100 in org100 mode:
switch-A /org/eth-policy #
create eth-target
To create an Ethernet target endpoint for a fabric interface, use the create eth-target command.
Syntax Description name Name of the Ethernet target endpoint. The name can include a maximum of 16
characters.
Usage Guidelines You must create an interface for a fabric before you use this command.
You must create a port channel for a fabric before you use this command.
The name of the Ethernet target endpoint can be alphanumeric, but cannot include special characters.
Examples This example shows how to create an Ethernet target endpoint for a fabric interface:
Switch-A # scope eth-storage
Switch-A /eth-storage # scope fabric a
Switch-A /eth-storage/fabric # scope interface 2 33
Switch-A /eth-storage/fabric/interface # create eth-target Testing
Switch-A /eth-storage/fabric/interface/eth-target* # commit-buffer
Switch-A /eth-storage/fabric/interface/eth-target #
create ext-static-ip
To create an external static management IP, use the create ext-static-ip command.
create ext-static-ip
Examples This example shows how to set an external static management IP address for the CIMC.
Switch-A # scope server 1/7
Switch-A /chassis/server # scope cimc
Switch-A /chassis/server/cimc # create ext-static-ip
Switch-A /chassis/server/cimc/ext-static-ip* # commit-buffer
Switch-A /chassis/server/cimc/ext-static-ip #
create fc-mon-session
To create a Fibre Channel traffic monitoring session, use the create fc-mon-session command.
Syntax Description Name Name of the monitoring session. The name can include a maximum of 16 characters,
and can include alphanumeric characters.
Usage Guidelines The Fibre Channel traffic monitoring session must be created prior to using this command.
The name of the Fibre Channel monitoring session cannot include special characters.
Examples This example shows how to create a Fibre Channel monitoring session:
Switch-A # scope fc-traffic-mon
Switch-A /fc-traffic-mon # scope fabric a
Switch-A /fc-traffic-mon/fabric # create fc-mon-session Default
Switch-A /fc-traffic-mon/fabric/fc-mon-session* # commit-buffer
create fcoe-if
To create a FCoE (Fibre Channel over Ethernet) interface, use the create fcoe-if command.
create fcoe-if
switch /org/service-profile/vnic #
create fc-policy
To create a Fibre Channel policy, use the create fc-policy command.
Syntax Description policy-name The name of the Fibre Channel policy. The range of valid values is 1 to
16.
Usage Guidelines Use this command to create a Fibre Channel policy, and enter organization fc-policy mode.
Examples This example shows how to create Fibre Channel policy fcp10 in org10 mode:
switch /org/fc-policy #
create folder
To create a folder, use the create folder command in vcenter mode. You can also create a folder in data-center
mode.
Syntax Description folder-name The name of the folder. A unique set of numbers or letters that identifies the
folder. The range of valid values is 1 to 16.
create fw-host-pack
To create a host pack, use the create fw-host-pack command.
Syntax Description name Pack name. The range of valid values is 1 to 16.
Usage Guidelines A pack is a collection of host firwmare images for devices like adapters, HBAs, NICs, and raid controllers.
Use this command to create a host firmware package and enter organization firmware host package mode.
Pubs-A /org/fw-host-pack #
create fw-mgmt-pack
To create a management pack, use the create fw-mgmt-pack command.
Syntax Description name Pack name. The range of valid values is 1 to 16.
Usage Guidelines A pack is a collection of host firwmare images for devices like adapters, HBAs, NICs, and raid controllers.
Use this command to create a management firmware package and enter organization firmware management
package mode.
switch /org/fw-host-pack #
create hv-conn
To create an HV connection, use the create hv-conn command.
Usage Guidelines Use this command to create a Hypervisor connection, and enter organization HV connection mode.
switch /org/service-profile/hv-conn #
create import-config
To create a import configuration, use the create import-config command.
create import-config {ftp:| scp:| sftp:| tftp:} {disabled| enabled} {merge| replace}
Usage Guidelines Use this command to create a configuration for importing files, and enter organization import configuration
mode.
switch /service/import-config #
create initiator
To create an initiator, use the create initiator command.
create initiator id
Syntax Description id Initiator identification number. The range of valid values is 1 to 16.
Usage Guidelines Use this command to create a WWN initiator, and enter organization initiator mode.
switch-A /org/wwn-pool/initiator #
create interface
To create an interface, use the create interface command.
Syntax Description slot-id Slot identification number. The range of valid values is 2 to 5.
2.0(1) This command can be used to create unified and non-unified ports.
Unified ports are supported on the 6200 series fabric interconnect with Cisco UCS
Manager, version 2.0.
Unified Ports are not supported on 6100 series fabric interconnects, even if they are
running Cisco UCS Manager, version 2.0.
Usage Guidelines Use this command to create an Ethernet or Fibre Channel interface, and enter organization interface mode.
Starting with 2.0(1), use this command to configure:
• Ethernet and Fibre Channel ports on both, 6100 and 6200 Fabric Interconnect series switches.
• non-unified ports for 6100 series fabric interconnects, and unified ports for 6200 series fabric interconnects
with Cisco UCS Manager, version 2.
When you create a new interface for an already configured slot ID and port ID, Cisco UCS Manager
deletes the previously configured interface and creates a new one. If a port mode change is required
because you configured a port that previously operated in the Ethernet port mode to a port type in Fibre
Channel port mode (or vice-versa), Cisco UCS Manager notes the change, and the Fabric Interconnect
will reboot when the change is committed.
create interface fc
To create a Fibre Channel interface for a fabric, use the create interface fc command.
Syntax Description slot id The slot identification number. The range of valid values is 2 to 5.
port id The port identification of the interface. The range of valid values is 1 to 40.
Examples This example shows how to create a fibre channel interface for a fabric.
Switch-A # scope fc-storage
Switch-A /fc-storage # scope fabric a
Switch-A /fc-storage/fabric # create interface fc 2 33
Switch-A /fc-storage/fabric/fc* # commit-buffer
Switch-A /fc-storage/fabric/fc #
Syntax Description slot id The slot identification number. The range of valid values is 2 to 5.
port id The port identification number. The range of valid values is 1 to 40.
Examples This example shows how to create a Fibre Channel over Ethernet interface for a fabric.
Switch-A # scope fc-storage
Switch-A /fc-storage # scope fabric a
Switch-A /fc-storage/fabric # create interface fcoe 3 40
Switch-A /fc-storage/fabric/fcoe* # commit-buffer
Switch-A /fc-storage/fabric/fcoe #
create ip-if
To create an IPv4 interface for an iSCSI VNIC, use the create ip-if command.
create ip-if
Usage Guidelines You must create an iSCSI VNIC for a service profile and an Ethernet interface for the ISCSI VNIC before
you use this command.
Examples This example shows how to create an IPv4 interface for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # create ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if #
create pooled-ip-params
create static-ip-params
create ipmi-access-profile
To create an IPMI (Intelligent Platform Management Interface) access profile, use the create
ipmi-access-profile command.
Syntax Description name IPMI access profile name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to create an IPMI access profile, and enter organization IPMI access profile mode.
switch /org/ipmi-access-profile #
create ipmi-user
To create an end-point user, use the create ipmi-user command.
Syntax Description name End-point user name. The range of valid values is 1 to 16.
Usage Guidelines Creates the specified endpoint user and enters organization IPMI access profile endpoint user mode.
More than one endpoint user can be created within an IPMI access profile, with each endpoint user having
its own password and privileges
switch-A /org/ipmi-access-profile/ipmi-user #
create iqn-pool
An IQN pool is a collection of iSCSI Qualified Names (IQNs) for use as initiator identifiers by iSCSI vNICs
in a Cisco UCS domain. To create an IQN pool, use the create iqn-pool command.
Syntax Description name Name of the IQN pool. The name can include a maximum of 32 characters.
Usage Guidelines The IQN pool name can be alphanumeric and can include a maximum of 32 characters.
Examples This example shows how to create an IQN pool in the organization command scope.
UCS-A # scope org
UCS-A /org # create iqn-pool Sample1
UCS-A /org/iqn-pool* # set iqn-prefix iqn.alpha.com
UCS-A /org/iqn-pool* # set descr "This is a sample iqn pool"
UCS-A /org/iqn-pool* # create block beta 3 5
UCS-A /org/iqn-pool/block* # commit-buffer
UCS-A /org/iqn-pool/block # exit
UCS-A /org/iqn-pool #
scope iqn-pool
show iqn-pool
delete iqn-pool
set iqn-prefix
set descr
Command Description
create block
create iscsi-policy
To create an iSCSI adapter policy, use the create iscsi-policy command.
Syntax Description name Name of the iSCSI adapter policy. The name can include a maximum of 16
characters.
Usage Guidelines The name of the iSCSI adapter policy can include a maximum of 16 characters.
Examples This example shows how to create an iSCSI policy in the organization mode:
UCS-A # scope org test
UCS-A /org # create iscsi-policy Sample
UCS-A /org/iscsi-policy* # commit-buffer
UCS-A /org/iscsi-policy #
enter iscsi-policy
show iscsi-policy
delete iscsi-policy
create iscsi
To create a boot iSCSI policy for the organization mode, use the create iscsi command.
create iscsi
Examples This example shows how to create a boot iSCSI policy for a service profile of an organization:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope boot-definition
UCS-A /org/service-profile/boot-definition # create iscsi
UCS-A /org/service-profile/boot-definition/iscsi* # commit-buffer
UCS-A /org/service-profile/boot-definition/iscsi #
enter iscsi
show iscsi
delete iscsi
create keyring
To create a keyring, use the create keyring command.
Syntax Description name Keyring name. The name can be up to 16 alphanumeric characters.
Usage Guidelines Use this command to create a keyring to store RSA keys, and enter organization keyring mode.
create lan
To create a LAN, use the create lan command.
create lan
Usage Guidelines Use this command to create a LAN, and enter organization lan mode.
switch-A /org/boot-policy/lan #
create ldap-group
To create an LDAP group, use the create ldap-group command.
Syntax Description Group DN The group description. The name of the LDAP group can contain a maximum
of 127 characters.
Usage Guidelines The LDAP group name can include alphanumeric and special characters.
create ldap-group-rule
To create an LDAP group rule, use the create ldap-group-rule command.
create ldap-group-rule
Usage Guidelines While using this command in the server mode, an LDAP server must be created to use this command.
Examples This example shows how to create an LDAP group rule for a server.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope server Example
Switch-A /security/ldap/server # create ldap-group-rule
Switch-A /security/ldap/server/ldap-group-rule* # commit-buffer
Switch-A /security/ldap/server/ldap-group-rule #
create local
To create local storage, use the create local command.
create local
switch /org/boot-policy/storage #
create local-disk-config
To create a local disk configuration, use the create local-disk-config command.
create local-disk-config
Usage Guidelines Use this command to create a local disk configuration, and enter organization local disk configuration mode.
switch /org/service-profile/local-disk-config #
create local-disk-config-policy
To create a local disk configuration policy, use the create local-disk-config-policy command.
Syntax Description name Local disk configuration policy name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to create a local disk configuration policy, and enter organization local disk configuration
policy mode.
Examples This example shows how to create a local disk configuration policy:
Pubs-A /org/local-disk-config-policy #
create locale
To create a locale, use the create locale command.
Syntax Description name Locale name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to create a locale, and enter organization local user mode.
You cannot create locales for an administrator account.
switch /security/local-user #
create local-user
To create a local user, use the create local-user command.
Syntax Description name Local user name. The range of valid values is 1 to 74.
Usage Guidelines Use this command to create a local user, and enter organization local user mode.
switch /security/local-user #
create lun
To create a LUN for a static target interface priority, use the create lun command.
create lun
Usage Guidelines You must create a static target interface for an iSCSI VNIC before you use this command.
Examples This example shows how to create a LUN for a configured static target interface priority:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope static-target-if 1
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if # create lun
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if/lun* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if/lun #
create static-target-if
enter static-target-if
scope static-target-if
show static-target-if
delete static-target-if
create mac-pool
To create a MAC address pool, use the create mac-pool command.
Syntax Description name MAC address pool name. The name can be up to 32 alphanumeric characters.
Usage Guidelines Use this command to create a block of MAC addresses, and enter organization MAC pool mode.
create mac-security
To create MAC security, use the create mac-security command.
create mac-security
1.4(1) This command is now available in the Network Control Policy mode within the
Organization mode (/org/nw-ctrl-policy) and Ethernet Storage mode
(/eth-storage/nw-ctrol-policy). This command is no longer available within the Port
Profile mode in the Ethernet Uplink Mode.
Usage Guidelines Use this command to create MAC security, and enter organization MAC security mode.
A network control policy for an organization must be created prior to using this command.
switch /org/nw-ctrl-policy/mac-security #
create maint-policy
To create a maintenance policy, use the create maint-policy command.
Syntax Description name The name of the maintenance policy. This name can include a maximum of 16
characters.
Usage Guidelines The name of the maintenance policy can include alphanumeric characters, but cannot include special characters.
create member-port
To create a member port, use the create member-port command.
b Specifies fabric B.
port-id Port identification number. Depending on the command mode, the range of valid
values is 1 to 40 or 1 to 256.
1.4(1) This command is not available in the Port Channel mode within /eth-uplink/switch
mode.
This command can be used in the VLAN mode within Ethernet Storage.
(/eth-storage/vlan).
Usage Guidelines Use this command to create a member port, and enter organization member port mode.
Examples This example shows how to create a member port for a VLAN within the Ethernet Storage command mode:
create member-port fc
To create a fibre channel member port, use the create member-port fc command.
b Specifies fabric B.
Usage Guidelines You must create a VSAN before you use this command.
Examples This example shows how to create a fibre channel member port within a fabric in the Fibre Channel storage
mode:
UCS-A # scope fc-storage
UCS-A /fc-storage # scope fabric a
UCS-A /fc-storage/fabric # scope vsan sample
UCS-A /fc-storage/fabric/vsan # create member-port fc 1 223
UCS-A /fc-storage/fabric/vsan/member-port* # commit-buffer
UCS-A /fc-storage/fabric/vsan/member-port #
scope member-port fc
Command Description
show member-port fc
delete member-port fc
b Specifies fabric B.
port-id Port identification number. The value must be between 1 and 256.
Command Modes VSAN within the Fibre Channel storage command mode (/fc-storage/vsan)
VSAN within a fabric (/fc-storage/fabric/vsan)
Usage Guidelines You must create a VSAN before you use this command.
Examples This example shows how to create a Fibre Channel over Ethernet member port:
UCS-A # scope fc-storage
UCS-A /fc-storage # scope vsan sample
UCS-A /fc-storage/vsan # create member-port fcoe 1 233
UCS-A /fc-storage/vsan/member-port* # commit-buffer
UCS-A /fc-storage/vsan/member-port #
Syntax Description slot id Slot identification number. The value must be between 1 and 5.
port id Port identification number. Depending on the command mode that you are in, the
values must be between 1 and 40 or 1 and 48.
2.0(1) This command was introduced in the port channel mode within a Fabric in the
Ethernet storage mode (/eth-storage/fabric/port-channel).
Usage Guidelines You must create port channels before you use this command.
You can specify a port ID between 1 and 48 while creating a member port in the following command modes:
• Port channel within a Fabric in the Ethernet storage mode (/eth-storage/fabric/port-channel)
• Port-Channel within the Fibre Channel Uplink mode (/fc-uplink/fabric/port-channel)
You can specify a port ID between 1 and 40 while creating a member port in the following command mode:
• Port-Channel within the Ethernet Uplink mode (/eth-uplink/fabric/port-channel)
Examples This example shows how to create a member port for a port channel within the Fibre Channel uplink mode:
UCS-A # scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # scope port-channel sample
UCS-A /fc-uplink/fabric/port-channel # create member-port 1 22
scope member-port
create member-port-channel
To create a member port channel, use the create member-port-channel command.
b Specifies fabric B.
port channel id Specifies the ID of the port channel. It must be a value between 1- 256.
2.0(1) This command was introduced in Ethernet uplink mode (/eth-uplink/vlan and
/eth-uplink/fabric/vlan).
Usage Guidelines You must create a VSAN or a VLAN before you use this command.
Examples This example shows how to create a member port channel for a sample VSAN within a fabric:
UCS-A # scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # scope vsan Sample
UCS-A /fc-uplink/fabric/vsan # create member-port-channel a 22
UCS-A /fc-uplink/fabric/vsan* # commit-buffer
UCS-A /fc-uplink/fabric/vsan #
create memory
To create a memory qualifier, use the create memory command.
create memory
Usage Guidelines Use this command to create a memory qualifier, and enter organization memory mode.
Pubs-A /org/server-qual/memory #
create mon-src
To create a monitor source session, use the create mon-src command.
Syntax Description session name The name of the monitoring source session. This name can include a maximum
of 16 characters.
Usage Guidelines The session of the monitoring source can include a maximum of 16 characters. The session can be alphanumeric,
but cannot include special characters.
Examples This example shows how to create a monitoring source for VNIC within a service profile.
Switch-A # scope org
Switch-A /org # scope service-profile sample
Switch-A /org/service-profile # scope vnic test
Switch-A /org/service-profile/vnic # create mon-src example
Switch-A /org/service-profile/vnic/mon-src* # commit-buffer
Switch-A /org/service-profile/vnic/mon-src #
Syntax Description name Ethernet interface name. The range of valid values is 1 to 16.
Use this command to create a network, and enter organization network mode.
switch /eth-uplink/port-profile/network #
Syntax Description network-name The name of the network. A unique set of numbers or letters that identifies the
network. The range of valid values is 1 to 32.
create ntp-server
To create an NTP server, use the create ntp-server command.
Usage Guidelines Use this command to create an NTP server, and enter organization NTP server mode.
switch-A /system/services/ntp-server #
create nw-ctrl-policy
To create a network control policy, use the create nw-ctrl-policy command.
1.4(1) This command was introduced in the Ethernet storage command mode.
Usage Guidelines The name of the network control policy can be alphanumeric, but cannot include special characters.
When you create a network control policy, you can use the policy to perform the following tasks:
• Enable CDP
• Set up an uplink fail action
set uplink-fail-action
enter nw-ctrl-policy
Command Description
delete nw-ctrl-policy
show nw-ctrl-policy
Syntax Description name Name of the one-time occurrence for the schedule. The name can include a maximum
of 16 characters.
Examples This example shows how to create a one-time occurrence for a schedule.
Switch-A # scope system
Switch-A /system # scope schedule Sample
Switch-A /system/schedule # create occurrence one-time Trial
Switch-A /system/schedule/one-time* # commit-buffer
Switch-A /system/schedule/one-time #
Syntax Description Name The name of the recurring occurrence instance. This name can include a maximum
of 16 characters.
Examples This example shows how to create a recurring occurrence instance for a schedule.
Switch-A # scope system
Switch-A /system # scope schedule Default
Switch-A /system/schedule # create occurrence recurring Sample
Switch-A /system/schedule/recurring* # commit-buffer
Switch-A /system/schedule/recurring #
set concur-tasks
set day
Command Description
set hour
set max-duration
set min-interval
set minute
set proc-cap
create org
To create an org, use the create org command.
Syntax Description name Org name. The range of valid values is 1 to 80.
Usage Guidelines Organizations are logical entities that you can use to divide up large physical infrastructures into smaller
infrastructures.
Use this command to create an organization, and enter organization mode.
Switch-A /org #
create org-ref
To create a organization reference, use the create org-ref command.
Syntax Description name Organization name. The range of valid values is 1 to 16.
Usage Guidelines The create org-ref command creates a an organization reference to a locale. Use this command to create a
organization reference, and enter organization organization reference mode.
You can specify more than one org-ref-name and orgdn-name argument on the same command line to reference
multiple organizations to the locale, or you can add organizations to the same locale using multiple create
org-ref commands.
switch-A /security/locale/org-ref #
Command Description
show org
create pack-image
To create an image pack, use the create pack-image command.
host-hba-optionrom Specifies the image for the host HBA optional ROM.
switch-A /org/fw-mgmt-pack/pack-image #
create path
To create a LAN image path, use the create path command.
Usage Guidelines The LAN image path is the path the vNIC used when booting from an image on a LAN, such as a PXE boot.
For each path you can specify the vNIC to use.
Use this command to create a LAN image path, and enter organization path mode.
switch-A /org/boot-policy/lan/path #
Usage Guidelines You must create a service profile and a boot definition before you use this command.
You must create a boot policy before you can use this command in the boot-policy command mode.
Examples This example shows how to create a primary path for an iSCSI image for a boot policy:
UCS-A # scope org test
UCS-A /org # scope boot-policy default
UCS-A /org/boot-policy # scope iscsi
UCS-A /org/boot-policy/iscsi # create path primary
UCS-A /org/boot-policy/iscsi/path* # commit-buffer
UCS-A /org/boot-policy/iscsi/path #
create physical-qual
To create a physical qualifier for a server pool policy, use the create physical-qual command.
create physical-qual
Usage Guidelines Use this command create a physical qualifier for a server pool policy, and to enter organization physical
qualifier mode.
create pin-group
To create a pin group, use the create pin-group command.
Syntax Description name Pin group name. The range of valid values is 1 to 16.
switch-A /eth-uplink/pin-group #
create policy
To create a policy, use the create policy command.
callhome mode
create policy event
flow-control mode
create policy name
Syntax Description event Select a predefined fault or system event type. See Usage Guidelines for event
options.
1.1(1) This command was modified to add additional event types for Call Home.
Usage Guidelines Use this command to create a policy, and enter either organization callhome or organization flow control
mode.
In Call Home configuration, use this command to create an instance of a policy for a predefined type of fault
or system event. The following list shows the available keywords for Call Home event types:
• association-failed
• chassis-seeprom-error
• configuration-failure
• connectivity-problem
• election-failure
• equipment-inaccessible
• equipment-inoperable
• equipment-problem
• fru-problem
• identity-unestablishable
• link-down
• management-services-failure
• management-services-unresponsive
• power-problem
• thermal-problem
• unspecified
• version-incompatible
• voltage-problem
Examples This example shows how to create and enable a Call Home policy instance for link-down events:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # create policy link-down
switch-A /monitoring/callhome/policy # set admin-state enabled
switch-A /monitoring/callhome/policy* # commit-buffer
switch-A /monitoring/callhome/policy #
This example shows how to create a named policy for flow control:
switch-A # scope eth-uplink
switch-A /eth-uplink # scope flow-control
switch-A /eth-uplink/flow-control # create policy policy1
switch-A /eth-uplink/flow-control* # commit-buffer
switch-A /eth-uplink/flow-control #
create pooled-ip-params
To configure a pool for initiator IP parameters, use the create pooled-ip-params command.
create pooled-ip-params
Command Modes IPv4 interface within the iSCSI VNIC mode (/org/service-profile/vnic-iscsi/eth-if/ip-if)
Usage Guidelines You must create an IPv4 interface for the iSCSI VNIC before you use this command.
Examples This example shows how to configure a pool for initiator IP parameters:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if # create pooled-ip-params
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if/pooled-ip-params* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if/pooled-ip-params #
scope pooled-ip-params
delete pooled-ip-params
create dhcp-ip-params
create static-ip-params
create ip-if
create pooling-policy
To create a pooling policy, use the create pooling-policy command.
Syntax Description name Policy name. The range of valid values is 1 to 16.
Usage Guidelines Creates a server pooling policy, and enters organization pooling policy mode.
switch-A /org/pooling-policy #
create port-channel
To create a port channel, use the create port-channel command.
create port-channel id
Syntax Description id Port identification number. The range of valid values is 1 to 256.
1.4(1) This command was introduced for a Fabric within the Fibre Channel uplink mode
(fc-uplink/fabric) and the Ethernet storage mode (/eth-storage).
The range of valid values was modified to 1 to 256 from 1 to 40.
Usage Guidelines Consider using a port channel to make best use of capacity when multiple uplinks are used on a switch.
Use this command to create a port channel, and enter organization port channel mode.
Syntax Description name Port profile name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to create a port profile, and enter organization port profile mode.
switch-A /eth-uplink/port-profile #
Syntax Description profile-name The name of the profile. A unique set of numbers or letters that identifies the
profile. The range of valid values is 1 to 31.
Usage Guidelines The port profile client determines the DVSes to which a port profile is applied. By default, a port profile
applies to all DVSes in the vCenter; however, you can use a port profile client to apply a port profile to all
DVSes in a specific datacenter or datacenter folder, or to a specific DVS.
create port-profile creates the specified port profile and enters system VM management VMware profile
set port profile mode.
create power-control-policy
To create a power policy, use the create power-control-policy command.
Syntax Description name The name of the power policy. The name can include a maximum of 16 characters.
Usage Guidelines The name of the power policy can be alphanumeric, but cannot include special characters.
create power-group
To create a power group, use the create power-group command.
Syntax Description name The name of the power group. The name can include a maximum of 16 characters.
Usage Guidelines The name of the power group can include alphanumeric characters, but cannot include special characters.
The global capping policy must be set as policy-driven-chassis--group-cap to create power groups.
create processor
To create a processor qualifier for a server pool policy, use the create processor command.
create processor
Usage Guidelines Use this command create a processor qualifier for a server pool policy, and to enter organization processor
mode.
Only one processor qualifier can be created.
Note In later releases, this command is replaced by the create cpu command.
create profile
To create a profile, use the create profile command.
Syntax Description name Profile name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to create a profile, and enter organization profile mode.
switch-A /monitoring/callhome/profile #
create qos-policy
To create a QoS policy, use the create qos-policy command in org mode.
Syntax Description policy-name The name of the QoS policy. A unique set of numbers or letters that identifies
the policy. The range of valid values is 1 to 16.
create rack
To create a rack qualifier, use the create rack command.
Syntax Description minimum-slot-id The minimum slot ID for the rack. It must be a value between 1 and
255.
maximum-slot-id The maximum slot ID for the rack. It must be a value between 1 and
255.
Usage Guidelines A server pool policy qualification must be created to use this command.
scope rack
show rack
delete rack
create role
To create a role, use the create role command.
Syntax Description name Role name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to create a role, and enter organization role mode.
switch-A /security/role #
create san-image
To create a SAN image, use the create san-image command.
Usage Guidelines Only one SAN image can be created and committed.
Use this command to create a SAN image, and enter organization SAN image mode.
switch /org/service-profile/boot-def/storage/san-image #
create scheduler
To create a scheduler, use the create scheduler command.
Syntax Description name The name of the scheduler. This name can include a maximum of 16 characters.
Usage Guidelines The name of the scheduler can include alphanumeric characters, but cannot include any special characters.
create scrub-policy
To create a scrub policy, use the create scrub-policy command.
Syntax Description name Scrub policy name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to create a scrub policy, and enter organization scrub policy mode.
switch /org/scrub-policy #
create server
To create a server, use the create server command.
Syntax Description server-name The name of the server. Valid entries for this value are a name or an IP address.
The range of valid values for a name is 1 to 16.
1.4(1) The command options have been modified. With this release, you only need to specify the
name of the server, or the host IP address. The name of the server can include a maximum
of 16 characters.
This command is not available in the VMware management mode.
The options for this command in the server pool mode have been modified. See create
server server-pool command.
Usage Guidelines This command takes the name argument only in the /org/server-pool mode.
Use this command to create a server, and enter organization server mode.
switch-A /security/radius/server #
Syntax Description rack-id The ID of the rack that the server will belong to. The value must be an
integer between 1 and 255.
create server
create server-autoconfig-policy
To create a server automatice configuration policy, use the create server-autoconfig-policy command.
Syntax Description name Policy name. The range of valid values is 1 to 16.
switch /org/server-autoconfig-policy #
create server-disc-policy
To create a server discovery policy, use the create server-disc-policy command.
Syntax Description name Server discovery policy name. The range of valid values is 1 to 16.
switch /org/server-disc-policy #
create server-inherit-policy
To create a server inherit policy, use the create server-inherit-policy command.
Syntax Description name Policy name. The range of valid values is 1 to 16.
switch#scope org /
switch /org/server-inherit-policy #
create server-pool
To create a server pool, use the create server-pool command.
Syntax Description name Server pool name. The name can be up to 32 alphanumeric characters.
Usage Guidelines Use this command to create a server pool, and enter organization server pool mode.
create server-qual
To create a server qualifier, use the create server-qual command.
Syntax Description name Server qualifier name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to create a server qualifier, and enter organization server qualification mode.
switch /org/server-qual #
create server-ref
To create a server reference for an authentication server group, use the create server-ref command.
Syntax Description name The name of the server. You can enter either a name or the IP address of the server.
Usage Guidelines An authentication server group and a server must be created to use this command.
Examples This example shows how to add a server reference to an authentication server group within LDAP.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope auth-server-group Sample
Switch-A /security/ldap/auth-server-group # create server-ref example
Switch-A /security/ldap/auth-server-group/server-ref* # commit-buffer
Switch-A /security/ldap/auth-server-group/server-ref #
create service-profile
To create a service profile, use the create service-profile command.
Syntax Description name The service profile name. This name can be between 2 and 32 alphanumeric
characters long. You cannot use spaces or any special characters, and you
cannot change this name after the object has been saved.
initial-template Specifies that instances will not automatically update if this template is updated.
updating-template Specifies that instances will automatically update if this template is updated.
Usage Guidelines Use this command to create a service profile, and enter service profile mode.
create slot
To create a slot, use the create slot command.
Syntax Description min-id Minimum slot identification number. The range of valid values is 1 to 8.
Usage Guidelines Use this command to create a slot with the specified ID, and enters organization slot mode.
switch /org/server-qual/chassis/slot #
create snmp-trap
To create an SNMP trap, use the create snmp-trap command.
Syntax Description ip-address Host IP address. Specify the IP address in the format A.B.C.D.
Usage Guidelines You must create an SNMP community before you create an SNMP trap.
switch#scope monitoring
switch /monitoring/snmp-trap #
create snmp-user
To create an SNMPv3 user, use the create snmp-user command.
createsnmp-useruser-name
Syntax Description user-name User name. The range of valid values is 1 to 16.
switch-A /monitoring #
create sol-config
To create a Serial over LAN (SoL) configuration, use the create sol-config command.
create sol-config
Usage Guidelines Use this command to create a SoL configuration, and enter organization SoL configuration mode.
switch-A /org/service-profile/sol-config #
create sol-policy
To create an SoL policy, use the create sol-policy command.
Syntax Description name SoL policy name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to create a SoL policy with the specified name, and enters organization SoL policy mode.
switch-A /org/sol-policy #
create static-ip-params
To configure static initiator IP parameters, use the create static-ip-params command.
create static-ip-params
Usage Guidelines You must create an IPv4 interface for the iSCSI VNIC before you use this command.
Examples This example shows how to configure static initiator IP parameters for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if # create static-ip-params
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if/static-ip-params* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if/static-ip-params #
set default-gw
set primary-dns
set secondary-dns
set subnet
enter static-ip-params
scope static-ip-params
Command Description
delete static-ip-params
show static-ip-params
create dhcp-ip-params
create pooled-ip-params
create ip-if
create static-target-if
To configure a static target interface for an iSCSI VNIC, use the create static-target-if command.
Syntax Description static target priority Priority level of the static target interface. The value can either be 1
or 2.
Usage Guidelines You must create an iSCSI VNIC, and an Ethernet interface for the iSCSI VNIC before you use this command.
Examples This example shows how to create a static target interface for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # create static-target-if 1
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if #
enter static-target-if
scope static-target-if
show static-target-if
delete static-target-if
create stats-threshold-policy
To create a statistics threshold policy, use the create stats-threshold-policy command.
Syntax Description name Policy name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to create a statistics threshold policy, and enter organization statistics threshold policy
mode.
switch /org/stats-threshold-policy #
create storage
To create storage, use the create storage command.
create storage
Usage Guidelines Use this command to create a storage qualification, and enter organization server qualification storage mode.
switch /org/service-profile/boot-def/storage #
create threshold-value
To create a threshold value for a property, use the create threshold-value command.
Usage Guidelines This command creates the specified threshold value for the class property and enters organization statistics
threshold policy class property threshold value mode. You must have a class and a property created in order
to execute the set threshold-value command. The command is used to set the value of the property you
created.
You can configure multiple threshold values for a class property. Before you use this command, use the set
normal-value command to set a baseline.
Examples The following example shows how to set the threshold value for the bytes-rx-delta property in vnic-stats class:
switch-A#scope org org100
switch-A /org # scope stats-threshold-policy stp100
create trustpoint
To create a trustpoint, use the create trustpoint command.
Syntax Description name Trustpoint name. The name can be up to 16 alphanumeric characters.
Usage Guidelines Use this command to identify the trustpoints that will be used to validate a certificate during Internet Key
Exchange (IKE) authentication, and enter organization trustpoint mode.
create uuid-suffix-pool
To create a UUID suffix pool, use the create uuid-suffix-pool command.
Syntax Description name UUID suffix pool name. The name can be up to 32 alphanumeric characters.
Usage Guidelines Creates a UUID suffix pool with the specified name, and enters organization UUID suffix pool mode.
create vcenter
To create a VCenter, use the create vcenter command in vmware mode.
Syntax Description vcenter-name The name of the VCenter. A unique set of numbers or letters that identifies the
VCenter. The range of valid values is 1 to 16.
create vcon
To create a vCon (virtual network interface connection), use the create vcon command.
create vcon {1 | 2}
create vcon-policy
To create a vCon policy (vNIC/vHBA placement profile), use the create vcon-policy command.
Usage Guidelines Creates the specified vCon policy and enters organization vcon-policy mode. vCon policies determine the
placement and distribution of vNICs and vHBAs between the adapters for a server that has more than one
adapter.
policy-name should be a unique set of numbers or letters that identifies the policy. The range of valid values
is 1 to 16.
create vhba
To create a virtual HBA vHBA), use the create vhba command.
Syntax Description name vHBA name. The range of valid values is 1 to 16.
a Specifies fabric A.
b Specifies fabric B.
Usage Guidelines Use this command to create a vHBA, and enter organization virtual HBA mode.
switch-A /org/service-profile/vhba #
create vhba-templ
To create a vHBA template, use the create vhba-templ command.
Syntax Description name vHBA template name. The range of valid values is 1 to 16.
a Specifies fabric A.
b Specifies fabric B.
fci-name Fibre Channel interface name. The range of valid values is 1 to 16.
Usage Guidelines A vHBA is a virtualized host bus adapter that is configured on a physical network adapter and appears to be
a physical HBA to the operating system of the server. The type of adapter in the system determines how many
vHBAs you can create.
Use this command to create a vHBA template, and enter organization virtual HBA template mode.
switch-A /org/vhba-templ #
create virtual-media
To create virtual media, use the create virtual-media command.
Usage Guidelines Use this command to create virtual media with the specified name, and enters organization virtual-media
mode.
switch-A /org/service-profile/boot-definition/virtual-media #
create vlan
To create a VLAN, use the create vlan command.
Syntax Description name VLAN name. The name can contain up to 32 characters.
id VLAN identification number. The range of valid values is 1 to 3967 and 4049 to
4093.
1.4(1) This command was introduced for a fabric within the Ethernet Storage command mode.
In addition, the following changes were introduced:
• Number of characters for the vlan name has been extended from 16 to 32.
• The range of valid values was modified from 4048 - 4093 to 4049 - 4093.
2.0(2) Starting with this release, overlapping Ethernet VLAN and FCoE VLAN IDs are not
allowed. If Cisco UCS Manager detects an overlapping ID, it raises a critical fault.
Usage Guidelines Use this command to create a VLAN with the specified name and identifier number and enter vlan mode.
Starting with 2.0(2) release, overlapping Ethernet VLAN and FCoE VLAN IDs are not allowed. If Cisco UCS
Manager detects an overlapping ID, it raises a critical fault and drops Ethernet traffic on the overlapped
VLANs. Ensure that there are no overlapping Ethernet and FCoE VLAN IDs before upgrading to Cisco UCS
Release 2.0.
Syntax Description name VLAN name. The name can contain up to 32 characters.
1.4(1) The command option was modified to accept a value with a maximum of 32
characters. Prior to this release, the maximum number of characters was 16.
Usage Guidelines Use this command to create a VLAN with the specified name for a port profile and enter vlan mode.
Examples This example shows how to create a VLAN for a port profile:
switch-A# scope system
switch-A /system # scope vm-mgmt
switch-A /system/vm-mgmt # scope vmware
switch-A /system/vm-mgmt/vmware # scope profile-set
switch-A /system/vm-mgmt/vmware/profile-set # scope port-profile pp100
switch-A /system/vm-mgmt/vmware/profile-set/port-profile # create vlan v100
switch-A /system/vm-mgmt/vmware/profile-set/port-profile/vlan* # commit-buffer
switch-A /system/vm-mgmt/vmware/profile-set/port-profile/vlan #
create vnic
To create a VNIC (Virtual Network Interface Card), use the create vnic command.
Syntax Description name VNIC template name. The range of valid values is 1 to 16.
a Specifies switch A.
b Specifies switch B.
Usage Guidelines Use this command to create a vNIC with the specified name, and enters organization virtual NIC mode.
switch-A /org/service-profile/vnic #
create vnic-egress-policy
To create a VNIC egress policy, use the create vnic-egress-policy command.
create vnic-egress-policy
Use this command to create a vNIC egress policy, and enter organization virtual NIC egress policy mode.
switch-A /org/vnic-qos #
create vnic-iscsi
To create an iSCSI VNIC for a service profile, use the create vnic-iscsi command.
Syntax Description name Name of the iSCSI VNIC. The name can include a maximum of 16 characters.
Usage Guidelines You must create a service profile before you use this command.
The name of the iSCSI VNIC cannot exceed 16 characters.
Examples This example shows how to create an iSCSI VNIC for a service profile:
UCS-A # scope org Test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # create vnic-iscsi Trial
UCS-A /org/service-profile/vnic-iscsi* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi #
enter vnic-iscsi
show vnic-iscsi
delete vnic-iscsi
create vnic-templ
To create a VNIC template, use the create vnic-templ command.
create vnic-templ name {fabric {a| a-b| b| b-a}| target {adapter| vm}+| eth-if eth-if}*
Syntax Description name vNIC template name. The range of valid values is 1 to 16.
a Specifies switch A.
b Specifies switch B.
target Specifies whether or not Cisco UCS Manager automatically creates a VM-FEX
port profile with the appropriate settings for the vNIC template. The target can
either be an adapter or a VM.
Usage Guidelines Use this command to create a vNIC template, and enters organization virtual NIC template mode.
create vsan
To create a VSAN, use the create vsan command.
Syntax Description name VSAN name. The range of valid values is 1 to 16.
fcoe-vlan Fibre Channel over Ethernet VLAN. The range of valid values is 1 to 4093.
Usage Guidelines Use this command to create a VSAN with the specified name, and enters organization VSAN mode.
You can create a named VSAN with IDs from 1 to 4093. VSANs configured on different FCoE VLANs
cannot share the same ID.
switch-A /fc-uplink/vsan #
create wwn-pool
To create a WWN (World Wide Name) pool, use the create wwn-pool command.
Syntax Description name WWN pool name. The name can be up to 32 alphanumeric
characters.
Usage Guidelines Use this command to create a WWN pool with the specified name, and enters organization WWN pool mode.
A WWN pool can include only WWNNs or WWPNs in the 20:xx range. All other WWN ranges are reserved.
cycle
To cycle a server, use the cycle command.
switch-A /chassis/server #
decommission chassis
To decommission a chassis, use the decommission chassis command.
decommission chassis id
switch-A* # commit-buffer
switch-A #
decommission fex
To decommission a Fabric extender module, use the decommission fex command.
decommission fex id
decommission server
To decommission a server, use the decommission server command.
1.4(1) The option to specify the chassis identification number was introduced.
switch-A* # commit-buffer
switch-A #
show chassis
show server
Syntax Description ID The identification number of the slot. It must be a value between 1 and 8.
delete adapter
To delete the adapter, use the delete adapter command.
delete adapter
switch-A /org/server-qual #
delete auth-domain
To delete an authentication domain, use the delete auth-domain command.
delete auth-profile
To delete an iSCSI authorization profile for the organization mode, use the delete auth-profile command.
Syntax Description iscsi-auth-profile-name The name of the iSCSI authorization profile. It is the name that you
provided while creating the profile.
Usage Guidelines An iSCSI authorization profile must be created to use this command.
Examples This example shows how to delete an iSCSI authorization profile for the organization mode.
UCS-A # scope org test
UCS-A /org # delete auth-profile sample
UCS-A /org* # commit-buffer
UCS-A /org #
enter auth-profile
scope auth-profile
show auth-profile
delete auth-server-group
To delete an authentication server group, use the delete auth-server-group command.
Syntax Description authentication server group The name of the authentication server group.
delete auto-target-if
To delete a configured automatic target interface of the Ethernet interface for an iSCSI VNIC, use the delete
auto-target-if command.
delete auto-target-if
Command Modes Ethernet interface within the iSCSI VNIC mode (/org/service-profile/vnic-iscsi/eth-if)
Usage Guidelines You must create an iSCSI VNIC, an Ethernet interface for the iSCSI VNIC, and an automatic target interface
before you use this command.
Examples This example shows how to delete an automatic target interface of the Ethernet interface for the iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # delete auto-target-if
UCS-A /org/service-profile/vnic-iscsi/eth-if* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if #
enter auto-target-if
scope auto-target-if
show auto-target-if
delete backup
To delete backup, use the delete backup command.
switch-A /system #
delete bladeserver-disc-policy
To delete a compute blade server discovery policy, use the delete bladeserver-disc-policy command.
Syntax Description name The name of the compute blade server discovery policy.
Examples This example shows how to delete a compute blade server discovery policy.
Switch-A # scope org
Switch-A /org # delete bladeserver-disc-policy Default
Switch-A /org* # commit-buffer
Switch-A /org #
delete block
To delete a block, use the delete block command.
Syntax Description suffix The name of the suffix for the block
that you had specified for an IQN
pool.
to End UUID.
For an IQN pool, it is a number
between 0 and 65535.
2.0(2) This command was introduced in the IQN pool command mode.
---------------------------------------------
delete boot-definition
To delete a boot definition, use the delete boot-definition command.
delete boot-definition
switch-A /org/service-profile #
delete boot-policy
To delete a boot policy, use the delete boot-policy command.
switch-A /org #
delete boot-target
To delete a boot-target object, use the delete boot-target command.
Usage Guidelines Before using this command, you must create a boot target object by using the create boot-target command.
delete cap-qual
To delete a capacity qualification, use the delete cap-qual command.
Syntax Description fcoe Specifies the Fibre Channel over Ethernet (FCoE) qualification.
enter cap-qual
scope cap-qual
show cap-qual
delete certreq
To delete a certificate request, use the delete certreq command.
delete certreq
switch-A /security/keyring #
delete chassis
To delete a chassis, use the delete chassis command.
Syntax Description min-id Minimum chassis identification number. The range of valid values is 1 to 8.
switch-A /org/server-qual #
Examples This example shows how to delete the chassis statistics class:
switch-A /eth-server/stats-threshold-policy #
Examples The following example shows how to delete the CPU statistics class:
switch-A /eth-server/stats-threshold-policy #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to delete the DIMM environment statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # delete class dimm-env-stats
server /org/stats-threshold-policy # commit-buffer
server /org/stats-threshold-policy #
Examples This example shows how to delete the DIMM statistics class:
switch-A /eth-server/stats-threshold-policy #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to delete the Ethernet error statistics class:
switch-A /eth-server/stats-threshold-policy #
Examples This example shows how to delete the Ethernet interface statistics class:
switch-A /org/stats-threshold-policy #
Examples This example shows how to delete the Ethernet loss statistics class:
switch-A /eth-server/stats-threshold-policy #
Usage Guidelines Use this command to delete an Ethernet port error statistics class.
Examples This example shows how to delete an Ethernet port error statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # delete class ethernet-port-err-stats
switch-A /org/stats-threshold-policy* # commit-buffer
switch-A /org/stats-threshold-policy #
Usage Guidelines Use this command to delete an Ethernet port multicast statistics class.
Examples This example shows how to delete an Ethernet port multicast statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # delete class ethernet-port-multicast-stats
switch-A /org/stats-threshold-policy/class* # commit-buffer
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use this command to delete an Ethernet port over-under-sized statistics class.
Examples This example shows how to delete an Ethernet port over-under-sized statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # delete class ethernet-port-over-under-sized-stats
switch-A /org/stats-threshold-policy* # commit-buffer
switch-A /org/stats-threshold-policy #
Usage Guidelines Use this command to delete an Ethernet port statistics class.
Examples This example shows how to delete an Ethernet port statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # delete class ethernet-port-stats
switch-A /org/stats-threshold-policy* # commit-buffer
switch-A /org/stats-threshold-policy #
Usage Guidelines Use this command to delete an Ethernet port large packet statistics class.
Examples This example shows how to delete an Ethernet port large packet statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # delete class ethernet-port-stats-by-size-large-packets
switch-A /org/stats-threshold-policy* # commit-buffer
switch-A /org/stats-threshold-policy #
Usage Guidelines Use this command to delete an Ethernet port small packet statistics class.
Examples This example shows how to delete an Ethernet port small packet statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # delete class ethernet-port-stats-by-size-small-packets
switch-A /org/stats-threshold-policy* # commit-buffer
switch-A /org/stats-threshold-policy #
Syntax Description
This command has no arguments or keywords.
Examples This example shows how to delete the Ethernet pause statistics class:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # delete class ether-pause-stats
server /eth-server/stats-threshold-policy* # commit-buffer
server /eth-server/stats-threshold-policy #
Examples This example shows how to delete the Ethernet recieve statistics class:
switch-A /eth-server/stats-threshold-policy #
Examples This example shows how to delete the Ethernet transmit statistics class:
switch-A /eth-server/stats-threshold-policy #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to delete the fan module statistics classes:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # delete class fan-module-stats
server /eth-server/stats-threshold-policy* # commit-buffer
server /eth-server/stats-threshold-policy #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to delete the Fibre Channel error statistics classes in the system:
server# scope fc-uplink
server /fc-uplink # scope stats-threshold-policy default
server /fc-uplink/stats-threshold-policy # delete class fc-error-stats
server /fc-uplink/stats-threshold-policy* # commit-buffer
server /fc-uplink/stats-threshold-policy #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to delete the Fibre Channel port statistics classes in the system:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # delete class fc-port-stats
server /org/stats-threshold-policy* # commit-buffer
server /org/stats-threshold-policy #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to delete a Fibre Channel statistics class:
server# scope fc-uplink
server /fc-uplink # scope stats-threshold-policy default
server /fc-uplink/stats-threshold-policy # delete class fc-stats
server /fc-uplink/stats-threshold-policy* # commit-buffer
server /fc-uplink/stats-threshold-policy #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to delete an Fex environment statistics class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # create class fex-env-stats
Switch-A /eth-server/stats-threshold-policy/class* # commit-buffer
Switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to delete an Fex power summary statistics class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # delete class fex-power-summary
Switch-A /eth-server/stats-threshold-policy* # commit-buffer
Switch-A /eth-server/stats-threshold-policy #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to delete an Fex power supply input statistics class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # delete class fex-psu-input-stats
Switch-A /eth-server/stats-threshold-policy* # commit-buffer
Switch-A /eth-server/stats-threshold-policy #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to delete an Ethernet IO card statistics class:
server# scope eth-server
server /eth-server # scope stats-threshold-policy
server /eth-server/stats-threshold-policy # delete class io-card-stats
server /eth-server/stats-threshold-policy # commit-buffer
server /eth-server/stats-threshold-policy #
Usage Guidelines
Examples This example shows how to delete a mother board power statistics class and commit the transaction:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # delete class mb-power-stats
server /org/stats-threshold-policy* # commit-buffer
server /org/stats-threshold-policy #
Usage Guidelines
Examples This example shows how to delete a temporary mother board statistics class and commit the transaction:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # delete class mb-temp-stats
server /org/stats-threshold-policy* # commit-buffer
server /org/stats-threshold-policy #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to delete the memory array environment statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # delete class memory-array-env-stats
server /org/stats-threshold-policy* # commit-buffer
server /org/stats-threshold-policy #
Usage Guidelines A statistics threshold policy and a motherboard temperature statistics class must be created to use this command.
Examples This example shows how to delete a motherboard temperature statistics class.
UCS-A # scope org test
UCS-A /org # scope stats-threshold-policy sample
UCS-A /org/stats-threshold-policy # delete class motherboard-temp-stats
UCS-A /org/stats-threshold-policy* # commit-buffer
UCS-A /org/stats-threshold-policy #
Usage Guidelines
Examples This example shows how to delete the PCIe fatal completion error statistics class and commit the transaction:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # delete class pcie-fatal-completion-error-stats
server /org/stats-threshold-policy* # commit-buffer
server /org/stats-threshold-policy #
Usage Guidelines
Examples This example shows how to delete a PCIe fatal error statistics class and commit the transaction:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # delete class pcie-fatal-error-stats
server /org/stats-threshold-policy* # commit-buffer
server /org/stats-threshold-policy #
Usage Guidelines
Examples This example shows how to delete a PCIe fatal protocol error statistics class and commit the transaction:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # delete class pcie-fatal-protocol-error-stats
server /org/stats-threshold-policy* # commit-buffer
server /org/stats-threshold-policy #
Usage Guidelines
Examples This example shows how to delete the PCIe fatal receive error statistics class and commit the transaction:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # delete class pcie-fatal-receiving-error-stats
server /org/stats-threshold-policy* # commit-buffer
server /org/stats-threshold-policy #
Usage Guidelines
Examples This example shows how to delete a PSU input statistics class and commit the transaction:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # delete psu-input-stats
server /eth-server/stats-threshold-policy* # commit-buffer
server /eth-server/stats-threshold-policy #
Usage Guidelines
Examples This example shows how to delete a power supply input statistics class and commit the transaction:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # delete psu-stats
server /eth-server/stats-threshold-policy* # commit-buffer
server /eth-server/stats-threshold-policy #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to delete a rack unit fan statistics class.
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # delete class rack-unit-fan-stats
Switch-A /eth-server/stats-threshold-policy* # commit buffer
Switch-A /eth-server/stats-threshold-policy #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to delete a rack unit power supply statistics class.
Switch-A # scope org
Switch-A /org # scope stats-threshold-policy Default
Switch-A /org/stats-threshold-policy # delete class rack-unit-psu-stats
Switch-A /org/stats-threshold-policy* # commit-buffer
Switch-A /org/stats-threshold-policy #
Usage Guidelines
Examples This example shows how to delete a system statistics class and commit the transaction:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # delete system-stats
server /eth-server/stats-threshold-policy* # commit-buffer
server /eth-server/stats-threshold-policy #
Usage Guidelines
Examples This example shows how to delete a virtual NIC statistics class and commit the transaction:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # delete class vnic-stats
server /org/stats-threshold-policy* # commit-buffer
server /org/stats-threshold-policy #
delete client
To delete a client, use the delete client command in port-profile mode.
delete cluster
To delete a distributed virtual switch, use the delete cluster command.
Syntax Description name The name of the distributed virtual switch. It is the name you provided when you
created the switch.
Usage Guidelines A distributed virtual switch must be created to use this command.
enter cluster
scope cluster
show cluster
delete cpu
To delete a CPU qualifier for a server pool policy, use the delete cpu command.
delete cpu
Usage Guidelines Use this command to delete a CPU qualifier for a server pool policy.
delete data-center
To delete a data center, use the delete data-center command in vcenter mode. You can also delete a data
center in folder mode.
delete default-auth
To delete a default authentication mechanism, use the delete default-auth command.
delete default-auth
Examples This example shows how to delete a default authentication method for an authentication domain.
Switch-A # scope security
Switch-A /security # scope auth-domain Default
Switch-A /security/auth-domain # delete default-auth
Switch-A /security/auth-domain* # commit-buffer
Switch-A /security/auth-domain #
delete default-behavior
To delete a default behavior mode, use the delete default-behavior command.
Examples This example shows how to delete a vNIC default behavior mode:
switch-A# scope org org100
switch-A /org # scope service-profile sp100
switch-A /org/service-profile # delete default-behavior vnic
switch-A /org/service-profile/* # commit-buffer
switch-A /org/service-profile/ #
delete destination
To delete the destination, use the delete destination command.
switch-A /monitoring/callhome/profile #
delete dest-interface
To delete a destination interface for the Fibre Channel traffic monitoring session or the Ethernet traffic
monitoring session, use the delete dest-interface command.
Syntax Description slotid The slot ID of the destination interface. It must be a value between 1-5.
portid The port ID of the destination interface. It must be a value between 1-40.
Usage Guidelines A Fibre Channel traffic monitoring session or an Ethernet traffic monitoring session must be created prior to
using this command.
Examples This example shows how to delete the destination interface for the Ethernet monitoring session.
To delete the destination interface for the Fibre Channel monitoring session, replace eth-traffic-mon with
fc-traffic-mon , and eth-mon-session with fc-mon-session .
Switch-A # scope eth-traffic-mon
Switch-A /eth-traffic-mon # scope fabric a
Switch-A /eth-traffic-mon/fabric # scope eth-mon-session Default
Switch-A /eth-traffic-mon/fabric/eth-mon-session # delete dest-interface 1 33
Switch-A /eth-traffic-mon/fabric/eth-mon-session/dest-interface* # commit buffer
Switch-A /eth-traffic-mon/fabric/eth-mon-session #
delete dhcp-ip-params
To delete a configured DHCP for initiator IP parameters, use the delete dhcp-ip-params command.
delete dhcp-ip-params
Usage Guidelines You must create a DHCP initiator for IP parameters before you use this command.
Examples This example shows how to delete the configured DHCP for initiator IP parameters:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if # delete dhcp-ip-params
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if #
enter dhcp-ip-params
scope dhcp-ip-params
delete distributed-virtual-switch
To delete a distributed virtual switch, use the delete distributed-virtual-switch command in folder mode.
delete dns
To delete DNS service, use the delete dns command.
switch-A /system/services #
delete download-task
To delete a downloaded firmware image, use the delete download-task command.
Syntax Description filename Firmware image filename. The filename can be a maximum of 64 characters.
Usage Guidelines
Examples This example shows how to delete a downloaded firmware image and commit the transaction:
server# scope firmware
server /firmware # delete download-task firmware-image.bin
server /firmware* # commit-buffer
server /firmware
show download-task
delete dynamic-vnic-conn
To delete a dynamic vNIC connection, use the delete dynamic-vnic-conn command.
delete dynamic-vnic-conn
switch-A /org/service-profile #
delete dynamic-vnic-conn-policy
To delete a dynamic vNIC connection policy, use the delete dynamic-vnic-conn-policy command.
Examples This example shows how to delete a dynamic vNIC connection policy:
switch-A /org #
delete egress-policy
To delete an egress policy, use the delete egress-policy command in egress-policy mode.
delete eth-if
To delete an Ethernet interface, use the delete eth-if command.
switch-A /org/service-profile #
delete eth-mon-session
To delete an Ethernet traffic monitoring session, use the delete eth-mon-session command.
Examples This example shows how to delete an Ethernet traffic monitoring session:
Switch-A # scope eth-traffic-mon
Switch-A # /eth-traffic-mon # scope fabric a
Switch-A # /eth-traffic-mon/fabric # delete eth-mon-session Default
Switch-A # /eth-traffic-mon/fabric* # commit-buffer
Switch-A # /eth-traffic-mon/fabric #
delete eth-policy
To delete an Ethernet policy, use the delete eth-policy command.
Examples This example shows how to delete Ethernet policy ep100 in org100 mode:
switch-A /org #
delete eth-target
To delete an Ethernet target endpoint for a fabric interface, use the delete eth-target command.
Usage Guidelines An interface for a fabric and an Ethernet target endpoint for the interface must be created to use this command.
Examples This example shows how to delete an Ethernet target endpoint for a fabric interface.
Switch-A # scope eth-storage
Switch-A /eth-storage # scope fabric a
Switch-A /eth-storage/fabric # scope interface 2 33
Switch-A /eth-storage/fabric/interface # delete eth-target Testing
Switch-A /eth-storage/fabric/interface* # commit-buffer
Switch-A /eth-storage/fabric/interface #
delete ext-static-ip
To delete an external static management IP address for the CIMC or for a service profile, use the delete
ext-static-ip command.
delete ext-static-ip
Examples This example shows how to delete an external static management IP address for the CIMC.
Switch-A # scope server 1/7
Switch-A /chassis/server # scope cimc
Switch-A /chassis/server/cimc # delete ext-static-ip
Switch-A /chassis/server/cimc* # commit-buffer
Switch-A /chassis/server/cimc #
delete fc-mon-session
To delete a Fibre Channel monitoring session, use the delete fc-mon-session command.
Syntax Description Name Name of the monitoring session. This name can include a maximum of 16 characters,
and can be alphanumeric.
Usage Guidelines The name of the monitoring session cannot include special characters.
A traffic monitoring session must be created prior to using this command.
Examples This example shows how to delete a Fibre Channel monitoring session:
Switch-A # scope fc-traffic-mon
Switch-A /fc-traffic-mon # scope fabric a
Switch-A /fc-traffic-mon/fabric # delete fc-mon-session default
Switch-A /fc-traffic-mon/fabric* # commit-buffer
Swithc-A /fc-traffic-mon/fabric #
delete fc-policy
To delete a Fibre Channel policy, use the delete fc-policy command.
Examples This example shows how to delete Fibre Channel policy fcp10 in org10 mode:
switch-A /org #
delete folder
To delete a folder, use the delete folder command in vcenter mode. You can also delete a folder in data-center
mode.
delete fw-host-pack
To delete a host firmware package, use the delete fw-host-pack command.
Syntax Description host-pack-name Name of the server host firmware package image. The name can be a
maximum of 16 characters.
Usage Guidelines
Examples This example shows how to delete a host firmware package and commit the transaction:
server# scope org
server /org # delete fw-host-pack app1
server /org* # commit-buffer
server /org
enter fw-host-pack
scope fw-host-pack
show fw-host-pack
delete fw-mgmt-pack
To delete a management firmware package, use the delete fw-mgmt-pack command.
Syntax Description mgmt-pack-name Name of the management firmware package. The name can be a maximum
of 16 characters.
Usage Guidelines
Examples This example shows how to delete a firmware management package and commit the transaction:
server# scope org
server /org # delete fw-mgmt-pack cimc1
server /org* # commit-buffer
server /org #
enter fw-mgmt-pack
scope fw-mgmt-pack
show fw-mgmt-pack
delete image
To delete an image, use the delete image command.
switch-A /firmware #
delete import-config
To delete an import configuration, use the delete import-config command.
switch-A /system #
delete initiator
To delete an initiator, use the delete initiator command.
delete initiator id
switch-A /org/wwn-pool #
delete interface
To delete an interface, use the delete interface command.
switch-A#scope eth-uplink
switch /eth-uplink/fabric #
delete interface fc
To delete a fibre channel interface for a fabric, use the delete interface fc command.
Syntax Description slot id The port identification number. The range of valid values is between 2 and 5.
port id The port identification number. The range of valid values is between 1 and 40.
Usage Guidelines A fibre channel interface for a fabric must be created to use this command.
Examples This example shows how to delete a fibre channel interface for a fabric.
Switch-A # scope fc-storage
Switch-A /fc-storage # scope fabric a
Switch-A /fc-storage/fabric # delete interface fc 2 33
Switch-A /fc-storage/fabric* # commit-buffer
Switch-A /fc-storage/fabric #
Usage Guidelines A Fibre Channel over Ethernet interface for a fabric must be created to use this command.
Examples This example shows how to delete a Fibre Channel over Ethernet interface for a fabric.
Switch-A # scope fc-storage
Switch-A /fc-storage # scope fabric a
Switch-A /fc-storage/fabric # delete interface fcoe 2 33
Switch-A /fc-storage/fabric* # commit-buffer
Switch-A /fc-storage/fabric #
delete ip-if
To delete an IPv4 interface, use the delete ip-if command.
delete ip-if
Command Modes Ethernet interface within the iSCSI VNIC mode (/org/service-profile/vnic-iscsi/eth-if)
Usage Guidelines You must create an IPv4 interface before you use this command.
create pooled-ip-params
create static-ip-params
create ip-if
enter ip-if
scope ip-if
delete ipmi-access-profile
To delete an IPMI access profile, use the delete ipmi-access-profile command.
switch-A /org #
delete ipmi-user
To delete an IPMI user, use the delete ipmi-user command.
switch-A /org/ipmi-access-profile #
delete iqn-pool
To delete an IQN pool, use the delete iqn-pool command.
enter iqn-pool
scope iqn-pool
show iqn-pool
delete iscsi-policy
To delete an iSCSI adapter policy, use the delete iscsi-policy command.
Syntax Description name Name of the iSCSI adapter policy. Enter the name that you provided while creating
the policy.
Usage Guidelines You should have created an iSCSI adapter policy to use this command.
scope iscsi-policy
enter iscsi-policy
show iscsi-policy
delete iscsi
To delete iSCSI devices from a boot policy, use the delete iscsi command.
delete iscsi
Examples This example shows how to delete iSCSI devices from a boot policy for a service profile of an organization:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope boot-definition
UCS-A /org/service-profile/boot-definition # delete iscsi
UCS-A /org/service-profile/boot-definition* # commit-buffer
UCS-A /org/service-profile/boot-definition #
scope iscsi
enter iscsi
show iscsi
delete keyring
To delete a keyring, use the delete keyring command.
switch-A /security #
delete lan
To delete the LAN, use the delete lan command.
delete lan
switch-A /org/boot-policy #
delete ldap-group
To delete an LDAP group, use the delete ldap-group command.
delete ldap-group-rule
To delete an LDAP group rule, use the delete ldap-group-rule command.
delete ldap-group-rule
Usage Guidelines To use this command in the LDAP server mode, an LDAP server must be created.
Examples This example shows how to delete an LDAP group rule for an LDAP server.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope server Default
Switch-A /security/ldap/server # delete ldap-group-rule
Switch-A /security/ldap/server* # commit-buffer
Switch-A /security/ldap/server #
delete local
To delete the local storage, use the delete local command.
delete local
switch-A /org/boot-policy/storage #
delete locale
To delete a locale, use the delete locale command.
Syntax Description name Locale name. The range of valid values is 1 to 16.
switch-A /security #
delete local-disk-config
To delete the local disk configuration, use the delete local-disk-config command.
delete local-disk-config
Examples This example shows how to delete the local disk configuration:
switch-A /org/service-profile #
delete local-disk-config-policy
To delete a configuration policy set in the local disk, use the delete local-disk-config-policy command.
Syntax Description policy-name Policy name. The name is case sensitivie, and can be a maximum of 16
characters.
Usage Guidelines
Examples This example shows how to delete a configuration policy stored in the local disk and commit the transaction:
server# scope org
server /org # delete local-disk-config-policy myPolicy1
server /org* # commit-buffer
server /org
enter local-disk-config-policy
scope local-disk-config-policy
show local-disk-config-policy
delete local-user
To delete a local user, use the delete local-user command.
switch-B /security #
delete lun
To delete a target LUN for a static target interface priority of an iSCSI VNIC, use the delete lun command.
delete lun
Usage Guidelines You must create a static target interface priority for an iSCSI VNIC before you use this command.
Examples This example shows how to delete a target LUN for a static target interface priority of an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope static-target-if 1
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if # delete lun
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if #
enter lun
scope lun
show lun
delete mac-pool
To delete a MAC pool, use the delete mac-pool command.
switch-A /org #
delete mac-security
To delete MAC security, use the delete mac-security command.
delete mac-security
Usage Guidelines Use this command to delete the MAC security policy.
switch-A /eth-uplink/port-profile #
delete maint-policy
To delete a maintenance policy, use the delete maint-policy command.
delete member-port
To delete a member port, use the delete member-port command.
vsan configuration
delete member-port {a| b} slot-id port-id
b Specifies switch B.
switch-A#scope fc-uplink
switch-A /fc-uplink/fabric/vsan #
delete member-port fc
To delete a Fibre Channel member port, use the delete member-port fc command.
b Specifies fabric B.
Command Modes VSAN within the Fibre Channel storage mode (/fc-storage/vsan)
VSAN within a Fabric in the Fibre Channel storage mode (/fc-storage/fabric/vsan)
Usage Guidelines You must create Fibre Channel member ports before you use this command.
Examples This example shows how to delete Fibre channel member ports from the Fibre Channel storage command
mode:
UCS-A # scope fc-storage
UCS-A /fc-storage # scope vsan sample
UCS-A /fc-storage/vsan # delete member-port fc 1 223
UCS-A /fc-storage/vsan* # commit-buffer
UCS-A /fc-storage/vsan #
enter member-port fc
scope member-port fc
Command Description
show member-port fc
b Specifies fabric B.
Command Modes VSAN within the Fibre Channel storage command mode (/fc-storage/vsan)
VSAN within a fabric in the Fibre Channel storage command mode (/fc-storage/fabric/vsan)
Usage Guidelines You must create Fibre Channel over Ethernet member ports before you use this command.
Examples This example shows how to delete Fibre Channel over Ethernet member port from the Fibre Channel storage
command mode:
UCS-A # scope fc-storage
UCS-A /fc-storage # scope vsan sample
UCS-A /fc-storage/vsan # delete member-port fcoe a 1 223
UCS-A /fc-storage/vsan* # commit-buffer
UCS-A /fc-storage/vsan #
Command Description
show member-port fcoe
delete member-port-channel
To delete a member port channel, use the delete member-port-channel command.
b Specifies port B.
2.0(1) This command was introduced in Ethernet uplink mode (/eth-uplink/vlan and
/eth-uplink/fabric/vlan).
Usage Guidelines You must create a VSAN or a VLAN and a member port channel before you use this command.
Examples This example shows how to delete a member port channel for VSAN for a fabric.
UCS-A # scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # scope vsan default
UCS-A /fc-uplink/fabric/vsan # delete member-port-channel a 22
UCS-A /fc-uplink/fabric/vsan* # commit-buffer
UCS-A /fc-uplink/fabric/vsan #
delete memory
To delete memory, use the delete memory command.
delete memory
switch-A /org/server-qual #
delete mon-src
To delete a monitoring source, use the delete mon-src command.
Syntax Description session name The name of the monitor source session.
Usage Guidelines A monitoring source session must be created to use this command.
Examples This example shows how to delete a monitoring source session for a VNIC within a service profile.
Switch-A # scope org
Switch-A /org # scope service-profile sample
delete network
To delete an Ethernet interface under a virtual machine port profile, use the delete network command.
Syntax Description port-profile-name Port profile name. The name is case sensitive, and can be a maximum of
32 characters.
Usage Guidelines
Examples This example shows how to delete an Ethernet interface for a virtual machine port profile and commit the
transaction:
server# scope system
server /system # scope vm-mgmt
server /system/vm-mgmt # scope vmware
server /system/vm-mgmt/vmware # scope profile-set
server /system/vm-mgmt/vmware/profile-set # scope port-profile mprofile1
server /system/vm-mgmt/vmware/profile-set/port-profile # delete network
server /system/vm-mgmt/vmware/profile-set/port-profile* # commit-buffer
server /system/vm-mgmt/vmware/profile-set/port-profile
enter network
scope network
show network
delete ntp-server
To delete a Network Time Protocol (NTP) server hostname, use the delete ntp-server command.
Syntax Description host-name NTP server hostname. The name is case sensitive, and can be a maximum of
512 characters.
Usage Guidelines
Examples This example shows how to delete an NTP server hostname and commit the transaction:
server# scope system
server /system # scope services
server /system/services # delete ntp-server myNTPserver
server /system/services* # commit-buffer
server /system/services
enter ntp-server
scope ntp-server
show ntp-server
delete nw-ctrl-policy
To delete a network control policy, use the delete nw-ctrl-policy command.
1.4(1) This command was introduced in the Ethernet storage command mode.
scope nw-ctrl-policy
enter nw-ctrl-policy
show nw-ctrl-policy
Examples This example shows how to delete a one-time occurrence instance for a schedule.
Switch-A # scope system
Switch-A /system # scope schedule Sample
Switch-A /system/schedule # delete occurrence one-time Trial
Switch-A /system/schedule* # commit-buffer
Switch-A /system/schedule #
Usage Guidelines A schedule and a recurring occurrence instance for the schedule must be created to use this command.
Examples This example shows how to delete a recurring occurrence instance for a schedule.
Switch-A # scope system
Switch-A /system # scope schedule Default
Switch-A /system/schedule # delete occurrence recurring Trial
Switch-A /system/schedule* # commit-buffer
Switch-A /system/schedule #
delete org
To delete an organization, use the delete org command.
Syntax Description org-name Organization name. The name is case sensitive, and can be a maximum of 120
characters.
Usage Guidelines
Examples This example shows how to delete an organization and commit the transaction:
server# scope org
server /org # delete org
server /org* # commit-buffer
server /org
enter org
scope org
show org
delete org-ref
To delete an organization reference, use the delete org-ref command.
switch-A#scope security
switch-A /security/locale #
delete pack-image
To delete a firmware host package image, use the delete pack-image command.
Syntax Description hw-vendor-name Hardware vendor name. The name is case sensitive, and can be a
maximum of 512 characters.
hw-model Hardware model. The name is case sensitive, and can be a maximum
of 512 characters.
version-num Version number of the firmware being used for the package image.
Usage Guidelines The hw-vendor-name and hw-model values are labels that help you easily identify the package image. You
can view the hardware vendor and model by using the show image detail command.
The firmware version must match the model numbers (PID) on the servers that are associated with this firmware
pack.
Examples This example shows how to delete a RAID controller firmware package and commit the transaction:
server# scope org
server /org # scope fw-host-pack fhp1
server /org/fw-host-pack # delete pack-image Cisco UCS raid-controller 2009.02.09
server /org/fw-host-pack* # commit-buffer
server /org/fw-host-pack
enter pack-image
scope pack-image
show pack-image
delete path
To delete the path, use the delete path command.
switch-A /org/boot-policy/lan #
Syntax Description primary Specifies the primary path of the iSCSI image.
Usage Guidelines You must create an iSCSI image path before you use this command.
Examples This example shows how to delete a secondary path to the iSCSI image:
UCS-A # scope org test
UCS-A /org # scope boot-policy sample
UCS-A /org/boot-policy # scope iscsi
UCS-A /org/boot-policy/iscsi # delete path secondary
UCS-A /org/boot-policy/iscsi* # commit-buffer
UCS-A /org/boot-policy/iscsi #
delete pending-deletion
To delete a virtual machine task that is pending deletion, use the delete pending-deletion command.
Syntax Description task-ID Task ID of the task pending deletion. The range is from 0 to 4294967294.
Usage Guidelines
Examples This example shows how to delete a pending task and commit the transaction:
server# scope system
server /system # scope vm-mgmt
server /system/vm-mgmt # scope vmware
server /system/vm-mgm/vmware # delete pending-deletion 120
server /system/vm-mgm/vmware* # commit-buffer
server /system/vm-mgm/vmware
enter pending-deletion
scope pending-deletion
show pending-deletion
delete physical-qual
To delete a physical qualifier for a server pool policy, use the delete physical-qual command.
delete physical-qual
Usage Guidelines Use this command to delete a physical qualifier for a server pool policy.
delete pin-group
To delete the pin group, use the delete pin-group command.
switch-A /eth-uplink #
delete policy
To delete a policy, use the delete policy command.
callhome mode
delete policy {equipment-degraded| equipment-inoperable| fru-problem| identity-unestablishable|
thermal-problem| voltage-problem}
switch-A /eth-uplink/flow-control #
delete pooled-ip-params
To delete a configured pool of initiator IP parameters, use the delete pooled-ip-params command.
delete pooled-ip-params
Command Modes IPv4 interface within the iSCSI VNIC mode (/org/service-profile/vnic-iscsi/eth-if/ip-if)
Usage Guidelines You must create a pool of initiator IP parameters before you use this command.
enter pooled-ip-params
scope pooled-ip-params
show pooled-ip-params
delete pooling-policy
To delete a pooling policy, use the delete pooling-policy command.
switch-A /org/pooling-policy #
delete port-channel
To delete a port channel, use the delete port-channel command.
Syntax Description port-channel-id Port channel identification number. It is the ID specified while creating
the port channel.
1.4(1) This command was introduced in the Fabric mode within Fibre Channel mode
(/fc-uplink/fabric) and Ethernet storage mode (/eth-storage/fabric).
delete power-control-policy
To delete a power policy, use the delete power-control-policy command.
Usage Guidelines A power control policy must be created to use this command.
delete power-group
To delete a power group, use the delete power-group command.
delete processor
To delete a processor qualifier for a server pool policy, use the delete processor command.
delete processor
Usage Guidelines Use this command to delete a processor qualifier for a server pool policy.
Note In later releases, this command is replaced by the delete cpu command.
delete profile
To delete a Cisco Call Home profile, use the delete profile command.
Syntax Description profile-name Cisco Call Home profile name. The name is case sensitive, and can be a
maximum of 16 characters.
Usage Guidelines
Examples This example shows how to delete a Cisco Call Home profile, named myCHprofile, and commit the transaction:
server# scope monitoring
server /monitoring # scope callhome
server /monitoring/callhome # delete profile myCHprofile
server /monitoring/callhome* # commit-buffer
server /monitoring/callhome
enter profile
scope profile
show profile
delete qos-policy
To delete a QoS policy, use the delete qos-policy command in org mode.
switch-A /org #
delete rack
To delete a rack qualifier, use the delete rack command.
deleterackminimum-slot-idmaximum-slot-id
Syntax Description minimum-slot-id The minimum slot ID specified when you created the rack qualifier.
maximum-slot-id The maximum slot ID specified when you created the rack qualifier.
Usage Guidelines A server pool policy qualification and a rack qualifier within it must be created to use this command.
Examples This example shows how to delete a rack for a server pool policy qualification.
UCS-A # scope org test
UCS-A /org # scope server-qual sample_policy
UCS-A /org/server-qual # delete rack 1 25
UCS-A /org/server-qual* # commit-buffer
UCS-A /org/server-qual #
enter rack
scope rack
show rack
delete remote-user
To delete an authentication, authorization, and accounting (AAA) remote user, use the delete remote-user
command.
Syntax Description user-name Remote user name. The name is case sensitive, and can be a maximum of 16
characters.
Usage Guidelines
Examples This example shows how to delete an AAA remote user named RUser1 and commit the transaction:
server# scope security
server /security # delete remote-user RUser1
server /security* # commit-buffer
server /security
enter remote-user
scope remote-user
show remote-user
delete role
To delete a role, use the delete role command.
switch-A#scope security
switch-A /security/local-user #
delete san-image
To delete a SAN boot image, use the delete san-image command.
Usage Guidelines
Examples This example shows how to delete a secondary SAN boot image from the boot policy storage area, and commit
the transaction:
server# scope org
server /org # scope boot-policy default
server /org/boot-policy # scope storage
server /org/boot-policy/storage # delete san-image secondary
server /org/boot-policy/storage* # commit-buffer
server /org/boot-policy/storage
enter san-image
scope san-image
show san-image
delete scheduler
To delete a scheduler, use the delete scheduler command.
delete scrub-policy
To delete a scrub policy, use the delete scrub-policy command.
switch-A /org #
delete server
To delete a server, use the delete server command.
switch-A /org/server-pool #
show server
show server-pool
Syntax Description Host name or IP address The name of the server, or the IP address.
Examples This example shows how to delete a server using the server host name:
Switch-A # scope security
Switch-A /security # scope radius
Switch-A /security/radius # delete server Test
Switch-A /security/radius* # commit-buffer
Switch-A /security/radius #
show server
delete server-autoconfig-policy
To delete a server autoconfig policy, use the delete server-autoconfig-policy command.
Syntax Description policy-name Policy name. The name is case sensitive, and can be a maximum of 16
characters.
Usage Guidelines The server autoconfig policy applies only to the organization root.
Examples This example shows how to delete a server autoconfig policy and commit the transaction:
server# scope org
server /org # delete server-autoconfig-policy autopolicy1
server /org* # commit-buffer
server /org
enter server-autoconfig-policy
scope server-autoconfig-policy
show server-autoconfig-policy
delete server-disc-policy
To delete a server discovery policy, use the delete server-disc-policy command.
switch-A /org #
delete server-inherit-policy
To delete a blade server inherit policy, use the delete server-inherit-policy command.
Syntax Description policy-name Name of server inherit policy. The name is case sensitive, and can be a
maximum of 16 characters.
Usage Guidelines The blade server inherit policy applies only to the organization root.
Examples This example shows how to delete a server inherit policy named ServPolicy1, and commit the transaction:
server# scope org
server /org # delete server-inherit-policy ServPolicy1
server /org* # commit-buffer
server /org
enter server-inherit-policy
scope server-inherit-policy
show server-inherit-policy
delete server-pool
To delete a server pool, use the delete server-pool command.
switch-A /org #
delete server-qual
To delete a server qualifier, use the delete server-qual command.
switch-A /org/server-qual #
delete server-ref
To delete a server reference for an authentication server group, use the delete server-ref command.
Syntax Description name The name of the server. You can enter either the name or the IP address of the
server.
Usage Guidelines An authentication server group and a server reference must be configured to use this command.
Examples This example shows how to delete a server reference for an authentication server group within LDAP.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope auth-server-group Sample
Switch-A /security/ldap/auth-server-group # delete server-group Test
Switch-A /security/ldap/auth-server-group* # commit-buffer
Switch-A /security/ldap/auth-server-group #
delete service-profile
To delete a service profile name, use the delete service-profile command.
Syntax Description service-profile-name Service profile name. The name is case sensitive, and can be a maximum
of 32 characters.
Examples This example shows how to delete a service profile named ServiceTest, and commit the transaction:
server# scope org
server /org # delete service-profile ServiceTest
server /org* # commit-buffer
server /org
enter service-profile
scope service-profile
show service-profile
delete slot
To delete a chassis slot qualification, use the delete slot command.
Examples This example shows how to delete a chassis slot qualification and commit the transaction:
server# scope org
server /org # scope server-qual all-chassis
server /org/server-qual # scope chassis 1 40
server /org/server-qual/chassis # delete slot 1 4
server /org/server-qual/chassis* # commit-buffer
server /org/server-qual/chassis
enter slot
scope slot
show slot
delete snmp-trap
To delete a Simple Network Management Protocol (SNMP) trap host, use the delete snmp-trap command.
Syntax Description hostname SNMP trap hostname or IP address. The hostname is case sensitive, and can be
a maximum of 512 characters.
Usage Guidelines
Examples This example shows how to delete an SNMP trap host and commit the transaction:
server# scope monitoring
server /monitoring # delete snmp-trap 10.10.10.10
server /monitoring* # commit-buffer
server /monitoring
enter snmp-trap
scope snmp-trap
show snmp-trap
delete snmp-user
To delete a Simple Network Management Protocol (SNMP) user, use the delete snmp-user command.
Syntax Description name Name of SNMPv3 user. The name is case sensitive, and can be a maximum of 512
characters.
Usage Guidelines
Examples This example shows how to delete an SNMP user and commit the transaction:
server# scope monitoring
server /monitoring # delete snmp-user snmpuser1
server /monitoring* # commit-buffer
server /monitoring
enter snmp-user
scope snmp-user
show snmp-user
delete sol-config
To delete a Serial over LAN (SoL) configuration, use the delete sol-config command.
delete sol-config
Usage Guidelines
Examples This example shows how to delete a SoL configuration and commit the transaction:
server# scope org
server /org # scope service-profile CE-B440-M1-SP
server /org/service-profile # delete sol-config
server /org/service-profile* # commit-buffer
server /org/service-profile
enter sol-config
scope sol-config
show sol-config
delete sol-policy
To delete a Serial over LAN (SoL) policy, use the delete sol-config command.
Syntax Description policy-name SoL policy name. The name is case sensitive, and can be a maximum of 16
characters.
Usage Guidelines
Examples This example shows how to delete a SoL policy named Sol9600, and commit the transaction:
server# scope org
server /org # delete sol-policy Sol9600
server /org* # commit-buffer
server /org
enter sol-policy
scope sol-policy
show sol-policy
delete static-ip-params
To delete configured static initiator IP parameters, use the delete static-ip-params command.
delete static-ip-params
Usage Guidelines You must create a static initiator of IP parameters before you use this command.
Examples This example shows how to delete the static initiator of IP parameters:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if # delete static-ip-params
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if #
enter static-ip-params
scope static-ip-params
show static-ip-params
delete static-target-if
To delete a configured static target interface for an iSCSI VNIC, use the delete static-target-if command.
Syntax Description static target priority Static target priority that you had specified when you created the static
target interface.
Usage Guidelines You must create a static target interface for an iSCSI VNIC before you use this command.
Examples This example shows how to delete a configured static target interface for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # delete static-target-if 1
UCS-A /org/service-profile/vnic-iscsi/eth-if* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if #
enter static-target-if
scope static-target-if
show static-target-if
delete stats-threshold-policy
To delete a statistics threshold policy, use the delete stats-threshold-policy command.
Syntax Description policy-name Statistics threshold policy name. The name can be a maximum of 16
characters.
Usage Guidelines You cannot delete a statistics threshold policy for Ethernet server ports, uplink Ethernet ports, or uplink Fibre
Channel ports. You can only configure the existing default policy.
Examples This example shows how to delete a statistics threshold policy named stp10, and commit the transaction:
server# scope org
server /org # delete stats-threshold-policy stp10
server /org* # commit-buffer
server /org
enter stats-threshold-policy
scope stats-threshold-policy
show stats-threshold-policy
delete storage
To delete storage, use the delete storage command.
delete storage
switch-A /org/server-qual #
delete target
To delete a target, use the delete target command.
b Specifies switch B.
switch-A /fc-uplink/pin-group #
delete threshold-value
To delete a threshold value for a property, use the delete threshold-value command.
Examples The following example shows how to delete the threshold value for the bytes-rx-delta property in vnic-stats
class:
switch-A#scope org org100
switch-A /org # scope stats-threshold-policy stp100
delete trustpoint
To delete a trustpoint, use the delete trustpoint command.
switch /security #
delete user-sessions
To delete a user session, use the delete user-sessions command.
Usage Guidelines Use this command to delete both local and remote user sessions.
Examples This example shows how to delete a local user session and commit the transaction:
server# scope security
server /security # scope local-user Escalation
server /security/local-user # delete user-sessions pts_25_1_31264
server /security/local-user* # commit-buffer
server /security/local-user
enter user-sessions
scope user-sessions
show user-sessions
show user-sessions
Syntax Description user-name User name. The name is case sensitive, and can be a
maximum of 512 characters.
Usage Guidelines
Examples This example shows how to delete a local user session named pts_25_1_31264 for the user Steve, and commit
the transaction:
server# scope security
server /security # delete user-sessions local steve pts_25_1_31264
server /security* # commit-buffer
server /security
show user-sessions
Syntax Description user-name User name. The name is case sensitive, and can be a
maximum of 512 characters.
Usage Guidelines
Examples This example shows how to delete a remote user session and commit the transaction:
server# scope security
server /security # delete user-sessions remote admin3 tty_1_28064
server /security* # commit-buffer
server /security
delete uuid-suffix-pool
To delete a UUID suffix pool, use the delete uuid-suffix-pool command.
switch-A /org #
delete vcenter
To delete a VCenter, use the delete vcenter command in vmware mode.
delete vcon
To delete a vCon (virtual network interface connection), use the delete vcon command.
delete vcon {1 | 2}
delete vcon-policy
To delete a vCon policy (vNIC/vHBA placement profile), use the delete vcon-policy command.
delete vhba
To delete a virtual HBA, use the delete vhba command.
switch-A /org/service-profile #
delete vhba-templ
To delete a virtualized host bus adapter (vHBA) template, use the delete vhba-templ command.
Syntax Description template-name vHBA template name. The name is case sensitive, and
can be a maximum of 16 alphanumeric characters.
Usage Guidelines
Examples This example shows how to delete a vHBA template and commit the transaction:
server# scope org
server /org # delete vhba-templ VhbaTempFoo
server /org* # commit-buffer
server /org
enter vhba-templ
scope vhba-templ
show vhba-templ
delete virtual-media
To delete a virtual media boot for a boot policy or a service profile boot definition, use the delete virtual-media
command.
Usage Guidelines
Examples This example shows how to delete a read-only virtual media for the default boot policy, and commit the
transaction:
server# scope org
server /org # scope boot-policy default
server /org/boot-policy # delete virtual-media read-only
server /org/boot-policy* # commit-buffer
server /org/boot-policy
enter virtual-media
scope virtual-media
show virtual-media
delete vlan
To delete a VLAN, use the delete vlan command.
1.4(1) This command was introduced in the Fabric mode within Ethernet Storage
(/eth-storage/fabric).
delete vlan-group-permit
To delete a VLAN group permit, use the delete vlan-group-permit command.
Usage Guidelines A VLAN group permit must be created to use this command.
enter vlan-group-permit
show vlan-group-permit
delete vlan-permit
To delete a VLAN permit, use the delete vlan-permit command.
enter vlan-permit
show vlan-permit
delete vnic
To delete a virtual NIC, use the delete vnic command.
switch-A /org/service-profile #
delete vnic-iscsi
To delete an iSCSI VNIC of a service profile, use the delete vnic-iscsi command.
Usage Guidelines You must create an iSCSI VNIC for a service profile before you use this command.
Examples This example shows how to delete an iSCSI VNIC for a service profile:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # delete vnic-iscsi trial
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
scope vnic-iscsi
enter vnic-iscsi
show vnic-iscsi
delete vnic-templ
To delete a virtual NIC template, use the delete vnic-templ command.
switch-A /org/wwn-pool #
delete vsan
To delete a VSAN, use the delete vsan command.
switch-A /fc-uplink #
delete wwn-pool
To delete a WWN pool, use the delete wwn-pool command.
switch-A /org/wwn-pool #
diagnostic-interrupt
To use Non Maskable Interrupt (NMI) to generate a stack trace or a core dump of a system that is unresponsive,
use the diagnostic-interrupt command.
diagnostic-interrupt
Examples This example shows how to interrupt the diagnostics running on the server.
UCS-A # scope server 1/7
UCS-A /chassis/server # diagnostic-interrupt
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
dir
To list the contents of a directory, use the dir command in local management command mode.
dir [ path ]
Usage Guidelines Use this command to list the contents of a directory in local management command mode. If no path is
specified, the current working directory is listed.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
This command operates on either the workspace (FLASH) or volatile (RAM) file system. To specify the file
system, include the workspace: or volatile: keyword in the path. If the file system is not specified, the
current working file system is assumed.
You can use the ls command as an alias for this command.
Examples This example shows how to list the contents of a directory named temp in the volatile file system:
switch-A # connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
switch-A(local-mgmt)#
disable (distributed-virtual-switch)
To disable the DVS (Distributed Virtual Switch) administrative state, use the disable command, in
distributed-virtual-switch mode.
disable
Examples This example shows how to disable the DVS administrative state:
switch-A# scope system
switch-A /system # scope vm-mgmt
switch-A /system/vm-mgmt # scope vmware
switch-A /system/vm-mgmt/vmware # scope vcenter vc10
switch-A /system/vm-mgmt/vmware/vcenter # scope data-center dc10
switch-A /system/vm-mgmt/vmware/vcenter/data-center # scope folder f10
switch-A /system/vm-mgmt/vmware/vcenter/data-center/folder # scope distributed-virtual-switch
dvs10
switch-A /system/vm-mgmt/vmware/vcenter/data-center/folder/distributed-virtual-switch #
disable
switch-A /system/vm-mgmt/vmware/vcenter/data-center/folder* # commit-buffer
switch-A /system/vm-mgmt/vmware/vcenter/data-center/folder #
disable cdp
To disable Cisco Discovery Protocol (CDP), use the disable cdp command.
disable cdp
switch-A /org/nw-ctrl-policy #
disable cimxml
To disable CIM XML services, use the disable cimxml command.
disable cimxml
switch-A#scope system
switch-A /system/services #
disable core-export-target
To disable a core export target, use the disable core-export-target command.
disable core-export-target
disable http
To disable HTTP services, use the disable http command.
disable http
switch-A#scope system
switch-A /system/services #
disable http-redirect
To disable directing HTTP connections as HTTPS connections, use the disable http-redirect command.
disable http-redirect
Examples This example shows how to disable HTTP connections from being directions as HTTPS connections.
UCS-A # scope system
UCS-A /system # scope services
UCS-A /system/services # disable http-redirect
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
disable cimxml
disable http
disable https
disable telnet-server
disable xmlclconnpolicy
disable https
To disable HTTPS services, use the disable https command.
disable https
switch-A#scope system
switch-A /system/services #
disable locator-led
To deactivate a chassis or server locator LED, use the disable locator-led command.
disable locator-led
Usage Guidelines Use this command to deactivate a chassis or server locator LED.
To activate a chassis or server locator LED, use the enable locator-led command.
Examples This example shows how to deactivate the locator LED for server 4 in chassis 2:
switch-A# scope server 2/4
switch-A /chassis/server # disable locator-led
switch-A /chassis/server* # commit-buffer
switch-A /chassis/server #
disable (port-channel)
To disable a port channel, use the disable command.
disable
Command Modes Port channel within a fabric in the Ethernet storage mode (/eth-storage/fabric/port-channel)
Member port within a fabric in the Ethernet storage mode (/eth-storage/fabric/port-channel/member-port)
Member port within a port channel in the Ethernet uplink mode (/eth-uplink/fabric/port-channel/member-port)
Member port within a port channel in the Fibre Channel uplink mode
(/fc-uplink/fabric/port-channel/member-port)
Usage Guidelines Port channels must be available in the fabric to use this command.
Examples This example shows how to disable a port channel within fabric A within the Ethernet storage mode:
UCS-A # scope eth-storage
UCS-A /eth-storage # scope fabric a
UCS-A /eth-storage/fabric # scope port-channel 223
UCS-A /eth-storage/fabric/port-channel # disable
UCS-A /eth-storage/fabric/port-channel* # commit-buffer
UCS-A /eth-storage/fabric/port-channel #
show port-channel
disable snmp
To disable SNMP services, use the disable snmp command.
disable snmp
switch-A#scope monitoring
switch-A /monitoring #
disable syslog
To disable syslog services, use the disable syslog command.
Syntax Description console Disables the sending of syslog messages to the console.
Usage Guidelines Use this command to disable monitoring of system log (syslog) messages by the operating system, or to disable
the sending of syslog messages to the console, to a file, or to a remote syslog server.
Examples This example shows how to disable the sending of syslog messages to a syslog remote destination:
switch-A# scope monitoring
switch-A /monitoring # disable syslog remote-destination server-1
switch-A /monitoring* # commit-buffer
switch-A /monitoring #
disable telnet-server
To disable TELNET server services, use the disable telnet-server command.
disable telnet-server
switch-A#scope system
switch-A /system/services #
disassociate
To disassociate servers, use the disassociate command.
disassociate
switch-A /org/service-profile #
discard-buffer
To cancel pending configuration changes, use the discard-buffer command.
discard-buffer
Usage Guidelines Use this command to cancel and discard all uncommitted configuration changes. While any configuration
commands are pending, an asterisk (*) appears before the command prompt. When you enter the discard-buffer
command, the commands are discarded and the asterisk disappears.
download image
To download an image, use the download image command.
scp://user1@192.168.10.10/images/ucs-k9-bundle.1.0.0.988.gbin
switch-A /firmware #
download license
To download a license, use the download license command.
Syntax Description licfileuri The location of the license file. You can use either ftp, scp, sftp or tftp to download
the license file.
Usage Guidelines You must determine the location of the license file to use this command.
Examples This example shows how to download a license file using FTP.
Switch-A # scope license
Switch-A /license # download license ftp://www.sampleurl.com
password: *********
Switch-A /license #
enable (distributed-virtual-switch)
To enable the DVS (Distributed Virtual Switch) administrative state, use the enable command, in
distributed-virtual-switch mode.
enable
Examples This example shows how to enable the DVS administrative state:
switch-A# scope system
switch-A /system # scope vm-mgmt
switch-A /system/vm-mgmt # scope vmware
switch-A /system/vm-mgmt/vmware # scope vcenter vc10
switch-A /system/vm-mgmt/vmware/vcenter # scope data-center dc10
switch-A /system/vm-mgmt/vmware/vcenter/data-center # scope folder f10
switch-A /system/vm-mgmt/vmware/vcenter/data-center/folder # scope distributed-virtual-switch
dvs10
switch-A /system/vm-mgmt/vmware/vcenter/data-center/folder/distributed-virtual-switch #
enable
switch-A /system/vm-mgmt/vmware/vcenter/data-center/folder* # commit-buffer
switch-A /system/vm-mgmt/vmware/vcenter/data-center/folder #
enable cdp
To enable Cisco Discovery Protocol (CDP) for a network control policy, use the enable cdp command.
enable cdp
Usage Guidelines When you enable CDP, you can use it to obtain addresses of other devices in your network. You can also use
it to discover the platforms of those devices.
switch-A /org/nw-ctrl-policy #
enable cimxml
To CIM (Common Information Model) XML services, use the enable cimxml command.
enable cimxml
Usage Guidelines Cisco recommends that you enable only the communication services that are required to interface with other
network applications.
switch-A#scope system
switch-A /system/services #
enable cluster
To enable a standalone fabric interconnect for cluster operation, use the enable cluster command.
Syntax Description clusterip Specifies the IP address of the standalone fabric interconnect.
Usage Guidelines Use this command to enable a standalone fabric interconnect for cluster operation. After enabling cluster
operation, you can add a second fabric interconnect to the cluster.
Examples This example enables a standalone fabric interconnect for cluster operation:
switch-A# connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
enable core-export-target
To enable a core export target, use the enable core-export-target command.
enable core-export-target
switch-A /monitoring/sysdebug #
enable http
To enable HTTP services, use the enable http command.
enable http
Usage Guidelines Cisco recommends that you enable only the communication services that are required to interface with other
network applications.
switch-A#scope system
switch-A /system/services #
enable http-redirect
To redirect HTTP connections as HTTPS connections, use the enable http-redirect command.
enable http-redirect
Examples This example shows how to redirect HTTP connections as HTTPS connections.
UCS-A # scope system
UCS-A /system # scope services
UCS-A /system/services # enable http-redirect
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
enable http
enable https
enable telnet-server
enable xmlclconnpolicy
enable https
To enable HTTPS services, use the enable https command.
enable https
Usage Guidelines Cisco recommends that you enable only the communication services that are required to interface with other
network applications.
switch-A#scope system
switch-A /system/services #
enable locator-led
To activate a chassis or server locator LED, use the enable locator-led command.
enable locator-led
Usage Guidelines Use this command to activate a chassis or server locator LED.
To deactivate a chassis or server locator LED, use the disable locator-led command.
Examples This example shows how to activate the locator LED for server 4 in chassis 2:
switch-A# scope server 2/4
switch-A /chassis/server # enable locator-led
switch-A /chassis/server* # commit-buffer
switch-A /chassis/server #
enable (port-channel)
To enable a port channel, use the enable command.
enable
Command Modes Port channel within a fabric in the Ethernet storage mode (/eth-storage/fabric/port-channel)
Member port within a fabric in the Ethernet storage mode (/eth-storage/fabric/port-channel/member-port)
Member port within a port channel in the Ethernet uplink mode (/eth-uplink/fabric/port-channel/member-port)
Member port within a port channel in the Fibre Channel uplink mode
(/fc-uplink/fabric/port-channel/member-port)
Usage Guidelines Port channels must be available in the fabric to use this command.
Examples This example shows how to enable the port channel available for fabric A within the Ethernet storage mode:
UCS-A # scope eth-storage
UCS-A /eth-storage # scope fabric a
UCS-A /eth-storage/fabric # scope port-channel 223
UCS-A /eth-storage/fabric/port-channel # enable
UCS-A /eth-storage/fabric/port-channel* # commit-buffer
UCS-A /eth-storage/fabric/port-channel #
show port-channel
enable snmp
To enable SNMP services, use the enable snmp command.
enable snmp
Usage Guidelines Cisco recommends that you enable only the communication services that are required to interface with other
network applications.
switch-A#scope monitoring
switch-A /monitoring #
enable syslog
To enable syslog services, use the enable syslog command.
Syntax Description console Enables the sending of syslog messages to the console.
Usage Guidelines Use this command to enable monitoring of system log (syslog) messages by the operating system, or to enable
the sending of syslog messages to the console, to a file, or to a remote syslog server.
To send syslog messages to a file or a remote syslog server, you must configure additional parameters using
the set syslog file or the set syslog remote-destination command.
Examples This example shows how to enable and configure a syslog remote destination:
switch-A# scope monitoring
switch-A /monitoring # enable syslog remote-destination server-1
switch-A /monitoring* # set syslog remote-destination server-1 hostname ITEast1 level alerts
switch-A /monitoring* # commit-buffer
switch-A /monitoring #
Command Description
set syslog file
set syslog remote-destination
show syslog
enable telnet-server
To enable TELNET server services, use the enable telnet-server command.
enable telnet-server
Usage Guidelines Cisco recommends that you enable only the communication services that are required to interface with other
network applications.
switch-A#scope system
switch-A /system/services #
end
To return to the highest-level mode of the CLI, use the end command.
end
Examples This example shows how to return to the highest-level mode of the CLI from the service-profile mode.
Switch-A # scope org Test
Switch-A /org # scope service-profile Sample
Switch-A /org/service-profile # end
Switch-A #
enter adapter
To enter the adapter, use the enter adapter command.
enter adapter
Usage Guidelines Use this command to enter adapter capacity qualification. In this qualification, you can create and delete
capacity qualifications. Use the exit command to exit adapter.
If you are entering an adapter for the first time, once you have entered you will need to execute the
commit-buffer command.
switch-A /org/server-qual/adapter #
enter auth-domain
To create, if necessary, or to enter the authentication domain mode, use the enter auth-domain command.
Examples This example shows how to enter the authentication domain mode.
Switch-A # scope security
Switch-A /security # enter auth-domain Testing
Switch-A /security/auth-domain #
enter auth-profile
To enter the iSCSI authorization profile mode, use the enter auth-profile command.
Usage Guidelines An iSCSI authorization profile must be created to use this command. The profile name can include a maximum
of 16 characters.
Examples This example shows how to enter the iSCSI authorization profile mode in the organization command mode.
UCS-A # scope org test
UCS-A /org # enter auth-profile sample
UCS-A /org/auth-profile #
delete auth-profile
scope auth-profile
show auth-profile
enter auth-server-group
To create, if necessary, and to enter the authentication server group, use the enter auth-server-group command.
Syntax Description authentication server group The name of the authentication server group.
Examples This example shows how to enter the authentication server group for LDAP:
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # enter auth-server-group Default
Switch-A /security/ldap/auth-server-group #
enter auto-target-if
To enter the configured automatic target interface for an iSCSI VNIC, use the enter auto-target-if command.
enter auto-target-if
Usage Guidelines You must create an iSCSI VNIC, an Ethernet interface for the iSCSI VNIC, and an automatic target interface
before you use this command.
Examples This example shows how to enter the configured automatic target interface of the iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # enter auto-target-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/auto-target-if #
delete auto-target-if
show auto-target-if
enter backup
To enter the management plane backup operation, use the enter backup command.
Syntax Description URL Specify the URL for the backup file using one of the
following syntax:
• ftp:// hostname / path
• scp:// username @ hostname hostname / path
• sftp:// username @ hostname / path
• tftp:// hostname : port-num / path
disabled Specifies that the backup operation will not run until it
is enabled.
Usage Guidelines
delete backup
scope backup
show backup
enter bladeserver-disc-policy
To create, if necessary, and to enter the blade server discovery policy mode, use the enter
bladeserver-disc-policy command.
Syntax Description name The name of the compute blade server discovery policy.
Usage Guidelines A compute blade server discovery policy must be created to use this policy.
Examples This example shows how to enter the blade server discovery policy.
Switch-A # scope org
Switch-A /org # enter bladeserver-disc-policy Default
Switch-A /org/bladeserver-disc-policy #
enter block
To enter an UUID address block, a WWN initiator block, or a MAC address block, use the enter block
command.
Examples This example shows how to enter the MAC pool block:
server# scope org
server /org # scope mac-pool mp1
delete block
scope block
show block
show mac-pool
enter boot-definition
To enter a boot definition for the service profile, use the enter boot-definition command.
enter boot-definition
Usage Guidelines
Examples This example shows how to enter a boot definition for a service profile named CE-B440-M1-SP:
server# scope org
server /org # scope service-profile CE-B440-M1-SP
server /org/service-profile # enter boot-definition
server /org/service-profile/boot-definition #
delete boot-definition
scope boot-definition
show boot-definition
enter boot-policy
To enter a boot policy, use the enter boot-policy command.
Usage Guidelines
Examples This example shows how to enter a boot policy called utility:
server# scope org
server /org/ # enter boot-policy utility
server /org/boot-policy #
delete boot-policy
scope boot-policy
show boot-policy
enter boot-target
To enter the boot target, use the enter boot-target command.
Usage Guidelines Use this command to enter the boot target. You can assign the logical unit number (LUN) and world wide
name (WWN) to the primary or secondary boot target. Use the exit command to exit boot-target.
Examples The following example shows how to enter the secondary boot target:
server# scope org
server /org # scope wwn-pool default
server /org/wwn-pool # scope initiator 20:00:00:25:B5:00:00:00
server /org/wwn-pool/initiator # enter boot-target secondary
server /org/wwn-pool/initiator/boot-target #
enter cap-qual
To enter a capacity qualification for a specified adapter type, use the enter cap-qual command.
Usage Guidelines
Examples This example shows how to enter the FCoE capacity qualification:
server# scope org
server /org # scope server-qual all-chassis
server /org/server-qual # scope adapter
server /org/server-qual/adapter # enter cap-qual fcoe
server /org/server-qual/adapter/cap-qual #
delete cap-qual
scope cap-qual
show cap-qual
enter chassis
To enter a chassis, use the enter chassis command.
Syntax Description min-chassis-id Minimum chassis identification number. The range of valid values is 1 to
255.
Usage Guidelines Use this command to enter slot capacity qualification. In this qualification, you can create and delete capacity
qualifications. Use the exit command to exit the chassis.
If you are entering a chassis for the first time, once you have entered you will need to execute the
commit-buffer command.
switch-A /org/server-qual/chassis #
Usage Guidelines
Examples This example shows how to enter the chassis statistics class mode:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # enter class chassis-stats
server /eth-server/stats-threshold-policy/class #
Examples This example shows how to enter the CPU environment statistics class:
switch-A# scope org org100
switch-A /org # scope stats-threshold-policy stp100
switch-A /org/stats-threshold-policy # enter class cpu-env-stats
switch-A /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Examples This example shows how to enter the DIMM environment statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # enter class dimm-env-stats
server /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to enter the environment statistics class:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # enter class env-stats
server /eth-server/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to enter an Ethernet error statistics class for an Ethernet server:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # enter class ether-error-stats
server /eth-server/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to enter an Ethernet loss statistics class for an Ethernet server:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # enter class ether-loss-stats
server /eth-server/stats-threshold-policy/class #
Usage Guidelines Use this command to create, if necessary, and enter an Ethernet port error statistics class.
Examples This example shows how to create and enter an Ethernet port error statistics class that does not already exist:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # enter class ethernet-port-err-stats
switch-A /org/stats-threshold-policy/class * # commit-buffer
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use this command to create, if necessary, and enter an Ethernet port multicast statistics class.
Examples This example shows how to enter an Ethernet port multicast statistics class that already exists:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # enter class ethernet-port-multicast-stats
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use this command to create, if necessary, and enter an Ethernet port over-under-sized statistics class.
Examples This example shows how to create and enter an Ethernet port over-under-sized statistics class that does not
already exist:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # enter class ethernet-port-over-under-sized-stats
switch-A /org/stats-threshold-policy/class * # commit-buffer
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use this command to create, if necessary, and enter an Ethernet port statistics class.
Examples This example shows how to create and enter an Ethernet port statistics class that does not already exist:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # enter class ethernet-port-stats
switch-A /org/stats-threshold-policy/class * # commit-buffer
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use this command to create, if necessary, and enter an Ethernet port large packet statistics class.
Examples This example shows how to create and enter an Ethernet port large packet statistics class that does not already
exist:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # enter class ethernet-port-stats-by-size-large-packets
switch-A /org/stats-threshold-policy/class * # commit-buffer
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use this command to create, if necessary, and enter an Ethernet port small packet statistics class.
Examples This example shows how to create and enter an Ethernet port small packet statistics class that does not already
exist:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # enter class ethernet-port-stats-by-size-small-packets
switch-A /org/stats-threshold-policy/class * # commit-buffer
switch-A /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Examples This example shows how to enter the Ethernet pause statistics class:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # enter class ether-pause-stats
server /eth-server/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to enter an Ethernet recieve statistics class for the Ethernet server:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # enter class ether-rx-stats
server /eth-server/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to enter an Ethernet transmission statistics class for an Ethernet server:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # enter class ether-tx-stats
server /eth-server/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to enter a fan module statistics class in the Ethernet server:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # enter class fan-module-stats
server /eth-server/stats-threshold-policy/class #
show stats-threshold-policy
Usage Guidelines
Examples This example shows how to enter a fan statistics class for an Ethernet server:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # enter class fan-stats
server /eth-server/stats-threshold-policy/class #
show stats-threshold-policy
Command Modes Statistics threshold policy under Fibre Channel uplink (/fc-uplink/stats-threshold-policy)
Usage Guidelines
Examples This example shows how to enter a Fibre Channel error statistics class:
server# scope fc-uplink
server /fc-uplink # scope stats-threshold-policy default
server /fc-uplink/stats-threshold-policy # enter class fc-error-stats
server /fc-uplink/stats-threshold-policy/class #
show stats-threshold-policy
Usage Guidelines
Examples This example shows how to enter a Fibre Channel port statistics class:
server# scope org TestyOrg
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # enter class fc-port-stats
server /org/stats-threshold-policy/class #
show stats-threshold-policy
Command Modes Statistics threshold policy under Fibre Channel uplink (/fc-uplink/stats-threshold-policy)
Usage Guidelines
Examples This example shows how to enter a Fibre Channel statistics class:
server# scope fc-uplink
server /fc-uplink # scope stats-threshold-policy default
server /fc-uplink/stats-threshold-policy # enter class fc-stats
server /fc-uplink/stats-threshold-policy/class #
show stats-threshold-policy
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to enter the fabric extender environment statistics mode for a class.
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy sample
Switch-A /eth-server/stats-threshold-policy # enter class fex-env-stats
Switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to enter the Fabric extender power summary mode for a class.
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy sample
Switch-A /eth-server/stats-threshold-policy # enter class fex-power-summary
Switch-A /eth-server/stats-threshold-policy/class* # commit-buffer
Switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to enter the Fabric extender power supply unit statistics mode for a class.
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy sample
Switch-A /eth-server/stats-threshold-policy # enter class fex-psu-input-stats
Switch-A /eth-server/stats-threshold-policy/class* # commit-buffer
Switch-A /eth-server/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to enter the IO card statistics class:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # enter class io-card-stats
server /eth-server/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to enter a mother board power statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # enter class mb-power-stats
server /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to delete a temporary mother board statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # enter class mb-temp-stats
server /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to enter the memory array environment statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # enter class memory-array-env-stats
server /org/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy and a motherboard temperature statistics class must be created to use this command.
Examples This example shows how to enter the motherboard temperature statistics class mode.
UCS-A # scope org test
UCS-A /org # scope stats-threshold-policy sample
UCS-A /org/stats-threshold-policy # enter class motherboard-temp-stats
UCS-A /org/stats-threshold-policy/class #
scope motherboard-temp-stats
show motherboard-temp-stats
delete motherboard-temp-stats
Usage Guidelines
Examples This example shows how to enter the PCIe fatal completion error statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # enter class pcie-fatal-completion-error-stats
server /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to enter the PCIe fatal error statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # enter class pcie-fatal-error-stats
server /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to enter a PCIe fatal protocol error statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # enter class pcie-fatal-protocol-error-stats
server /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to enter the PCIe fatal receive error statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # enter class pcie-fatal-receiving-error-stats
server /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to enter a power supply input statistics class:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # enter class psu-input-stats
server /eth-server/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy must created to use this command.
Examples This example shows how to enter the rack unit fan statistics mode for a class.
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy Sample
Switch-A /eth-server/stats-threshold-policy # enter class rack-unit-fan-stats
Switch-A /eth-server/stats-threshold-policy/class* # commit-buffer
Switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to enter the rack unit power supply unit statistics mode for a class.
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy sample
Switch-A /eth-server/stats-threshold-policy # enter class rack-unit-psu-stats
Switch-A /eth-server/stats-threshold-policy/class* # commit-buffer
Switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to enter the system statistics class:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # enter system-stats
server /eth-server/stats-threshold-policy #
Usage Guidelines
Examples This example shows how to enter a virtual NIC statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # enter class vnic-stats
server /org/stats-threshold-policy/class #
enter client
To enter a specific client mode, use the enter client command in port-profile mode.
enter cluster
To enter a distributed virtual switch, use the enter cluster command.
Syntax Description name The name of the distributed virtual switch. It is the name you provided while creating
the switch.
Usage Guidelines A distributed virtual switch must be created to use this command.
scope cluster
show cluster
delete cluster
enter cpu
To enter a CPU qualifier for a server pool policy, use the enter cpu command.
enter cpu
Usage Guidelines
delete cpu
scope cpu
show server
enter data-center
To enter a data center, use the enter data command in vcenter mode.
enter default-auth
To create, if necessary, or to enter the default authentication mode, use the enter default-auth command.
enter default-auth
Examples This example shows how to enter the default authentication mode for an authentication domain.
Switch-A # scope security
Switch-A /security # scope auth-domain Testing
Switch-A /security/auth-domain # enter default-auth
Switch-A /security/auth-domain/default-auth #
enter default-behavior
To enter default-behavior mode, use the enter default-behavior command.
Usage Guidelines Use this command to create a default behavior, and enter organization default-behavior mode.
Examples This example shows how to enter vNIC default behavior mode:
switch-A# scope org org100
switch-A /org # scope service-profile sp100
switch-A /org/service-profile # enter default-behavior vnic
switch-A /org/service-profile/default-behavior* # commit-buffer
switch-A /org/service-profile/default-behavior #
enter destination
To enter an email address to which Call Home alerts should be sent, use the enter destination command.
Syntax Description email-addr E-mail address in email address format. The address can
be a maximum of 512 alphanumeric characters, and
cannot contain white spaces. Example,
personname@companyname.com.
Usage Guidelines
delete destination
scope destination
show destination
enter dest-interface
To create, if necessary, and to enter the destination interface of the Fibre Channel traffic monitoring session
or the Ethernet traffic monitoring session, use the enter dest-interface command.
Usage Guidelines The Fibre Channel traffic monitoring session or an Ethernet traffic monitoring session must be created to use
this command.
Examples This example shows how to enter the destination interface of the Fibre Channel traffic monitoring session
To enter the destination interface of an Ethernet traffic monitoring session, replace fc-traffic-mon with
eth-traffic-mon , and fc-mon-session with eth-mon-session .
Switch-A # scope fc-traffic-mon
Switch-A /fc-traffic-mon # scope fabric a
Switch-A /fc-traffic-mon/fabric # scope fc-mon-session Default
Switch-A /fc-traffic-mon/fabric/fc-mon-session # enter dest-interface 1 1
Switch-A /fc-traffic-mon/fabric/fc-mon-session/dest-interface* # commit-buffer
enter dhcp-ip-params
To enter the configured DHCP for initiator IP parameters, use the enter dhcp-ip-params command.
enter dhcp-ip-params
Usage Guidelines You must create a DHCP initiator for IP parameters before you use this command.
Examples This example shows how to enter the configured DHCP for initiator IP parameters:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if # enter dhcp-ip-params
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if/dhcp-ip-params #
scope dhcp-ip-params
delete dhcp-ip-params
enter distributed-virtual-switch
To enter a distributed virtual switch, use the enter distributed-virtual-switch command in folder mode.
enter dynamic-vnic-conn
To enter dynamic-vnic-conn mode, use the enter dynamic-vnic-conn command.
create dynamic-vnic-conn
switch-A /org/service-profile #
enter dynamic-vnic-conn-policy
To enter dynamic-vnic-conn-policy mode, use the enter dynamic-vnic-conn-policy command.
enter egress-policy
To enter an egress policy (for both vNICs and vHBAs) to be used by a QoS policy, use the enter egress-policy
command.
enter egress-policy
Usage Guidelines
Examples This example shows how to enter an egress policy for vNIC traffic:
server# scope org
server /org # scope qos-policy VnicPolicy34
server /org/qos-policy # enter egress-policy
server /org/qos-policy/egress-policy #
delete egress-policy
scope egress-policy
show egress-policy
enter eth-if
To enter an Ethernet interface, use the enter eth-if command.
Usage Guidelines
Examples This example shows how to enter an Ethernet interface in virtual NIC:
server# scope org
server /org # scope service-profile CE-B440-M1-SP
server /org/service-profile # scope vnic vnic-emulex-a
server /org/service-profile/vnic # enter eth-if vlan150
server /org/service-profile/vnic/eth-if #
delete eth-if
scope eth-if
show eth-if
show service-profile
show vnic
enter eth-if
Usage Guidelines You must create a service profile and an iSCSI VNIC for the service profile before you use this command.
Examples This example shows how to enter the Ethernet interface of the iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-isci testing
UCS-A /org/service-profile/vnic-iscsi # enter eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if #
create eth-if
scope eth-if
enter eth-mon-session
To enter an Ethernet traffic monitoring session, use the enter eth-mon-session command.
Syntax Description name The name of the Ethernet traffic monitoring session.
Usage Guidelines An Ethernet traffic monitoring session must be created to use this command.
Examples This example shows how to enter the Ethernet traffic monitoring session:
Switch-A # scope eth-traffic-mon
Switch-A /eth-traffic-mon # scope fabric a
Switch-A /eth-traffic-mon/fabric # enter eth-mon-session Default
Switch-A /eth-traffic-mon/fabric/eth-mon-session* # commit-buffer
Switch-A /eth-traffic-mon/fabric/eth-mon-session #
enter eth-policy
To enter eth-policy mode, use the enter eth-policy command.
Examples This example shows how to enter eth-policy mode using Ethernet policy ep100:
switch-A /org/eth-policy #
enter eth-target
To create, if necessary, and to enter the Ethernet target endpoint mode for a fabric, use the enter eth-target
command.
Syntax Description name Name of the Ethernet target endpoint of the fabric.
Usage Guidelines You must create an interface for a fabric, and an Ethernet target endpoint for that interface before you use
this command.
You must create a port channel for a fabric, and an Ethernet target endpoint for that port channel before you
use this command.
Examples This example shows how to enter the Ethernet target endpoint mode for a fabric interface:
Switch-A # scope eth-storage
Switch-A /eth-storage # scope fabric a
Switch-A /eth-storage/fabric # scope interface 2 33
Switch-A /eth-storage/fabric/interface # enter eth-target Testing
Switch-A /eth-storage/fabric/interface/eth-target #
enter ext-static-ip
To create, if necessary, and to enter the external static management IP address mode, use the enter ext-static-ip
command.
enter ext-static-ip
Examples This example shows how to enter the external static management IP address mode for the CIMC.
Switch-A # scope server 1/7
Switch-A /chassis/server # scope cimc
Switch-A /chassis/server/cimc # enter ext-static-ip
Switch-A /chassis/server/cimc/ext-static-ip #
enter fc-mon-session
To enter the Fibre Channel trafffic monitoring session, use the enter fc-mon-session command.
Syntax Description name The name of the Fibre Channel traffic monitoring session. The name can include a
maximum of 16 characters.
Usage Guidelines A Fibre Channel traffic monitoring session must be created to use this command.
Examples This example shows how to enter the Fibre Channel traffic monitoring session:
Switch-A # scope fc-traffic-mon
Switch-A /fc-traffic-mon # scope fabric a
Switch-A /fc-traffic-mon/fabric # enter fc-mon-session Default
Switch-A /fc-traffic-mon/fabric/fc-mon-session #
enter fc-policy
To enter fc-policy mode, use the enter fc-policy command.
enter folder
To enter a folder, use the enter folder command in vcenter mode.
enter fw-host-pack
To enter a host firmware package, use the enter fw-host-pack command.
Syntax Description host-pack-name Name of the server host firmware package image. The
name can be a maximum of 16 characters.
Usage Guidelines
delete fw-host-pack
scope fw-host-pack
show fw-host-pack
enter fw-mgmt-pack
To enter a management firmware package, use the enter fw-mgmt-pack command.
Syntax Description mgmt-pack-name Name of the management firmware package. The name can be a maximum
of 16 characters.
Usage Guidelines
delete fw-mgmt-pack
scope fw-mgmt-pack
show fw-mgmt-pack
enter import-config
To enter an import configuration, use the enter import-config command.
Syntax Description URL URL for the file being imported using one of the
following syntax:
• ftp://hostname/path
scp://username@hostname/path
sftp://username@hostname/path
tftp://hostname:port-num/path
disabled Specifies that the import operation will not run until it
is enabled.
replace Specifies that the system takes each object in the import
configuration file and overwrites the corresponding
object in the current configuration.
delete import-config
scope import-config
show import-config
enter initiator
To enter the organization WWN pool initiator mode, use the enter initiator command.
enter initiator ID
Examples This example shows how to enter an initiator named 20:00:00:25:B5:00:00:00 for the default WWN pool:
server# scope org
server /org # scope wwn-pool default
server /org/wwn-pool # enter initiator 20:00:00:25:B5:00:00:00
server /org/wwn-pool/initiator #
delete initiator
scope initiator
show initiator
enter interface
To enter an interface for the specified Ethernet server port, use the enter interface command.
Syntax Description slot-id Ethernet interface slot number. The range is from 1 to
5 for a fabric interconnect under Ethernet server and
under Ethernet uplink, 2 to 5 for a fabric interconnect
under Fibre Channel uplink.
Usage Guidelines
Examples This example shows how to enter an interface for Ethernet server port 14 on slot 3 of fabric B:
server# scope eth-server
server /eth-server # scope fabric b
server /eth-server/fabric # enter interface 1 2
server /eth-server/fabric/interface #
delete interface
scope interface
show interface
enter interface fc
To create, if necessary, and to enter the fibre channel interface of the fabric, use the enter interface fc command.
Syntax Description slot id The slot identification number. The range of valid values is 2 to 5.
port id The port identification number. The range of valid values is 1 to 40.
Usage Guidelines A fibre channel interface for a fabric must be created to use this command.
Examples This example shows how to enter the fibre channel interface for a fabric.
Switch-A # scope fc-storage
Switch-A /fc-storage # scope fabric a
Switch-A /fc-storage/fabric # enter interface fc 2 33
Switch-A /fc-storage/fabric/fc #
Usage Guidelines A Fibre Channel over Ethernet interface for a fabric must be created to use this command.
Examples This example shows how to enter the Fibre Channel over Ethernet interface for a fabric.
Switch-A # scope fc-storage
Switch-A /fc-storage # scope fabric a
Switch-A /fc-storage/fabric # enter interface fcoe 2 33
Switch-A /fc-storage/fabric/fcoe #
enter ip-if
To enter the IPv4 interface of an iSCSI VNIC, use the enter ip-if command.
enter ip-if
Command Modes Ethernet interface within the iSCSI VNIC mode (/org/service-profile/vnic-iscsi/eth-if)
Usage Guidelines You must create an IPv4 interface for an iSCSI VNIC before you use this command.
Examples This example shows how to enter the IPv4 interface of the iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi example
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # enter ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if #
create pooled-ip-params
create static-ip-params
create ip-if
scope ip-if
delete ip-if
enter ipmi-access-profile
To enter an Intelligent Platform Management Interface (IPIMI) access profile, use the enter ipmi-access-profile
command.
Syntax Description profile-name IPMI access profile name. The name is case sensitive,
and can be a maximum of 16 characters.
Examples This example shows how to enter an IPMI access profile named ipmiProf1:
server# scope org
server /org # enter ipmi-access-profile ipmiProf1
server /org/ipmi-access-profile #
delete ipmi-access-profile
scope ipmi-access-profile
show ipmi-access-profile
enter ipmi-user
To enter an end-point user for IPMI access, use the enter ipmi-user command.
Syntax Description name End-point IPMI user name. The name is case insensitive,
and can be a maximum of 16 alphanumeric characters.
The name can also contain a hyphen (-) or underscore
(_) character, but cannot contain white spaces.
delete ipmi-user
scope ipmi-user
show ipmi-user
set descr
Command Description
set password
set privilege
enter iqn-pool
To enter the IQN Pool command mode, use the enter iqn-pool command.
Examples This example shows how to enter the IQN pool command mode.
UCS-A # scope org
UCS-A /org # enter iqn-pool Sample1
UCS-A /org/iqn-pool #
scope iqn-pool
show iqn-pool
delete iqn-pool
set iqn-prefix
set descr
create block
enter iscsi-policy
To enter, and create if necessary, an iSCSI adapter policy, use the enter iscsi-policy command.
Syntax Description name Name of the iSCSI adapter policy. Provide the name that you had specified when
you created this policy.
Usage Guidelines You must create an iSCSI adapter policy before you use this command.
Examples This example shows how to enter the iSCSI adapter policy in the organization mode:
UCS-A # scope org test
UCS-A /org # enter iscsi-policy sample
UCS-A /org/iscsi-policy #
scope iscsi-policy
show iscsi-policy
delete iscsi-policy
enter iscsi
To enter and create a boot iSCSI mode for an organization, use the enter iscsi command.
enter iscsi
Usage Guidelines You must create a boot iSCSI policy before you use this command.
Examples This example shows how to enter the boot iSCSI mode for a service profile:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope boot-definition
UCS-A /org/service-profile/boot-definition # enter iscsi
UCS-A /org/service-profile/boot-definition/iscsi #
delete iscsi
scope iscsi
show iscsi
enter keyring
To enter an RSA keyring, use the enter keyring command.
Usage Guidelines
delete keyring
scope keyring
show keyring
enter lan
To enter a LAN boot configuration, use the enter lan command.
enter lan
Examples This example shows how to enter a LAN boot configuration for a boot policy:
server# scope org
server /org # scope boot-policy bp6
server /org/boot-policy # enter lan
server /org/boot-policy/lan #
delete lan
scope lan
show lan
enter ldap-group
To create, if necessary, and to enter the LDAP group mode, use the enter ldap-group command.
enter ldap-group-rule
To create, if necessary, and to enter the LDAP group-rule mode, use the enter ldap-group-rule command.
enter ldap-group-rule
Usage Guidelines To use this command in the server mode, an LDAP server must be created.
Examples This example shows how to enter the LDAP group rule mode for an LDAP server.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope server Sample
Switch-A /security/ldap/server # enter ldap-group-rule
Switch-A /security/ldap/server/ldap-group-rule #
enter local
To enter a local storage, use the enter local command.
enter local
Examples This example shows how to enter a local storage configuration for a boot policy:
server# scope org
server /org # scope boot-policy bp6
server /org/boot-policy # scope storage
server /org/boot-policy/storage # enter local
server /org/boot-policy/storage #
delete local
scope local
show local
enter local-disk-config
To enter a local disk configuration for a service profile, use the enter local-disk-config command.
enter local-disk-config
Examples This example shows how to enter a local disk configuration for a service profile:
server# scope org
server /org # scope service-profile CE-B440-M1-SP
server /org/service-profile # enter local-disk-config
server /org/service-profile/local-disk-config #
delete local-disk-config
scope local-disk-config
show local-disk-config
enter local-disk-config-policy
To enter a local disk configuration policy, use the enter local-disk-config-policy command.
Syntax Description policy-name Policy name. The name is case sensitive, and can be a
maximum of 16 characters.
Examples This example shows how to enter a local disk configuration policy named ldcp1:
server# scope org
server /org # enter local-disk-config-policy ldcp1
server /org/local-disk-config-policy #
delete local-disk-config-policy
scope local-disk-config-policy
show local-disk-config-policy
enter locale
To enter a locale, use the enter locale command.
Syntax Description locale-name Locale name. The name is case sensitive, and can be a
maximum of 16 characters.
delete locale
scope locale
show locale
enter local-user
To enter an user account for a specified local user, use the enter local-user command.
Syntax Description user-name User name. The name is case sensitive, and can be a
maximum of 16 characters.
Examples This example shows how to enter a local user named Escalation:
server# scope security
server /security # enter local-user Escalation
server /security/local-user #
delete local-user
scope local-user
show local-user
enter lun
To enter a target LUN for a static target interface of the iSCSI VNIC, use the enter lun command.
enter lun
Usage Guidelines You must create a static target interface priority for an iSCSI VNIC before you use this command.
Examples This example shows how to enter a target LUN for the static target interface priority for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-target
UCS-A /org/service-profile/vnic-iscsi/eth-target # scope static-target-if 1
UCS-A /org/service-profile/vnic/iscsi/eth-target/static-target-if # enter lun
UCS-A /org/service-profile/vnic/iscsi/eth-target/static-target-if/lun #
set ipaddress
set name
set port
create lun
scope lun
show lun
delete lun
enter mac-pool
To enter a MAC pool, use the enter mac-pool command.
Syntax Description name MAC pool name. The name is case sensitive, and can
be a maximum of 32 characters.
Examples This example shows how to enter a MAC pool named mpool37:
server# scope org
server /org # enter mac-pool mpool37
server /org/mac-pool #
delete mac-pool
scope mac-pool
show mac-pool
enter mac-security
To enter a MAC security, use the enter mac-security command.
enter mac-security
Examples This example shows how to enter a MAC security mode for a network control policy:
server# scope org
server /org # scope nw-ctrl-policy ncp5
server /org/nw-ctrl-policy # enter mac-security
server /org/nw-ctrl-policy/mac-security #
delete mac-security
scope mac-security
show mac-security
enter maint-policy
To create, if necessary, and to enter the maintenance policy mode, use the enter maint-policy command.
enter member-port
To enter a member port, use the enter member-port command.
port-id Port number. The range is from 1 to 256 for VSAN under
Fibre Channel uplink and VSAN under fabric
interconnect.
Examples This example shows how to enter a member port on slot 1, port 2 for the VLAN:
server# scope eth-storage
server /eth-storage # scope vlan sample
server /eth-storage/vlan # enter member-port a 1 2
server /eth-storage/vlan/member-port #
Examples This example shows how to enter a member port on slot 1, port 2 for the VSAN named 300 under the fabric
named a:
server# scope fc-uplink
server /fc-uplink # scope fabric a
server /fc-uplink/fabric # scope vsan 300
server /fc-uplink/fabric/vsan # enter member-port a 1 2
server /fc-uplink/fabric/vsan/member-port #
create member-port
delete member-port
scope member-port
show member-port
enter member-port fc
To enter the Fibre Channel member port mode, use the enter member-port fc command.
b Specifies fabric B.
Command Modes VSAN within the Fibre Channel storage mode (/fc-storage/vsan)
VSAN within a fabric in the Fibre Channel storage mode (/fc-storage/fabric/vsan)
Usage Guidelines You must create Fibre Channel member ports before you use this command.
Examples This example shows how to enter a Fibre Channel member port in the Fibre Channel storage mode:
UCS-A # scope fc-storage
UCS-A /fc-storage # scope vsan sample
UCS-A /fc-storage/vsan # enter member-port fc a 1 22
UCS-A /fc-storage/vsan/member-port #
scope member-port fc
show member-port fc
delete member-port fc
b Specifies fabric B.
Command Modes VSAN within the Fibre Channel storage command mode (/fc-storage/vsan)
VSAN within a fabric in the Fibre Channel storage command mode (/fc-storage/fabric/vsan)
Usage Guidelines You must create Fibre Channel over Ethernet member ports before you use this command.
Examples This example shows how to enter the Fibre Channel over Ethernet member port command mode:
UCS-A # scope fc-storage
UCS-A /fc-storage # scope vsan sample
UCS-A /fc-storage/vsan # enter member-port fcoe a 1 223
UCS-A /fc-storage/vsan/member-port #
Command Description
delete member-port fcoe
Syntax Description fc Use this option to enter the member-port mode for a Fibre Channel.
fcoe Use this option to enter the member-port mode for a Fibre Channel over Ethernet
interface.
a Specifies fabric A.
b Specifies fabric B.
slot \-id Specifies the slot ID. The value must be an integer between 1 and 5.
port-id Specifies port ID. The value must be an integer between 1 and 256.
Usage Guidelines The VSAN and a member-port for the VSAN must be created to use this command.
Examples This example shows how to enter the member port mode for a fibre channel within the VSAN of a fibre
channel storage device.
Switch-A # scope fc-storage
Switch-A /fc-storage # scope vsan v300
Switch-A /fc-storage/vsan # enter member-port fc a 1 233
Switch-A /fc-storage/vsan/member-port #
Command Description
enter member-port (/port-channel)
show member-port
Syntax Description slot ID Slot identification number. The value must be an integer between 1 and 5.
port ID Port identification number. The value must be an integer between 1 and 40.
Command Modes Port channel within a fabric under Ethernet uplink (eth-uplink/fabric/port-channel)
Port channel within a fabric in the Ethernet storage mode (/eth-storage/fabric/port-channel)
Port channel within a fabric under Fibre Channel uplink (fc-uplink/fabric/port-channel)
Usage Guidelines You must create member ports within a port channel before you use this command.
Examples This example shows how to enter the member port for a port channel in the Fibre Channel uplink command
mode:
UCS-A # scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # scope port-channel 2
UCS-A /fc-uplink/fabric/port-channel # enter member-port 1 22
UCS-A /fc-uplink/fabric/port-channel/member-port #
show member-port
enter member-port-channel
To create, if necessary, and to enter the member port channel mode, use the enter member-port-channel
command.
b Specifies port B.
2.0(1) This command was introduced in Ethernet uplink mode (/eth-uplink/vlan and
/eth-uplink/fabric/vlan).
Usage Guidelines You must create a VSAN or a VLAN and a member port channel before you use this command.
Examples This example shows how to enter the member port channel mode for a VSAN in a fabric:
Switch-A # scope fc-uplink
Switch-A /fc-uplink # scope fabric a
Switch-A /fc-uplink/fabric # scope vsan default
Switch-A /fc-uplink/fabric/vsan # enter member-port-channel a 22
Switch-A /fc-uplink/fabric/vsan/member-port-channel #
enter memory
To enter memory, use the enter memory command.
enter memory
Usage Guidelines Use this command to enter memory and set memory property values. Use the exit command to exit memory.
If you are entering memory for the first time, once you have entered you will need to execute the commit-buffer
command.
switch-A /org/server-qual/memory #
enter mon-src
To create, if necessary, and to enter the monitor source session, use the enter mon-src command.
Syntax Description session name The name of the monitor source session.
Examples This example shows how to enter the monitor source session for a VNIC within a service profile.
Switch-A # scope org
Switch-A /org # scope service-profile sample
enter network
To enter an Ethernet interface for a virtual machine NIC port profile, use the enter network command.
Syntax Description port-profile-name Port profile name. The name is case sensitive, and can be a maximum of
32 characters.
Examples This example shows how to enter an Ethernet interface for a virtual machine port profile:
server# scope system
server /system # scope vm-mgmt
server /system/vm-mgmt # scope vmware
server /system/vm-mgmt/vmware # scope profile-set
server /system/vm-mgmt/vmware/profile-set # scope port-profile mprofile1
server /system/vm-mgmt/vmware/profile-set/port-profile # enter network
server /system/vm-mgmt/vmware/profile-set/port-profile
delete network
scope network
show network
enter nw-ctrl-policy
To enter a network control policy, use the enter nw-ctrl-policy command.
1.4(1) This command was introduced in the Ethernet storage command mode.
Usage Guidelines You must create a network control policy before you use this command.
When you enter a network control policy, you can perform the following tasks:
• Enable CDP
• Set up an uplink fail action
create nw-ctrl-policy
scope nw-ctrl-policy
delete nw-ctrl-policy
Syntax Description name The name of the one-time occurrence instance for a schedule.
Usage Guidelines A schedule and a one-time occurrence instance must be created to use this command.
Examples This example shows how to enter the one-time occurrence instance for a schedule.
Switch-A # scope system
Switch-A /system # scope schedule Sample
Switch-A /system/schedule # enter occurrence one-time Trial
Switch-A /system/schedule/one-time #
Syntax Description name The name of the recurring occurrence instance for the schedule.
Usage Guidelines A schedule policy and a recurring occurrence instance for the schedule must be created to use this command.
Examples This example shows how to enter the recurring occurrence instance for a schedule.
Switch-A # scope system
Switch-A /system # scope schedule Sample
Switch-A /system/schedule # enter occurrence recurring Trial
Switch-A /system/schedule/recurring #
enter org
To enter an organization, use the enter org command.
Syntax Description org-name Organization name. The name is case sensitive, and can be a maximum of 120
characters.
delete org
scope org
show org
enter pack-image
To enter a firmware package image, use the enter pack-image command.
Syntax Description hw-vendor-name Hardware vendor name. The name is case sensitive, and can be a
maximum of 512 characters.
hw-model Hardware model. The name is case sensitive, and can be a maximum
of 512 characters.
version-num Version number of the firmware being used for the package image.
Usage Guidelines The hw-vendor-name and hw-model values are labels that help you easily identify the package image. You
can view the hardware vendor and model by using the show image detail command.
The firmware version must match the model numbers (PID) on the servers that are associated with this firmware
pack.
Examples This example shows how to enter a RAID controller firmware package:
server# scope org
server /org # scope fw-host-pack fhp1
server /org/fw-host-pack # enter pack-image Cisco UCS raid-controller 2009.02.09
server /org/fw-host-pack/pack-image #
delete pack-image
scope pack-image
show pack-image
enter path
To enter a primary or secondary SAN or LAN boot image path, use the enter path command.
Examples The following example shows how to enter a secondary SAN image path for a boot policy:
server# scope org
server /org # scope boot-policy boot-policy-LAN
server /org/boot-policy # scope storage
server /org/boot-policy/storage # scope san-image primary
server /org/boot-policy/storage/san-image # enter path secondary
server /org/boot-policy/storage/san-image/path #
delete path
set lun
set wwn
show path
Usage Guidelines You must create an iSCSI path for the service profile before you use this command in the boot definition
command mode.
You must create an iSCSI path for the boot policy before you use this command in the boot policy command
mode.
Examples This example shows how to enter the iSCSI path for a boot policy:
UCS-A # scope org test
UCS-A /org # scope boot-policy trial
UCS-A /org/boot-policy # scope iscsi
UCS-A /org/boot-policy/iscsi # enter path primary
UCS-A /org/boot-policy/iscsi/path #
set iscsivnicname
enter pin-group
To enter an Ethernet (LAN) or Fibre Channel pin group, use the enter pin-group command.
Syntax Description pin-group-name Pin group name. The name is case sensitive, and can be a maximum of
16 characters.
Examples The following example shows how to enter an Ethernet pin group named pingroup54:
server# scope eth-uplink
server /eth-uplink # enter pin-group pingroup54
server /eth-uplink/pin-group #
delete pin-group
scope pin-group
show pin-group
enter policy
To create, if necessary, and enter a policy, use the enter policy command.
callhome mode
enter policy event
flow-control mode
enter policy name
Syntax Description event Select a predefined fault or system event type. See Usage Guidelines for event
options.
1.1(1) This command was modified to add additional event types for Call Home.
Usage Guidelines Use this command to enter a policy in either organization callhome or organization flow control mode. If the
policy does not exist, it will first be created.
In Call Home configuration, use this command to enter an instance of a policy for a predefined type of fault
or system event. The following list shows the available keywords for Call Home event types:
• association-failed
• chassis-seeprom-error
• configuration-failure
• connectivity-problem
• election-failure
• equipment-inaccessible
• equipment-inoperable
• equipment-problem
• fru-problem
• identity-unestablishable
• link-down
• management-services-failure
• management-services-unresponsive
• power-problem
• thermal-problem
• unspecified
• version-incompatible
• voltage-problem
Examples This example shows how to enter and enable a Call Home policy instance for link-down events:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # enter policy link-down
switch-A /monitoring/callhome/policy # set admin-state enabled
switch-A /monitoring/callhome/policy* # commit-buffer
switch-A /monitoring/callhome/policy #
This example shows how to enter a named policy for flow control:
switch-A # scope eth-uplink
switch-A /eth-uplink # scope flow-control
switch-A /eth-uplink/flow-control # enter policy policy1
switch-A /eth-uplink/flow-control #
enter pooled-ip-params
To enter the configured pool of initiator IP parameters, use the enter pooled-ip-params command.
enter pooled-ip-params
Command Modes IPv4 interface within the iSCSI VNIC mode (/org/service-profile/vnic-iscsi/eth-if/ip-if)
Usage Guidelines You must configure a pool of initiator IP parameters before you use this command.
Examples This example shows how to enter the configured pool of initiator IP parameters:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if # enter pooled-ip-params
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if/pooled-ip-params #
scope pooled-ip-params
show pooled-ip-params
delete pooled-ip-params
create ip-if
enter pooling-policy
To enter a server pooling policy, use the enter pooling-policy command.
Syntax Description policy-name Policy name. The name is case sensitive, and can be a maximum of 16
characters.
Examples The following example shows how to enter a server pooling policy named ServPoolPolicy1:
server# scope org
server /org # enter pooling-policy ServPoolPolicy1
server /org/pooling-policy #
delete pooling-policy
scope pooling-policy
show pooling-policy
enter port-channel
To enter a port channel, use the enter port-channel command.
Syntax Description port-channel-ID Port channel number. The range is from 1 to 256.
Command Modes Fabric interconnect mode within the Ethernet Uplink mode (/eth-uplink/fabric)
Fabric interconnect mode within the Ethernet storage mode (/eth-storage/fabric)
Fabric interconnect mode within the Fibre Channel Uplink mode (/fc-uplink/fabric)
1.4(1) This command was introduced in the Fabric interconnect mode within the Fibre
Channel Uplink mode (/fc-uplink/fabric) and the Ethernet storage mode
(/eth-storage/fabric).
Examples This example shows how to enter port channel 20 in the fabric named a:
UCS-A # scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # enter port-channel 20
UCS-A /eth-uplink/fabric/port-channel #
delete port-channel
scope port-channel
show port-channel
enter power-control-policy
To create, if necessary, and to enter the power policy mode, use the enter power-control-policy command.
Usage Guidelines A power control policy must be created to use this command.
Examples This example shows how to enter the power control policy mode.
Switch-A # scope org
Switch-A /org # enter power-control-policy Sample
Switch-A /org/power-control-policy #
enter power-group
To create, if necessary, and to enter the power group mode, use the enter power-group command.
Examples This example shows how to enter the power group mode.
Switch-A # scope power-cap-mgmt
Switch-A /power-cap-mgmt # enter power-group Sample
Switch-A /power-cap-mgmt/power-group #
enter processor
To enter the processor, use the enter processor command.
enter processor
Usage Guidelines Use this command to enter the processor and set processor property values. Use the exit command to exit the
processor.
If you are entering memory for the first time, once you have entered you will need to execute the commit-buffer
command.
switch-A /org/server-qual/processor #
enter qos-policy
To enter qos-policy mode, use the enter qos-policy command.
enter rack
To enter the rack qualifier, use the enter rack command.
Syntax Description minimum-slot-id Minimum slot ID of the rack qualifier. It is the same ID you specified when
you created the rack qualifier.
maximum-slot-id Maximum slot ID of the rack qualifier. It is the same ID you specified when
you created the rack qualifier.
Usage Guidelines A server pool policy qualification and a rack qualifier must be created to use this command.
scope rack
show rack
delete rack
enter scheduler
To create, if necessary, and to enter the scheduler mode, use the enter scheduler command.
enter server
To enter the RADIUS server, use the enter server command.
Usage Guidelines The RADIUS server must be created to use this command.
Examples The following example shows how to enter the RADIUS server mode.
Switch-A # scope security
Switch-A /security # scope radius
Switch-A /security/radius # enter server example
Switch-A /security/radius/server #
enter server-ref
To create, if necessary, and to enter the server reference mode, use the enter server-ref command.
Syntax Description name The name of the server. You can enter either the name of the server or the IP address.
Usage Guidelines An authentication server group must be created, and a server reference must be added to the authentication
server group to use this command.
Examples This example shows how to enter the server reference mode for an authentication server group within LDAP.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope auth-server-group Default
Switch-A /security/ldap/auth-server-group # enter server-ref sample_server
Switch-A /security/ldap/auth-server-group/server-ref #
enter static-ip-params
To enter the static initiator of IP parameters, use the enter static-ip-params command.
enter static-ip-params
Usage Guidelines You must create a static initiator of IP parameters before you use this command.
Examples This example shows how to enter the static initiator of IP parameters:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if # enter static-ip-params
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if/static-ip-params #
set default-gw
set primary-dns
set secondary-dns
set subnet
create static-ip-params
scope static-ip-params
show static-ip-params
Command Description
delete static-ip-params
enter static-target-if
To enter the configured static target interface for an iSCSI VNIC, use the enter static-target-if command.
Syntax Description static target priority Static target priority that you had specified when you created the static
target interface.
Usage Guidelines You must configure a static target interface for an iSCSI VNIC before you use this command.
Examples This example shows how to enter the static target interface mode for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # enter static-target-if 1
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if #
scope static-target-if
show static-target-if
delete static-target-if
enter storage
To enter storage, use the enter storage command.
enter storage
Usage Guidelines Use this command to enter storage and set storage property values. Use the exit command to exit storage.
If you are entering storage for the first time, once you have entered you will need to execute the commit-buffer
command.
switch-A /org/server-qual/storage #
enter threshold-value
To enter a threshold value for a property, use the enter threshold-value command.
enter threshold-value {above-normal | below-normal} {cleared | condition | critical | info | major | minor
| warning}
Examples The following example shows how to enter the threshold value above-normal critical in property packets-rx-delta
mode:
switch-A#scope org org100
switch-A /org # scope stats-threshold-policy stp100
enter vcenter
To enter a VCenter, use the enter vcenter command in vmware mode.
enter vcon
To enter a vCon (virtual network interface connection), use the enter vcon command.
enter vcon {1 | 2}
enter vcon-policy
To enter vcon-policy mode, use the enter vcon-policy command.
enter vlan
To create a VLAN, if necessary, and enter VLAN configuration mode, use the enter vlan command.
Syntax Description name VLAN name. The name can contain up to 32 characters.
id VLAN identification number. The range of valid values is 1 to 3967 and 4049 to
4093.
1.4(1) This command was introduced for a Fabric within the Ethernet Storage mode
(/eth-storage/fabric). In addition, the following changes were introduced:
• Maximum number of characters for the VLAN name has been extended from 16
to 32.
• The range of valid values was modified from 4048 - 4093 to 4049 - 4093.
Usage Guidelines Use this command to enter configuration mode for a VLAN with the specified name and identifier number.
If the VLAN does not exist, it will be created.
show interface
show vlan
Syntax Description name VLAN name. The name can contain up to 32 characters.
1.4(1) The maximum number of characters for the VLAN name has been modified
from 16 to 32.
Usage Guidelines Use this command to enter configuration mode for a VLAN with the specified name and identifier number.
If the VLAN does not exist, it will be created.
Examples This example shows how to enter a VLAN for a port profile:
switch-A# scope system
switch-A /system # scope vm-mgmt
switch-A /system/vm-mgmt # scope vmware
switch-A /system/vm-mgmt/vmware # scope profile-set
switch-A /system/vm-mgmt/vmware/profile-set # scope port-profile pp100
switch-A /system/vm-mgmt/vmware/profile-set/port-profile # enter vlan v100
switch-A /system/vm-mgmt/vmware/profile-set/port-profile/vlan* # commit-buffer
switch-A /system/vm-mgmt/vmware/profile-set/port-profile/vlan #
show port-profile
enter vnic-iscsi
To enter the iSCSI virtual network interface card mode for a service profile, use the enter vnic-iscsi command.
Syntax Description name Name of the iSCSI VNIC. It is the name that you provided when you created the
iSCSI VNIC.
Usage Guidelines You must create a service profile and an iSCSI VNIC for the service profile before you use this command.
Examples This example shows how to enter the iSCSI VNIC mode for a service profile:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # enter vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi #
scope vnic-iscsi
show vnic-iscsi
delete vnic-iscsi
enter vsan
To create a VSAN, if necessary, and enter the VSAN configuration mode, use the enter vsan command.
1.4(1) This command was introduced for a fabric within the Fibre Channel Storage mode
(/fc-storage/fabric). In addition, the switch mode within the Fibre Channel uplink mode
has been obsoleted.
Usage Guidelines While using this command for a fabric within the Fibre Channel Storage command mode, you need to specify
only the name of the VSAN.
Examples This example shows how to enter the VSAN mode in the Fibre Channel Uplink command mode:
Switch-A # scope fc-uplink
Switch-A /fc-uplink # enter vsan VSAN1 1 33
Switch-A /fc-uplink/vsan #
Command Description
show vsan
scope vsan
delete vsan
erase configuration
To erase the UCS configuration, use the erase configuration command.
erase configuration
erase-log-config
To erase the UCS management logging configuration file, use the erase-log-config command.
erase-log-config
Usage Guidelines Use this command to erase the UCS management logging configuration file.
Examples This example shows how to erase the UCS management logging configuration file:
switch-A# connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
install file
To install a license file, use the install file command.
Usage Guidelines An install file must be created and available to use this command.
ls
To list the contents of a directory, use the ls command in local management command mode.
ls [ path ]
Usage Guidelines Use this command to list the contents of a directory in local management command mode. If no path is
specified, the current working directory is listed.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
This command operates on either the workspace (FLASH) or volatile (RAM) file system. To specify the file
system, include the workspace: or volatile: keyword in the path. If the file system is not specified, the
current working file system is assumed.
Examples This example shows how to list the contents of a directory named temp in the volatile file system:
switch-A # connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
switch-A(local-mgmt)# ls volatile:/temp
40 Dec 29 15:28:58 2009 src/
switch-A(local-mgmt)#
mkdir
To create a directory, use the mkdir command in local management command mode.
mkdir path
Syntax Description path Absolute or relative path, including the name of the new directory.
Usage Guidelines Use this command to create a directory in local management command mode.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
This command operates on either the workspace (FLASH) or volatile (RAM) file system. To specify the file
system, include the workspace: or volatile: keyword in the path. If the file system is not specified, the
current working file system is assumed.
Examples This example shows how to create a directory named temp in the volatile file system:
switch-A # connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
move
To move a file from one directory to another, use the move command in local management command mode.
Syntax Description from-filesystem: File system containing the file to be moved. See the Usage
Guidelines for valid values.
to-filesystem: File system to contain the moved file. See the Usage Guidelines
for valid values.
Usage Guidelines Use this command in local management command mode to copy a file to a new location and to delete the file
in its original location.
If a dest-filename is specified, the moved file is renamed at the destination location.
If no file system is specified, the current working file system is assumed. If no path is specified, the current
working directory is assumed.
To specify the file system location, use the appropriate syntax from the following table:
ftp:[//[username@]server]
scp:[//[username@]server]
sftp:[//[username@]server]
tftp:[//server[:port]]
volatile:[/path]
workspace:
Either the source or destination file system must be local; you cannot move a file from one remote file system
to another.
If a remote protocol is specified with no server name, you are prompted to enter the server name.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
This command operates on either the workspace (FLASH) or volatile (RAM) file system. To specify the file
system, include the workspace: or volatile: keyword in the path. If the file system is not specified, the
current working file system is assumed.
You can use the mv command as an alias for this command.
Examples This example shows how to move a file from the current working directory to a directory in the volatile file
system:
switch-A # connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
ping
To diagnose basic network connectivity, use the ping command in local management command mode.
ping {host-ip-address| host-name} [count count] [packet-size packet-size] [interval interval] [timeout
timeout]
count count Specifies the number of ping packets that will be sent.
The range is 1 to 2147483647 packets.
Usage Guidelines Use this command to send ICMP echo request packets to a host.
The ping command is on the local management port command line. Use the connect local-mgmt command
to connect to that command line.
Examples This example shows how to send four ping packets of size 100 bytes at an interval of 10 seconds:
switch-A# connect local-mgmt
Cisco UCS 6100 Series Fabric Interconnect
power
To power up or down, use the power command.
Usage Guidelines A service profile for an organization must be created to use this command.
Examples This example shows how to initiate a soft power shut down followed by a hard shut down.
Switch-A # scope org Sample
Switch-A /org # scope service-profile Testing
Switch-A /org/service-profile # power down soft-followed-by-hard
Switch-A /org/service-profile* # commit-buffer
Switch-A /org/service-profile #
Usage Guidelines A service profile for an organization must be created to use this command.
Examples This example shows how to initiate a soft shut down for a service profile.
Switch-A # scope org Sample
Switch-A /org # scope service-profile Testing
Switch-A /org/service-profile # power down soft-shut-down
Switch-A /org/service-profile* # commit-buffer
Switch-A /org/service-profile #
pwd
To view the current working directory, use the pwd command in local management command mode.
pwd
Usage Guidelines Use this command to view the current working directory in local management command mode.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
Examples This example shows how to view the current working directory:
switch-A # connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
switch-A(local-mgmt)# cd temp
switch-A(local-mgmt)# pwd
workspace:temp
switch-A(local-mgmt)#
reboot
To reboot, use the reboot command.
reboot
recommission chassis
To recommission a chassis, use the recommission chassis command.
model Model.
optional-chassis-number The number of the chassis. Use this option only if you want to
renumber the chassis.
1.3(1) In this release, the option optional-chassis-number was introduced that allows
you to provide a new chassis number. If a new number is not provided, then the
old chassis number is used.
Examples This example shows how to recommission a chassis and renumber it:
switch-A# recommission chassis "Cisco Systems Inc" "Cisco UCS 5108" FOX1252GNNN 6
switch-A* # commit-buffer
switch-A #
recommission fex
To recommission a Fabric extender module, use the recommission fex command.
Syntax Description vendor The vendor from whom the Fabric extender module has been purchased
from.
recommission server
To recommission a server, use the recommission server command.
Syntax Description vendor The name of the company that you purchased the server from.
recover-bios
To recover a corrupt BIOS, use the recover-bios command.
Syntax Description version Specifies the BIOS version. Enter up to 512 characters with no spaces.
Usage Guidelines Use this command to recover a corrupt BIOS image. This procedure is not part of the normal maintenance of
a server. After you recover the BIOS, the server boots with the running version of the firmware for that server.
Note Remove all attached or mapped USB storage from a server before you attempt to recover the corrupt BIOS
on that server. If an external USB drive is attached or mapped from vMedia to the server, BIOS recovery
fails.
remove alertgroups
To remove specific alert groups from a Call Home profile, use the remove alertgroups command.
Syntax Description ciscotac Specifies the Cisco Technical Assistance Center (TAC) alert group.
Usage Guidelines Use this command to remove specific predefined Call Home alert groups from an existing alert group list
within a Call Home profile.
Examples This example shows how to remove diagnostic and license alert groups from an existing Call Home profile:
switch-A /monitoring/callhome/profile #
Syntax Description log-full Specifies that the log is backed up when it is full.
on-change-of-association Specifies that the log is backed up when the server changes associations.
Usage Guidelines Use this command to remove an action or actions that will trigger a backup of the system event log. Other
previously configured actions are retained.
Examples This example shows how to remove the action to trigger a backup of the system event log when the log is
full:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # remove backup action log-full
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
Command Description
show backup
remove fex
To remove a Fabric extender module from the system, use the remove fex command.
remove fex id
Examples This example shows how to delete a Fabric extender module from the system.
Switch-A # scope org
Switch-A /org # remove fex 2
Switch-A /org* # commit-buffer
Switch-A /org #
remove privilege
To remove privileges, use the remove privilege command.
switch-A#scope security
switch-A /security/role #
remove server
To remove a server, use the remove server command.
chassis-id / blade-id The identification numbers of the chassis and the blade for the server. It must
entered in the n/n format.
Usage Guidelines When using this command in Chassis command mode, you need to specify only the identification number of
the slot.
switch-A* # commit-buffer
switch-A #
reset
To reset a managed object, use the reset command.
Syntax Description hard-reset-immediate Specifies that the server be hard reset immediately.
hard-reset-wait Specifies that a hard reset be scheduled after all pending management
operations have completed.
Examples The following example shows how to reset an I/O module A in iom mode:
switch-A /chassis/iom #
reset-cmos
To reset the CMOS, use the reset-cmos command.
reset-cmos
switch-A /chassis/server #
reset-errors
To reset the errors on the DIMM, use the reset-errors command.
reset-errors
Usage Guidelines A memory array and a DIMM for the server must be created to use this command.
Examples This example shows how to reset the errors on the DIMM for a server.
UCS-A # scope server 1/1
UCS-A /chassis/server # scope memory-array 1
UCS-A /chassis/server/memory-array # scope dimm 2
UCS-A /chassis/server/memory-array/dimm # reset-errors
UCS-A /chassis/server/memory-array/dimm* # commit-buffer
UCS-A /chassis/server/memory-array/dimm #
reset-kvm
To reset or clear all sessions (keyboard, video and mouse) for a server, use the reset-kvm command.
reset-kvm
Examples This example shows how to reset or clear all sessions for a server.
UCS-A # scope server 1/1
UCS-A /chassis/server # reset-kvm
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
reset hard-reset-immediate
reset hard-reset-wait
reset pers-bind
To reset persistent binding, use the reset pers-bind command.
reset pers-bind
Syntax Description
This command has no arguments or keywords.
Usage Guidelines Use this command to reset persistent binding of fibre channel targets.
restart
To restart a firmware download task, use the restart command.
restart
Syntax Description:
This command has no arguments or keywords.
rmdir
To remove a directory, use the rmdir command in local management command mode.
rmdir path
Syntax Description path Absolute or relative path, including the name of the directory to be removed.
Usage Guidelines Use this command to remove a directory in local management command mode.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
This command operates on either the workspace (FLASH) or volatile (RAM) file system. To specify the file
system, include the workspace: or volatile: keyword in the path. If the file system is not specified, the
current working file system is assumed.
Examples This example shows how to remove a directory named temp from the volatile file system:
switch-A # connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
run-script
To run a script, use the run-script command in local management command mode.
run-script script-name
Syntax Description script-name The path and file name of the script file to be executed.
Usage Guidelines Use this command to run a shell script in the local management command mode. The script file must exist in
the workspace: file system.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
save
To save the management logging files, use the save command.
save
Usage Guidelines Use this command to save the management logging files.
Examples This example shows how to save the management logging files:
switch-A# scope monitoring
switch-A /monitoring # scope sysdebug
switch-A /monitoring/sysdebug # scope mgmt-logging
switch-A /monitoring/sysdebug/mgmt-logging # save
switch-A /monitoring/sysdebug/mgmt-logging #
scope adapter
To enter adapter mode, use the scope adapter command.
scope auth-domain
To enter the authentication domain mode, use the scope auth-domain command.
Syntax Description name The name of the authentication domain. This name can include a maximum of 16
characters.
Usage Guidelines The name of the authentication domain can include alphanumeric characters, but cannot include special
characters.
An authentication domain must be created to use this command.
scope auth-profile
To enter the iSCSI authorization profile mode, use the scope auth-profile command.
Syntax Description iscsi-auth-profile-name The name of the iSCSI authorization profile. It is the name that you
provided when you created the profile.
Usage Guidelines An iSCSI authorization profile must be created to use this command.
Examples This example shows how to enter the iSCSI authorization profile mode for an organization.
UCS-A # scope org test
UCS-A /org # scope auth-profile sample
UCS-A /org/auth-profile #
enter auth-profile
show auth-profile
delete auth-profile
scope auth-server-group
To enter the authentication server group mode, use the scope auth-server-group command.
Syntax Description authentication server group The name of the authentication server group. This name can include
a maximum of 127 characters.
Usage Guidelines An authentication server group must be created to use this command.
Examples This example shows how to enter the authentication server group for LDAP:
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope auth-server-group Default
Switch-A /security/ldap/auth-server-group #
scope auto-target-if
To enter the configured automatic target interface of an Ethernet interface of an iSCSI VNIC, use the scope
auto-target-if command.
scope auto-target-if
Command Modes Ethernet interface within the iSCSI VNIC mode (/org/service-profile/vnic-iscsi/eth-if)
Usage Guidelines You must create an iSCSI VNIC, an Ethernet interface for the iSCSI VNIC, and an automatic target interface
before you use this command.
Examples This example shows how to enter the automatic target interface mode of the Ethernet interface for an iSCSI
VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope auto-target-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/auto-target-if #
create auto-target-if
enter auto-target-if
delete auto-target-if
show auto-target-if
scope backup
To enter backup mode, use the scope backup command.
switch-A /system #
scope banner
To enter the banner mode, use the scope banner command.
scope banner
show pre-login-banner
set message
clear message
scope beacon-led
To enter the beacon LED mode, use the scope beacon-led command.
scope beacon-led
Examples This example shows how to enter the beacon LED mode:
UCS-A # scope fabric-interconnect A
UCS-A /fabric-interconnect # scope card 1
UCS-A /fabric-interconnect/card # scope beacon-led
UCS-A /fabric-interconnect/card/beacon-led #
show beacon-led
scope bios-settings
To enter the BIOS settings mode, use the scope bios-settings command.
scope bios-settings
Examples The following example shows how to enter the BIOS settings mode for a server:
Switch-A # scope server 1/1
Switch-A /chassis/server # scope bios
Switch-A /chassis/server/bios # scope bios-settings
Switch-A /chassis/server/bios/bios-settings #
The following example shows how to change the NUMA default BIOS setting for a platform and commit the
transaction:
UCS-A# scope system
UCS-A /system # scope server-defaults
UCS-A /system/server-defaults # show platform
Platform:
Product Name Vendor Model Revision
------------ ---------- ---------- --------
Cisco B200-M1
Cisco Systems, Inc.
N20-B6620-1
0
scope bios
To enter the BIOS mode for a server, use the scope bios command.
scope bios
Examples This example shows how to enter the BIOS mode for a server.
Switch-A # scope server 1/1
Switch-A /server # scope bios
Switch-A /server/bios #
show bios-settings
scope bladeserver-disc-policy
To enter the blade server discovery policy mode, use the scope bladeserver-disc-policy command.
Syntax Description name The name of the compute blade server discovery policy.
Usage Guidelines A blade server discovery policy must be created to use this command.
Examples This example shows how to enter the blade server discovery policy mode.
Switch-A # scope org
Switch-A /org # scope bladeserver-disc-policy Default
Switch-A /org/bladeserver-disc-policy #
scope block
To enter block mode, use the scope block command.
to To value.
switch-A /org/ip-pool #
scope boardcontroller
To enter board controller mode, use the scope boardcontroller command.
scope boardcontroller
Usage Guidelines Only certain servers, such as the Cisco UCS B440 High Performance blade server and the Cisco UCS B230
blade server, have board controller firmware. The board controller firmware controls many of the server
functions, including eUSBs, LEDs, and I/O connectors.
switch-A /chassis/server/boardcontroller #
scope boot-definition
To enter boot definition mode, use the scope boot-definition command.
scope boot-definition
switch-A /org/service-profile/boot-definition #
scope boot-policy
To enter boot-policy mode, use the scope boot-policy command.
switch-A /org/boot-policy #
scope boot-target
To enter the boot target mode, use the scope boot-target command.
Usage Guidelines Use this command to enter the boot target. You can configure the logical unit number (LUN) and world wide
name (WWN) for the primary or secondary boot target. Use the exit command to exit boot-target.
Examples The following example shows how to enter the secondary boot target mode:
server# scope org
server /org # scope wwn-pool default
server /org/wwn-pool # scope initiator 20:00:00:25:B5:00:00:00
server /org/wwn-pool/initiator # scope boot-target secondary
server /org/wwn-pool/initiator/boot-target #
scope callhome
To view the callhome details, use the scope callhome command.
scope callhome
Syntax Description
This command has no arguments or keywords.
Usage Guidelines Use this command to view the callhome policy details.
Examples This example shows how to use this command to view the callhome details:
switch-A # scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome #
scope policy
scope capability
To enter capability mode, use the scope capability command.
scope capability
switch-A /system/capability #
scope cap-qual
To enter capacity qualification mode, use the scope cap-qual command.
scope card
To enter the fabric card mode for a fabric-interconnect, use the scope card command.
scope card id
Syntax Description id The ID of the fabric card. It must be a value between 0 and 4294967295.
Examples This example shows how to enter the switch mode for a fabric-interconnect.
UCS-A # scope fabric-interconnect A
UCS-A /fabric-interconnect # scope card 1
UCS-A /fabric-interconnect/card #
scope cat-updater
To enter the capability catalog file updater mode, use the scope cat-updater command.
Syntax Description filename Enter the name of the capability catalog update file used in the previous update
operation.
Usage Guidelines Use this command to enter the capability catalog file updater mode for a previous update operation. In the
cat-updater mode, you can change parameters of the operation, such as remote server location, login information,
and protocol.
Examples The following example shows how to change a parameter from a failed previous capability catalog update
and restart the update:
UCS-A# scope system
UCS-A /system # scope capability
UCS-A /system/capability # show cat-updater
Catalog Updater:
File Name Protocol Server Userid Status
--------- -------- --------------- --------------- ------
ucs-catalog.1.0.0.4.bin
Scp 192.0.2.111 user1 Failed
scope cert-store
To enter cert-store mode, use the scope cert-store command.
scope cert-store
Usage Guidelines Use cert-store mode to create, enter, delete, and show certificates.
scope chassis
To enter chassis mode, use the scope chassis command.
switch-A /chassis #
model The model number of the chassis. The value can include a maximum of 510
characters.
Examples This example shows how to enter the chassis mode for a system:
Switch-A # scope system
Switch-A /system # scope capability
Switch-A /system/capability # scope chassis Cisco Systems Inc N20-C6508 1
Switch-A /system/capability/chassis #
scope chassis-conn-policy
To enter the chassis connectivity policy mode for a fabric, use the scope chassis-conn-policy command.
Syntax Description chassis id The ID of the chassis. The value must be a number between 1 and 255.
Examples This example shows how to enter the chassis connectivity policy mode for fabric A:
UCS-A # scope org test
UCS-A /org # scope chassis-conn-policy 1 a
UCS-A /org/chassis-conn-policy #
show chassis-conn-policy
scope chassis-disc-policy
To enter chassis discovery policy mode, use the scope chassis-disc-policy command.
scope chassis-disc-policy
Examples This example shows how to enter chassis discovery policy mode:
switch-A /org/chassis-disc-policy #
scope cimc
To enter CIMC mode, use the scope cimc command.
scope cimc
Syntax Description
This command has no arguments or keywords.
Usage Guidelines A statistics threshold policy must be created prior to using this command.
Examples This example shows how to enter the chassis statistics of a class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # scope class chassis-stats
Switch-A /eth-server/stats-threshold-policy/class #
Examples This example shows how to enter the CPU environment statistics class:
switch-A# scope org org100
switch-A /org # scope stats-threshold-policy stp100
switch-A /org/stats-threshold-policy # scope class cpu-env-stats
switch-A /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Examples This example shows how to enter the DIMM environment statistics mode:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # scope class dimm-env-stats
server /org/stats-threshold-policy/class #
scope ether-error-stats
Syntax Description
This command has no arguments or keywords.
Usage Guidelines There must be an available statistics threshold policy to view the Ethernet error statistics for the class.
Examples This example shows how to enter the Ethernet error statistics class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold policy default
Switch-A /eth-server/stats-threshold-policy # scope class ether-error-stats
Switch-A /eth-server/stats-threshold-policy/class #
Syntax Description
This command has no arugments or keywords
Usage Guidelines The statistics threshold policy must be created prior to using this command.
Examples This example shows how to enter the Ethernet loss statistics for a class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-srver/stats-threshold-policy # scope class ether-loss-stats
Switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines Use this command to enter an Ethernet port error statistics class.
Examples This example shows how to enter an Ethernet port error statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # enter class ethernet-port-err-stats
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use this command to enter an Ethernet port multicast statistics class.
Examples This example shows how to enter an Ethernet port multicast statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # scope class ethernet-port-multicast-stats
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use this command to enter an Ethernet port over-under-sized statistics class.
Examples This example shows how to enter an Ethernet port over-under-sized statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # enter class ethernet-port-over-under-sized-stats
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use this command to enter an Ethernet port statistics class.
Examples This example shows how to enter an Ethernet port statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # enter class ethernet-port-stats
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use this command to enter an Ethernet port large packet statistics class.
Examples This example shows how to enter an Ethernet port large packet statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # enter class ethernet-port-stats-by-size-large-packets
switch-A /org/stats-threshold-policy/class #
Usage Guidelines Use this command to enter an Ethernet port small packet statistics class.
Examples This example shows how to enter an Ethernet port small packet statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # enter class ethernet-port-stats-by-size-small-packets
switch-A /org/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Examples This example shows how to change to the Ethernet pause statistics class mode:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # scope class ether-pause-stats
server /eth-server/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines A statistics threshold policy must be created to use this command.
Examples This example shows how to enter the Ethernet Rx statistics class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # scope class ether-rx-stats
Switch-A /eth-server/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines A statistics threshold policy must be created prior to using this command.
Examples This example shows how to enter the Ethernert tx statistics mode for a class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # scope class ether-tx-stats
Switch-A /eth-server/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines A statistics threshold policy must be created prior to using this command.
Examples This example shows how to enter the fan module statistics mode for a class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy/ # scope class fan-module-stats
Switch-A /eth-server/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines A statistics threshold policy must be created prior to using this command.
Examples This example shows how to enter the fan statistics mode of a class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # scope class fan-stats
Switch-A /eth-server/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines A statistics threshold policy must be created prior to using this command.
Examples This example shows how to enter the Fibre Channel error statistics mode of a class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # scope class fc-error-stats
Switch-A /eth-server/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines A statistics threshold policy must be created prior to using this command.
Examples This example shows how to enter the Fibre Channel statistics mode for a class:
Switch-A # scope fc-uplink
Switch-A /fc-uplink # scope stats-threshold-policy default
Switch-A /fc-uplink/stats-threshold-policy # scope class fc-stats
Switch-A /fc-uplink/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy must be created to use this command.
An Fex environment statistics mode must be created for a class to use this command.
Examples This example shows how to enter the Fex environment statistics mode for a class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy Default
Switch-A /eth-server/stats-threshold-policy # scope class fex-env-stats
Switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy and an Fex power summary statistics class must be created to use this command
Examples This example shows how to enter the Fex power summary statistics class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # scope class fex-power-summary
Switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy and an Fex power supply input statistics class must be created to use this command.
Examples This example shows how to enter the Fex power supply input statistics mode for a class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # scope class fex-psu-input-stats
Switch-A /eth-server/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines Use this command to enter the io-card-stats class mode to configure class properties.
Examples This example shows how to enter the IO card statistics class mode:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # scope class io-card-stats
server /eth-server/stats-threshold-policy/class #
Syntax Description
This command has no arguments or keywords.
Usage Guidelines
Examples This example shows how to enter the memory array environment statistics class mode:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # scope class memory-array-env-stats
server /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to change to the memory error correctable code statistics class mode:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # scope class memory-error-correctable-codes-stats
server /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to change to the memory mirroring error statistics class mode:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # scope class memory-mirroring-error-stats
server /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to change to the memory sparing error statistics class mode:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # scope class memory-sparing-error-stats
server /org/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy for the organization mode must be created to use this command.
Examples This example shows how to enter the motherboard temperature statistics mode for a class.
UCS-A # scope org test
UCS-A /org # scope stats-threshold-policy sample
UCS-A /org/stats-threshold-policy # scope class motherboard-temp-stats
UCS-A /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to change to the PCIe correctable error statistics class mode:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # scope class pc-ie-correctable-stats
server /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to enter the PCIe fatal completion error statistics class mode:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # scope class pcie-fatal-completion-error-stats
server /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to change to the PCIe fatal error statistics class mode:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # scope class pcie-fatal-error-stats
server /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to change to a PCIe fatal protocol error statistics class mode:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # scope class pcie-fatal-protocol-error-stats
server /org/stats-threshold-policy/class #
Usage Guidelines
Examples This example shows how to change to the PCIe fatal receive error statistics class mode:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # scope class pcie-fatal-receiving-error-stats
server /org/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy and a rack unit fan statistics class must be created to use this command.
Examples This example shows how to enter the rack unit fan statistics mode for a class:
Switch-A # scope eth-server
Switch-A /eth-server # scope stats-threshold-policy default
Switch-A /eth-server/stats-threshold-policy # scope class rack-unit-fan-stats
Switch-A /eth-server/stats-threshold-policy/class #
Usage Guidelines A statistics threshold policy and a rack unit power supply statistics class must be created to use this command.
Examples This example shows how to enter the rack unit power supply statistics mode for a class.
Switch-A # scope org
Switch-A /org # scope stats-threshold-policy default
Switch-A /org/stats-threshold-policy # scope class rack-unit-psu-stats
Switch-A /org/stats-threshold-policy/class #
scope client
To enter a specific client mode, use the scope client command in port-profile mode.
Command Modes Port profile within the VMware command mode (/system/vm-mgmt/vmware/profile-set/port-profile)
Port profile with the virtual management command mode (/system/vm-mgmt/profile-set/port-profile)
Usage Guidelines Use client mode to create the following managed objects:
• Data centers
• Distributed virtual switches
• Folders
scope cluster-set
To enter the cluster-set mode for the system, use the scope cluster-set command.
scope cluster-set
Examples This example shows how to enter the cluster-set mode for the system.
UCS-A # scope system
UCS-A /system # scope vm-mgmt
UCS-A /system/vm-mgmt # scope cluster-set
UCS-A /system/vm-mgmt/cluster-set #
scope cluster
To enter the distributed virtual switch mode, use the scope cluster command.
Syntax Description name The name of the distributed virtual switch. It is the name you provided while creating
the switch.
Usage Guidelines A distributed virtual switch must be created to use this command.
Examples This example shows how to enter the distributed virtual switch mode.
UCS-A # scope system
UCS-A /system # scope vm-mgmt
UCS-A /system/vm-mgmt # scope cluster-set
UCS-A /system/vm-mgmt/cluster-set # scope cluster sample
UCS-A /system/vm-mgmt/cluster-set/cluster #
enter cluster
delete cluster
show cluster
scope console-auth
To enter the console authentication mode, use the scope console-auth command.
scope console-auth
Examples This example shows how to enter the console authentication mode:
Switch-A # scope security
Switch-A /security # scope console-auth
Switch-A /security/console-auth #
scope cpu
To enter a CPU mode, use the scope cpu command.
scope cpu
delete cpu
enter cpu
show server
Syntax Description vendor The vendor name of the CPU. The name can include a maximum of 510
characters.
model The model number of the CPU. The name can include a maximum of 510
characters.
Examples This example shows how to enter the CPU mode for a system.
Switch-A # scope system
Switch-A /system # scope capability
Switch-A /system/capability # scope cpu Intel(R) Genuine Intel(R) CPU 1
Switch-A /system/capability/cpu #
scope chassis
scope data-center
To enter data-center mode, use the scope data-center command in vcenter mode.
scope default-auth
To enter the default authentication mode, use the scope default-auth command.
scope default-auth
Usage Guidelines An authentication domain must be created prior to using this command to enter the default authentication
mode for an authentication domain.
Examples This example shows how to enter the default authentication mode in an authentication domain:
Switch-A # scope security
Switch-A /security # scope auth-domain Default
Switch-A /security/auth-domain # scope default-auth
Switch-A /security/auth-domain/default-auth #
scope default-behavior
To enter default-behavior mode, use the scope default-behavior command.
Examples This example shows how to enter vNIC default behavior mode:
switch-A# scope org org100
switch-A /org # scope service-profile sp100
switch-A /org/service-profile # scope default-behavior vnic
switch-A /org/service-profile/default-behavior #
scope dest-interface
To enter the destination interface mode for the Fibre Channel traffic monitoring session or the Ethernet traffic
monitoring session, use the scope dest-interface command.
Syntax Description slotid The slot ID of the destination interface. It must be a value between 1-5.
portid The port ID of the destination interface. It must be a value between 1-40.
Usage Guidelines A Fibre Channel traffic monitoring session or an Ethernet traffic monitoring session must be created prior to
using this command.
Examples This example shows how to enter the destination interface mode for the Ethernet traffic monitoring session.
To enter the destination interface mode for the Fibre Channel traffic monitoring session, replace
eth-traffic-mon with fc-traffic-mon , and eth-mon-session with fc-mon-session .
Switch-A # scope eth-traffic-mon
Switch-A /eth-traffic-mon # scope fabric a
Switch-A /eth-traffic-mon/fabric # scope eth-mon-session Default
Switch-A /eth-traffic-mon/fabric/eth-mon-session # scope dest-interface 1 33
Switch-A /eth-traffic-mon/fabric/eth-mon-session/dest-interface #
scope dhcp-ip-params
To enter the configured DHCP for initiator IP parameters mode, use the scope dhcp-ip-params command.
scope dhcp-ip-params
Usage Guidelines You must create a DHCP initiator for IP parameters before you use this command.
Examples This example shows how to enter the DHCP for initiator IP parameters mode:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if # scope dhcp-ip-params
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if/dhcp-ip-params #
enter dhcp-ip-params
delete dhcp-ip-params
create ip-if
scope diag
To enter the diagnostics mode for a server, use the scope diag
command.
scope diag
Examples This example shows how to enter the diagnostic mode for a server.
Switch-A # scope server 1/1
Switch-A /chassis/server # scope diag
Switch-A /chassis/server/diag #
scope dimm
To enter the dual in-line memory module (DIMM) for a server, use the scope dimm command.
scope dimm id
Syntax Description Id The ID of the dual in-line memory module. It must be a value between 0 and 4294967295.
Examples This example shows how to enter the DIMM mode for a server.
Switch-A # scope server 1/1
Switch-A /chassis/server # scope memory-array 1
Switch-A /chassis/server/memory-array # scope dimm 2
Switch-A /chassis/server/memory-array/dimm #
acknowledge fault
scope distributed-virtual-switch
To enter distributed-virtual-switch mode, use the enter distributed-virtual-switch command in folder mode.
scope download-task
To download a task for a license, use the scope download-task command.
scope dynamic-vnic-conn
To enter dynamic-vnic-conn mode, use the scope dynamic-vnic-conn command.
scope dynamic-vnic-conn
switch-A /org/service-profile #
scope dynamic-vnic-conn-policy
To enter dynamic-vnic-conn-policy mode, use the enter dynamic-vnic-conn-policy command.
scope egress-policy
To enter egress-policy mode, use the scope egress-policy command in qos-policy mode.
scope egress-policy
Usage Guidelines You must create an egress policy before you scope to egress-policy mode.
Use egress-policy mode to perform the following tasks:
• Set QoS priority and rate
• Show egress QoS policy information
scope eth-best-effort
To enter eth-best-effort mode, use the scope eth-best-effort command in qos mode.
scope eth-best-effort
scope eth-classified
To enter eth-classified mode, use the scope eth-classified command.
switch-A# eth-server
switch-A /eth-server/qos/eth-classified #
scope eth-if
To view the Ethernet interface, use the scope eth-if command.
Syntax Description Name Name of the Ethernet interface. This name can include a maximum of 32
alphanumeric characters.
Usage Guidelines The name of the Ethernet interface can include a maximum of 32 characters and can be alphanumeric. Special
characters cannot be used.
Examples This example shows how to view the Ethernet interface information:
switch-A # scope org
switch-A # /org # scope vnic-templ
switch-A # /org/vnic-templ # scope eth-if
Word Name (Max Size 32)
switch-A # /org/vnic-templ # scope eth-if Sample
switch-A # /org/vnic-templ/eth-if #
scope eth-if
Usage Guidelines You must create a service profile and an iSCSI VNIC for the service profile before you use this command.
Examples This example shows how to enter the Ethernet interface mode for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-isci testing
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if #
create eth-if
enter eth-if
scope eth-mon-session
To enter the Ethernet monitoring session mode, use the scope eth-mon-session command.
Syntax Description name Name of the Ethernet monitoring session. The name can include a maximum of 16
characters.
Usage Guidelines The name of the Ethernet traffic monitoring session can include alphanumeric characters, but no special
characters are allowed.
An Ethernet traffic monitoring session must be created to use this command.
Examples This example shows how to enter the Ethernet traffic monitoring session mode:
UCS-A # scope eth-traffic-mon
UCS-A /eth-traffic-mon # scope fabric a
UCS-A /eth-traffic-mon/fabric # scope eth-mon-session Default
UCS-A /eth-traffic-mon/fabric/eth-mon-session #
scope eth-policy
To enter eth-policy mode, use the scope eth-policy command.
Examples This example shows how to enter eth-policy mode using Ethernet policy ep100:
switch-A /org/eth-policy #
scope eth-server
To enter eth-server mode, use the scope eth-server command.
scope eth-server
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A#scope eth-server
switch-A /eth-server #
scope eth-storage
To enter the Ethernet storage mode, use the scope eth-storage command.
scope eth-storage
Examples This example shows how to enter the Ethernet storage mode from the chassis mode.
Switch-A # scope chassis 1
Switch-A /chassis # scope eth-storage
Switch-A /eth-storage #
scope eth-target
To enter the Ethernet target endpoint mode for a fabric interface, use the scope eth-target command.
Usage Guidelines You must create an interface for a fabric, and an Ethernet target endpoint for that interface before you use
this command in the interface command mode.
You must create a port channel for a fabric in the Ethernet storage command mode before you use this
command.
Examples This example shows how to enter the Ethernet target endpoint for a fabric interface:
UCS-A # scope eth-storage
UCS-A /eth-storage # scope fabric a
UCS-A /eth-storage/fabric # scope interface 2 33
UCS-A /eth-storage/fabric/interface # scope eth-target Testing
UCS-A /eth-storage/fabric/interface/eth-target #
scope eth-traffic-mon
To enter the Ethernet traffic monitoring session mode, use the scope eth-traffic-mon command.
scope eth-traffic-mon
Examples This example shows how to enter the Ethernet traffic monitoring session mode:
Switch-A # scope adapter 1/1/1
Switch-A chassis/server/adapter # scope eth-traffic-mon
Switch-A /eth-traffic-mon #
scope eth-uplink
To enter eth-uplink mode, use the scope eth-uplink command.
scope eth-uplink
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A#scope eth-uplink
switch-A /eth-uplink #
scope ext-eth-if
To enter the external Ethernet interface for an adapter, use the scope ext-eth-if command.
Syntax Description ID The ID of the external Ethernet interface. The value must be an integer 0 and
4294967295.
Examples This example shows how to enter the external Ethernet interface for an adapter.
Switch-A # scope adapter 1/1/1
Switch-A /chassis/server/adapter # scope ext-eth-if 2
Switch-A /chassis/server/adapter/ext-eth-if #
set cli
show ext-eth-if
scope extension-key
To enter extension-key mode, use the scope extension-key command in vm-mgmt mode.
scope extension-key
scope ext-pooled-ip
To enter the external management pooled IP address mode for a service profile, use the scope ext-pooled-ip
command.
scope ext-pooled-ip
Usage Guidelines A service profile must be created and an external management pooled IP address must be set for this service
profile to use this command.
Examples This example shows how to enter the scope of the external management pooled IP address mode for a service
profile.
Switch-A # scope org
Switch-A /org # scope service-profile default
Switch-A /org/service-profile # scope ext-pooled-ip
Switch-A /org/service-profile/ext-pooled-ip #
scope ext-static-ip
To enter the external static management IP address mode, use the scope ext-static-ip command.
scope ext-static-ip
Examples This example shows how to enter the external static management IP address mode for the CIMC.
Switch-A # scope server 1/7
Switch-A /chassis/server # scope cimc
Switch-A /chassis/server/cimc # scope ext-static-ip
Switch-A /chassis/server/cimc/ext-static-ip #
scope fabric
To enter fabric mode, use the scope fabric command.
b Specifies switch B.
Examples This example shows how to enter Ethernet server fabric mode for fabric B:
switch-A# scope eth-server
switch-A /eth-server# scope fabric b
switch-A /eth-server/fabric #
scope fabric-if
To enter the fabric interface mode, use the scope fabric-if command.
Syntax Description ID Port ID of the fabric. The value must be an integer between 0 and 4294967295.
Examples This example shows how to enter the fabric interface mode of a chassis:
UCS-A # scope chassis 1
UCS-A /chassis # scope iom 1
UCS-A /chassis/iom # scope port-group fabric
UCS-A /chassis/iom/port-group # scope fabric-if 345
scope fabric-interconnect
To enter fabric interconnect mode, use the scope fabric-interconnect command.
b Specifies switch B.
Examples This example shows how to enter fabric interconnect mode for fabric B:
switch-A# scope fabric-interconnect b
switch-A /fabric-interconnect #
scope fabric-port-channel
To enter the fabric port channel mode, use the scope fabric-port-channel command.
Syntax Description port channel id The ID of the port channel interface. The value must be between 1024
and 4096.
Usage Guidelines A fabric port channel must be configured to use this command.
Examples This example shows how to enter the fabric port channel in the Ethernet server mode:
UCS-A # scope eth-server
UCS-A /eth-server # scope fabric a
UCS-A /eth-server/fabric # scope fabric-port-channel 1024
UCS-A /eth-server/fabric/fabric-port-channel #
scope host-port-channel
scope fan
To enter the fan mode, use the scope fan command.
scope fan id
Syntax Description ID Identification number of the fan. It must be a number between 1 and 8.
Examples This example shows how to enter the fan mode for a chassis:
Switch-A # scope chassis 1
Switch-A /chassis # scope fan-module 1 2
Switch-A /chassis/fan-module # scope fan 3
Switch-A /chassis/fan-module/fan #
scope fan-module
To enter the fan module, use the scope fan-module command.
Examples This example shows how to enter the fan module mode for a chassis:
Switch-A # scope chassis 1
Switch-A /chassis # scope fan-module 1 3
Switch-A /chassis/fan-module #
show fan-module
scope fc
To view and set Fibre Channel information, use the scope fc command.
scopefc{set| show}
Syntax Description set Use this option to set details such as Cos and weight.
Usage Guidelines
• The range of valid values for setting cos is 0 to 6. You must select an integer between 0 and 6.
• The range of valid values for setting weight is 0-10. You must select an integer between 0 and 10.
Examples This example shows how to view the fibre channel information:
switch-A# scope eth-server
switch-A# /eth-server # scope qos
switch-A# /eth-server/qos # scope fc
switch-A# /eth-server/qos/fc # show
FC Class:
Priority: Fc
Cos: 3
Weight: 5
Bw Percent: 50
Drop: No Drop
Mtu: FC
Admin State: Enabled
scope fc-mon-session
To enter the Fibre Channel traffic monitoring session mode, use the scope fc-mon-session command.
Syntax Description name Name of the monitoring session. The name can include a maximum of 16 characters.
Usage Guidelines The name of the monitoring session can be alphanumeric, but cannot include special characters.
You must configure a traffic monitoring session before you use this command.
Examples This example shows how to enter the Fibre Channel traffic monitoring session:
Switch-A # scope fc-traffic-mon
Switch-A /fc-traffic-mon # scope fabric b
Switch-A /fc-traffic-mon/fabric # scope fc-mon-session Default
Switch-A /fc-traffic-mon/fabric/fc-mon-session #
scope fc-policy
To enter fc-policy mode, use the scope fc-policy command.
scope fc-storage
To enter the Fibre Channel storage mode, use the scope fc-storage command.
scope fc-storage
Examples This example shows how to enter the Fibre Channel storage mode from the service profile mode.
Switch-A # scope org
Switch-A /org # scope service-profile sample
Switch-A /org/service-profile # scope fc-storage
Switch-A /fc-storage #
scope fc-traffic-mon
To enter the Fibre Channel traffic monitoring mode, use the scope fc-traffic-mon command.
scope fc-traffic-mon
Examples This example shows how to enter the Fibre Channel traffic monitoring mode:
Switch-A # scope adapter 1/1/1
Switch-A chassis/server/adapter # scope fc-traffic-mon
Switch-A /fc-traffic-mon #
scope fc-uplink
To enter fc-uplink mode, use the scope fc-uplink command.
scope fc-uplink
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A /fc-uplink #
scope fex
To enter the Fabric extender module, use the scope fex command.
scope fex id
Syntax Description id The ID of the Fabric extender module. The value must be a numeral.
Examples This example shows how to enter the fabric extender module from the adapter mode.
Switch-A # scope adapter 1/1
Switch-A /server/adapter # scope fex 2
Switch-A /fex #
scope firmware
To enter firmware mode, use the scope firmware command.
scope firmware
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A /firmware #
scope flow-control
To enter flow control mode, use the scope flow-control command.
scope flow-control
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A /eth-uplink/flow-control #
scope folder
To enter folder mode, use the scope folder command in vcenter mode.
scope fw-host-pack
To view the server host pack, use the scope fw-host-pack command.
Syntax Description Name The name of the server host pack. This name can include a maximum of 16
characters.
Usage Guidelines The name of the server host pack can include a maximum of 16 characters. It should not include any special
characters.
Examples This example shows how to view the server host pack.
switch-A # scope org
switch-A # /org # scope fw-host-pack ?
Word Name (Max size 16)
switch-A # /org # scope fw-host-pack fhpl
switch-A # /org/fw-host-pack #
scope fw-mgmt-pack
To view the server management pack details, use the scope fw-mgmt-pack command.
Syntax Description Name The name of the server management pack. This name can include a maximum of
16 characters.
Usage Guidelines The name of the server management pack can include upto 16 characters only. The name can include
alphanumeric characters, but special characters are not allowed.
Examples This example shows how to view the server management pack.
switch-A # scope org
switch-A /org # scope fw-mgmt-pack ?
Word Name (Max size 16)
switch-A /org # scope fw-mgmt-pack Fhpl123
switch-A /org/fw-mgmt-pack #
scope host-eth-if
To view the Ethernet interface information of the adapter, use the scope host-eth-if command.
scope host-eth-if ID
Usage Guidelines The ID must be an integer. Alphanumeric characters are not allowed.
Examples This example shows how to view the Ethernet information of the host:
Switch-A # scope adapter 1/1/1
Switch-A /chassis/server/adapter # scope host-eth-if 2
Switch-A /chassis/server/adapter/host-eth-if #
Syntax Description dynamic MAC address Enter the MAC address of the host Ethernet interface.
The standard format of the MAC address is hh:hh:hh:hh:hh:hh.
Usage Guidelines The dynamic MAC address must be entered in the standard hh:hh:hh:hh:hh:hh format.
Examples This example shows how to view the host Ethernet interface information of a particular device:
Switch-A # scope adapter 1/1/1
Switch-A /chassis/server/adapter # scope host-eth-if 2
Switch-A /chassis/server/adapter/host-eth-if # scope host-eth-if dynamic-mac 00:1B:50:35:56:99
Switch-A /chassis/server/adapter/host-eth-if #
scope host-fc-if
To view the Fibre Channel information of the host interface, use the scope host-fc-if command.
scope host-fc-if ID
Usage Guidelines The ID is an integer and the range of valid values is between 0 to 4294967295.
Examples This example shows how to view the Fibre Channel information of the host interface:
Switch-A # scope adapter 1/1/1
Switch-A /chassis/server/adapter # scope host-fc-if 2
Switch-A /chassis/server/adapter/host-fc-if #
Syntax Description wwn Worldwide Name. The valid value is a 64-bit alphanumeric string.
Examples This example shows how to view the Fibre Channel interface information of a particular device:
Switch-A # scope adapter 1/1/1
Switch-A /chassis/server/adapter # scope host-fc-if wwn 01:23:45:67:89:ab:cd:ef
Switch-A /chassis/server/adapter/host-fc-if #
scope host-iscsi-if
To enter the host iSCSI interface mode, use the scope host-iscsi-if command.
scope host-iscsi-if ID
Syntax Description ID Identification number of the host iSCSI interface. It must be a value between 0 and
4294967295.
Usage Guidelines You must create the host iSCSI interface before you use this command.
Examples This example shows how to enter the host iSCSI interface mode for an adapter:
UCS-A # scope adapter 1/1/1
UCS-A /chassis/server/adapter # scope host-iscsi-if 2
UCS-A /chassis/server/adapter/host-iscsi-if #
scope host-port-channel
To enter the host port channel mode, use the scope host-port-channel command.
Syntax Description port channel id The port channel ID. The value must be between 1024 and 4096.
Usage Guidelines The host port channels must be available to use this command.
Examples This example shows how to enter the host port channel mode for a fabric within the Ethernet server mode:
UCS-A # scope eth-server
UCS-A /eth-server # scope fabric a
UCS-A /eth-server/fabric # scope host-port-channel 1023
UCS-A /eth-server/fabric/host-port-channel #
scope fabric-port-channel
scope import-config
To enter import configuration mode, use the scope import-config command.
switch-A /system/import-config #
scope instance
To enter instance mode, use the scope instance command in vm-mgmt mode.
scope interface
To view the Ethernet interface information of the fabric, use the scope interface command.
Syntax Description slot ID The ID of the slot. It must be a number between 1 and 5.
Usage Guidelines The Slot ID must be a number between 1 and 5. You cannot enter any alphanumeric or special characters.
The Port ID must be a number between 1 and 40. You cannot enter any alphanumeric or special characters.
Examples This example shows how to view the interface information for the Ethernet Uplink:
Switch-A # scope eth-uplink
Switch-A /eth-uplink # scope fabric a
Switch-A /eth-uplink/fabric # scope interface
1-5 Slot ID
Switch-A /eth-uplink/fabric # scope interface 2
1-40 Port ID
Switch-A /eth-uplink/fabric # scope interface 2 33
Switch-A /eth-uplink/fabric/interface #
scope interface fc
To enter the fibre channel interface for a fabric, use the scope interface fc command.
Syntax Description slot id The slot identification number. The range of valid values is between 2 and 5.
port id The port identification number. The range of valid values is between 1 and 40.
Usage Guidelines A fibre channel interface for the fabric must be created to use this command.
Examples This example shows how to enter the fibre channel interface for a fabric.
Switch-A # scope fc-storage
Switch-A /fc-storage # scope fabric a
Switch-A /fc-storage/fabric # scope interface fc 2 33
Switch-A /fc-storage/fabric/fc #
Usage Guidelines A Fibre Channel over Ethernet interface for a fabric must be created to use this command.
Examples This example shows how to enter the Fibre Channel over Ethernet interface for a fabric.
Switch-A # scope fc-storage
Switch-A /fc-storage # scope fabric a
Switch-A /fc-storage/fabric # scope interface fcoe 2 33
Switch-A /fc-storage/fabric/fcoe #
scope inventory
To view the Callhome periodic system inventory information, use the scope inventory command.
scope inventory
Syntax Description
This command has no arguments or keywords.
Usage Guidelines Use this command to view the periodic system inventory.
Examples This example shows how to view the periodic system inventory information:
switch-A # scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # scope inventory
switch-A /monitoring/callhome/inventory #
scope profile
a Specifies switch A.
b Specifies switch B.
switch-A /chassis/iom #
show iom
show slot
Syntax Description vendor Vendor name. The name can include a maximum of 510 characters.
Examples This example shows how to enter the IOM mode for a system.
Switch-A # scope system
Switch-A /system # scope capability
Switch-A /system/capability # scope iom Cisco Systems Inc N20-I6583 0
Switch-A /system/capability/iom #
show iom
scope iom id
scope ip-if
To enter the IPv4 interface mode of the iSCSI VNIC, use the scope ip-if command.
scope ip-if
Command Modes Ethernet interface within the iSCSI VNIC mode (/org/service-profile/vnic-iscsi/eth-if)
Usage Guidelines You must create an IPv4 target interface before you use this command.
Examples This example shows how to enter the IPv4 target interface for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi example
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if #
create pooled-ip-params
create static-ip-params
create ip-if
enter ip-if
delete ip-if
scope ipmi-access-profile
To enter IPMI access profile mode, use the scope ipmi-access-profile command.
Examples The following example shows how to enter IPMI access profile mode:
switch-A /org/ipmi-access-profile #
scope ipmi-user
To change the mode to the IPMI user, use the scope ipmi-user command.
Usage Guidelines The name of the IPMI user can be alphanumeric, but cannot contain any special characters.
Examples This example shows how to change the mode to the IPMI user:
switch-A # scope org
switch-A /org # scope ipmi-access-profile Sample
switch-A /org/ipmi-access-profile # scope ipmi-user Example
switch-A /org/ipmi-access-profile/ipmi-user #
enter ipmi-user
delete ipmi-user
set descr
set password
set privilege
scope iqn-pool
To change the command mode to the IQN pool mode, use the scope iqn-pool command.
Examples This example shows how to change the command mode to IQN pool mode.
UCS-A # scope org
UCS-A /org # scope iqn-pool Sample1
UCS-A /org/iqn-pool #
enter iqn-pool
show iqn-pool
delete iqn-pool
set iqn-prefix
set descr
create block
scope iscsi-policy
To enter the iSCSI adapter policy mode for the organization, use the scope iscsi-policy command.
Syntax Description name Name of the iSCSI adapter policy. It is the name that you provided when you created
the iSCSI adapter policy.
Usage Guidelines You must create an iSCSI policy before you use this command.
Examples This example shows how to enter the iSCSI adapter policy mode for an organization:
UCS-A # scope org test
UCS-A /org # scope iscsi-policy sample
UCS-A /org/iscsi-policy #
enter iscsi-policy
show iscsi-policy
delete iscsi-policy
scope iscsi
To enter the boot iSCSI mode, use the scope iscsi command.
scope iscsi
Usage Guidelines You must create a boot iSCSI policy before you use this command.
Examples This example shows how to enter the boot iSCSI mode for the boot definition of a service profile:
UCS-A # scope org Sample
UCS-A /org # scope service-profile test
UCS-A /org/service-profile # scope boot-definition
UCS-A /org/service-profile/boot-definition # scope iscsi
UCS-A /org/service-profile/boot-definition/iscsi #
delete iscsi
enter iscsi
show iscsi
scope lan
To view information on the boot LAN, use the scope lan command.
scope lan
Syntax Description
This command has no arguments or keywords.
Usage Guidelines Use this command to view the boot LAN information.
Examples This example shows how to view the boot LAN information:
switch-A # scope org
switch-A /org # scope boot-policy Example
switch-A /org/boot-policy # scope lan
scope virtual-media
scope ldap
To enter LDAP mode, use the scope ldap command.
scope ldap
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A#scope security
switch-A /security/ldap #
scope ldap-group
To enter the LDAP group mode, use the scope ldap-group command.
Examples This example shows how to enter the LDAP group mode:
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope ldap-group Sample
Switch-A /security/ldap/ldap-group #
scope ldap-group-rule
To enter the LDAP group rule mode, use the scope ldap-group-rule command.
scope ldap-group-rule
Usage Guidelines To use this command in the server mode, an LDAP server must be created to use this command.
Examples This example shows how to enter the LDAP group rule mode for an LDAP server.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope server Sample
Switch-A /security/ldap/server # scope ldap-group-rule
Switch-A /security/ldap/server/ldap-group-rule #
scope license
To enter the license mode, use the scope license command.
scope license
Examples This example shows how to enter the license mode from the adapter mode.
Switch-A # scope adapter 1/1
Switch-A /server/adapter # scope license
Switch-A /license #
scope locale
To enter locale mode, use the scope locale command.
switch-A#scope security
switch-A /security/locale #
scope local-disk-config
To enter the local disk configuration mode, use the scope local-disk-config command.
scope local-disk-config
Examples This example shows how to enter the local disk configuration mode for the RAID controller of a server.
Switch-A # scope server 1/1
Switch-A /chassis/server # scope raid-controller 1 Sas
Switch-A /chassis/server/raid-controller # scope local-disk-config
Switch-A /chassis/server/raid-controller/local-disk-config #
scope lun
To enter the logical unit number (LUN) mode for a server, use the scope lun command.
scope lun id
Syntax Description ID The ID of the logical unit number. It must be a value between 0 and 4294967297.
Examples This example shows how to enter the logical unit number mode for a RAID controller.
Switch-A # scope server 1/1
Switch-A /chassis/server # scope raid-controller 1 Sas
Switch-A /chassis/server/raid-controller # scope lun 1
Switch-A /chassis/server/raid-controller/lun #
show lun
scope lun
Usage Guidelines You must create a static target interface priority for an iSCSI VNIC before you use this command.
Examples This example shows how to enter the LUN mode for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope static-target-if 1
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if # scope lun
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if #
set ipaddress
set name
set port
create lun
enter lun
show lun
delete lun
scope mac-security
To enter the MAC security mode for a network control policy, use the scope mac-security command.
scope mac-security
Usage Guidelines A network control policy for an organization must be created to use this command.
Examples This example shows how to enter the MAC security mode for a network control policy for an organization.
Switch-A # scope org Test
Switch-A /org # scope nw-ctrl-policy Sample
Switch-A /org/nw-ctrl-policy # scope mac-security
Switch-A /org/nw-ctrl-policy/mac-security #
show mac-security
scope maint-policy
To enter the maintenance policy mode, use the scope maint-policy command.
Examples This example shows how to enter the maintenance policy mode.
Switch-A # scope org
Switch-A /org # scope maint-policy Default
Switch-A /org/maint-policy #
scope management-extension
To enter the management extension mode for the system, use the scope management-extension command.
scope management-extension
Examples This example shows how to enter the management extension mode for a system.
Switch-A # scope system
Switch-A /system # scope management-extension
Switch-A /system/management-extension #
scope member-port-channel
To enter the member port channel mode, use the scope member-port-channel command.
b Specifies port B.
2.0(1) This command was introduced in Ethernet uplink mode (/eth-uplink/vlan and
/eth-uplink/fabric/vlan).
Usage Guidelines You must create a VSAN or a VLAN and a member port channel before you use this command.
Examples This example shows how to enter the member port channel for VSAN:
Switch-A # scope fc-uplink
Switch-A /fc-uplink # scope fabric a
Switch-A /fc-uplink/fabric # scope vsan default
Switch-a /fc-uplink/fabric/vsan # scope member-port-channel a 22
Switch-a /fc-uplink/fabric/vsan/member-port-channel #
scope member-port
To enter the member port command mode, use the scope member-port command.
b Specifies fabric B.
Usage Guidelines You must create member ports before you use this command.
Examples This example shows how to enter the member port command mode:
UCS-A # scope eth-storage
UCS-A /eth-storage # scope vlan sample
UCS-A /eth-storage/vlan # scope member-port a 1 22
UCS-A /eth-storage/vlan/member-port #
enter member-port
show member-port
delete member-port
scope member-port fc
To enter the Fibre Channel member port command mode, use the scope member-port fc command.
b Specifies fabric B.
Command Modes VSAN within the Fibre Channel storage mode (/fc-storage/vsan)
VSAN within a fabric in the Fibre Channel storage mode (/fc-storage/fabric/vsan)
Usage Guidelines You must create Fibre Channel member ports before you use this command.
Examples This example shows how to enter the Fibre Channel member port command mode:
UCS-A # scope fc-storage
UCS-A /fc-storage # scope vsan sample
UCS-A /fc-storage/vsan # scope member-port fc a 1 22
UCS-A /fc-storage/vsan/member-port #
enter member-port fc
show member-port fc
delete member-port fc
b Specifies fabric B.
port-id Port identification number. The value must be between 1 and 256.
Command Modes VSAN within the Fibre Channel storage command mode (/fc-storage/vsan)
VSAN within a fabric (/fc-storage/fabric/vsan)
Usage Guidelines You must create Fibre Channel over Ethernet member ports before you use this command.
Examples This example shows how to enter the Fibre Channel over Ethernet member ports command mode:
UCS-A # scope fc-storage
UCS-A /fc-storage # scope vsan sample
UCS-A /fc-storage/vsan # scope member-port fcoe 1 233
UCS-A /fc-storage/vsan/member-port #
Command Description
delete member-port fcoe
scope memory-array
To enter the memory array mode for a server, use the scope memory-array command.
Syntax Description ID The ID of the memory array. The value must be an integer between 1 and 8.
Examples This example shows how to enter the memory array mode for a server.
Switch-A # scope server 1/1
Switch-A /chassis/server # scope memory-array 2
Switch-A /chassis/server/memory-array #
acknowledge fault
scope mon-flt
To enter the monitor filter mode, use the scope mon-flt command.
Usage Guidelines To use this command within a fabric, either a VLAN or a VSAN must be created.
Examples This example shows how to enter the monitor filter mode for a VSAN under Fibre Channel mode.
Switch-A # scope fc-uplink
Switch-A /fc-uplink # scope fabric b
Switch-A /fc-uplink/fabric # scope vsan test200
Switch-A /fc-uplink/fabric/vsan # scope mon-flt
Switch-A /fc-uplink/fabric/vsan/mon-flt #
scope monitoring
To enter monitoring mode, use the scope monitoring command.
scope monitoring
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A#scope monitoring
switch-A /monitoring #
scope mon-src
To enter the monitor source session mode, use the scope mon-src command.
Syntax Description session name The name of the monitor source session.
Usage Guidelines The monitor source session must be created to use this command.
Examples This example shows how to enter the monitor source session mode for a VNIC in a service profile.
Switch-A # scope org
Switch-A /org # scope service-profile sample
scope network
To enter network mode, use the scope network command in port-profile mode.
Usage Guidelines Use network mode to enable or disable the default network.
scope nw-ctrl-policy
To enter network control policy mode, use the scope nw-ctrl-policy command.
1.4(1) This command was introduced in the Ethernet storage command mode.
Usage Guidelines You must create a network control policy before you use this command.
Examples This example shows how to enter network control policy mode:
UCS-A# scope org org10
UCS-A /org/ # scope nw-ctrl-policy nCP10
UCS-A /org/nw-ctrl-policy #
create nw-ctrl-policy
Usage Guidelines A schedule and a one-time occurrence instance for the schedule must be created to use this command.
Examples This example shows how to enter the one-time occurrence mode for a schedule.
Switch-A # scope system
Switch-A /system # scope schedule Sample
Switch-A /system/schedule # scope occurrence one-time Trial
Switch-A /system/schedule/one-time #
Syntax Description name The name of the recurring occurrence instance for the schedule.
Usage Guidelines A schedule and the recurring occurrence instance for that schedule must be created to use this command.
Examples This example shows how to enter the recurring occurrence mode for a schedule.
Switch-A # scope system
Switch-A /system # scope schedule Default
Switch-A /system/schedule # scope occurrence recurring Trial
Switch-A /system/schedule/recurring #
scope org
To enter org mode, use the scope org command.
scope password-profile
To enter the password profile mode, use the scope password-profile command.
scope password-profile
Usage Guidelines You must be an administrator user or have aaa privileges to use this command.
Examples This example shows how to enter the password profile mode:
UCS-A # scope security
UCS-A /security # scope password-profile
UCS-A /security/password-profile #
set change-during-interval
set change-interval
set history-count
set no-change-interval
Syntax Description primary Specifies the primary path of the iSCSI image.
Usage Guidelines You must create an iSCSI profile and a path to the iSCSI image before you use this command.
Examples This example shows how to enter the path for an iSCSI profile within the boot-policy mode:
UCS-A # scope org test
UCS-A /org # scope boot-policy sample
UCS-A /org/boot-policy # scope iscsi
UCS-A /org/boot-policy/iscsi # scope path secondary
UCS-A /org/boot-policy/iscsi/path #
scope policy
To enter policy mode for various types of faults and system events, use the scope policy command.
Syntax Description event Select a predefined fault or system event type. See Usage Guidelines for event
options.
Usage Guidelines Use this command to enter the policy mode for various types of faults and system events. In the specific policy
mode, you can enable or disable Call Home messages for the type of fault or system event. The following list
shows the available keywords:
• association-failed
• chassis-seeprom-error
• configuration-failure
• connectivity-problem
• election-failure
• equipment-inaccessible
• equipment-inoperable
• equipment-problem
• fru-problem
• identity-unestablishable
• link-down
• management-services-failure
• management-services-unresponsive
• power-problem
• thermal-problem
• unspecified
• version-incompatible
• voltage-problem
Examples This example shows how to enter an existing policy mode for link-down events and how to enable Call Home
messages for those events:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # scope policy link-down
switch-A /monitoring/callhome/policy # set admin-state enabled
switch-A /monitoring/callhome/policy* # commit-buffer
switch-A /monitoring/callhome/policy #
scope pooled-ip-params
To enter the configured pool for initiator IP addresses mode, use the scope pooled-ip-params command.
scope pooled-ip-params
Command Modes IPv4 interface within the iSCSI VNIC mode (/org/service-profile/vnic-iscsi/eth-if/ip-if)
Usage Guidelines You must configure a pool of initiator IP parameters before you use this command.
Examples This example shows how to enter the configured pool of initiator IP parameters mode:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if # scope pooled-ip-params
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if/pooled-ip-params #
enter pooled-ip-params
show pooled-ip-params
delete pooled-ip-params
create ip-if
scope port-channel
To enter the port channel mode, use the scope port-channel command.
Syntax Description port-channel-id Port identification number. It is the value you specified while creating the
port channel.
Command Modes Fabric interconnect mode within the Ethernet Uplink mode (/eth-uplink/fabric)
Fabric interconnect mode within the Ethernet storage mode (/eth-storage/fabric)
Fabric interconnect mode within the Fibre Channel Uplink mode (/fc-uplink/fabric)
1.4(1) This command was introduced in the fabric interconnect mode within the Fibre
Channel uplink mode (/fc-uplink/fabric) and Ethernet storage mode
(/eth-storage/fabric).
scope port-profile
To enter port-profile mode, use the scope port-profile command in profile-set mode.
2.0(1) This command was introduced in the cluster set command mode.
scope post-code-reporter
To enter the POST code reporter mode for a system, use the scope post-code-reporter command.
Usage Guidelines A POST code reporter must be available on the system to use this command.
Examples This example shows how to enter the POST code reporter mode for the system.
UCS-A # scope system
UCS-A /system # scope capability
UCS-A /system/capability # scope post-code-reporter testing
UCS-A /system/capability/post-code-reporter* # commit-buffer
UCS-A /system/capability/post-code-reporter #
scope post-code-template
To enter the POST code template mode for a system, use the scope post-code-template command.
Usage Guidelines A POST code template must be available on the system to use this command.
Examples This example shows how to enter the POST code template mode for the system
Switch-A # scope system
Switch-A /system # scope capability
Switch-A /system/capability # scope post-code-template test-codes
Switch-A /system/capability/post-code-template* # commit-buffer
Switch-A /system/capability/post-code-template #
scope power-cap-mgmt
To enter the power capping management mode for the switch, use the scope power-cap-mgmt command.
scope power-cap-mgmt
Examples This example shows you how to enter the power capping management mode from the adapter mode.
Switch-A # scope adapter 1/1
Switch-A /server/adapter # scope power-cap-mgmt
Switch-A /power-cap-mgmt #
scope power-control-policy
To enter the power control policy mode, use the scope power-control-policy command.
Usage Guidelines A power control policy must be created to use this command.
Examples This example shows how to enter the power control policy mode.
Switch-A # scope org
Switch-A /org # scope power-control-policy Sample
Switch-A /org/power-control-policy #
scope power-group
To enter the power group mode, use the scope power-group command.
Examples This example shows how to enter the power group mode.
Switch-A # scope power-cap-mgmt
Switch-A /power-cap-mgmt # scope power-group Sample
Switch-A /power-cap-mgmt/power-group #
scope pre-login-banner
To enter the pre-login banner mode, use the scope pre-login-banner command.
scope pre-login-banner
Examples This example shows how to enter the pre-login banner mode.
UCS-A # scope security
UCS-A /security # scope banner
UCS-A /security/banner # scope pre-login-banner
UCS-A /security/banner/pre-login-banner #
scope priority-weight
To set a priority for a power capping management policy, use the scope priority-weight command.
Syntax Description Admin priority Use this option to set an administrator priority to the power capping
management policy. The value must be numeral between 1 - 10.
Examples This example shows you how to set an administrator priority on the power capping management policy.
Switch-A # scope power-cap-mgmt
Switch-A /power-cap-mgmt # scope priority-weight 3
Switch-A /power-cap-mgmt/priority-weight #
scope profile
To change the mode to the callhome destination profile, use the scope profile command.
Syntax Description Name Name of the callhome destination profile. The value of this name can include a
maximum of 16 characters.
Usage Guidelines The name of the callhome profile can include a maximum of 16 characters that can be alphanumeric.
Examples This example show how to change modes to the callhome profile:
switch-A # scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # scope profile
Word Name (Max size 16)
switch-A /monitoring/callhome # scope profile Sample
switch-A /monitoring/callhome/profile #
scope policy
scope profile-set
To enter profile-set mode, use the scope profile-set command in vmware mode.
scope profile-set
Usage Guidelines You use profile-set mode to perform the following tasks:
• Create and delete port profiles
• Show events, the status of the port set finite state machine, and port profiles
scope psu
To enter the power supply unit mode, use the scope psu command.
Syntax Description 1-8 PSU Number of the power supply unit. The value must be an integer between 1 and
8.
1.4(1) This command was introduced in the Fabric extender module (/fex) mode.
Usage Guidelines The PSU number must be a unique number between 1 and 8.
Examples This example shows how to change the mode to the power supply unit of the chassis:
Switch-A # scope chassis
1-255 Chassis ID
Switch-A # scope chassis 1
Switch-A /chassis # scope psu 2
Switch-A /chassis/psu #
scope psu-policy
To enter psu-policy mode, use the scope psu-policy command.
scope psu-policy
scope qos
To enter QoS mode, use the scope qos command.
scope qos
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A /eth-server/qos #
scope qos-policy
To enter qos-policy mode, use the scope qos-policy command in org mode.
scope rack
To enter the rack qualifier mode, use the scope rack command.
Syntax Description minimum-slot-id The minimum slot ID that you specified while creating the rack qualifier.
maximum-slot-id The maximum slot ID that you specified while creating the rack qualifier.
Usage Guidelines A server pool policy qualification and a rack qualifier must be created to use this command.
Examples This example shows how to enter the rack qualifier mode.
UCS-A # scope org test
UCS-A /org # scope server-qual sample_policy
UCS-A /org/server-qual # scope rack 1 25
UCS-A /org/server-qual/rack #
enter rack
show rack
delete rack
scope rack-mount
To enter the rack-mount mode, use the scope rack-mount command.
Syntax Description vendor Name of the vendor of the rack mount server. The value can include a maximum of
510 alphanumeric characters.
model Model number of the rack mount server. The value can include a maximum of 510
alphanumeric characters.
hw-rev Hardware revision number of the rack mount server. The value can include a
maximum of 510 alphanumeric characters.
Examples This example shows how to enter the rack-mount mode of the server:
UCS-A # scope system
UCS-A /system # scope capability
UCS-A /system/capability # scope rack-mount Cisco Systems Inc R200-23454W 0
UCS-A /system/capability/rack-mount #
scope rackserver-disc-policy
To enter the rack server discovery policy mode, use the scope rackserver-disc-policy command.
scope rackserver-disc-policy
Usage Guidelines This mode is applicable only in the root organization mode.
Examples This example shows how to enter the rack server discovery policy.
Switch-A # scope org
Switch-A /org # scope rackserver-disc-policy
Switch-A /org/rackserver-disc-policy #
scope radius
To enter radius mode, use the scope radius command.
scope radius
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A#scope security
scope raid-controller
To enter the RAID controller mode for a server, use the scope raid-controller command.
Syntax Description id The ID of the RAID controller. It must be a value between 0 and 4294967295.
sas Use this option to enter the SAS type of RAID controller.
sata Use this option to enter the SATA type of RAID controller.
Usage Guidelines A RAID controller for a server must be created to use this command.
Examples This example shows how to enter the RAID controller mode for a server.
Switch-A # scope server 1/1
Switch-A /chassis/server # scope raid-controller 1 Sas
Switch-A /chassis/server/raid-controller #
scope lun
scope role
To enter role mode, use the scope role command.
switch-A#scope security
switch-A /security #
scope scheduler
To enter the scope scheduler mode, use the scope scheduler command.
scope security
To enter security mode, use the scope security command.
scope security
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A /security #
scope server
To enter server mode, use the scope server command.
switch-A /chassis/server #
Usage Guidelines The LDAP server must be created to use this command.
Examples This example shows how to enter the LDAP server mode.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope server Testserver
Switch-A /security/ldap/server #
show server
scope server
Containers ?
Data centers ?
scope server-if
To enter the server facing interface mode, use the scope server-if command.
scopeserver-ifport id
Syntax Description port id ID of the port. It must be a value between 0 and 4294967295.
Examples This example shows how to enter the server facing interface mode for a port group within a chassis:
UCS-A # scope chassis 1
UCS-A /chassis # scope iom 2
UCS-A /chassis/iom # scope port-group fabric
UCS-A /chassis/iom/port-group # scope server-if 22
UCS-A /chassis/iom/port-group/server-if #
scope fex
scope server-qual
To enter server-qual mode, use the scope server-qual command.
switch-A /org/server-qual #
scope server-ref
To enter the server reference mode for an authentication server group, use the scope server-ref command.
Syntax Description name The name of the server. You can enter either the name of the server or the IP address.
Usage Guidelines An authentication server group and the server reference for the authentication server group is required to use
this command.
Examples This example shows how to enter the server reference mode for an authentication server group.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope auth-server-group Sample
Switch-A /security/ldap/auth-server-group # scope server-ref example-server
Switch-A /security/ldap/auth-server-group/server-ref #
scope services
To enter services mode, use the scope services command.
scope services
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A#scope system
switch-A /system/services #
scope service-profile
To enter the service profile command, use the scope service-profile command.
org The name of the organization for which the service profile was created.
server The server ID for which the service profile was created.
Usage Guidelines To use the command with the option org , an organization and a service profile for that organization must be
created.
To use the command with the option server , the value entered can either be the server ID, or the chassis ID
with the blade ID (n/n format).
Examples This example shows how to enter the service profile mode.
Switch-A # scope service-profile server 1/1
Switch-A /org/service-profile #
Command Description
show service-profile status server
Syntax Description dynamic-uuid The dynamic UUID for the service profile. The value can either be derived
or the UUID.
server The server ID. The value entered should either be the server ID or the
chassis-ID/blade-id (n/n format).
Usage Guidelines The service profile for the organization must be created to use this command.
Examples This example shows how to enter the server of the service-profile for an organization.
Switch-A # scope org Testing
Switch-A /org # scope service-profile server 1/1
Switch-A /org/service-profile #
show service-profile
scope snmp-user
To enter SNMP user mode, use the scope snmp-user command.
scope snmp-user
switch /monitoring/snmp-user #
scope static-ip-params
To enter the static initiator of IP parameters mode, use the scope static-ip-params command.
scope static-ip-params
Usage Guidelines You must configure a static initiator of IP parameters before you use this command.
Examples This example shows how to enter the static initiator of IP parameters mode:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope ip-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if # scope static-ip-params
UCS-A /org/service-profile/vnic-iscsi/eth-if/ip-if/static-ip-params #
set default-gw
set primary-dns
set secondary-dns
set subnet
create static-ip-params
enter static-ip-params
show static-ip-params
Command Description
delete static-ip-params
scope static-target-if
To enter the configured static target interface mode for an iSCSI VNIC, use the scope static-target-if command.
Syntax Description static target priority Static target priority that you specified when you created the static
target interface.
Usage Guidelines You must configure a static target interface for an iSCSI VNIC before you use this command.
Examples This example shows how to enter the static target interface mode for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope static-target-if 1
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if #
enter static-target-if
show static-target-if
delete static-target-if
scope stats-threshold-policy
To enter the statistics threshold policy mode, use the scope stats-threshold-policy command.
1.4(1) This command was introduced in the Ethernet storage command mode
(/eth-storage).
Usage Guidelines You must create a statistics threshold policy before you use this command.
Examples This example shows how to enter the statistics threshold policy in the Ethernet storage command mode:
UCS-A # scope eth-storage
UCS-A /eth-storage # scope stats-threshold-policy sample-policy
UCS-A /eth-storage/stats-threshold-policy #
show stats-threshold-policy
scope storage-controller
To enter the storage controller command mode, use the scope storage-controller command.
Examples This example shows how to enter the storage controller command mode:
UCS-A # scope system
UCS-A /system # scope capability
UCS-A /system/capability # scope storage-controller Cisco C240 0
UCS-A /system/capability/storage-controller #
scope sys-defaults
To enter the system default settings mode, use the scope sys-defaults command.
scope sys-defaults
Examples This example shows how to enter the system default settings mode.
UCS-A # scope system
UCS-A /system # scope sys-defaults
UCS-A /system/sys-defaults #
scope system
To enter system mode, use the scope system command.
scope system
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A /system #
scope tacacs
To enter TACACS mode, use the scope tacacs command.
scope tacacs
Usage Guidelines You do not have to enter this mode with a managed object.
switch-A#scope security
switch-A /security/tacacs #
scope threshold-value
To enter a threshold value for a property, use the enter threshold-value command.
enter threshold-value {above-normal | below-normal} {cleared | condition | critical | info | major | minor
| warning}
Examples The following example shows how to enter the threshold value above-normal critical in property packets-rx-delta
mode:
switch-A#scope org org100
switch-A /org # scope stats-threshold-policy stp100
scope update
To enter update mode, use the scope update command.
Syntax Description label Specifies the label of an update in the update history.
scope cat-updater
scope vcenter
To enter vcenter (VCenter) mode, use the scope vcenter command in vmware mode.
scope vcon-policy
To enter vcon-policy mode, use the scope vcon-policy command.
scope vhba
To enter virtual HBA mode, use the scope vhba command.
switch-A /org/vhba #
scope vhba-templ
To enter virtual HBA template mode, use the scope vhba-templ command.
Examples This example shows how to enter virtual HBA template mode:
switch-A /org/vhba-templ #
scope virtual-machine
To enter virtual-machine mode, use the scope virtual-machine command in vmware mode.
scope virtual-machine
Usage Guidelines The virtual machine must be created to use this command.
Examples This example shows how to enter the virtual machine mode for the system.
UCS-A # scope system
UCS-A /system # scope vm-mgmt
UCS-A /system/vm-mgmt # scope virtual-machine 4125a5e0-e2c3-11de-8a39-0800200c9a66
UCS-A /system/vm-mgmt/virtual-machine #
scope vlan
To enter VLAN mode, use the scope vlan command.
1.4(1) Ethernet Storage, and Fabric within Ethernet Storage modes were added.
scope vm-life-cycle-policy
To enter the virtual machine life cycle policy mode, use the scope vm-life-cycle-policy command.
scope vm-life-cycle-policy
Examples This example shows how to enter the Virtual machine life cycle policy for the system.
Switch-A # scope system
Switch-A /system # scope vm-mgmt
Switch-A /system/vm-mgmt # scope vm-life-cycle-policy
Switch-A /system/vm-mgmt/vm-life-cycle-policy #
scope vm-mgmt
To enter vm-mgmt (virtual machine management) mode, use the scope vm-mgmt command in system mode.
scope vm-mgmt
scope vmware
To enter vmware (VMware) mode, use the scope vmware command in vm-mgmt mode.
scope vmware
scope vnic
To enter virtual NIC mode, use the scope vnic command.
switch-A /org/vnic #
scope vnic-iscsi
To enter the VNIC iSCSI mode for a service profile, use the scope vnic-iscsi command.
Syntax Description name Name of the iSCSI VNIC. It is the name that you provided when you created the
iSCSI VNIC.
Usage Guidelines You must create a service profile and an iSCSI VNIC for the service profile before you use this command.
Examples This example shows how to enter the iSCSI VNIC mode for a service profile:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi #
enter vnic-iscsi
show vnic-iscsi
delete vnic-iscsi
scope vnic-templ
To enter virtual NIC template mode, use the scope vnic-templ command.
Examples This example shows how to enter virtual NIC template mode:
switch-A /org/vnic-templ #
scope vsan
To enter the VSAN mode, use the scope vsan command.
Examples This example shows how to enter the VSAN for a Fabric within the Fibre Channel uplink mode.
Switch-A # scope fc-uplink
Switch-A /fc-uplink # scope fabric a
Switch-A /fc-uplink/fabric # scope vsan vlan1
Switch-A /fc-uplink/fabric/vsan #
show vsan
delete vsan
scope web-session-limits
To enter the web sessions mode, use the scope web-session-limits command.
scope web-session-limits
Syntax Description
This command has no arguments or keywords.
Examples This example shows how to enter the web session limits mode.
Switch-A # scope system
Switch-A /system # scope services
Switch-A /system/services # scope web-session-limits
Switch-A /system/services/web-session-limits #
set total
scope wwn-pool
To enter WWN pool mode, use the scope wwn-pool command.
switch-A /org/wwn-pool #
send
To send the current system inventory message to the Smart Call Home database, use the send command.
send
Usage Guidelines Use this command to immediately send the current system inventory message to the Smart Call Home database.
Examples This example shows how to send the current system inventory message:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # scope inventory
switch-A /monitoring/callhome/inventory # send
switch-A /monitoring/callhome/inventory #
send-syslog
To create and send a syslog message, use the send-syslog command.
send-syslog {emergencies| alerts| critical| errors| warnings| notifications| information| debugging} text
Usage Guidelines Use this command to create and send a syslog message. Specify the urgency level of the message and enter
up to 512 characters of text. If the text includes spaces, it must be enclosed in quotes (" ").
The following table shows the urgency level options in order of decreasing urgency.
Examples This example shows how to create and send a syslog message:
switch-A# scope monitoring
switch-A /monitoring # send-syslog alerts "This is a test message"
switch-A /monitoring #
send-test-alert
To send a Callhome test alert message, use the send-test-alert command.
Examples This example shows how to send a Callhome test alert message:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # send-test-alert alert-message-type diag
switch-A /monitoring/callhome #
set account-status
To set a status for an account of the local user, use the set account-status command.
inactive To set the account status to inactive. If an account is set to inactive, then the
user cannot login to the server.
Examples This example shows how to change the status of a local user to inactive.
UCS-A # scope security
UCS-A /security # scope local-user admin
UCS-A /security/local-user # set account-status inactive
UCS-A /security/local-user* # commit-buffer
UCS-A /security/local-user #
set firstname
set lastname
set phone
Command Description
set sshkey
set action
To set action, use the set action command.
chassis-disc-policy mode
set action {1-link| 2-link| 4-link}
import-config mode
set action {merge| replace}
server-disc-policy mode
set action {diag| immediate| user-acknowledged}
Usage Guidelines Use this command in chassis-disc-policy mode to specify the number of links to the switch that the chassis
must have to be discovered.
switch-A /org/chassis-dis-policy #
set adaptor-policy
To set an adaptor policy, use the set adaptor-policy command.
Use this command to associate the specified profile with the service profile you used to enter service profile
mode.
set adaptor-policy
To set an adaptor policy, use the set adaptor-policy command.
Use this command to associate the specified profile with the service profile you used to enter service profile
mode.
set addr
To set an IP address for the external management static IP address, use the set addr command.
Command Modes External management static IP address under service profile (/org/service-profile/ext-static-ip)
External management static IP address under CIMC (/chassis/server/cimc/ext-static-ip)
Usage Guidelines The external management IP address and the default gateway must be on the same subnet.
The external management IP address cannot match the default gateway.
Examples This example shows how to set an IP address for the external management static IP mode.
Switch-A # scope org
Switch-A /org # scope service-profile sample
Switch-A /org/service-profile # scope ext-static-ip
Switch-A /org/service-profile/ext-static-ip # set addr 1.2.3.4
Switch-A /org/service-profile/ext-static-ip* # commit-buffer
Switch-A /org/service-profile/ext-static-ip #
set adminspeed
To set the speed for a fabric interface, use the set adminspeed command.
Syntax Description 10gbps Use this option to set the speed of the interface to 10 Gbps.
1gbps Use this option to set the speed of the interface to 1 Gbps.
Usage Guidelines An interface must be created for the fabric to use this command.
Examples This example shows to set the speed for the fabric interface.
Switch-A # scope eth-storage
Switch-A /eth-storage # scope fabric b
Switch-A /eth-storage/fabric # scope interface 2 3
Switch-A /eth-storage/fabric/interface # set adminspeed 10gbps
Switch-A /eth-storage/fabric/interface #
set adminstate
To reset the connectivity of an adapter, use the set adminstate command.
Usage Guidelines Use this command to reset connectivity on the vNIC or vHBA. A shutdown and enable sequence is performed
on the port.
The active and passive options are not available on external host ports.
Command Description
show host-eth-if
show host-fc-if
set admin-state
To set the administration state of a policy, use the set admin-state command.
Usage Guidelines Use this command to enable or disable the context policy when a fault or system event matching the associated
cause is encountered.
Examples This example shows how to enable the administration state for link-down system events:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # scope policy link-down
switch-A /monitoring/callhome/policy # set admin-state enabled
switch-A /monitoring/callhome/policy* # commit-buffer
switch-A /monitoring/callhome/policy #
Syntax Description eth Specifies all of the unified ports in the Ethernet mode to be represented by illuminated
beacon LED lights.
fc Specifies all of the unified ports in the Fibre Channel mode to be represented by
illuminated beacon LED lights.
off Specifies that the beacon LED lights for all ports on the module are turned off.
Examples This example shows how to specify that the beacon LED lights for all ports on the module are turned off:
UCS-A # scope fabric-interconnect A
UCS-A /fabric-interconnect # scope card 1
UCS-A /fabric-interconnect/card # scope beacon-led
UCS-A /fabric-interconnect/card/beacon-led # set admin-state Off
UCS-A /fabric-interconnect/card/beacon-led* # commit-buffer
UCS-A /fabric-interconnect/card/beacon-led #
show beacon-led
set admin-vcon
To set up an administrative vCon (administrative virtual network interface connection) for the vHBA, use the
set admin-vcon command in vhba or vnic mode.
Examples This example shows how to set up an administrative vCon in vhba mode:
switch-A# scope org org100
switch-A /org # scope service-profile sp100
switch-A /org/service-profile # scope vhba vhba100
switch-A /org/service-profile/vhba # set admin-vcon any
switch-A /org/service-profile/vhba* # commit-buffer
switch-A /org/service-profile/vhba #
set aes-128
To set up AES (Advanced Encryption Standard) 128-bit encryption, use the set aes-128 command.
Usage Guidelines SNMPv3, enabled on a UCS system by using the create snmp-user command, provides important security
features. One is authentication of packets, to prevent snooping by an unauthorized source. Use AES 128-bit
encryption to fully utilize the extended features of SNMPv3 on your UCS system.
set agent-policy
To set up an agent policy, use the set agent-policy command.
Usage Guidelines Use this command to associate the specified agent policy with the service profile you used to enter service
profile mode.
policy-name should be a unique set of numbers and letters that identifies the policy. The range of valid values
is 1 to 16.
set alertgroups
To enable alerts from predefined Call Home alert groups, use the set alertgroups command.
Syntax Description ciscotac Specifies the Cisco Technical Assistance Center (TAC) alert group.
Usage Guidelines Use this command to select and enable a set of alert groups for a Call Home profile. An alert group is a
predefined subset of Call Home alerts. Different types of Call Home alerts are grouped into different alert
groups depending on their type.
Note When you enter the set alertgroups command, any previously configured alert group list within the Call
Home profile is replaced. To add more alert groups to an existing alert group list, use the add alertgroups
command. To remove alert groups from an existing alert group list, use the remove alertgroups command.
Examples This example shows how to configure the sending of Call Home alerts from the environmental and diagnostic
alert groups.
UCS-A /monitoring # scope callhome
UCS-A /monitoring/callhome # enter profile ProfileOne
UCS-A /monitoring/callhome/profile # set alertgroups environmental diagnostic
UCS-A /monitoring/callhome/profile* # create destination admin@example.com
UCS-A /monitoring/callhome/profile/destination* # commit-buffer
UCS-A /monitoring/callhome/profile/destination #
set all
To specify the management logging threshold for all modules, use the set all command.
set all {crit| major| minor| warn| info| debug4| debug3| debug2| debug1| debug0}
Usage Guidelines Use this command to specify the management logging threshold for all modules. The threshold options are
listed in order of decreasing urgency in the Syntax Description.
Examples This example shows how to set the management logging threshold to major for all modules:
switch-A# scope monitoring
switch-A /monitoring # scope sysdebug
switch-A /monitoring/sysdebug # scope mgmt-logging
set arch
To set processor architecture (arch), use the set arch command.
set arch {dual-core-opteron| intel-p4-c| opteron| pentium-4| turion-64| xeon| xeon-mp| any}
switch-A /org/server-qual/processor #
set attribute
To set an attribute, use the set attribute command.
Syntax Description attribute Attribute name. The range of valid values is 1 to 63.
Usage Guidelines Use this command to restrict database searches to records that contain the specified attribute.
switch-A#scope security
switch-A /security/ldap #
set auth
To set the authentication type for an SNMP user, use the set auth command.
Usage Guidelines SNMPv3, enabled on a UCS system by using the create snmp-user command, provides important security
features. One is authentication, to verify that a message is from a valid source. Use MD5 or SHA authentication
to fully utilize the extended features of SNMPv3 on your UCS system.
Examples This example shows how to set the SNMP user authentication type:
switch-A# scope monitoring
switch /monitoring # scope snmp-user SU10
switch /monitoring/snmp-user # set auth sha
switch /monitoring/snmp-user* # commit-buffer
switch /monitoring/snmp-user #
switch-A#scope security
switch-A /security #
switch-A#scope security
switch-A /security #
set authport
To set up an authentication port, use the set authport command.
set authport id
Syntax Description id Authentication port identification number. The range of valid values is 1 to 65535.
Usage Guidelines Use this command to specify the port used to communicate with a RADIUS server.
switch-A#scope security
switch-A /security/radius/server #
set authorization
To enable or disable authorization for an LDAP group rule, use the set authorization command.
Syntax Description disable Use this option to disable authorization for an LDAP group rule.
enable Use this option to enable authorization for an LDAP group rule.
Usage Guidelines An LDAP server and an LDAP group rule must be created to use this command.
Examples This example shows how to enable authorization for an LDAP group rule.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope server Testing
Switch-A /security/ldap/server # scope ldap-group-rule
Switch-A /security/ldap/server/ldap-group-rule # set authorization enable
Switch-A /security/ldap/server/ldap-group-rule* # commit-buffer
Switch-A /security/ldap/server/ldap-group-rule #
show ldap-group-rule
set auth-server-group
To set an authentication server group, use the set auth-server-group command.
Syntax Description authentication server group The name of the authentication server group.
Usage Guidelines An authentication server group must be created to use this command.
Examples This example shows how to set the authentication server group for console authentication:
Switch-A # scope security
Switch-A /security # scope console-auth
Switch-A /security/console-auth # set auth-server-group Default
Switch-A /security/console-auth* # commit-buffer
Switch-A /security/console-auth #
Syntax Description log-full Specifies that the log is backed up when it is full.
on-change-of-association Specifies that the log is backed up when the server changes associations.
Usage Guidelines Use this command to specify an action or actions that will trigger a backup of the system event log.
Note When you enter the set backup action command, any previously configured list of actions is replaced.
To add more actions to an existing list, use the add backup action command. To remove actions from
an existing list, use the remove backup action command.
Examples This example shows how to back up the log when the log is full, when the log is cleared, and on an interval:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # set backup action log-full on-clear timer
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
Syntax Description no The system event log is not cleared after a backup operation.
Command Default The system event log is not cleared after a backup operation.
Usage Guidelines Use this command to specify whether to clear the system event log after a backup operation.
Examples This example shows how configure clearing of the system event log after a backup operation:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # set backup clear-on-backup yes
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
Syntax Description url Specifies the URL where the system event log backup file will be stored.
Usage Guidelines Use this command to specify the protocol, user, password, remote hostname, and remote path for the backup
operation. The url can be specified using the syntax of one of the following protocols:
• FTP— ftp:// hostname/path
• SCP— scp:// username@hostname/path
• SFTP— sftp:// username@hostname/path
• TFTP— tftp:// hostname:port-num/path
If the destination requires a username and password, use the URL format for the specific protocol, such as
ftp:// user:password@ hostname/path for FTP.
Note You can also configure the backup destination by using the set backup hostname , set backup password
, set backup protocol , set backup remote-path , set backup user commands.
Examples This example shows how configure an ftp destination with login for system event log backups:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # set backup destination
ftp://joe:password1@ftp.example.com/backups
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
Syntax Description ascii Specifies that the backup file will be in ASCII format.
Usage Guidelines Use this command to specify the format for the system event log backup file.
Examples This example shows how to specify a binary format for the system event log backup file:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # set backup format binary
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
Syntax Description hostname The host name of the backup destination server.
Usage Guidelines Use this command to specify the host name or IP address of the backup destination server.
Examples This example shows how to specify the host name of the backup destination server:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # set backup hostname ftp.example.com
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
Usage Guidelines Use this command to enable or disable the automatic backup operation and to specify the time interval for
automatic backups. To disable automatic backups, specify the never keyword.
Examples This example shows how to specify automatic backups at 8 hour intervals:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # set backup interval 8-hours
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
Syntax Description password The login password for the backup destination server.
Usage Guidelines Use this command to specify the password for connecting to the system event log backup destination server.
The password is not used when TFTP is the backup protocol.
Examples This example shows how to specify the password for connecting to the backup destination server:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # set backup password
Password:
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
Usage Guidelines Use this command to specify the file transfer protocol for the system event log backup.
Examples This example shows how to specify SFTP as the backup file transfer protocol:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # set backup protocol sftp
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
Usage Guidelines Use this command to specify the remote server path for system log file backups. The remote-path is a unique
set of up to 128 characters that identifies a path on the remote server. Do not use characters that are not allowed
in a URL.
Examples This example shows how to set the remote path for backups:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # set backup remote-path /test/sel/backups
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
Syntax Description user-name The login user name for the backup destination server.
Usage Guidelines Use this command to specify a user name for connecting to the system event log backup destination server.
The user name can be up to 128 characters.
Examples This example shows how to specify a user name for connecting to the backup destination server:
switch-A# scope org
switch-A /org # scope ep-log-policy sel
switch-A /org/ep-log-policy # set backup user superUser
switch-A /org/ep-log-policy* # commit-buffer
switch-A /org/ep-log-policy #
set basedn
To set up a distinguished name, use the set basedn command.
Syntax Description basedn Distinguished name. The range of valid values is 1 to 127.
1.4(1) This command was introduced in the LDAP server mode, and the command option
has been renamed as basedn
Usage Guidelines Use this command to restrict database searches to records that contain the specified distinguished name.
switch-A#scope security
switch-A /security/ldap #
set binddn
To configure the distinguished name for the LDAP database superuser account, use the set binddn command.
Usage Guidelines Use this command to configure the distinguished name for the LDAP database superuser account. Enter a
name of up to 127 characters. If the name includes spaces, you must enclose the name in quotes (" ").
set bios-settings-scrub
To specify whether the BIOS settings are cleared when the server is disassociated from a service profile, use
the set bios-settings-scrub command.
Syntax Description no Disables BIOS settings scrub. The BIOS settings are preserved.
yes Enables BIOS settings scrub. The BIOS settings are reset to default.
Usage Guidelines Use this command in a scrub policy to specify whether the BIOS settings in CMOS memory are cleared or
preserved when the server is disassociated from a service profile. The action taken is as follows:
• If enabled, erases all BIOS settings for the server and and resets them to the BIOS defaults for that server
type and vendor
• If disabled, preserves the existing BIOS settings on the server
Note This command is deprecated in some releases. With those releases, you can use the reset-cmos command
to manually reset the BIOS settings.
Examples This example shows how to specify in a scrub policy that the BIOS settings will be erased when the server is
disassociated:
switch-A# scope org org10
switch-A /org # scope scrub-policy scrub100
switch-A /org/scrub-policy # set bios-settings-scrub yes
show scrub-policy
set blocksize
To set the block size, use the set blocksize command.
Syntax Description blocksize Storage block size. The range of valid values is 0 to 4294967295.
switch-A /org/server-qual/storage #
Syntax Description disabled Use this option to disable the retry configuration.
platform-default Use this option to set the retry configuration to be the same as the platform
default.
Examples This example shows how to enable the retry configuration of the boot option.
UCS-A # scope org
UCS-A /org # scope bios-policy Sample
UCS-A /org/bios-policy # set boot-option-retry-config retry enable
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
set boot-policy
To set the boot policy, use the set boot-policy command.
Syntax Description name Boot policy name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to associate the specified boot policy with the service profile you used to enter service
profile mode.
switch-A /org/service-profile #
set cap-policy
To set a power capping policy, use the set cap-policy command.
Syntax Description policy-driven-chassis-group-cap Use this option to set a policy driven chassis group cap.
set cert
To enter a certificate in a keyring, use the set cert command.
set cert
Usage Guidelines Use this command to enter a certificate into a keyring. When prompted, paste the text of the certificate at the
prompt, then type ENDOFBUF to finish.
set certchain
To enter a list (or chain) of trustpoints, use the set certchain command.
Syntax Description certchain The name of a trustpoint. If this variable is omitted, you are prompted to enter
a name or names.
Usage Guidelines Use this command to enter a list of one or more trustpoints defining a certification path to the root certificate
authority (CA). You can the enter up to 512 characters in the command line. If you do not specify trustpoints
in the command line, you are prompted to type or paste the information at the prompt, then type ENDOFBUF
to finish.
set certificate
To set up a certificate, use the set certificate command.
Syntax Description certificate-name The name of the certificate. The range of valid values is 1 to 512.
Examples This example shows how to set the URL of the certificate:
switch-A# scope system
switch-A /system # scope vm-mgmt
switch-A /system/vm-mgmt # scope vmware
switch-A /system/vm-mgmt/vmware # set certificate workspace:
switch-A /system/vm-mgmt/vmware* # commit-buffer
switch-A /system/vm-mgmt/vmware #
set change-count
To set the number of times a user password can be modified, use the set change-count command.
Syntax Description password change count Number of times the password can be changed. The value is a numeral
between 0 and 10.
Usage Guidelines You must be an administrator user or have aaa privileges to use this command.
Examples This example shows how to set the change count for a password to 6:
UCS-A # scope security
UCS-A /security # scope password-profile
UCS-A /security/password-profile # set change-count 6
UCS-A /security/password-profile* # commit-buffer
UCS-A /security/password-profile #
set change-interval
set history-count
set no-change-interval
set change-during-interval
To enable or disable password modification during an interval, use the set change-during-interval command.
Usage Guidelines You must be an administrator user or have aaa privileges to use this command.
Examples This example shows how to enable password modification during the interval:
UCS-A # scope security
UCS-A /security # scope password-profile
UCS-A /security/password-profile # set change-during-interval enable
UCS-A /security/password-profile* # commit-buffer
UCS-A /security/password-profile #
set change-interval
set history-count
set no-change-interval
set change-interval
To specify an interval for changing a password, use the set change-interval command.
Syntax Description password change interval Time duration in hours for changing a password. The value must be
between 1 and 745.
Usage Guidelines You must be administrator user or have aaa privileges to use this command.
Examples This example shows how to set the time duration for changing a password to 50 hours:
UCS-A # scope security
UCS-A /security # scope password-profile
UCS-A /security/password-profile # set change-interval 50
UCS-A /security/password-profile* # commit-buffer
UCS-A /security/password-profile #
set change-during-interval
set history-count
set no-change-interval
Syntax Description port Port number. The range of valid values is 1 to 65535.
switch-A#scope system
switch-A /system/services #
set clear-action
To specify whether all cleared fault messages will be retained or deleted, use the set clear-action command.
Syntax Description delete Specifies that fault messages are deleted when cleared.
Usage Guidelines Use this command to specify whether all cleared fault messages will be retained or deleted
Examples This example shows how to configure retention of cleared fault messages for 30 days:
switch-A# scope monitoring
switch-A /monitoring # scope fault policy
switch-A /monitoring/fault-policy # set clear-action retain
switch-A /monitoring/fault-policy* # set retention-interval 30 0 0 0
switch-A /monitoring/fault-policy* # commit-buffer
switch-A /monitoring/fault-policy #
Syntax Description no Disables the option to clear password history for the local user.
yes Enables the option to clear password history for the local user.
Usage Guidelines You must create a local user before you use this command.
You must be an administrator user or have aaa privileges to use this command.
Examples This example shows how to enable the option for clearing password for a local user:
UCS-A # scope security
UCS-A /security # scope local-user sample
UCS-A /security/local-user # set clear password-history yes
UCS-A /security/local-user #
Syntax Description off Command output lines wrap in the terminal window.
Usage Guidelines Use this command to select whether command output lines will wrap or truncate to fit the width of the terminal
window.
Examples This example shows how to select whether command output lines will wrap or truncate:
Switch-A# scope monitoring
Switch-A /monitoring # set cli suppress-field-spillover on
Switch-A /monitoring # show fault
Severity Code Last Transition Time ID Description
--------- -------- ------------------------ -------- -----------
Warning F16520 2010-01-21T18:33:22.065 5785755 [FSM:STAGE:RETRY:]: detect
mezz cards in 1/6(FSM-STAGE:sam:dme:ComputeBladeDiscover:NicPresence)
Condition F77960 2010-01-21T18:32:31.255 1089623 [FSM:STAGE:REMOTE-ERROR]: R
esult: end-point-unavailable Code: unspecified Message: sendSamDmeAdapterInfo: i
dentify failed
Switch-A /monitoring #
Usage Guidelines Use this command to display or suppress headers in command output tables.
Examples This example shows how to suppress headers in command output tables:
Switch-A# scope monitoring
Switch-A /monitoring # show fsm task
FSM Task:
Item ID Completion FSM Flags
---------------- -------- ------------ ---------
Powercycle 1154858 Scheduled
BiosRecovery 1154860 Scheduled
FSM Task:
Powercycle 1154858 Scheduled
BiosRecovery 1154860 Scheduled
Switch-A /monitoring #
Syntax Description comma Add commas to separate fields in command output tables.
Command Default Spaces are used to separate fields in command output tables.
Usage Guidelines Use this command to select the delimeter between fields in command output tables.
Examples This example shows how to select commas to separate fields in command output tables:
Switch-A# scope monitoring
Switch-A /monitoring # show fsm task
FSM Task:
Item ID Completion FSM Flags
---------------- -------- ------------ ---------
Powercycle 1154858 Scheduled
BiosRecovery 1154860 Scheduled
FSM Task:
,Item,ID,Completion,FSM Flags
----------------,--------,------------,---------
Powercycle,1154858,Scheduled,
BiosRecovery,1154860,Scheduled,
Switch-A /monitoring #
Syntax Description number Memory clock speed, in seconds. The range of valid values is 1 to 65535.
Examples This example shows how to set the memory clock speed:
switch-A# scope org org10
switch-A /org # scope server-qual sq10
switch-A /org/server-qual # scope memory
switch-A /org/server-qual/memory # set clock 10
switch-A /org/server-qual/memory* # commit-buffer
switch-A /org/server-qual/memory #
Syntax Description month Enter the three-letter abbreviation for the month.
Examples This example shows how to manually set the system clock:
switch-A# scope system
switch-A /system # scope services
switch-A /system/services # set clock apr 14 2010 15 27 00
switch-A /system/services* # commit-buffer
switch-A /system/services #
show clock
set cluster
To set a cluster for a port profile, use the set cluster command.
Syntax Description cluster Name of the cluster. The name can include a maximum of 256 alphanumeric
characters.
Usage Guidelines You must create a client within a port profile before you use this command.
Examples This example shows how to set the cluster for a port profile:
UCS-A # scope system
UCS-A /system # scope vm-mgmt
UCS-A /system/vm-mgmt # scope profile-set
UCS-A /system/vm-mgmt/profile-set # scope port-profile sample
UCS-A /system/vm-mgmt/profile-set/port-profile # scope client test
UCS-A /system/vm-mgmt/profile-set/port-profile/client # set cluster Trial123
UCS-A /system/vm-mgmt/profile-set/port-profile/client* # commit-buffer
UCS-A /system/vm-mgmt/profile-set/port-profile/client #
set descr
set folder
set collection-interval
To specify the interval at which statistics are collected from the system, use the set collection-interval
command.
Usage Guidelines Use this command to specify the interval at which statistics are collected from the system. You can specify
the collection interval separately for chassis, port, host, adapter, and server statistics.
Examples This example shows how to set the port statistics collection interval to five minutes:
switch-A# scope monitoring
switch-A /monitoring # scope stats-collection-policy port
switch-A /monitoring/stats-collection-policy # set collection-interval 5minutes
switch-A /monitoring/stats-collection-policy* # commit-buffer
switch-A /monitoring/stats-collection-policy #
set communication-policy-ctrl
To set a communication policies control, use the create communication-policy-ctrl command.
create communication-policy-ctrlsource
Syntax Description source The source of the policy control. The source can be global or local.
Usage Guidelines A policy control endpoint must be created to use this command.
Examples This example shows how to set the communication policies control to global.
UCS-A # scope system
UCS-A /system # scope control-ep policy
UCS-A /system/control-ep # set communication-policy-ctrl source global
UCS-A /system/control-ep* # commit-buffer
UCS-A /system/control-ep #
set backup-control-ctrl
set datetime-policy-ctrl
set dns-policy-ctrl
set fault-policy-ctrl
set infra-pack-ctrl
set mep-policy-ctrl
set monitoring-policy-ctrl
Command Description
set powermgmt-policy-ctrl
set psu-policy-ctrl
set registry-ip
set security-policy-ctrl
set community
To specify the SNMP community access string for the SNMP trap destination, use the set community
command.
Syntax Description community Specifies the SNMPv1/v2c community string or the SNMPv3 username for the
trap destination. Enter up to 32 characters with no spaces.
Usage Guidelines Use this command to specify the community access string to permit access to the Simple Network Management
Protocol (SNMP) trap destination. If SNMPv1/v2c is configured, the community argument is used as the
community string. If SNMPv3 is configured, it is used as the msgUserName value.
Examples This example shows how to set the SNMP community access string for the SNMP trap destination:
switch-A# scope monitoring
switch-A /monitoring # create snmp-trap 192.20.1.28
switch-A /monitoring/snmp-trap* # set community Community28
switch-A /monitoring/snmp-trap* # commit-buffer
switch-A /monitoring/snmp-trap #
Usage Guidelines Use this command to configure the number of completion queue resources to allocate. Configure a count
between 1 and 521. In general, the number of completion queues equals the number of transmit queues plus
the number of receive queues.
Examples This example shows how to configure the number of completion queue resources for an Ethernet policy:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set recv-queue count 100
switch-A /org/eth-policy* # set trans-queue count 100
switch-A /org/eth-policy* # set comp-queue count 200
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
set concur-tasks
To set a maximum number of concurrent tasks that can be processed by either the one-time or the periodic
schedule, use the set concur-tasks command.
Syntax Description concur-jobs This option specifies the maximum number of concurrent tasks that the schedule
can process. The value must be a number between 0 - 65535.
unlimited This option indicates that the schedule can run any number of concurrent tasks.
Usage Guidelines A schedule, be it one-time or periodic, must be created to use this command.
Examples This example shows how to set the number of concurrent jobs for a one-time occurrence of a schedule to 23.
Switch-A # scope system
Switch-A /system # scope scheduler Default
Switch-A /system/schedule # scope occurrence one-time Testing
Switch-A /system/schedule/one-time # set concur jobs 23
Switch-A /system/schedule/one-time* # commit-buffer
Switch-A /system/schedule/one-time #
Syntax Description 115200 | 57600 | 38400 | 19200 | 9600 Specifies the serial port baud rate.
Usage Guidelines If a serial port can be used for management tasks, use this command to set the serial port transmission speed
so that it matches the rate of the remote terminal application.
Examples The following example shows how to create a BIOS policy specifying that serial port A is configured for
management tasks and operates at 19200 baud:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set console-redir-config console-redir serial-port-a
switch-A /org/bios-policy* # set console-redir-config baud-rate 19200
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
Usage Guidelines Use this command to specify whether a serial port can be used for server management tasks.
Examples The following example shows how to create a BIOS policy specifying that serial port A is configured for
management tasks:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set console-redir-config console-redir serial-port-a
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
Syntax Description none Use this option to not set a flow control policy.
platform-default Use this option to set the flow control policy to the platform default option.
rts-cts Use this option to set the flow control policy to RTS-CTS.
Examples This example shows how to set the flow control policy of the console redirection configuration to RTS-CTS.
Switch-A # scope org
Switch-A /org # scope bios-policy sample
Switch-A /org/bios-policy # set console-redir-config flow-control rts-cts
Switch-A /org/bios-policy* # commit-buffer
Switch-A /org/bios-policy #
Syntax Description disabled Use this option to disable the legacy OS redirection policy.
Examples This example shows how to enable the legacy OS redirection for the console redirection configuration.
Switch-A # scope org
Switch-A /org # scope bios-policy sample
Switch-A /org/bios-policy # set console-redir-config legacy-os-redir enable
Switch-A /org/bios-policy* # commit-buffer
Switch-A /org/bios-policy #
Syntax Description pc-ansi Use this option to set the terminal type to Pc Ansi.
platform-default Use this option to set the terminal type to the platform default.
vt100-plus Use this option to set the terminal type to Vt100 Plus.
Examples This example shows how to set the terminal type to platform default.
Switch-A # scope org
Switch-A /org # scope bios-policy sample
Switch-A /org/bios-policy # set console-redir-config terminal-type platform-default
Switch-A /org/bios-policy* # commit-buffer
Switch-A /org/bios-policy #
Command Description
set console-redir-config legacy-os-redir
set contact
To configure a primary Call Home contact person for the customer organization, use the set contact command.
Usage Guidelines Use this command to configure a primary Call Home contact person for the customer organization. The contact
name will be included in Call Home messages. Enter up to 255 characters. If the name includes spaces, you
must enclose your entry in quotes (" ").
set contract-id
To configure the customer contract ID for the monitored equipment, use the set contract-id command.
Usage Guidelines Use this command to configure the customer contract ID to be included in Call Home messages for the
monitored equipment. The ID can contain up to 512 characters.
Examples This example shows how to configure the customer contract ID:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # set contract-id ExampleCorp1234
switch-A /monitoring/callhome* # commit-buffer
switch-A /monitoring/callhome #
Usage Guidelines Use this command to specify the path to use when exporting the core file to the remote server. The path can
be up to 512 characters.
Examples This example shows how to specify the remote server path for exporting the core file:
switch-A# scope monitoring
switch-A /monitoring # scope sysdebug
switch-A /monitoring/sysdebug # set core-export-target path /root/CoreFiles/core
switch-A /monitoring/sysdebug* # commit-buffer
switch-A /monitoring/sysdebug #
Syntax Description port Specifies the port number to be used for the TFTP transfer.
Usage Guidelines Use this command to specify the port number to use when exporting the core file by TFTP. The range of valid
values is 1 to 65535; the default is 69, the standard TFTP port number.
Examples This example shows how to specify the port number on the remote server for exporting the core file:
switch-A# scope monitoring
switch-A /monitoring # scope sysdebug
switch-A /monitoring/sysdebug # set core-export-target port 45000
switch-A /monitoring/sysdebug* # commit-buffer
switch-A /monitoring/sysdebug #
Syntax Description description A description of the remote server that stores the core file.
Usage Guidelines Use this command to provide a description of the remote server that stores the core file. The description can
be up to 256 characters. If your description includes spaces, special characters, or punctuation, you must begin
and end your description with quotation marks (" "). The quotation marks will not appear in the description
field of any show command output.
Examples This example shows how to provide a description of the remote server for exporting the core file:
switch-A# scope monitoring
switch-A /monitoring # scope sysdebug
switch-A /monitoring/sysdebug # set core-export-target server-description
CoreFile102.168.10.10
switch-A /monitoring/sysdebug* # commit-buffer
switch-A /monitoring/sysdebug #
Usage Guidelines Use this command to specify the name or IP address of the remote server that stores the core file. The server
name can be up to 255 characters.
Examples This example shows how to specify the remote server name for exporting the core file:
switch-A# scope monitoring
switch-A /monitoring # scope sysdebug
switch-A /monitoring/sysdebug # set core-export-target server-name 192.168.10.10
switch-A /monitoring/sysdebug* # commit-buffer
switch-A /monitoring/sysdebug #
set correctible-memory-error-log-threshold-config
To specify whether the system uses continuous correctable error logging, use the set
correctible-memory-error-log-threshold-config command.
Syntax Description allerror Whenever a corrected error occurs in the server platform, the BIOS generates
an SEL event immediately.
regularlogscheme The BIOS accumulates the threshold number of (currently 10) correctible errors
and generates one SEL event when number of errors exceeds threshold.
platform-default The BIOS uses the value for this attribute contained in the BIOS defaults for
the server type and vendor.
Usage Guidelines Use this command to specify whether the system uses continuous correctable error logging.
Examples The following example shows how to create a BIOS policy specifying that an SEL event is generated
immediately when a correctable error occurs:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set correctible-memory-error-log-threshold-config
correctible-memory-error-log-threshold allerror
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
set cos
To set up CoS (Class of Service), use the set cos command.
Usage Guidelines Use this command to set the priority of traffic. A higher value indicates more important traffic. Setting CoS
at 6 specifies the most important traffic.
switch-A /eth-server/qos/eth-classified #
set country
To specify a country for a certificate request of a key ring, use the set country command.
Syntax Description Country name The country code corresponding to the country in which the company resides.
Enter two alphabetic characters
Usage Guidelines You should create a certificate request before specifying the country details.
Examples The following example shows how to set the country information for a certificate request.
UCS-A # scope security
UCS-A /security # scope keyring test
UCS-A /security/keyring # create certreq
UCS-A /security/keyring/certreq* # set country US
UCS-A /security/keyring/certreq* # commit buffer
UCS-A /security/keyring/certreq #
set e-mail
set ip
set locality
set org-name
set org-unit-name
set state
Command Description
set subject-name
hpc Enables all prefetchers and data reuse. This setting is also known as high
performance computing.
platform-default Sets the value for this attributed contained in the BIOS defaults for the
server type and vendor.
Usage Guidelines You must create a BIOS policy before you use this command.
Examples This example shows how to set the CPU performance profile of the server to the platform default option:
UCS-A # scope org test
UCS-A /org # scope bios-policy sample
UCS-A /org/bios-policy # set cpu-performance-config cpu-performance platform-default
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
Command Description
set enhanced-intel-speedstep-config speed-step
set intel-vt-config vt
set customer-id
To configure customer identifier (ID) information for Call Home messages, use the set customer-id command.
Usage Guidelines Use this command to configure customer identifier information to be included in Call Home messages for the
monitored equipment. Enter up to 512 characters.
set data-center
To set up a data center, use the set data-center command.
Syntax Description datacenter-name The name of the data center. The range of valid values is 1 to 16.
set data-center-folder
To set up a data center folder, use the set data-center-folder command.
Syntax Description datacenter-folder-name The name of the data center. The range of valid values is 1 to 16.
Syntax Description data-center Name of the data center. The value can include a maximum of 256
alphanumeric characters.
Usage Guidelines A client must be created within the port profile before you use this command.
Examples This example show how to set a data center for a client within the port profile mode:
UCS-A # scope system
UCS-A /system # scope vm-mgmt
UCS-A /system/vm-mgmt # scope profile-set
UCS-A /system/vm-mgmt/profile-set # scope port-profile sample
UCS-A /system/vm-mgmt/profile-set/port-profile # scope client test
UCS-A /system/vm-mgmt/profile-set/port-profile/client # set data-center Trial13
UCS-A /system/vm-mgmt/profile-set/port-profile/client* # commit-buffer
UCS-A /system/vm-mgmt/profile-set/port-profile/client #
set descr
set folder
set date
To set specific parameters such as month, day, date and time for a one-time maintenance window, use the set
date command.
set date {apr| aug| dec| feb| jan| jul| jun| mar| may| nov| oct| sep} dayofmonth year hour minute
Syntax Description apr Use this option to specify the month April for the maintenance window.
aug Use this option to specify the month August for the maintenance window.
dec Use this option to specify the month December for the maintenance window.
feb Use this option to specify the month February for the maintenance window.
jan Use this option to specify the month January for the maintenance window.
jul Use this option to specify the month July for the maintenance window.
jun Use this option to specify the month June for the maintenance window .
mar Use this option to specify the month March for the maintenance window .
may Use this option to specify the month May for the maintenance window.
nov Use this option to specify the month November for the maintenance window.
oct Use this option to specify the month October for the maintenance window.
sep Use this option to specify the month September for the maintenance window.
dayofmonth Use this option to specify a day of the month when this maintenance window must
run. The range of valid values is between 1 - 31.
year Use this option to specify the year in which this maintenance window must run. The
range of valid values is between 1900 - 29999
hour Use this option to specify the hour in which this maintenance window must run. The
range of valid values is between 0 - 23 hours.
minute Use this option to specify the exact minute at which this maintenance window must
run. The range of valid values is between 0 - 59.
Usage Guidelines A scheduler policy and a one-time maintenance window must be created to use this command.
Examples This example shows how to set the parameters for the one-time maintenance window.
Switch-A # scope system
Switch-A /system # scope scheduler Sample
Switch-A /system/scheduler # scope maint-window one-time Trial
Switch-A /system/scheduler/one-time # set date nov 22 2010 3 45
Switch-A /system/scheduler/one-time* # commit-buffer
Switch-A /system/scheduler/one-time #
set day
To set a day of the week that the periodic maintenance window must run, use the set day command.
set day
set day {Friday| Monday| Saturday| Sunday| Thursday| Tuesday| Wednesday| even-day| every-day|
never| odd-day}
Syntax Description Friday Use this option to set Friday for the maintenance window.
Monday Use this option to set Monday for the maintenance window.
Saturday Use this option to set Saturday for the maintenance window.
Sunday Use this option to set Sunday for the maintenance window.
Thursday Use this option to set Thursday for the maintenance window.
Tuesday Use this option to set Tuesday for the maintenance window.
Wednesday Use this option to set Wednesday for the maintenance window.
even-day Use this option to set the maintenance window to run on every even day of
the week.
every-day Use this option to set the maintenance window to run every day of the week.
never Use this option to not set a day for the maintenance window to run.
odd-day Use this option to set the maintenance window to run on every odd day of
the week.
Usage Guidelines A scheduler policy and a periodic maintenance window must be created to use this command.
Examples This example shows how to set a day for a periodic maintenance window to run.
Switch-A # scope system
Switch-A /system # scope scheduler Sample
Switch-A /system/scheduler # scope maint-window periodic Testing
Switch-A /system/scheduler/periodic # set day Friday
Switch-A /system/scheduler/periodic* # commit-buffer
Switch-A /system/scheduler/periodic #
set deescalating
To specify the class property threshold value for de-escalating an event, use the set escalating command.
Syntax Description value The property value at which the event will be de-escalated. See the Usage Guidelines
for the required format.
Usage Guidelines Use this command to specify the class property threshold value for de-escalating an event. The format of the
value argument varies depending on the class property threshold value being configured. To see the required
format, enter the set deescalating ? command.
Note You can specify both de-escalating and escalating class property threshold values.
Examples This example creates an above normal warning threshold of 50° C, de-escalating the warning at 49° C:
switch-A /org* # scope stats-threshold-policy ServStatsPolicy
switch-A /org/stats-threshold-policy* # create class cpu-stats
switch-A /org/stats-threshold-policy/class* # create property cpu-temp
switch-A /org/stats-threshold-policy/class/property* # set normal-value 48.5
switch-A /org/stats-threshold-policy/class/property* # create threshold-value above-normal
warning
switch-A /org/stats-threshold-policy/class/property/threshold-value* # set escalating 50.0
switch-A /org/stats-threshold-policy/class/property/threshold-value* # set deescalating
49.0
switch-A /org/stats-threshold-policy/class/property/threshold-value* # commit-buffer
switch-A /org/stats-threshold-policy/class/property/threshold-value #
set default-gw
To set a default gateway for an external static IP address, use the set default-gw command.
Syntax Description default-gw The IP address of the default gateway. It must be in the a.b.c.d format.
Examples This example shows how to set a default gateway for a service profile.
Switch-A # scope org
Switch-A /org # scope service-profile sample
Switch-A /org/service-profile # scope ext-static-ip
Switch-A /org/service-profile/ext-static-ip # set default-gw 1.2.3.4
Switch-A /org/service-profile/ext-static-ip* # commit-buffer
Switch-A /org/service-profile/ext-static-ip #
set default-net
To set the current interface or VLAN as the default network, use the set default-net command.
Syntax Description no Specifies that the current interface or VLAN is not the default network.
yes Specifies that the current interface or VLAN is the default network.
Usage Guidelines Use this command to set the current interface or VLAN as the default network.
Examples This example shows how to create an Ethernet interface and make the interface the default network:
switch-A# scope org org10
switch-A /org # scope service-profile sp10
switch-A /org/service-profile # scope vnic vn10
switch-A /org/service-profile/vnic # create eth-if if10
switch-A /org/service-profile/vnic/eth-if* # set default-net yes
switch-A /org/service-profile/vnic/eth-if* # commit-buffer
switch-A /org/service-profile/vnic/eth-if #
set defaultzoning
To enable or disable default zoning for a VSAN, use the set default-zoning command.
Examples This example shows how to set the default zoning for VSAN.
Switch-A # scope fc-storage
Switch-A /fc-storage # scope vsan sample
Switch-A /fc-storage/vsan # set defaultzoning enabled
Switch-A /fc-storage/vsan* # commit-buffer
Switch-A /fc-storage/vsan #
set descr
To set a description, use the set descr command.
Initiator (/org/wwn-pool/initiator)
Boot definition (/org/service-profile/boot-def)
Chassis discovery policy under organization (/org/chassis-disc-policy)
Automatic configuration policy (/org/autoconfig-policy)
SoL policy (/org/sol-policy)
Scrub policy (/org/scrub-policy)
Local disk configuration under service profile (/org/service-profile/local-disk-config)
Firmware host pack under organization (/org/fw-host-pack)
Port profile (/eth-uplink/port-profile)
WWN pool (/org/wwn-pool)
Server inherit policy under organization (/org/server-inherit-policy)
IPMI user (/org/ipmi-access-profile/ipmi-user)
Usage Guidelines If your description includes spaces, special characters, or punctuation, you must begin and end your description
with quotation marks. The quotation marks will not appear in the description field of any show command
output
switch-A /org/boot-policy #
set description
To set the description of the VCenter server, use the set description command.
Usage Guidelines The description of the VCenter server should be a unique set of numbers, letters, or a combination of numbers
and letters that identifies the server. The range of valid values is 1 to 256. If your description includes spaces,
special characters, or punctuation, you must begin and end your description with quotation marks. The quotation
marks will not appear in the description field of any show command output.
Examples This example shows how to set the description of the VCenter server:
switch-A# scope system
switch-A /system # scope vm-mgmt
switch-A /system/vm-mgmt # scope vmware
switch-A /system/vm-mgmt/vmware # scope vcenter marComm
switch-A /system/vm-mgmt/vmware/vcenter # set description marketingVCenter
switch-A /system/vm-mgmt/vmware/vcenter* # commit-buffer
switch-A /system/vm-mgmt/vmware/vcenter #
Usage Guidelines Provides a description for the vNIC/vHBA placement profile. vCon policies determine the placement and
distribution of vNICs and vHBAs between the adapters for a server that has more than one adapter.
If your description includes spaces, special characters, or punctuation, you must begin and end your description
with quotation marks. The quotation marks will not appear in the description field of any show command
output.
Examples This example shows how to set up a description for a vCon policy:
switch-A# scope org /
switch-A /org # scope vcon-policy vcp100
switch-A /org # set descr "Control policy for vNIC 1 and 2"
switch-A /org* # commit-buffer
switch-A /org #
Usage Guidelines Use this command to specify the organization for which the server is to be used.
Examples This example shows how to specify the organization for which the server is to be used:
server-A# scope org /
server-A /org* # create server-autoconfig-policy AutoConfigFinance
server-A /org/server-autoconfig-policy* # set destination org finance
server-A /org/server-autoconfig-policy* # commit-buffer
server-A /org/server-autoconfig-policy #
set dhcp-vendor-id
To set the DHCP vendor ID for an automatic target interface, use the set dhcp-vendor-id command.
Syntax Description dhcp-vendor-id ID of the DHCP vendor. The value can include a maximum of 32 characters
and can be alphanumeric.
Usage Guidelines You must create an automatic target interface for the Ethernet interface of the iSCSI VNIC before you use
this command.
Examples This example shows how to set the DHCP vendor ID for the configured automatic target interface of an iSCSI
VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope auto-target-if
UCS-A /org/service-profile/vnic-iscsi/eth-if/auto-target-if # set dhcp-vendor-id sample_id
UCS-A /org/service-profile/vnic-iscsi/eth-if/auto-target-if* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if/auto-target-if #
Syntax Description disabled Use this option to disable direct cache access.
platform-default Use this option to set the platform default choice as the direct cache
access policy.
set direction
To set the direction for the monitor source session, use the set direction command.
Syntax Description both Use this option to set the direction of the session to include both, receive and
transmit.
Command Modes Monitor source session within fabric interface in Fibre Channel uplink (/fc-uplink/fabric/interface/mon-src)
Monitor source session within the Fibre Channel over Ethernet interface within Fibre Channel storage
(/fc-storage/fabric/fcoe/mon-src)
Monitor source session within the fabric interface of Ethernet uplink (/eth-uplink/fabric/interface/mon-src)
Monitor source session within VHBA of a service profile (/org/service-profile/vhba/mon-src)
Monitor source session within VNIC of a service profile (/org/service-profile/vnic/mon-src)
Monitor source session within external Ethernet interface of the adapter
(/chassis/server/adapter/ext-eth-if/mon-src)
Monitor source session within the Fibre Channel mode of a fabric (/fc-storage/fabric/fc/mon-src)
Usage Guidelines A monitor source session must be created to use this command.
Examples This example shows how to set the direction of the monitor source session to receive and transmit.
Switch-A # scope org
Switch-A /org # scope service-profile sample
Switch-A /org/service-profile # scope vnic test
Switch-A /org/service-profile/vnic # scope mon-src example
Switch-A /org/service-profile/vnic/mon-src # set direction both
Switch-A /org/service-profile/vnic/mon-src* # commit-buffer
Switch-A /org/service-profile/vnic/mon-src #
set diskless
To set storage method, use the set diskless command.
Syntax Description no Use this option to not set the diskless method for storage.
Usage Guidelines A server pool policy qualification must be created to use this command.
Examples This example shows how to set the diskless storage for a server pool policy qualification.
Switch-A # scope org
Switch-A /org # scope server-qual sample
Switch-A /org/server-qual # scope storage
Switch-A /org/server-qual/storage # set diskless yes
Switch-A /org/server-qual/storage* # commit-buffer
Switch-A /org/server-qual/storage #
set disk-scrub
To specify whether the local disks are erased when the server is disassociated from a service profile, use the
set disk-scrub command.
Syntax Description no Disables disk scrub. The disk contents are preserved.
Usage Guidelines Use this command in a scrub policy to specify whether the local disk contents are erased or preserved when
the server is disassociated from a service profile. The action taken is as follows:
• If enabled, destroys all data on any local drives
• If disabled, preserves all data on any local drives, including local storage configuration
set dns-policy-ctrl
To set the control for the DNS policy, use the create dns-policy-ctrl command.
Syntax Description source The source of the policy control. The source can be global or local.
Usage Guidelines A control endpoint policy must be configured to use this command.
Examples This example shows how to set the control for the DNS policy to global.
UCS-A # scope system
UCS-A /system # scope control-ep policy
UCS-A /system/control-ep # set dns-policy-ctrl source global
UCS-A /system/control-ep* # commit-buffer
UCS-A /system/control-ep #
set communication-policy-ctrl
set datetime-policy-ctrl
set fault-policy-ctrl
set infra-pack-ctrl
set mep-policy-ctrl
set monitoring-policy-ctrl
set powermgmt-policy-ctrl
Command Description
set psu-policy-ctrl
set registry-ip
set security-policy-ctrl
set dns
To specify a Domain Name Server (DNS) for a certificate request of a key ring, use the set dns command.
Syntax Description subject alternative name The Domain Name Server. The name can include a maximum of
255 characters.
Usage Guidelines You should create a certificate request before setting the DNS details.
Examples The following example shows how to set the DNS details for a certificate request.
UCS-A # scope security
UCS-A /security # scope keyring test
UCS-A /security/keyring # create certreq
UCS-A /security/keyring/certreq* # set dns bgl-samc-15
UCS-A /security/keyring/certreq* # commit buffer
UCS-A /security/keyring/certreq #
set e-mail
set ip
set locality
set org-name
set org-unit-name
set state
Command Description
set subject-name
set domain-name
To specify a domain name, use the set domain-name command.
Usage Guidelines Use this command to specify a domain name. Enter up to 255 characters.
set drop
To specify whether the channel can drop packets, use the set drop command.
Usage Guidelines Use this command to specify whether the channel can drop packets. By default, the channel cannot drop
packets.
Note Only one system class can use the no-drop option.
Examples This example shows how to specify that the QoS bronze class channel can drop packets:
switch-A# scope eth-server
switch-A /eth-server # scope qos
switch-A /eth-server/qos # scope eth-classified bronze
switch-A /eth-server/qos/eth-classified # set drop drop
switch-A /eth-server/qos/eth-classified* # commit-buffer
switch-A /eth-server/qos/eth-classified #
set dvs
To specify which port profile a DVS is applied to, use the set dvs command.
Syntax Description folder-name The name of the folder. The range of valid values is 1 to 16.
Examples This example shows how to specify which port profile a DVS is applied to:
switch-A# scope system
switch-A /system # scope vm-mgmt
switch-A /system/vm-mgmt # scope vmware
switch-A /system/vm-mgmt/vmware # scope profile-set
switch-A /system/vm-mgmt/vmware/profile-set # scope port-profile
switch-A /system/vm-mgmt/vmware/profile-set/port-profile # scope client cl100
switch-A /system/vm-mgmt/vmware/profile-set/port-profile/client # set dvs dvs100
switch-A /system/vm-mgmt/vmware/profile-set/port-profile/client* # commit-buffer
switch-A /system/vm-mgmt/vmware/profile-set/port-profile/client #
set dynamic-eth
To configure the number of dynamic vNICs, use the set dynamic-eth command.
Syntax Description dynamic-eth Specifies the number of dynamic vNICs. Enter a value from 0 to 88.
Usage Guidelines Use this command to configure the number of dynamic vNICs.
set email
To configure a primary contact email address, use the set email command.
Usage Guidelines Use this command to configure a primary contact email address to be included in Call Home messages. Specify
the email address in the format <name>@<domain name>.
If an email address includes special characters, such as # (hash), spaces, or & (ampersand), the email server
may not be able to deliver email messages to that address. Cisco recommends that you use email addresses
which comply with RFC2821 and RFC2822 and include only 7bit ASCII characters.
Examples This example shows how to configure a primary contact email address:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # set email admin@example.com
switch-A /monitoring/callhome* # commit-buffer
switch-A /monitoring/callhome #
Syntax Description E-mail name The e-mail address associated with the certificate request.
Usage Guidelines You should create a certificate request before specifying the email address.
Examples The following example shows how to set the e-mail address for a certificate request.
UCS-A # scope security
UCS-A /security # scope keyring test
UCS-A /security/keyring # create certreq
UCS-A /security/keyring/certreq* # set e-mail test@abc.com
UCS-A /security/keyring/certreq* # commit buffer
UCS-A /security/keyring/certreq #
set country
set ip
set locality
set org-name
set org-unit-name
set state
Command Description
set subject-name
set enforce-vnic-name
To select whether the vNIC name is enforced, use the set enforce-vnic-name command.
set enhanced-intel-speedstep-config
To specify whether Enhanced Intel SpeedStep Technology is enabled, use the set
enhanced-intel-speedstep-config command.
Syntax Description disabled The processor never dynamically adjusts its voltage or frequency.
enabled The processor utilizes Enhanced Intel SpeedStep Technology and enables all
supported processor sleep states to further conserve power.
platform-default The BIOS uses the value for this attribute contained in the BIOS defaults for
the server type and vendor.
Usage Guidelines Use this command to specify whether the processor uses Enhanced Intel SpeedStep Technology that allows
the system to dynamically adjust processor voltage and core frequency, which can result in decreased average
power consumption and decreased average heat production. Contact your operating system vendor to make
sure the operating system supports this feature.
Examples The following example shows how to create a BIOS policy specifying that Enhanced Intel SpeedStep
Technology is enabled:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set enhanced-intel-speedstep-config speed-step enabled
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
Usage Guidelines Use this command to enable or disable Fibre Channel Protocol (FCP) error recovery.
Usage Guidelines Use this command to configure a link down timeout. Enter a value between 0 and 240000 msec.
Examples This example shows how to configure a link down timeout of 60 seconds:
switch-A# scope org
switch-A /org # enter fc-policy FcPolicy19
switch-A /org/fc-policy # set error-recovery link-down-timeout 60000
switch-A /org/fc-policy* # commit-buffer
switch-A /org/fc-policy #
Usage Guidelines Use this command to configure the number of port down I/O retries. Enter a value between 0 and 255.
Examples This example shows how to configure 100 port down I/O retries:
switch-A# scope org
switch-A /org # enter fc-policy FcPolicy19
switch-A /org/fc-policy # set error-recovery port-down-io-retry-count 100
switch-A /org/fc-policy* # commit-buffer
switch-A /org/fc-policy #
Usage Guidelines Use this command to configure a port down timeout. Enter a value between 0 and 240000 msec.
Examples This example shows how to configure a port down timeout of 60 seconds:
switch-A# scope org
switch-A /org # enter fc-policy FcPolicy19
switch-A /org/fc-policy # set error-recovery port-down-timeout 60000
switch-A /org/fc-policy* # commit-buffer
switch-A /org/fc-policy #
set escalating
To specify the class property threshold value for escalating an event, use the set escalating command.
Syntax Description value The property value at which the event will be escalated. See the Usage Guidelines
for the required format.
Usage Guidelines Use this command to specify the class property threshold value for escalating an event. The format of the
value argument varies depending on the class property threshold value being configured. To see the required
format, enter the set escalating ? command.
Note You can specify both de-escalating and escalating class property threshold values.
Syntax Description disabled Use this option to disable the bit for a BIOS policy.
enabled Use this option to enable the bit for a BIOS policy.
platform-default Use this option to set the platform default option for a bit of the BIOS
policy.
Examples This example shows how to set the bit for a BIOS Policy to the platform default option.
Switch-A # scope org Test
Switch-A /org # scope bios-policy Sample
Switch-A /org/bios-policy # set execute-disable bit platform-default
Switch-A /org/bios-policy* # commit-buffer
Switch-A /org/bios-policy #
create org
set expiration
To set the expiration date, use the set expiration command.
set expiration {never| {apr| aug| dec| feb| jan| jul| jun| mar| may| nov| oct| sep} day year}
day Day.
year Year.
Usage Guidelines Use this command to set the date the user account expires.
switch-A#scope security
switch-A /security #
set expire-warn-interval
To set a password expiration warning interval, use the set expire-warn-interval command.
Syntax Description password expiration warning interval The password expiration warning interval in days. The value is
a numeral between 0 and 30.
Examples This example shows how to set the password expiration warning interval to 25 days.
UCS-A # scope security
UCS-A /security # scope password-profile
UCS-A /security/password-profile # set expire-warn-interval 25
UCS-A /security/password-profile* # commit-buffer
UCS-A /security/password-profile #
set history-count
set no-change-interval
set ext-mgmt-ip-state
To set an external management IP address state for a service profile, use the set ext-mgmt-ip-state command.
Syntax Description none This option does not set an external management IP state for the service profile.
pooled This option sets an external management pooled IP address state for the service
profile.
static This option sets an external management static IP address state for the service
profile.
Examples This example shows how to set the external management IP address state as pooled for a service profile.
Switch-A # scope org
Switch-A /org # scope service-profile default
Switch-A /org/service-profile # set ext-mgmt-ip-state pooled
Switch-A /org/service-profile* # commit-buffer
Switch-A /org/service-profile #
set fabric
To specify the fabric connection for a vHBA or vNIC template, use the set fabric command.
b Specifies fabric A.
Usage Guidelines Use this command to specify the fabric connection for a vHBA (virtual host bus adapter) or vNIC (virtual
network interface card) template. The redundant options are available only for vNICs.
Examples This example shows how to specify a fabric B connection for a vNIC template.
switch-A# scope org org10
switch-A /org # scope vnic-templ sp10
switch-A /org/vnic-templ # set fabric b
switch-A /org/vnic-templ* # commit-buffer
switch-A /org/vnic-templ #
Syntax Description timeout Number of seconds that the recovered interface must be available before it can
be used.
Usage Guidelines After the primary interface of a vNIC has recovered from a failure, the system waits the duration of the failover
timeout before switching back from the secondary interface to the primary interface. Use this command to
set the failover timeout, specifying how long the primary interface must be available before the system resumes
using the primary interface. Enter a number of seconds between 0 and 600.
Examples This example shows how to configure a 60 second failover timeout for an Ethernet policy:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set failover timeout 60
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
Syntax Description name Interface name. The name can contain up to 32 characters.
Usage Guidelines Use this command to configure a name for the Fibre Channel interface in a vHBA (virtual host bus adapter).
Examples This example shows how to configure a name for the Fibre Channel interface in a vHBA template:
switch-A# scope org org10
switch-A /org # scope vhba-templ sp10
switch-A /org/vhba-templ # set fc-if name if10
switch-A /org/vhba-templ* # commit-buffer
switch-A /org/vhba-templ #
set fcoe-vlan
To enable FCoE for the specified VLAN, use the set fcoe-vlan command.
Syntax Description fcoe-vlan Specifies the VLAN number for enabling FCoE.
1.4(1) The range of valid values was modified from 4048 - 4093 to 4049 - 4093.
Usage Guidelines Use this command to enable Fibre Channel over Ethernet (FCoE) for the specified VLAN or the default
VLAN. Valid ranges for the VLAN are 1 to 3967 and 4049 to 4093.
set fcoe-storage-native-vlan
To set a native VLAN identification number for the Fibre Channel storage device, use the set
fcoe-storage-native-vlan command.
Syntax Description fcoe-storage-native-vlan id The unique identifier assigned to the VLAN used for Fibre Channel
connections. Valid ranges for the VLAN are 1 to 3967 and 4048 to 4093.
Usage Guidelines FCoE VLANs in the SAN cloud and VLANs in the LAN cloud must have different IDs. Using the same ID
for an FCoE VLAN and a VLAN results in a critical fault and traffic disruption for all vNICs and uplink ports
using that FCoE VLAN.
Examples This example shows how to set a native VLAN identification number for the Fibre Channel storage device.
Switch-A # scope fc-storage
Switch-A /fc-storage # set fcoe-storage-native-vlan 44
Switch-A /fc-storage* # commit-buffer
Switch-A /fc-storage #
Syntax Description size Specifies the file size limit. The range is 1000000 (1M) to 10000000 (10M) bytes; the
default is 5242880 bytes.
Usage Guidelines Use this command to specify the size limit of the management logging file.
Examples This example shows how to specify the size limit of the management logging file:
switch-A# scope monitoring
switch-A /monitoring # scope sysdebug
switch-A /monitoring/sysdebug # scope mgmt-logging
switch-A /monitoring/sysdebug/mgmt-logging # set file size 10000000
switch-A /monitoring/sysdebug/mgmt-logging* # commit-buffer
switch-A /monitoring/sysdebug/mgmt-logging #
set filter
To set up a filter, use the set filter command.
Syntax Description name Filter name. The range of valid values is 1 to 63.
1.4(1) This command was introduced in the LDAP server command mode
(/security/ldap/server).
Usage Guidelines Use this command to restrict database searches to records that contain the specified filter.
switch-A#scope security
switch-A /security/ldap #
set firstname
To set the first name, use the set firstname command.
Syntax Description name First name. The range of valid values is 1 to 16.
switch-A#scope security
switch-A /security/local-user #
set flap-interval
To configure the length of time the system waits before changing a fault state, use the set flap-interval
command.
Syntax Description seconds Specifies the interval during which the fault state is not allowed to change again after
a state change. The range is 5 to 3600 seconds; the default is 10 seconds.
Usage Guidelines Flapping occurs when a fault is raised and cleared several times in rapid succession. To prevent flapping, use
the set flap-interval command to freeze the fault state until the flapping interval has elapsed after the last
state change. If the fault is raised again during the flapping interval, it returns to the active state; otherwise,
the fault is cleared.
Examples This example shows how to configure the fault state flap interval to 10 seconds:
switch-A# scope monitoring
switch-A /monitoring # scope fault policy
switch-A /monitoring/fault-policy* # set flap-interval 10
switch-A /monitoring/fault-policy* # commit-buffer
switch-A /monitoring/fault-policy #
set flow-control-policy
To set up a flow control policy, use the set flow-control-policy command.
Syntax Description name Flow control policy name. The range of valid values is 1 to 16.
switch-A /eth-uplink/fabric/interface #
set folder
To set up a folder, use the set folder command.
Syntax Description folder-name The name of the folder. The range of valid values is 1 to 16.
Syntax Description folder Name of the folder. The name can include a maximum of 256 alphanumeric
characters.
Usage Guidelines You must create a client within a port profile before you use this command.
Examples This example shows how to set a folder for a client within the port profile command mode:
UCS-A # scope system
UCS-A /system # scope vm-mgmt
UCS-A /system/vm-mgmt # scope profile-set
UCS-A /system/vm-mgmt/profile-set # scope port-profile test
UCS-A /system/vm-mgmt/profile-set/port-profile # scope client sample
UCS-A /system/vm-mgmt/profile-set/port-profile/client # set folder Trial123
UCS-A /system/vm-mgmt/profile-set/port-profile/client* # commit-buffer
UCS-A /system/vm-mgmt/profile-set/port-profile/client #
set descr
set forged-transmit
To allow or disallow the forging of MAC addresses, use the set forged-transmit command.
Syntax Description allow Specifies that the server is allowed to forge MAC addresses.
deny Specifies that the server is not allowed to forge MAC addresses.
Usage Guidelines Use this command to allow or disallow the forging of MAC addresses by the server when sending frames.
When port security is enabled in the network, MAC address forging should be disabled for the vNICs. You
can include the set forged-transmit command in a network control policy and then apply the policy in a
vNIC service profile.
Examples This example shows how to create a network control policy that disables the forging of MAC addresses:
switch-A# scope org
switch-A /org # create nw-ctrl-policy testPolicy
switch-A /org/nw-ctrl-policy* # create mac-security
switch-A /org/nw-ctrl-policy/mac-security* # set forged-transmit deny
switch-A /org/nw-ctrl-policy/mac-security* # commit-buffer
switch-A /org/nw-ctrl-policy/mac-security #
show nw-ctrl-policy
set format
To configure the format of Call Home messages, use the set format command.
Usage Guidelines Use this command to configure the data format of Call Home messages. The following format options are
available:
• Full text— Provides a fully formatted message with detailed information that is suitable for human
reading.
• Short text—Provides a one or two line description of the fault that is suitable for printed reports or for
communication with mobile devices.
• XML— Provides the Adaptive Messaging Language (AML) XML data structure required for
communication with the Cisco Technical Assistance Center. The AML XML schema definition (XSD)
is published on the Cisco website. XML is the default format.
Examples This example shows how to configure Call Home messages for XML format:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # enter profile TestProfile
switch-A /monitoring/callhome/profile* # set format xml
switch-A /monitoring/callhome/profile* # commit-buffer
switch-A /monitoring/callhome/profile #
set from-email
To configure an email address that will appear in the From field in Call Home email messages, use the set
from-email command.
Usage Guidelines Use this command to configure an email address that will appear in the From field in Call Home email
messages. Specify the email address in the format <name>@<domain name>. If no address is specified, the
contact email address is used.
set front-panel-lockout-config
To specify whether the power and reset buttons on the front panel are ignored by the server, use the set
front-panel-lockout-config command.
Syntax Description disabled The power and reset buttons on the front panel are active and can be used to
affect the server.
enabled The power and reset buttons are locked out. The server can only be reset or
powered on or off from the CIMC GUI.
platform-default The BIOS uses the value for this attribute contained in the BIOS defaults for
the server type and vendor.
Usage Guidelines Use this command to specify whether the power and reset buttons on the front panel are ignored by the server.
Examples The following example shows how to create a BIOS policy specifying that the power and reset buttons on the
front panel are ignored by the server:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set front-panel-lockout-config front-panel-lockout enabled
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
set history-count
To determine if users can use previously set passwords or not, use the set history-count command.
Syntax Description password history count Specifies the password history count. The value must be between 0
and 15.
Examples This example shows how to set the history count for the password to 15:
UCS-A # scope security
UCS-A /security # scope password-profile
UCS-A /security/password-profile # set history-count 15
UCS-A /security/password-profile* # commit-buffer
UCS-A /security/password-profile #
set change-during-interval
set change-interval
set no-change-interval
set host
To set up a host, use the set host command.
Syntax Description host-name The name of the host. The range of valid values is 1 to 16.
set host-cos-control
To set the CoS control for a host, use the set host-cos-control command.
Syntax Description full To set the CoS control to full for a host.
Examples This example shows how to set the CoS control to Full for a host.
Switch-A # scope org Test
Switch-A /org # scope qos-policy sample
Switch-A /org/qos-policy # scope egress-policy
Switch-A /org/qos-policy/egress-policy # set host-cos-control full
Switch-A /org/qos-policy/egress-policy* # commit-buffer
Switch-A /org/qos-policy/egress-policy #
set host-fw-policy
To set the host firmware policy, use the set host-fw-policy command.
Syntax Description name Host firmware policy name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to associate the specified host firmware policy with the service profile you used to enter
service profile mode.
Examples This example shows how to set the host firmware policy:
switch-A /org/service-profile #
set host-nwio-perf
To set the host net IO performance for a port-profile, use the set host-nwio-perf command.
Syntax Description high-performance To set the host net IO performance to high performance.
none To not set a performance limit for the host net IO.
Examples This example shows how to set the host net IO performance to high performance.
Switch-A # scope system
Switch-A /system # scope vm-mgmt
Switch-A /system/vm-mgmt # scope vmware
Switch-A /system/vm-mgmt/vmware # scope profile-set
Switch-A /system/vm-mgmt/vmware/profile-set # scope port-profile sample
Switch-A /system/vm-mgmt/vmware/profile-set/port-profile # set host-nwio-perf high-performance
Switch-A /system/vm-mgmt/vmware/profile-set/port-profile* # commit-buffer
Switch-A /system/vm-mgmt/vmware/profile-set/port-profile #
set hostname
To set the server hostname, use the set hostname command.
Usage Guidelines For callhome mode, the fully qualified domain name or IP address of the SMTP server. For vcenter mode,
the hostname or IP address of the VCenter server. Enter an IP address using the format X.X.X.X, or a host
name of up to 512 characters.
Examples This example shows how to set the SMTP server host name:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # set hostname smtp.example.com
switch-A /monitoring/callhome* # commit-buffer
switch-A /monitoring/callhome #
show callhome
set hostname
To create a host name, use the set hostname command in server mode.
Syntax Description host-name The name of the server. The name can be a name or an IP address. The range of
valid values for a name is 1 to 255. The format for an IP address is N.N.N.N.
Examples This example shows how to create a host name for the VCenter:
switch-A# scope system
switch-A /system # scope vm-mgmt
switch-A /system/vm-mgmt # scope vmware
switch-A /system/vm-mgmt/vmware # scope vcenter marComm
switch-A /system/vm-mgmt/vmware/vcenter # set hostname marComm10
switch-A /system/vm-mgmt/vmware/vcenter* # commit-buffer
switch-A /system/vm-mgmt/vmware/vcenter #
set hour
To set an hour for the periodic maintenance window, use the set hour command.
Syntax Description hour Use this option to specify a specific hour at which this maintenance window must
run. The value must be between 0 - 24.
every-hour Use this option to configure the maintenance window to run every hour.
Usage Guidelines A scheduler policy and a periodic maintenance window must be created to use this command.
Examples This example shows how to set the hour for a periodic maintenance window.
Switch-A # scope system
Switch-A /system # scope scheduler default
Switch-A /system/scheduler # scope maint-window periodic Trial
Switch-A /system/scheduler/periodic # set hour every-hour
Switch-A /system/scheduler/periodic* # commit-buffer
Switch-A /system/scheduler/periodic #
Syntax Description port Port identification number. The range of valid values is 1 to 65535.
Usage Guidelines Cisco recommends that you enable only the communication services that are required to interface with other
network applications.
switch-A#scope system
switch-A /system/services #
Syntax Description high-strength To set the level of Cipher Suite security to high-strength.
Examples This example shows how to enable HTTPS, set the port number to 443, set the key ring name to kring7984,
and set the Cipher Suite security level to high.
UCS-A # scope system
UCS-A /system # scope services
UCS-A /system/services # enable https
UCS-A /system/services* # set https port 443
Warning: When committed, this closes all the web sessions.
UCS-A /system/services* # set https keyring kring7984
UCS-A /system/services* # set https cipher-suite-mode high
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
Syntax Description cipher-suite-spec-string The customized Cipher suite string can contain up to 256 characters and
must conform to the OpenSSL Cipher Suite specifications.
Usage Guidelines You cannot use any spaces or special characters except ! (exclamation point), + (plus sign), - (hyphen), and
: (colon) in the customized Cipher suite string.
Examples The following example shows how to specify a customized Cipher suite string.
UCS-A # scope system
UCS-A /system # scope services
UCS-A /system/services # enable https
UCS-A /system/services* # set https port 43
Warning: when committed, this closes all web sessions
UCS-A /system/services* # set https keyring kring789
UCS-A /system/services* # set https cipher-suite-mode custom
UCS-A /system/services* # set https cipher-suite
ALL:!ADH:!EXPORT56:!LOW:RC4+RSA:+CUSTOM:+EXP:+eNULL
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
Syntax Description keyring Keyring name. The range of valid values is 1 to 16.
Usage Guidelines When the HTTPS keyring is modified using the set https keyring command, all current HTTP and HTTPS
sessions will be closed without any warning.
switch-A#scope system
switch-A /system/services #
Syntax Description port Port identification number. The range of valid values is 1 to 65535.
Usage Guidelines Cisco recommends that you enable only the communication services that are required to interface with other
network applications.
switch-A#scope system
switch-A /system/services #
set hyper-threading-config
To specify whether Intel Hyper-Threading Technology is enabled, use the set hyper-threading-config
command.
Syntax Description disabled The processor does not permit the parallel execution of multiple threads.
platform-default The BIOS uses the value for this attribute contained in the BIOS defaults
for the server type and vendor.
Usage Guidelines Use this command to specify whether the processor uses Intel Hyper-Threading Technology, which allows
multithreaded software applications to execute threads in parallel within each processor. Contact your operating
system vendor to make sure the operating system supports this feature.
Examples The following example shows how to create a BIOS policy specifying that Intel Hyper-Threading Technology
is enabled:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set hyper-threading-config hyper-threading enabled
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
set id
To set an ID for a VSAN, use the set id command.
set id id
Syntax Description ID The ID for the VSAN. The range of valid values is 1 to 4093.
show vsan
Syntax Description dynamic-mac Specifies a unique MAC address in the form nn:nn:nn:nn:nn:nn.
derived Derive the MAC address from a pool, if available, or from a MAC address
burned into the hardware at manufacture.
Usage Guidelines Use this command to configure a dynamic MAC address for a virtual NIC (vNIC).
To specify a pool of MAC addresses for dynamic assignment, use the set identity mac-pool command.
Examples This example shows how to specify a dynamic MAC address for a vNIC:
server-A# scope org /
server-A /org # scope service-profile ServInst90
server-A /org/service-profile # scope vnic dynamic-prot-001
server-A /org/service-profile/vnic # set identity dynamic-mac 01:23:45:67:89:ab
server-A /org/service-profile/vnic* # commit-buffer
server-A /org/service-profile/vnic #
derived Derive the UUID from a pool, if available, or from the UUID burned into the
hardware at manufacture.
Usage Guidelines Use this command to configure how the server acquires a dynamic universally unique identifier (UUID) in a
service profile.
To specify a pool of UUID suffixes for dynamic assignment, use the set identity uuid-suffix-pool command.
Examples This example shows how to specify a dynamic UUID for a service profile:
server-A# scope org /
server-A /org # scope service-profile ServInst90
server-A /org/service-profile # set identity dynamic-uuid 01234567-89ab-cdef-0123-456789abcdef
server-A /org/service-profile* # commit-buffer
server-A /org/service-profile #
derived Derive the WWNN from a pool, if available, or from a WWNN burned into
the hardware at manufacture.
Usage Guidelines Use this command to configure how the server acquires a dynamic world wide node name (WWNN) for
vHBAs in a service profile.
To specify a pool of WWN names for dynamic assignment, use the set identity wwnn-pool command.
Examples The following example shows how to configure a dynamic WWNN for vHBAs in a service profile
server-A# scope org /
server-A /org # scope service-profile ServInst90
server-A /org/service-profile # set identity dynamic-wwnn 01:23:45:67:89:ab:cd:ef
server-A /org/service-profile* # commit-buffer
server-A /org/service-profile #
derived Derive the WWPN from a WWPN pool, if available, or from a WWPN burned
into the hardware at manufacture.
Usage Guidelines Use this command to configure how the server acquires a dynamic world wide port name (WWPN) for a
vHBA in a service profile.
To specify a pool of WWPNs for dynamic assignment, use the set identity wwpn-pool command.
Examples This example shows how to configure a dynamic WWPN for a vHBA in a service profile:
server-A# scope org /
server-A /org # scope service-profile ServInst90
server-A /org/service-profile # scope vhba vhba3
server-A /org/service-profile/vhba # set identity dynamic-wwpn 01:23:45:67:89:ab:cd:ef
server-A /org/service-profile/vhba* # commit-buffer
server-A /org/service-profile/vhba #
Usage Guidelines Use this command to specify an existing pool of MAC addresses for dynamic assignment to a vNIC in a
service profile.
Examples This example shows how to specify a dynamic MAC address pool for a vNIC in a service profile:
server-A# scope org /
server-A /org # scope service-profile ServInst90
server-A /org/service-profile # scope vnic dynamic-prot-001
server-A /org/service-profile/vnic # set identity mac-pool MyMacPool3
server-A /org/service-profile/vnic* # commit-buffer
server-A /org/service-profile/vnic #
Usage Guidelines Use this command to specify an existing pool of universally unique identifier (UUID) suffixes for dynamic
assignment to vHBAs in a service profile.
Examples This example shows how to specify a UUID suffix pool for a service profile:
server-A# scope org /
server-A /org # scope service-profile ServInst90
server-A /org/service-profile # set identity uuid-suffix-pool MyUuidPool3
server-A /org/service-profile* # commit-buffer
server-A /org/service-profile #
Usage Guidelines Use this command to specify an existing pool of world wide node names (WWNN) for dynamic assignment
to vHBAs in a service profile.
Examples This example shows how to specify a WWNN pool for a service profile:
server-A# scope org /
server-A /org # scope service-profile ServInst90
server-A /org/service-profile # set identity wwnn-pool MyWwnnPool3
server-A /org/service-profile* # commit-buffer
server-A /org/service-profile #
Usage Guidelines Use this command to specify an existing pool of world wide port names (WWPN) for dynamic assignment
to a vHBA in a service profile.
Examples This example shows how to specify a dynamic WWPN pool for a vHBA in a service profile:
server-A# scope org /
server-A /org # scope service-profile ServInst90
server-A /org/service-profile # scope vhba vhba3
server-A /org/service-profile/vhba # set identity wwpn-pool MyWwpnPool13
server-A /org/service-profile/vhba* # commit-buffer
server-A /org/service-profile/vhba #
set intel-turbo-boost-config
To specify whether Intel Turbo Boost Technology is enabled, use the set intel-turbo-boost-config command.
Syntax Description disabled The processor never increases its frequency automatically.
platform-default The BIOS uses the value for this attribute contained in the BIOS defaults
for the server type and vendor.
Usage Guidelines Use this command to specify whether the processor uses Intel Turbo Boost Technology, which allows the
processor to automatically increase its frequency if it is running below power, temperature, or voltage
specifications.
Examples The following example shows how to create a BIOS policy specifying that Intel Turbo Boost Technology is
enabled:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set intel-turbo-boost-config turbo-boost enabled
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
set intel-vt-config
To specify whether Intel Virtualization Technology is enabled, use the set intel-vt-config command.
platform-default The BIOS uses the value for this attribute contained in the BIOS defaults
for the server type and vendor.
Usage Guidelines Use this command to specify whether the processor uses Intel Virtualization Technology, which allows a
platform to run multiple operating systems and applications in independent partitions.
Note If you change this option, you must power cycle the server before the setting takes effect.
Examples The following example shows how to create a BIOS policy specifying that Intel Virtualization Technology
is enabled:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set intel-vt-config vt enabled
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
set intel-vt-directed-io-config
To specify whether Intel Virtualization Technology for Directed I/O is enabled, use the set
intel-vt-directed-io-config command.
Usage Guidelines Use this command to configure processor support for Intel Virtualization Technology for Directed I/O.
Examples The following example shows how to create a BIOS policy specifying that Intel Virtualization Technology
for Directed I/O is enabled with Intel VT-d Interrupt Remapping:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set intel-vt-directed-io-config vtd enabled
switch-A /org/bios-policy* # set intel-vt-directed-io-config interrupt-remapping enabled
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
Syntax Description coalescing-time Enter a value between 1 and 65535 µsec. To turn off coalescing, enter 0
(zero).
Usage Guidelines Use this command to configure the time to wait between interrupts or the idle period that must be encountered
before an interrupt is sent. The coalescing behavior is specified by the set interrupt coalescing-type command.
Examples This example shows how to configure an Ethernet policy with interrupt coalescing:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set interrupt coalescing-time 1000
switch-A /org/eth-policy* # set interrupt coalescing-type min
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
Syntax Description idle The system waits for a period of inactivity exceeding the coalescing time before
sending another interrupt event.
min The system waits for the coalescing time before sending another interrupt event.
Usage Guidelines Use this command to configure the interrupt coalescing behavior. The coalescing time period for waiting is
specified by the set interrupt coalescing-time command.
Examples This example shows how to configure an Ethernet policy with interrupt coalescing:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set interrupt coalescing-time 1000
switch-A /org/eth-policy* # set interrupt coalescing-type min
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
Usage Guidelines Use this command to configure the number of interrupt resources to allocate. In general, you should allocate
one interrupt resource for each completion queue.
Examples This example shows how to configure the interrupt resources of an Ethernet adapter policy:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set interrupt count 32
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
Usage Guidelines Use this command to configure the interrupt mode of the Ethernet or fibre channel adapter. The mode options
are:
• intx—Line interrupt
• msi—Message-signaled interrupt
• msi-x—Extended message-signaled interrupt
Examples This example shows how to configure the interrupt mode of an Ethernet adapter policy:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy* # set interrupt mode msi
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
set interval-days
To configure the number of days between periodic Call Home inventory messages, use the set interval-days
command.
Usage Guidelines Use this command to configure the number of days between periodic Call Home inventory messages. The
range is 0 to 30 days; the default is 7 days.
Examples This example shows how to enable the periodic sending of a Call Home inventory message at 17:30 hours
every 14 days:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # scope inventory
switch-A /monitoring/callhome/inventory # set send-periodically on
switch-A /monitoring/callhome/inventory* # set interval-days 14
switch-A /monitoring/callhome/inventory* # set timeofday-hour 17
switch-A /monitoring/callhome/inventory* # set timeofday-minute 30
switch-A /monitoring/callhome/inventory* # commit-buffer
switch-A /monitoring/callhome/inventory #
set ip
To specify an IP address for a certificate request of a key ring, use the set ip command.
Syntax Description certificate request ip address The IP address of the fabric interconnect associated with the
certificate request.
Usage Guidelines You should create a certificate request before specifying the IP address.
Examples The following example shows how to set the IP address for a certificate request.
UCS-A # scope security
UCS-A /security # scope keyring test
UCS-A /security/keyring # create certreq
UCS-A /security/keyring/certreq* # set ip 1.2.3.4
UCS-A /security/keyring/certreq* # commit buffer
UCS-A /security/keyring/certreq #
set dns
set email
set locality
set org-name
set org-unit-name
set state
Command Description
set subject-name
set ipmi-access-profile
To set the IPMI access profile, use the set ipmi-access-profile command.
Syntax Description name IPMI access profile name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to associate the specified IPMI access profile with the service profile you used to enter
service profile mode.
Examples This example shows how to set the IPMI access profile:
switch-A /org/service-profile #
set iqn-prefix
To set prefix for an IQN pool, use the set iqn-prefix command.
Syntax Description IQN prefix Name of the IQN prefix. The name can include a maximum of 150 characters,
and can be alphanumeric.
Examples This example shows how to create a prefix for an IQN pool.
UCS-A # scope org
UCS-A /org # scope iqn-pool Sample1
UCS-A /org/iqn-pool # set iqn-prefix test1
UCS-A /org/iqn-pool* # commit-buffer
UCS-A /org/iqn-pool #
show iqn-pool
set iscsi-adaptor-policy
To set an iSCSI adaptor policy for an iSCSI VNIC, use the set iscsi-adaptor-policy command.
Syntax Description iscsi-adaptor-policy Name of the iSCSI adaptor policy for the iSCSI VNIC. The name can include
a maximum of 16 characters and can be alphanumeric.
Usage Guidelines You must create a service profile, and an iSCSI VNIC for the service profile before you use this command.
Examples This example shows how to set the iSCSI adaptor policy for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi
UCS-A /org/service-profile/vnic-iscsi # set iscsi-adaptor-policy Trial
UCS-A /org/service-profile/vnic-iscsi* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi #
set identity
set iscsi-identity
set overlay-vnic-name
Syntax Description initiator-name Name of the initiator for the iSCSI VNIC.
Usage Guidelines You must create a service profile and an iSCSI VNIC for the service profile before you use this command.
Examples This example shows how to set an initiator name for the iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi
UCS-A /org/service-profile/vnic-iscsi # set iscsi-identity initiator-name Admin
UCS-A /org/service-profile/vnic-iscsi* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi #
set identity
set iscsi-adaptor-policy
set overlay-vnic-name
Usage Guidelines You must create an iSCSI policy before you use this command.
Examples This example shows how to set the iSCSI protocol to boot to target:
UCS-A # scope org test
UCS-A /org # scope iscsi-policy sample
UCS-A /org/iscsi-policy # set iscsi-protocol-item boottotarget yes
UCS-A /org/iscsi-policy* # commit-buffer
UCS-A /org/iscsi-policy #
Syntax Description connection-timeout Connection timeout interval. The value is between 0 and 255 seconds.
Usage Guidelines You must create an iSCSI policy before you use this command.
If you set the value to 0, then Cisco UCS uses the value set in the adapter firmware.
Examples This example shows how to set the iSCSI protocol connection timeout to 50 seconds:
UCS-A # scope org test
UCS-A /org # scope iscsi-policy sample
UCS-A /org/iscsi-policy # set iscsi-protocol-item connection timeout 50
UCS-A /org/iscsi-policy* # commit-buffer
UCS-A /org/iscsi-policy #
Syntax Description dhcp-timeout DHCP timeout interval. The value must be between 60 and 300 seconds.
Usage Guidelines You must create an iSCSI policy before you use this command.
Examples This example shows how to set the DHCP timeout for an iSCSI policy to 70 seconds:
UCS-A # scope org test
UCS-A /org # scope iscsi-policy sample
UCS-A /org/iscsi-policy # set iscsi-protocol-item dhcp-timeout 70
UCS-A /org/iscsi-policy* # commit-buffer
UCS-A /org/iscsi-policy #
Syntax Description yes To configure an HBA mode for the iSCSI policy.
Examples This example shows how to set an HBA mode for an iSCSI policy.
UCS-A # scope org test
UCS-A /org # scope iscsi-policy sample
UCS-A /org/iscsi-policy # set iscsi-protocol-item hbamode yes
UCS-A /org/iscsi-policy* # commit-buffer
UCS-A /org/iscsi-policy #
Syntax Description lun-busy-retrycount LUN busy retry count parameter for an iSCSI policy. The value must
be between 0 and 60.
Usage Guidelines You must create an iSCSI policy before you use this command.
If you enter the value as 0, then Cisco UCS uses the value set in the adapter firmware.
Examples This example shows how to set the LUN busy retry-count parameter to 50 for an iSCSI policy:
UCS-A # scope org test
UCS-A /org # scope iscsi-policy sample
UCS-A /org/iscsi-policy # set iscsi-protocol-item lun-busy-retrycount 50
UCS-A /org/iscsi-policy* # commit-buffer
UCS-A /org/iscsi-policy #
Syntax Description no Specifies not setting the TCP timestamp for the iSCSI policy.
yes Specifies setting the TCP timestamp for the iSCSI policy.
Usage Guidelines You must create an iSCSI policy before you use this command.
This option only applies to servers with the Cisco UCS NIC M51KR-B adapter.
Examples This example shows how to enable the TCP timestamp feature for an iSCSI policy:
UCS-A # scope org test
UCS-A /org # scope iscsi-policy sample
UCS-A /org/iscsi-policy # set iscsi-protocol-item tcp-time-stamp yes
UCS-A /org/iscsi-policy* # commit-buffer
UCS-A /org/iscsi-policy #
set iscsi-targetname
To set an ISCSI target name for a static target interface, use the set iscsi-targetname command.
Examples This example shows how to set the ISCSI target name for a static target interface.
UCS-A # scope org
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # scope static-target-if 1
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if # set iscsi-targetname sample1
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi/eth-if/static-target-if #
create static-target-if
set iscsivnicname
To set an iSCSI VNIC name for the iSCSI path, use the set iscsivnicname command.
Syntax Description iscsivnicname Name of the iSCSI VNIC path. The name can include a maximum of 16
alphanumeric characters.
Usage Guidelines You must create an iSCSI path for a boot policy before you use this command.
Examples This example shows how to set the iSCSI VNIC name to the iSCSI path of the boot policy:
UCS-A # scope org test
UCS-A /org # scope boot-policy sample
UCS-A /org/boot-policy # scope iscsi
UCS-A /org/boot-policy/iscsi # scope path primary
UCS-A /org/boot-policy/iscsi/path # set iscsivnicname Trial
UCS-A /org/boot-policy/iscsi/path* # commit-buffer
UCS-A /org/boot-policy/iscsi/path #
set isnative
To mark a member-port as a native VLAN, use the set isnative command.
Syntax Description no Use this option to not set a member-port as the native VLAN.
Examples This example shows how to set a member port as a native vlan.
Switch-A # scope eth-storage
Switch-A /eth-storage # scope fabric a
Switch-A /eth-storage/fabric # scope vlan test
Switch-A /eth-storage/fabric/vlan # scope member-port a 1 2
Switch-A /eth-storage/fabric/vlan/member-port # set isnative yes
Switch-A /eth-storage/fabric/vlan/member-port* # commit-buffer
Switch-A /eth-storage/fabric/vlan/member-port #
scope member-port
set key
Syntax Description
This command has no arguments or keywords.
Usage Guidelines When you enter this command, you are prompted to type a key value twice. When you type the key on the
command line, it does not display.
The key can be up to 33 characters.
Examples This example shows how to set a key in server under LDAP mode:
switch-A#scope security
switch-A /security # scope ldap
switch-A /security/ldap # scope server 192.0.20.246
switch-A /security/ldap/server # set key
Enter the key:
Confirm the key:
switch-A /security/ldap/server* # commit-buffer
switch-A /security/ldap/server #
Syntax Description key-name The name of the key. A unique set of numbers or letters that identifies the key.
The range of valid values is 1 to 33.
Examples This example shows how to set up the master extension key:
switch-A# scope system
switch-A /system # scope vm-mgmt
switch-A /system/vm-mgmt # scope extension-key
switch-A /system/vm-mgmt/extension-key # set key K1
switch-A /system/vm-mgmt/extension-key* # commit-buffer
switch-A /system/vm-mgmt/extension-key #
set lastname
To set the user name last name, use the set lastname command.
Syntax Description name Last name. The range of valid values is 1 to 16.
Examples This example shows how to set the user name last name:
switch-A#scope security
switch-A /security/local-user #
set level
To filter Call Home messages based on their level of urgency, use the set level command.
set level {disaster| fatal| critical| major| minor| warning| notification| normal| debug}
Usage Guidelines Use this command to filter Call Home messages based on their level of urgency. Select the minimum urgency
level for generating a Call Home message, with Disaster (8) being the highest urgency and Debug (0) being
the lowest. Any message with a level value lower than the configured urgency level is not sent.
Examples This example shows how to set a threshold urgency level of Critical for sending Call Home messages:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # enter profile TestProfile
switch-A /monitoring/callhome/profile* # set level critical
set link-aggregation-pref
To set the link aggregation preference for the chassis connectivity policy for a fabric, use the set
link-aggregation-pref command.
Syntax Description global Sets the link aggregation preference to global. This option sets the preference to
the chassis discovery policy.
none Sets the link aggregation preference to none. This option implies that no port
channels are required.
port-channel Sets the link aggregation preference to port-channel. This options implies that
port channels are required.
Usage Guidelines Port channels are supported only with the new IO module that is released with 2.0(1) release. If your
configuration includes IO modules of previous releases, then you cannot configure port channels.
Examples This example shows how to set the link aggregation preference for the chassis connectivity policy to
port-channel for fabric A:
UCS-A # scope org test
UCS-A /org # scope chassis-conn-policy 1 a
UCS-A /org/chassis-conn-policy # set link-aggregation-pref port-channel
UCS-A /org/chassis-conn-policy* # commit-buffer
UCS-A /org/chassis-conn-policy #
scope chassis-conn-policy
Syntax Description none Sets no link aggregation preference for the policy.
Examples This example shows how to set the link aggregation preference to port channel:
UCS-A # scope org test
UCS-A /org # scope chassis-disc-policy
UCS-A /org/chassis-disc-policy # set link-aggregation-pref port-channel
UCS-A /org/chassis-disc-policy* # commit-buffer
UCS-A /org/chassis-disc-policy #
show org
set local-disk-policy
To set the local disk policy, use the set local-disk-policy command.
Syntax Description name Local disk policy name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to associate the specified local disk policy with the service profile you used to enter service
profile mode.
Examples This example shows how to set the local disk policy:
switch-A /org/service-profile #
set locality
To specify a city or town in which the company that requested for the certificate resides, use the set locality
command.
Syntax Description Locality name The name of the city or town in which the company that requested the certificate
resides. The name can include a maximum of 64 characters and can be
alphanumeric.
Usage Guidelines You should create a certificate request before specifying the locality.
Examples The following example shows how to set the locality for a certificate request.
UCS-A # scope security
UCS-A /security # scope keyring test
UCS-A /security/keyring # create certreq
UCS-A /security/keyring/certreq* # set locality new york city
UCS-A /security/keyring/certreq* # commit buffer
UCS-A /security/keyring/certreq #
set dns
set email
set locality
set org-name
set org-unit-name
Command Description
set state
set subject-name
set lun
To set a LUN name, use the set lun command.
Syntax Description name LUN name. The range of valid values is 1 to 16.
switch-A /org/service-profile/path #
set lv-dimm-support-config
To specify whether the system prioritizes low voltage or high frequency memory operations, use the set
lv-dimm-support-config command.
Syntax Description performance-mode The system prioritizes high frequency operations over low voltage
operations.
power-saving-mode The system prioritizes low voltage memory operations over high
frequency memory operations.
platform-default The BIOS uses the value for this attribute contained in the BIOS defaults
for the server type and vendor.
Usage Guidelines Use this command to specify whether the system prioritizes low voltage or high frequency memory operations.
Selecting the power-saving-mode option may lower memory frequency in order to keep the voltage low.
Examples The following example shows how to create a BIOS policy that prioritizes high frequency operations over
low voltage operations:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set lv-dimm-support-config lv-ddr-mode performance-mode
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
set macaddress
To set a MAC address for an Ethernet target endpoint, use the set macaddress command.
Syntax Description Target MAC address The MAC address of the Ethernet target endpoint. It must be in the
AA:BB:CC:DD:EE:FF format.
Usage Guidelines An interface for a fabric, and an Ethernet target endpoint for the fabric interface must be created to use this
command.
Examples This example shows how to set the MAC address for an Ethernet target endpoint.
Switch-A # scope eth-storage
Switch-A /eth-storage # scope fabric a
Switch-A /eth-storage/fabric # scope eth-target Test
Switch-A /eth-storage/fabric/eth-target # set macaddress 00:0D:L1:56:89:DA
Switch-A /eth-storage/fabric/eth-target* # commit-buffer
Switch-A /eth-storage/fabric/eth-target #
set mac-aging
To set up MAC aging, use the set mac aging command.
Syntax Description mode-default The aging time default value for the configured Ethernet switching mode. For end-host
mode, the default aging time is 7200 seconds; for switch mode, the default aging
time is 300 seconds.
never If the aging time is set to never the system will not remove MAC addresses from the
table, regardless of how long they have been idle.
Usage Guidelines The MAC aging time must be set in the dd:hh:mm:ss format.
show eth-uplink
set mac-pool
To specify a pool of MAC addresses for a vNIC template, use the set mac-pool command.
Usage Guidelines Use this command to specify an existing pool of MAC addresses for dynamic assignment to a vNIC (virtual
network interface card) template.
Examples This example shows how to specify the MAC address pool for a vNIC:
switch-A# scope org org10
switch-A /org # scope vnic-templ sp10
switch-A /org/vnic-templ # set mac-pool pool192
switch-A /org/vnic-templ* # commit-buffer
switch-A /org/vnic-templ #
set maint-policy
To set a maintenance policy for a service profile, use the set maint-policy command.
Syntax Description maintenance policy name The name of the maintenance policy.
Usage Guidelines A maintenance policy and a service profile must be created before using this command.
Examples This example shows how to set the maintenance policy for a service profile.
Switch-A # scope org
Switch-A /org # scope service-profile sample
Switch-A /org/service-profile # set maint-policy default
Switch-A /org/service-profile* # commit-buffer
Switch-A /org/service-profile #
set maxcap
To set the maximum capacity, use the set maxcap command.
Usage Guidelines Use this command to specify the maximum capacity of the memory array.
switch-A /org/service-qual/storage #
set maxcores
To set the maximum number of cores, use the set maxcores command.
Syntax Description max-cores Maximum number of cores. The range of valid values is 0 to 65535.
Usage Guidelines Use this command to specify the maximum number of processor cores.
Examples This example shows how to set the maximum number of cores:
switch-A /org/server-qual/processor #
set max-duration
To set a maximum duration for a one-time or periodic maintenance window, use the set max-duration
command.
Syntax Description none Use this option to not set any day for the maintenance window.
days Use this option to set a number of days for the maintenance window. The value
must be between 0 - 4294967294.
hours Use this option to set the hour for the maintenance window. The value must be
between 0 - 23.
minutes Use this option to set the minutes for the maintenance window. The value must be
between 0 - 59.
seconds Use this option to set the seconds for the maintenance window. The value must be
between 0 - 59.
Usage Guidelines A scheduler policy and a maintenance window must be created to use this command.
Examples This example shows how to set the maximum duration for a periodic maintenance window.
Switch-A # scope system
Switch-A /system # scope scheduler Default
Switch-A /system/scheduler # scope maint-window periodic Trial
Switch-A /system/scheduler/periodic # set max-duration 23 4 45 6
Switch-A /system/scheduler/periodic* # commit-buffer
Switch-A /system/scheduler/periodic #
set max-field-size
To configure the maximum data field size for the Fibre Channel interface, use the set max-field-size command.
Syntax Description max-field-size The maximum data field size. The range is 256 to 2112 bytes; the default
is 2048.
Usage Guidelines Use this command to configure the maximum data field size for the Fibre Channel interface in a vHBA (virtual
host bus adapter).
Examples This example shows how to configure the maximum data field size for the Fibre Channel interface in a vHBA
template:
switch-A# scope org org10
switch-A /org # scope vhba-templ sp10
switch-A /org/vhba-templ # set max-field-size 512
switch-A /org/vhba-templ* # commit-buffer
switch-A /org/vhba-templ #
set max-http-user-sessions
To set the maximum number of HTTP user sessions on the system, use the set max-http-user-sessions
command.
Syntax Description max http user sessions The maximum number of HTTP user sessions. The value must be a
numeral.
Usage Guidelines The value for this command must be a number. You cannot enter an alphanumeric string or enter special
characters.
Examples This example shows how to set the maximum number of HTTP user sessions to 20.
Switch-A # scope security
Switch-A /security # set max-http-user-session 20
Switch-A /security* # commit-buffer
set maximum
To set the maximum, use the set maximum command.
Usage Guidelines Use this command to specify the maximum capacity for the selected adapter type.
switch-A /org/server-qual/adapter/cap-qual #
set max-ports
To set the maximum number of ports a port profile can use, use the set max-ports command.
Syntax Description maximun-number The maximum number of ports. The range of valid values is 1 to 4096.
Usage Guidelines The maximum number of ports that can be associated with a single distributed virtual switch (DVS) is 4096.
If the DVS has only one associated port profile, that port profile can be configured with up to 4096 ports.
However, if the DVS has more than one associated port profile, the total number of ports associated with all
of those port profiles combined cannot exceed 4096.
Examples This example shows how to set the maximum number of ports a port profile can use:
switch-A# scope system
switch-A /system # scope vm-mgmt
switch-A /system/vm-mgmt # scope vmware
switch-A /system/vm-mgmt/vmware # scope profile-set
switch-A /system/vm-mgmt/vmware/profile-set # scope port-profile
switch-A /system/vm-mgmt/vmware/profile-set/port-profile # set max-ports 100
switch-A /system/vm-mgmt/vmware/profile-set/port-profile* # commit-buffer
switch-A /system/vm-mgmt/vmware/profile-set/port-profile #
platform-default Sets the processor C1e configuration to the platform default option.
Usage Guidelines You must create a BIOS policy before you use this command.
Examples This example shows how to set the processor C1e configuration to the platform default option:
UCS-A # scope org test
UCS-A /org # scope bios-policy sample
UCS-A /org/bios-policy # set processor-c1e-config c1e platform-default
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
Command Description
set intel-vt-config vt
Usage Guidelines A BIOS policy must be configured in the organization command mode to use this command.
Examples This example shows how to enable the maximum memory configuration.
UCS-A # scope org Test
UCS-A /org # scope bios-policy sample
UCS-A /org/bios-policy # set max-memory-below-4gb-config max-memory enabled
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
auto-max Sets the maximum variable MTRR configuration of a processor to the automatic
maximum limit.
platform-default Sets the maximum variable MTRR configuration of a processor to the platform
default option.
Usage Guidelines You must create a BIOS policy before you use this command.
Examples This example shows how to set the maximum variable MTRR setting to 8:
UCS-A # scope org test
UCS-A /org # scope bios-policy sample
UCS-A /org/bios-policy # set max-variable-mtrr-setting-config processor-mtrr 8
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
Command Description
set core-multi-processing-config multi-processing
set intel-vt-config vt
set maxprocs
To set the maximum number of processors, use the set maxprocs command.
Syntax Description max-procs Maximum number of processors. The range of valid values is 0 to 65535.
Examples This example shows how to set the maximum number of processors:
switch-A /org/server-qual/processor #
set maxsize
To configure a maximum destination message size for Call Home messages, use the set maxsize command.
Usage Guidelines Use this command to configure a maximum destination message size for Call Home messages. The range is
0 to 5000000 bytes; the default is 1000000.
For full-text and xml messages, the maximum recommended size is 5000000. For short-text messages, the
maximum recommended size is 100000. For messages sent to CiscoTAC-1, the maximum message size must
be 5000000.
Examples This example shows how to set a maximum Call Home message size of 10000 bytes:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # enter profile TestProfile
switch-A /monitoring/callhome/profile* # set maxsize 10000
switch-A /monitoring/callhome/profile* # commit-buffer
switch-A /monitoring/callhome/profile #
show callhome
set maxthreads
To set the maximum number of threads, use the set maxthreads command.
Syntax Description max-threads Maximum number of threads. The range of valid values is 0 to 65535.
Examples This example shows how to set the maximum number of threads:
switch-A /org/server-qual/processor #
set member-of-attribute
To set the member of attribute for an LDAP group rule, use the set member-of-attribute command.
Syntax Description Group Attribute The name of the group attribute that the LDAP group rule must be set with.
The value can include a maximum of 63 characters.
Usage Guidelines An LDAP server and an LDAP group rule must be created to use this command.
Examples This example shows how to set the member of attribute for an LDAP group rule.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope server Testing
Switch-A /security/ldap/server # scope ldap-group-rule
Switch-A /security/ldap/server/ldap-group-rule # set member-of-attribute Sample
Switch-A /security/ldap/server/ldap-group-rule* # commit-buffer
Switch-A /security/ldap/server/ldap-group-rule #
set memory-mirroring-mode
To enable and configure memory mirroring, use the set memory-mirroring-mode command.
Syntax Description intersocket Memory is mirrored between two Integrated Memory Controllers (IMCs)
across CPU sockets.
intrasocket One IMC is mirrored with another IMC in the same socket.
platform-default The BIOS uses the value for this attribute contained in the BIOS defaults
for the server type and vendor.
Usage Guidelines Use this command to enable and configure memory mirroring, which enhances system reliability by keeping
two identical data images in memory.
Examples The following example shows how to enable intersocket memory mirroring:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set memory-mirroring-mode mirroring-mode intersocket
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
set memory-ras-config
To specify the memory reliability, availability and serviceability (RAS) configuration, use the set
memory-ras-config command.
Usage Guidelines Use this command to specify the memory reliability, availability and serviceability (RAS) configuration.
If the DIMM pairs in the server have an identical type, size, and organization and are populated across the
SMI channels, you can enable lockstep mode to minimize memory access latency and provide better
performance. Lockstep is enabled by default for B400 servers.
platform-default Sets the memory sparing mode to the platform default option.
Usage Guidelines A BIOS policy must be configured in the Organization command mode to use this command.
Examples This example shows how to set the memory sparing mode to the platform default option.
UCS-A # scope org
UCS-A /org # scope bios-policy sample
UCS-A /org/bios-policy # set memory-sparing-mode sparing-mode platform-default
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
set message
To set a message as the pre-login banner for the system, use the set message command.
set message
Examples This example shows how to set a message as the pre-login banner message.
UCS-A # scope security
UCS-A /security # scope banner
UCS-A /security/banner # scope pre-login-banner
UCS-A /security/banner/pre-login-banner # set message
UCS-A /security/banner/pre-login-banner* # commit buffer
UCS-A /security/banner/pre-login-banner #
set mgmt-fw-policy
To set the management firmware policy, use the set mgmt-fw-policy command.
Syntax Description name Management firmware policy name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to associate the specified management firmware policy with the service profile you used
to enter service profile mode.
Examples This example shows how to set the management firmware policy:
switch-A /org/service-profile #
Syntax Description arp-deadline The time limit or deadline that the management interface must wait for an ARP
response. The value must be a number.
Examples This example shows how to set the maximum time limit to wait for an ARP response to 12.
Switch-A # scope monitoring
Switch-A /monitoring # set mgmt-if-mon-policy arp-deadline 12
Switch-A /monitoring* # commit-buffer
Switch-A /monitoring #
Command Description
set mgmt-if-mon-policy ping-requests
set mgmt-if-mon-policy poll-interval
Syntax Description ping-arp-targets Use this option to monitor all ARP targets that are pinged.
Examples This example shows how to set the monitoring mechanism to monitor the ping gateway.
Switch-A # scope monitoring
Switch-A /monitoring # set mgmt-if-mon-policy monitor-mechanism ping-gateway
Switch-A /monitoring* # commit-buffer
Switch-A /monitoring #
Command Description
set mgmt-if-mon-policy mii-retry-interval
set mgmt-if-mon-policy ping-deadline
set mgmt-if-mon-policy ping-requests
set mgmt-if-mon-policy poll-interval
Syntax Description ping-requests The number of ping requests. It must be a number between 1 and 5.
show mgmt-if-mon-policy
Syntax Description poll-interval The polling interval in seconds. The value must be a number between 99
and 300.
Examples This example shows how to set the polling interval to 200 seconds.
Switch-A # scope monitoring
Switch-A /monitoring # set mgmt-if-min-policy poll-interval 200
Switch-A /monitoring* # commit-buffer
Switch-A /monitoring #
show mgmt-if-mon-policy
set mincap
To set the minimum capacity, use the set mincap command.
Usage Guidelines Use this command to specify the minimum capacity of the memory array.
switch-A /org/service-qual/storage #
set mincores
To set the minimum number of cores, use the set mincores command.
Syntax Description min-cores Minimum number of cores. The range of valid values is 0 to 65535.
Usage Guidelines Use this command to specify the minimum number of processor cores.
Examples This example shows how to set the minimum number of cores:
switch-A /org/server-qual/processor #
set min-interval
To set a minimum interval for a one-time or periodic maintenance window, use the set min-interval command.
Syntax Description none Use this option to not set an hour for the maintenance window.
hours Use this option to specify the number of hours for the maintenance window. The
value must be between 0 - 24.
minutes Use this option to specify the number of minutes for the maintenance window.
The value must be between 0 - 59.
seconds Use this option to specify the number of seconds for the maintenance window.
Usage Guidelines A scheduler policy and a maintenance window must be created to use this command.
Examples This example shows how to set a minimum interval for a one-time maintenance window.
Switch-A # scope system
Switch-A /system # scope scheduler default
Switch-A /system/scheduler # scope maint-window one-time Test
Switch-A /system/scheduler/one-time # set min-interval 1 22 30
Switch-A /system/scheduler/one-time* # commit-buffer
Switch-A /system/scheduler/one-time #
Command Description
set max-duration
set proc-cap
set minprocs
To set the minimum number of processors, use the set minprocs command.
Syntax Description min-procs Minimum number of processors. The range of valid values is 0 to 65535.
Examples This example shows how to set the maximum number of processors:
switch-A /org/server-qual/processor #
set minthreads
To set the minimum number of threads, use the set minthreads command.
Syntax Description min-threads Minimum number of threads. The range of valid values is 0 to 65535.
Examples This example shows how to set the minimum number of threads:
switch-A /org/server-qual/processor #
set minute
To set a minute for the periodic maintenance window, use the set minute command.
Syntax Description minute To set a specific minute for the maintenance window. The range of valid values
is between 0 - 60.
Usage Guidelines A scheduler policy and a maintenance window must be created to use this command.
Examples This example shows how to set the minutes for the periodic maintenance window.
Switch-A # scope system
Switch-A /system # scope scheduler Default
Switch-A /system/scheduler # scope maint-window periodic Trial
Switch-A /system/scheduler/periodic # set minute 45
Switch-A /system/scheduler/periodic* # commit-buffer
Switch-A /system/scheduler/periodic #
Usage Guidelines The Ethernet switching mode determines how the switch behaves as a switching device between the servers.
End host mode allows the switch to act as an end host to the network, representing all server (hosts) connected
to it through vNICs and the network. Switch mode is the traditional Ethernet switching mode.
Examples This example shows how to set the Ethernet switching mode to end host mode:
switch-A# scope eth-uplink
switch-A /eth-uplink # set mode end-host
switch-A /eth-uplink* # commit-buffer
switch-A /eth-uplink #
Syntax Description end-host Specifies end host Fibre Channel switching mode.
Usage Guidelines The Fibre Channel switching mode determines how the switch behaves as a switching device between the
servers. End host mode allows the switch to act as an end host to the network, representing all server (hosts)
connected to it through vHBAs and the network. Switch mode is the traditional Fibre Channel switching
mode.
Examples This example shows how to set the Fibre Channel switching mode to end host mode:
switch-A# scope fc-uplink
switch-A /fc-uplink # set mode end-host
switch-A /fc-uplink* # commit-buffer
switch-A /fc-uplink #
Examples This example shows how to set the firmware pack mode:
switch-A# scope org /
switch-A /org # scope fw-host-pack Pack10
switch-A /org/fw-host-pack # set one-shot
switch-A /org/fw-host-pack* # commit-buffer
switch-A /org/fw-host-pack #
Syntax Description any-configuration Specifies any configuration for the local disk.
raid-6-striped-dual-parity Specifies RAID 6 striping with dual parity on the local disk.
1.3(1) The basic raid-mirrored and raid-striped keywords were removed and
more specific keywords were added.
Usage Guidelines The disk policy configures any optional SAS local drives that have been installed on a server through the
onboard RAID controller of the local drive. This policy enables you to set a local disk mode for all servers
that are associated with a service profile that includes the local disk configuration policy. The general disk
modes include the following:
• Any Configuration—For a server configuration that carries forward the local disk configuration without
any changes.
• No Local Storage—For a diskless workstation or a SAN only configuration. If you select this option,
you cannot associate any service profile which uses this policy with a server that has a local disk.
• No RAID—For a server configuration that removes the RAID and leaves the disk MBR and payload
unaltered.
• RAID Mirrored—For a 2-disk RAID 1 server configuration.
• RAID Striped—For a 2-disk RAID 0 server configuration.
You must include this policy in a service profile, and that service profile must be associated with a server for
it to take effect.
Examples This example shows how to set the local disk configuration mode:
switch-A# scope org org10
switch-A /org # enter local-disk-config-policy DiskPolicy12
switch-A /org/local-disk-config-policy* # set mode raid-5-striped-parity
switch-A /org/local-disk-config-policy* # commit-buffer
switch-A /org/local-disk-config-policy #
set model-regex
To filter model information with a regular expression, use the set model-regex command.
1.3(1) The processor qualification mode was replaced by the CPU qualification
mode.
Usage Guidelines Use this command to implement a server pool qualification filter. You can filter adapter or CPU model
information with a regular expression that is compatible with the Perl language.
Examples The following example shows how to create a server pool qualification filter to select only Intel 2.27GHz
processors:
switch-A# scope org org120
switch-A /org # scope server-qual sq20
switch-A /org/server-qual # create cpu
switch-A /org/server-qual/cpu* # set model-regex Intel.*2.27GHz
switch-A /org/server-qual/cpu* # commit-buffer
switch-A /org/server-qual/cpu #
set module
To specify the management logging threshold for a specific module, use the set module command.
set module module-name {crit| major| minor| warn| info| debug4| debug3| debug2| debug1| debug0}
Usage Guidelines Use this command to specify the management logging threshold for a specific module. The threshold options
are listed in order of decreasing urgency in the Syntax Description.
Examples This example shows how to specify the management logging threshold to major for a specific module:
switch-A# scope monitoring
switch-A /monitoring # scope sysdebug
switch-A /monitoring/sysdebug # scope mgmt-logging
switch-A /monitoring/sysdebug/mgmt-logging # set module test13 major
switch-A /monitoring/sysdebug/mgmt-logging* # commit-buffer
switch-A /monitoring/sysdebug/mgmt-logging #
set modulus
To select the key length in a keyring, use the set modulus command.
Examples This example shows how to select a key length of 1536 bits in a keyring:
switch-A# scope security
switch-A /security # scope keyring MyKR05
switch-A /security/keyring # set modulus mod1536
switch-A /security/keyring* # commit-buffer
switch-A /security/keyring #
set mtu
To set an Maximum Transmission Unit (MTU), use the set mtu command.
Syntax Description mtu MTU. The range of valid values is 1538 to 9216.
switch-A /eth-server/qos/eth-classified #
Syntax Description mtu Specifies an MTU in bytes. The range is 1538 to 9216.
Usage Guidelines Following are the MTU settings for fc and normal :
• fc —2240 octets or bytes
• normal —1528 octets or bytes
Syntax Description mtu The MTU. The range of valid values is 1500 to 9000.
Usage Guidelines Use this command to set the MTU (Maximum Transmission Unit) of a vNIC (virtual network interface card).
Examples This example shows how to set the MTU for a vNIC:
switch-A# scope org org10
switch-A /org # scope vnic-templ sp10
switch-A /org/vnic-templ # set mtu 9000
switch-A /org/vnic-templ* # commit-buffer
switch-A /org/vnic-templ #
set multicast-optimize
To optimize the class for sending multicast packets, use the set multicast-optimize command.
Syntax Description no The class is not optimized for sending multicast packets.
Usage Guidelines Use this command to optimize the class for sending multicast packets.
Examples This example shows how to optimize the QoS bronze class for sending multicast packets:
switch-A# scope eth-server
switch-A /eth-server # scope qos
switch-A /eth-server/qos # scope eth-classified bronze
switch-A /eth-server/qos/eth-classified # set multicast optimize yes
switch-A /eth-server/qos/eth-classified* # commit-buffer
switch-A /eth-server/qos/eth-classified #
switch-A /eth-server/qos/eth-best-effort #
set name
To set name, use the set name command.
1.4(1) This command was introduced in the Server (/chassis/server) and System
(/system) mode.
switch-A /eth-uplink/fabric/port-channel #
set native
To set the VLAN as the native VLAN, use the set native command.
Syntax Description no Specifies that the current VLAN is not the native VLAN.
Usage Guidelines Use this command to set the VLAN as the native VLAN.
Note Only one VLAN can exist as the native VLAN. If you set multiple VLANs as the native VLAN, the last
one to be set becomes the native VLAN.
Examples This example sets the current VLAN as the native VLAN:
switch-A# scope eth-uplink
switch-A /eth-uplink # scope fabric a
switch-A /eth-uplink/fabric # create vlan finance 3955
switch-A /eth-uplink/fabric/vlan* # set native
switch-A /eth-uplink/fabric/vlan* # commit-buffer
switch-A /eth-uplink/fabric/vlan #
set no-change-interval
To set a time interval during which users cannot modify their password, use the set no-change-interval
command.
Syntax Description no-change-interval Time, in hours, during which the password cannot be changed. The value
must be between 1 and 745.
Usage Guidelines You must be an administrator user or have aaa privileges to use this command.
The value must be lower than the value set for the set change-during-interval command.
Examples This example shows how to set the time duration during which a password cannot be modified to 40 hours:
UCS-A # scope security
UCS-A /security # scope password-profile
UCS-A /security/password-profile # set no-change-interval 40
UCS-A /security/password-profile* # commit-buffer
UCS-A /security/password-profile #
set change-during-interval
set change-interval
set history-count
set normal-value
To set a value for a property, use the set normal-value command.
Syntax Description value The value of a property in a class. The range of valid values is 0 to
9223372036854775807.
Usage Guidelines You must have a class and a property created in order to execute the set normal-value command. The
command is used to set the value of the property you created.
Examples The following example shows how to set a value for the bytes-rx-delta property in fc-stats class:
switch-A#scope fc-uplink
switch-A /fc-uplink # scope stats-threshold-policy stp100
set notificationtype
To set a notification method for the SNMP traps, use the set notificationtype command.
Syntax Description informs Use this option to configure SNMP to inform all notifications.
set numa-config
To specify whether the BIOS supports NUMA, use the set numa-config command.
platform-default The BIOS uses the value for this attribute contained in the BIOS defaults
for the server type and vendor.
Use this command to specify whether the BIOS includes the ACPI tables that are required for operating
systems that support Non-Uniform Memory Access (NUMA). If you enable this option, the system must
disable Inter-Socket Memory interleaving on some platforms.
Examples The following example shows how to create a BIOS policy specifying that NUMA is supported:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set numa-config numa-optimization enabled
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
set numberofblocks
To set the number of blocks, use the set numberofblocks command.
Syntax Description number Number of storage blocks. The range of valid values is 0 to
9223372036854775807.
Examples The following example shows how to set the number of blocks:
switch-A /org/server-qual/storage #
set nw-control-policy
To set a network control policy name , use the set nw-control-policy command.
Syntax Description policy-name The name of the policy. The range of valid values is 1 to 16.
2.0(1) This command was introduced in the Ethernet storage command mode.
Examples This example shows how to set a network control policy name:
UCS-A# scope org org3
UCS-A /org # scope service-profile sp3
UCS-A /org/service-profile # scope vnic vnic3
UCS-A /org/service-profile/vnic # set nw-control-policy ncp3
UCS-A /org/service-profile/vnic* # commit-buffer
UCS-A /org/service-profile/vnic #
enabled The hardware reassembles all segmented packets before sending them to
the CPU.
Usage Guidelines Use this command to enable or disable offloading of large packet reassembly. Enabling this option may reduce
CPU utilization and increase inbound throughput.
Examples This example shows how to enable the offloading of large packet reassembly:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set offload large-receive enabled
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
enabled The CPU sends all packet checksums to the hardware for validation.
Usage Guidelines Use this command to enable or disable the offloading of packet checksum validation. Enabling this option
may reduce CPU utilization.
Examples This example shows how to enable the offloading of packet checksum validation:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set offload tcp-rx-checksum enabled
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
enabled The CPU sends large TCP packets to the hardware to be segmented.
Usage Guidelines Use this command to enable or disable the offloading of large TCP packet segmentation. Enabling this option
may reduce CPU overhead and increase throughput rate.
Examples This example shows how to enable the offloading of large TCP packet segmentation:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set offload tcp-segment enabled
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
enabled The CPU sends all packets to the hardware so that the checksum can be
calculated.
Usage Guidelines Use this command to enable or disable the offloading of transmit checksum calculations. Enabling this option
may reduce CPU overhead.
Examples This example shows how to enable the offloading of transmit checksum calculations:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set offload tcp-tx-checksum enabled
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
set onboard-scu-storage-support
To set the onboard SCU storage support for a BIOS policy, use the set onboard-scu-storage-support command.
Syntax Description enabled Enables onboard SCU storage support for the BIOS policy.
disabled Disables onboard SCU storage support for the BIOS policy.
platform-default Sets the onboard SCU storage support to the platform default option.
Examples This example shows how to disable the onboard SCU storage support option for a BIOS policy.
UCS-A # scope org
UCS-A /org # scope bios-policy sample
UCS-A /org/bios-policy # set onboard-scu-storage-support disable
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
show bios-policy
set order {1 | 2 | 3 | 4}
Examples This example shows how to set the LAN boot order:
switch-A# scope org org3
switch-A /org # scope boot-policy bp3
switch-A /org/service-profile # scope lan
Syntax Description order The order. The range of valid values is 0 to 99.
Examples This example shows how to set the PCI scan order:
switch-A# scope org org10
Syntax Description order The order. The range of valid values is 0 to 99.
switch-A /org/service-profile/vnic #
set org-unit-name
To specify the name of the organizational unit requesting the certificate, use the set org-unit-name command.
Syntax Description Organizational unit name The name of the organizational unit requesting the certificate. The name
can include a maximum of 64 characters and can be alphanumeric.
Usage Guidelines You should create a certificate request before specifying the organizational unit details.
Examples The following example shows how to set the organizational unit information for a certificate request.
UCS-A # scope security
UCS-A /security # scope keyring test
UCS-A /security/keyring # create certreq
UCS-A /security/keyring/certreq* # set org-unit-name Testing
UCS-A /security/keyring/certreq* # commit buffer
UCS-A /security/keyring/certreq #
set dns
set e-mail
set ip
set locality
set org-name
set state
Command Description
set subject-name
set org-name
To specify the name of the organization requesting the certificate, use the set org-name command.
Syntax Description Organization name The name of the organization requesting the certificate. The name can include
a maximum of 64 characters and can be alphanumeric.
Usage Guidelines You should create a certificate request before specifying the organization details.
Examples The following example shows how to set the organization information for a certificate request.
UCS-A # scope security
UCS-A /security # scope keyring test
UCS-A /security/keyring # create certreq
UCS-A /security/keyring/certreq* # set org-name Cisco
UCS-A /security/keyring/certreq* # commit buffer
UCS-A /security/keyring/certreq #
set dns
set e-mail
set ip
set locality
set org-unit-name
set state
Command Description
set subject-name
set out-of-band
To configure out-of-band access to a fabric interconnect, use the set out-of-band command.
Usage Guidelines Use this command to configure out-of-band access to a fabric interconnect.
Note Changing the out-of-band access configuration may disconnect the current CLI session.
Examples This example shows how to configure out-of-band access for fabric A:
switch-A# scope fabric-interconnect a
switch-A /fabric-interconnect # set out-of-band ip 192.20.1.28
Warning: When committed, this change may disconnect the current CLI session
switch-A /fabric-interconnect* # set out-of-band netmask 255.255.248.0
Warning: When committed, this change may disconnect the current CLI session
switch-A /fabric-interconnect* # set out-of-band gw 192.20.1.1
Warning: When committed, this change may disconnect the current CLI session
switch-A /fabric-interconnect* # commit-buffer
switch-A /fabric-interconnect #
set overlay-vnic-name
To set an overlay VNIC name for the iSCSI VNIC, use the set overlay-vnic-name command.
Syntax Description overlay-vnic-name Name of the overlay VNIC. The name can include a maximum of 16
alphanumeric characters.
Usage Guidelines You must create a service profile and an iSCSI VNIC for the service profile before you use this command.
Examples This example shows how to set the overlay name for an iSCSI VNIC:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # set overlay-vnic-name Testing
UCS-A /org/service-profile/vnic-iscsi* # commit-buffer
UCS-A /org/service-profile/vnic-iscsi #
set identity
set iscsi-adaptor-policy
set iscsi-identity
set password
To set up a password, use the set password command.
set password
Examples This example shows how to set up a password for the security command mode:
switch-A#scope security
switch-A /security #
Command Description
show local-user
show remote-user
set password
Usage Guidelines An iSCSI authentication profile and a user ID for the profile must be created to use this command.
Examples This example shows how to set the password for a user ID associated with an ISCSI authentication profile.
UCS-A # scope org test
UCS-A /org # create auth-profile sample
UCS-A /org/auth-profile* # set user-id exampleuser
UCS-A /org/auth-profile* # set password
Enter password:
Confirm password:
UCS-A /org/auth-profile* # commit-buffer
UCS-A /org/auth-profile #
set user-id
set password
Enter a password:
Confirm the password:
switch /monitoring/snmp-user* # commit-buffer
switch /monitoring/snmp-user #
set path
To specify the absolute path to the file on the remote server, use the set path command.
Syntax Description path Sspecifies the absolute path to the file on the remote server.
Usage Guidelines Use this command to specify the absolute path to the file on the remote server.
If you use SCP as the file transfer protocol, the absolute path is always required. If you use any other protocol,
you may not need to specify a remote path if the file resides in the default download folder.
Examples This example shows how to specify the remote server path in which the firmware download file resides:
switch-A# scope firmware
switch-A /firmware # scope download-task ucs-k9-bundle.1.1.0.279.bin
switch-A /firmware/download-task # set path /firmware/bin/1.1
switch-A /firmware/download-task #
set peak
To set a peak for a power group, use the set peak command.
Syntax Description peak Use this option to set a peak for the power group. The value must be a numeral.
unbounded Use this option to not set a peak for the power group.
Examples This example shows how to set a peak for a power group.
Switch-A # scope power-cap-mgmt
Switch-A /power-cap-mgmt # scope power-group testing
Switch-A /power-cap-mgmt/power-group # set peak 5
Switch-A /power-cap-mgmt/power-group* # commit-buffer
Switch-A /power-cap-mgmt/power-group #
set per-user
To set a maximum number of HTTP and HTTPS sessions allowed for each user, use the set per-user command.
Syntax Description max sessions per user The maximum number of HTTP and HTTPS sessions allowed for a user.
The value must be a number between 1 and 256.
Command Default By default, the value of maximum allowed sessions for each user is set to 32.
Usage Guidelines The maximum number of allowed sessions must be a number between 1 and 256.
Examples This example shows how to set the maximum allowed number of sessions per user to 250.
Switch-A # scope system
Switch-A /system # scope services
Switch-A /system/services # scope web-session-limits
Switch-A /system/services/web-session-limits # set per-user 250
Switch-A /system/services/web-session-limits* # commit-buffer
Switch-A /system/services/web-session-limits #
set total
set perdiskcap
To set per-disk capacity, use the set perdiskcap command.
Syntax Description number Capacity number. The range of valid values is 0 to 9223372036854775807.
Examples The following example shows how to set the per-disk capacity:
switch-A /org/server-qual/storage #
set pers-bind
To disable or enable persistent binding, use the set pers-bind command.
Usage Guidelines Use this command to disable or enable persistent binding to Fibre Channel targets.
set phone
To set the phone user name, use the set phone command.
Syntax Description name Name of the user. The range of valid values is 1 to 512.
Examples This example shows how to set the phone user name:
switch-A /security/local-user #
set phone-contact
To configure a primary contact phone number for the customer organization, use the set phone-contact
command.
Usage Guidelines Use this command to configure a primary contact phone number to be included in Call Home messages. Enter
up to 512 characters.
Examples This example shows how to configure a primary contact phone number:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # set phone-contact +1-011-408-555-1212
switch-A /monitoring/callhome* # commit-buffer
switch-A /monitoring/callhome #
set pid-regex
To set a PID regular expression (regex), use the set pid-regex command.
setpid-regexpid-regex
Syntax Description pid-regex The PID regular expression. It can include a maximum of 256 characters and
can be alphanumeric.
1.3(1) The processor qualification mode was replaced by the CPU qualification
mode.
Usage Guidelines You must create a server qualification and a physical qualification before you use this command in the Physical
Qualification command mode.
You must create an adapter qualification and an adapter capacity qualification in the Server Qualification
command mode before you use this command.
Examples This example shows how to set the PID regex for a physical qualification:
UCS-A # scope org org100
UCS-A /org # scope server-qual sample
UCS-A /org/server-qual # scope physical-qual
UCS-A /org/server-qual/physical-qual # set pid-regex Trial123
UCS-A /org/server-qual/physical-qual* # commit-buffer
UCS-A /org/server-qual/physical-qual #
show server-qual
Command Description
show cap-qual
set pin-group
To set the pin group, use the set pin-group command.
Syntax Description name Pin group name. The name can contain 1 to 16 characters.
Usage Guidelines Use this command to specify the pin group to use for the vNIC.
set pingroupname
To set a pin group name for the fabric interface, use the set pingroupname command.
Syntax Description pin group name The name of the pin group name.
Usage Guidelines An interface for the fabric must be created to use this command.
The name of the pin group for the interface can be alphanumeric and can include special characters.
Examples This example shows how to set the pin group name for the fabric interface
Switch-A # scope eth-storage
Switch-A /eth-storage # scope fabric b
Switch-A /eth-storage/fabric # scope interface 2 3
Switch-A /eth-storage/fabric/interface # set pingroupname sample
Switch-A /eth-storage/fabric/interface* # commit-buffer
set pool
To set a pool, use the set pool command.
Usage Guidelines Use this command to add a pool to your pooling policy. Only one pool can be set for each pooling policy.
switch-A /org/pooling-policy #
set port
To set the port number, use the set port command.
Syntax Description number Port number. The range of valid values is 1 to 65535.
Usage Guidelines In Call Home configuration, use this command to specify the port used to communicate with the SMTP server.
The default SMTP port number is 25.
In LDAP configuration, use this command to specify the port used to communicate with the LDAP server.
The default LDAP server port number is 389.
Examples This example shows how to set the SMTP server port number in the Call Home configuration:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # set port 25
switch-A /monitoring/callhome* # commit-buffer
switch-A /monitoring/callhome #
This example shows how to set the LDAP server port number in the LDAP configuration:
switch-A#scope security
switch-A /security # scope ldap
switch-A /security/ldap # scope server s100
switch-A /security/ldap/server # set port 100
switch-A /security/ldap/server* # commit-buffer
switch-A /security/ldap/server #
Command Description
show server
Syntax Description io-throttle-count The range is 256 to 4096; the default is 512;
Usage Guidelines Use this command to specify the number of IO operations that can be pending in the vHBA at one time.
Syntax Description max-luns Specifies the maximum number of LUNs. The range is 1 to 1024 LUNs; the
default is 256.
Usage Guidelines Use this command to specify the maximum number of logical unit numbers (LUNs) supported per target.
Examples This example shows how to specify a maximum of 512 LUNs per target:
switch-A# scope org /
switch-A /org # scope fc-policy fcPolicy13
switch-A /org/fc-policy # set port max-luns 512
switch-A /org/fc-policy* # commit-buffer
switch-A /org/fc-policy #
Usage Guidelines Use this command to configure the number of Fibre Channel port fabric login (FLOGI) retries. You can
configure a number between 0 and 4294967295, or you can use the infinite keyword to retry until successful.
Syntax Description timeout The number of milliseconds (msec) to wait for the login to succeed.
Usage Guidelines Use this command to configure the Fibre Channel port fabric login (FLOGI) timeout. You can configure a
number between 1000 and 255000.milliseconds.
set portmode
To set a port mode for the fabric interface, use the set portmode command.
Syntax Description access Use this option to set the port mode to access.
Usage Guidelines An interface for the fabric must be created to use this command.
Examples This example shows how to set the port mode to access for the fabric interface.
Switch-A # scope eth-storage
Switch-A /eth-storage # scope fabric b
Switch-A /eth-storage/fabric # scope interface 2 3
Switch-A /eth-storage/fabric/interface # set portmode access
Switch-A /eth-storage/fabric/interface* # commit-buffer
Usage Guidelines Use this command to configure the number of Fibre Channel port-to-port login (PLOGI) retries. You can
configure a number between 0 and 255.
Syntax Description timeout The number of milliseconds (msec) to wait for the login to succeed.
Usage Guidelines Use this command to configure the Fibre Channel port-to-port login (PLOGI) timeout. You can configure a
number between 1000 and 255000.milliseconds.
platform-default To set the POST error pause configuration to the platform default option.
Usage Guidelines A BIOS policy for an organization must be created to use this command.
Examples This example shows how to enable the POST error pause configuration for a BIOS policy.
UCS-A # scope org Test
UCS-A /org # scope bios-policy sample
UCS-A /org/bios-policy # set post-error-pause-config post-error-pause enable
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
Command Default No power usage limitations are imposed on the server (disabled).
Usage Guidelines Use this command to manage the committed power usage level of a server.
Examples The following example limits the power usage level of a server to 1000 watts and commits the transaction:
UCS-A# scope server 2/4
UCS-A /chassis/server # set power-budget committed 1000
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
show power-budget
set power-control-policy
To set the power control policy for a service profile, use the set power-control-policy command.
Usage Guidelines A service profile and a power control policy must be created to use this command.
Examples This example shows how to set the power control policy for a service profile.
Switch-A # scope org
Switch-A /org # scope service-profile Default
Switch-A /org/service-profile # set power-control-policy Test
Switch-A /org/service-profile* # commit-buffer
Switch-A /org/service-profile #
set preserve-pooled-values
To preserve pool-derived identities in a backup, use the set preserve-pooled-values command.
Usage Guidelines Use this command to preserve pool-derived vHBA WWPN, vNIC MAC, WWNN and UUID identities in a
backup.
Examples This example specifies that pool-derived identities are preserved in a backup:
server-A# scope system
server-A /system # create backup ftp: full-state enabled
Password:
server-A /system/backup* # set preserve-pooled-values yes
server-A /system/backup* # commit-buffer
server-A /system/backup #
set prio
To set the QoS (Quality of Service) priority level, use the set prio command.
policy mode
set prio {auto| on}
egress-policy mode
set prio {best-effort | bronze | fc | gold | platinum | silver}
on Enables priority.
switch-A /eth-uplink/flow-control/policy #
set priority
To set a priority for a power control policy, use the set priority command.
Syntax Description Admin priority Use this option to set an administrator priority on the power control policy.
The value must be a number between 1 - 10.
no-cap Use this option to not set a capping on the power control policy.
Usage Guidelines A power control policy must be created to use this command.
Examples This example shows how to set an administrator priority on a power control policy.
Switch-A # scope org
Switch-A /org # scope power-control-policy Sample
Switch-A /org/power-control-policy # set priority 2
Switch-A /org/power-control-policy* # commit-buffer
Switch-A /org/power-control-policy #
set privilege
To configure administrative or read-only privileges for an IPMI endpoint user, use the set privilege command.
Usage Guidelines Use this command to configure administrative or read-only privileges for an IPMI endpoint user.
Examples This example shows how to configure read-only privileges for an IPMI endpoint user:
server-A# scope org /
server-A /org # scope ipmi-access-profile ReadOnly
server-A /org/ipmi-access-profile # scope ipmi-user bob
server-A /org/ipmi-access-profile/ipmi-user # set privilege readonly
server-A /org/ipmi-access-profile/ipmi-user* # commit-buffer
server-A /org/ipmi-access-profile/ipmi-user #
set priv-password
To set up a privacy password, use the set priv-password command.
set priv-password
set proc-cap
To set a maximum number of jobs that can be executed by a maintenance window, use the set proc-cap
command.
Syntax Description number of jobs The maximum number of jobs that can be executed by the maintenance window.
The value must be between 0 - 4294967294.
Usage Guidelines A scheduler policy and a maintenance window must be created to use this command.
Examples This example shows how to set a maximum number of jobs that can be executed by a periodic maintenance
window.
Switch-A # scope system
Switch-A /system # scope scheduler default
Switch-A /system/scheduler # scope maint-window periodic Trial
Switch-A /system/scheduler/periodic # set proc-cap 3456
Switch-A /system/scheduler/periodic* # commit-buffer
Switch-A /system/scheduler/periodic #
Command Description
set minute
Usage Guidelines You must create a BIOS policy before you use this command.
Examples This example shows how to set the processor C-state configuration to the platform default option:
UCS-A # scope org test
UCS-A /org # scope bios-policy sample
UCS-A /org/bios-policy # set processor-c-state-config c-state platform-default
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
Command Description
set intel-vt-config vt
set processor-c3-report-config
To specify whether the processor sends a C3 report to the operating system, use the set
processor-c3-report-config command.
Usage Guidelines Use this command to specify whether the processor sends the C3 report to the operating system.
Examples The following example shows how to create a BIOS policy that sends a C3 report to the operating system
using the ACPI C3 format:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set processor-c3-report-config processor-c3-report acpi-c3
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
set processor-c6-report-config
To specify whether the processor sends a C6 report to the operating system, use the set
processor-c6-report-config command.
Usage Guidelines Use this command to specify whether the processor sends the C6 report to the operating system.
Examples The following example shows how to create a BIOS policy that sends a C6 report to the operating system:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set processor-c6-report-config processor-report enabled
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
set protect
To specify whether the local disk is protected or not, use the set protect command.
1.4(1) This command was introduced for a local disk configuration policy for a service
profile within the Organization mode.
Usage Guidelines Use this command to specify whether the local disk is protected or not.
Examples This example shows how to set the enable local disk protection in a local disk configuration policy called
DiskPolicy7:
switch-A# scope org
switch-A /org # scope local-disk-config-policy DiskPolicy7
switch-A /org/local-disk-config-policy # set protect yes
switch-A /org/local-disk-config-policy* # commit-buffer
switch-A /org/local-disk-config-policy #
set protocol
To specify a file transfer protocol, use the set protocol command.
Examples This example specifies SFTP as the file transfer protocol for importing a configuration file:
server-A# scope system
server-A /system # scope import-config host35
server-A /system/import-config # set protocol sftp
server-A /system/import-config* # commit-buffer
server-A /system/import-config #
set pubnwname
To set a primary VLAN for a fabric VLAN, use the set pubnwname command.
Usage Guidelines A VLAN must be created within the fabric to use this command.
Examples This example shows how to set a primary VLAN for a fabric VLAN.
Switch-A # scope eth-uplink
Switch-A /eth-uplink # scope fabric a
Switch-A /eth-uplink/fabric # scope vlan 200
Switch-A /eth-uplink/fabric/vlan # set pubnwname sample
Switch-A /eth-uplink/fabric/vlan* # commit-buffer
Switch-A /eth-uplink/fabric/vlan #
set qos-policy
To set the QoS policy, use the set qos-policy command.
Syntax Description name QoS policy name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to specify the QoS policy to use for the vNIC.
switch-A /org/vnic-templ #
set qualifier
To set a qualifier, use the set qualifier command.
Syntax Description name Qualifier name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to add a qualifier to your policy. Only one qualifier can be set for each policy.
switch-A /org/server-disc-policy #
set quiet-boot-config
To configure the BIOS display during Power On Self-Test (POST), use the set quiet-boot-config command.
enabled The BIOS does not display any messages during boot.
platform-default The BIOS uses the value for this attribute contained in the BIOS defaults
for the server type and vendor.
Usage Guidelines Use this command to configure the BIOS display during Power On Self-Test (POST).
Examples The following example shows how to create a BIOS policy that enables quiet boot mode:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set quiet-boot-config quiet-boot enabled
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
set rate
To set the QoS (Quality of Service) rate and burst, use the set rate command.
Usage Guidelines The rate number, in bits. The range of valid values is 0 to 10000000. The burst number, in bits. The range of
valid values is 0 to 65535.
Examples This example shows how to set the rate and burst:
switch-A# scope org
switch-A /org # scope qos-policy qp10
switch-A /org/qos-policy # scope egress-policy
switch-A /org/qos-policy/egress-policy # set rate rate 10000 burst 1000
switch-A /org/qos-policy/egress-policy* # commit-buffer
switch-A /org/qos-policy/egress-policy #
Related Commands
Command Description
show qos-policy
set realloc
To set a reallocation for a power group, use the set realloc command.
Syntax Description chassis Use this option to set the reallocation of a power group to a chassis.
none Use this option to not set a reallocation for the power group.
Examples This example shows how to set a reallocation for a power group.
UCS-A # scope power-cap-mgmt
UCS-A /power-cap-mgmt # scope power-group testing
UCS-A /power-cap-mgmt/power-group # set reallocation chassis
UCS-A /power-cap-mgmt/power-group* # commit-buffer
UCS-A /power-cap-mgmt/power-group #
set realm
To set a realm for the default authentication mechanism, use the set realm command.
Syntax Description ldap Use this option to set the realm as LDAP.
Examples This example shows how to set the realm of the default authentication mechanism to LDAP.
Switch-A # scope security
Switch-A /security # scope auth-domain Sample
Switch-A /security/auth-domain # scope default-auth
Switch-A /security/auth-domain/default-auth # set realm ldap
Switch-A /security/auth-domain/default-auth* # commit-buffer
Switch-A /security/auth-domain/default-auth #
set realm
To set a realm for the security method, use the set realm command.
Syntax Description ldap Use this option to set the realm as LDAP.
Examples This example shows how to set the realm as LDAP for console authentication.
Switch-A # scope security
Switch-A /security # scope console-auth
Switch-A /security/console-auth # set realm LDAP
Switch-A /security/console-auth* # commit-buffer
Switch-A /security/console-auth #
set reboot-on-update
To set reboot on updates, use the set reboot-on-update command.
2.0(1) This command was introduced in the BIOS policy command mode
(/org/bios-policy)
set reboot-policy
To specify a reboot policy for all service profiles that include a specific maintenance policy that is associated
with a server, use the set reboot-policy command.
Syntax Description immediate (Optional) The server reboots as soon as the change is made to the service
profile.
timer-automatic (Optional) The server reboots at a scheduled time. The time must be set using
the set scheduler command.
user-ack (Optional) You must explicitly acknowledge the changes to the service profile
by using the apply pending-changes command.
Usage Guidelines If you set the reboot policy to timer-automatic, then you must schedule the reboot cycle by using the set
scheduler command.
If you set the reboot policy to user-ack, then you must explicitly acknowledge changes made to the service
profile by using the apply pending-changes command.
Examples This example shows how to set the reboot policy to immediate.
Switch-A # scope org Test
Switch-A /org # scope maint-policy Sample
Switch-A /org/maint-policy # set reboot-policy immediate
Switch-A /org/maint-policy* # commit-buffer
Switch-A /org/maint-policy #
Command Description
create service-profile
apply pending-changes
set scheduler
set receive
To set recieve, use the set receive command.
Usage Guidelines Use this command to specify flow control receive options.
When you specify off, pause requests from the network are ignored and traffic flow continues as normal.
When you specify on, pause requests are honored and all traffic is halted on that uplink port until the network
cancels the pause request
switch-A /eth-uplink/flow-control/policy #
Usage Guidelines Use this command to configure the number of receive queue resources to allocate. Enter a number between
1 and 256.
Examples This example shows how to configure the number of receive queue resources for an Ethernet policy:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set recv-queue count 100
switch-A /org/eth-policy* # set trans-queue count 100
switch-A /org/eth-policy* # set comp-queue count 200
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
Usage Guidelines Use this command to configure the number of descriptors in the receive queue. Enter a number between 64
and 4096.
Examples This example shows how to configure the receive queue ring size for an Ethernet policy:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set recv-queue count 100
switch-A /org/eth-policy* # set recv-queue ring-size 1024
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
set redundancy
To set up power supply redundancy, use the set redundancy command.
Usage Guidelines In the non-redundant scheme, all installed power supplies are turned on and load balanced evenly. Smaller
configurations, requiring less than 2500W, can be powered by a single power supply. However, a single power
supply does not provide redundancy. More common configurations require two or more power supplies (if
requirements are between 2500 and 5000 watts peak) in non-redundant mode.
In the n+1 scheme implies, the chassis contains the total number of power supplies to satisfy non-redundancy,
plus one additional power supply for redundancy. All the power supplies that are participating in n+1
redundancy are turned on, and equally share the power load for the chassis. If any additional power supplies
are installed, UCS Manager recognizes these unnecessary power supplies and turns them off.
If a power supply should fail, the surviving supply(s) can provide power to the chassis. In addition, UCS
Manager turns on any turned-off power supplies, to bring the system back to n+1 status.
To provide n+1 protection, the following number of power supplies are recommended:
• Chassis requires less than 2500W—Two power supplies
• Chassis requires greater than 2500W—Three power supplies
Adding an additional power supply to either of these configurations will provide an extra level of protection.
UCS Manager turns on the extra power supply in the event of a failure, and restores n+1 protection.
The grid redundant configuration is used when you have two power sources to power a chassis, or you require
greater than n+1 redundancy. If one source fails, which causes a loss of power to one or two power supplies,
the surviving power supplies on the other power circuit continue to provide power to the chassis.
A common reason for using grid redundancy is if the rack power distribution is such that power is provided
by two PDUs and you want the grid redundancy protection in the case of a PDU failure.
To provide grid redundancy or greater than n+1 protection, the following number of power supplies are
recommended:
• Chassis requires less than 2500W—Two power supplies
• Chassis requires greater than 2500W—Four power supplies
set refresh-period
To specify the maximum amount of time allowed between refresh requests for a user, use the set refresh-period
command.
Command Default By default, the maximum amount of time is set to 600 seconds.
Examples This example shows how to set the maximum amount of time allowed between refresh requests for a user to
500 seconds.
UCS-A # scope security
UCS-A /security # scope auth-domain sample
UCS-A /security/auth-domain # set refresh-period 500
UCS-A /security/auth-domain # set session-timeout 14400
UCS-A /security/auth-domain* # commit-buffer
UCS-A /security/auth-domain #
set regenerate
To regenerate the keys in the default keyring, use the set regenerate command.
Usage Guidelines Use this command to regenerate the RSA keys in the default keyring. This command is accepted only in the
default keyring.
Examples This example shows how to regenerate the keys in the default keyring:
switch-A# scope security
switch-A /security # scope keyring default
switch-A /security/keyring # set regenerate yes
switch-A /security/keyring* # commit-buffer
switch-A /security/keyring #
set remote-file
To specify the name of a file to be transfered, use the set remote-file command.
set remote-file
set remote-file remote-file
Usage Guidelines Use this command to specify the name of a file to be transfered.
Examples This example specifies the name of a remote configuration file for importing:
server-A# scope system
server-A /system # scope import-config host35
server-A /system/import-config # set remote-file MyConfig13.cfg
server-A /system/import-config* # commit-buffer
server-A /system/import-config #
set reply-to-email
To configure an email address that will appear in the Reply-To field in Call Home email messages, use the
set reply-to-email command.
Usage Guidelines Use this command to configure an email address that will appear in the Reply-To field in Call Home email
messages. Enter up to 512 characters. Specify the email address in the format <name>@<domain name>. If
no address is specified, the contact email address is used.
set reporting-interval
To specify the interval at which collected statistics are reported, use the set reporting-interval command.
Usage Guidelines Use this command to specify the interval at which collected statistics are reported. You can specify the reporting
interval separately for chassis, port, host, adapter, and server statistics.
Examples This example shows how to set the port statistics reporting interval to thirty minutes:
switch-A# scope monitoring
switch-A /monitoring # scope stats-collection-policy port
switch-A /monitoring/stats-collection-policy # set reporting-interval 30minutes
switch-A /monitoring/stats-collection-policy* # commit-buffer
switch-A /monitoring/stats-collection-policy #
set resume-ac-on-power-loss-config
To configure how the server behaves when power is restored after an unexpected power loss, use the set
resume-ac-on-power-loss-config command.
Usage Guidelines Use this command to configure how the server behaves when power is restored after an unexpected power
loss.
Examples The following example shows how to create a BIOS policy that restores the server power to its previous state
after a power loss:
switch-A# scope org org3
switch-A /org # create bios-policy bios1
switch-A /org/bios-policy* # set resume-ac-on-power-loss-config resume-action last-state
switch-A /org/bios-policy* # commit-buffer
switch-A /org/bios-policy #
set retention-interval
To configure the length of time before cleared fault messages are deleted, use the set retention-interval
command.
Usage Guidelines Use this command to set the retention period for fault messages when the set clear-action command is
configured to retain messages.
Examples This example shows how to set the fault message retention period to 30 days:
switch-A# scope monitoring
switch-A /monitoring # scope fault policy
set retries
To set the number of retries, use the set retries command.
Usage Guidelines Use this command to set the number of times to retry communicating with the RADIUS server before noting
the server as down.
switch-A#scope security
switch /security/radius #
set rootdn
To set a root distinguished name, use the set rootdn command.
Syntax Description name Root distinguished name. The range of valid values is 1 to 127.
Usage Guidelines Use this command to specify the distinguished name for the LDAP database superuser account.
switch-A#scope security
switch-A /security/ldap/server #
Usage Guidelines Use this command to enable or disable receive-side scaling (RSS). RSS enables the efficient distribution of
network receive processing across multiple CPUs in multiprocessor systems.
set scheduler
To set a scheduler for a maintenance policy, use the set scheduler command.
Usage Guidelines A maintenance policy and a scheduler must be created before using this command.
Examples This example shows how to set a scheduler for a maintenance policy.
Switch-A # scope org
Switch-A /org # scope maint-policy Sample
Switch-A /org/maint-policy # set scheduler default
Switch-A /org/maint-policy* # commit-buffer
Switch-A /org/maint-policy #
set scrub-policy
To set the scrub policy, use the set scrub-policy command.
Syntax Description name Scrub policy name. The range of valid values is 1 to 16.
1.4(1) This command was introduced in the Rack Server Discovery policy
(/org/rackserver-disc-policy). The Server Discovery Policy mode
(/org/server-disc-policy) has been obsoleted.
Usage Guidelines Use this command to associate a specified scrub policy with the service profile you used to enter service
profile mode.
switch-A /org/rackserver-disc-policy #
Usage Guidelines Use this command to configure the number of SCSI I/O queue resources to allocate. Enter a number between
1 and 8.
Examples This example shows how to configure the SCSI I/O queue for a Fibre Channel policy:
switch-A# scope org
switch-A /org # enter fc-policy FcPolicy19
switch-A /org/fc-policy # set scsi-io count 4
switch-A /org/fc-policy* # set scsi-io ring-size 128
switch-A /org/fc-policy* # commit-buffer
switch-A /org/fc-policy #
Usage Guidelines Use this command to configure the number of descriptors in the SCSI I/O queue. Enter a number between 64
and 512.
Examples This example shows how to configure the SCSI I/O queue for a Fibre Channel policy:
switch-A# scope org
switch-A /org # enter fc-policy FcPolicy19
switch-A /org/fc-policy # set scsi-io count 4
switch-A /org/fc-policy* # set scsi-io ring-size 128
switch-A /org/fc-policy* # commit-buffer
switch-A /org/fc-policy #
set send
To set send, use the set send command.
Usage Guidelines Use this command to specify flow control send options.
When you specify off, traffic on the port flows normally regardless of the packet load.
When you specify on, the UCS system sends a pause request to the network if the incoming packet rate
becomes too high. The pause remains in effect for a few milliseconds before traffic is reset to normal levels.
switch-A /eth-uplink/flow-control/policy #
set send-periodically
To enable the sending of a periodic Call Home inventory message, use the set send-periodically command.
Usage Guidelines Use this command to enable the periodic sending of a Call Home inventory message. The periodic message
includes hardware inventory information and an inventory of all software services currently enabled. If the
periodic message is enabled, the default period is 7 days and the default time of day is 00:00.
Examples This example shows how to enable the periodic sending of a Call Home inventory message at 17:30 hours
every 14 days:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # scope inventory
switch-A /monitoring/callhome/inventory # set send-periodically on
switch-A /monitoring/callhome/inventory* # set interval-days 14
switch-A /monitoring/callhome/inventory* # set timeofday-hour 17
switch-A /monitoring/callhome/inventory* # set timeofday-minute 30
switch-A /monitoring/callhome/inventory* # commit-buffer
switch-A /monitoring/callhome/inventory #
set server
To specify the remote server on which the firmware download file resides, use the set server command.
Usage Guidelines Use this command to specify the remote server on which the firmware download file resides.
set session-timeout
To set the maximum amount of time that can elapse after the last refresh request before Cisco UCS Manager
considers a web session to have ended, use the set session-timeout command.
Examples This example shows how to set the session timeout to 14400 seconds.
UCS-A # scope security
UCS-A /security # scope auth-domain sample
UCS-A /security/auth-domain # set refresh-period 500
UCS-A /security/auth-domain # set session-timeout 14400
UCS-A /security/auth-domain* # commit-buffer
UCS-A /security/auth-domain #
set sharing
To set a sharing type for the fabric VLAN, use the set sharing command.
Syntax Description isolated Use this option to set the sharing type as isolated.
none Use this option to not set a sharing type for the fabric VLAN.
Usage Guidelines A VLAN for the fabric must be created to use this command.
Examples This example shows how to set the sharing type to isolated for a fabric VLAN.
Switch-A # scope eth-uplink
Switch-A /eth-uplink # scope fabric
Switch-A /eth-uplink/fabric # scope vlan 200
Switch-A /eth-uplink/fabric/vlan # set sharing isolated
Switch-A /eth-uplink/fabric/vlan* # commit-buffer
Switch-A /eth-uplink/fabric/vlan #
set site-id
To configure customer site identification (ID) information for the monitored equipment, use the set site-id
command.
Usage Guidelines Use this command to configure customer site ID information to be included in Call Home messages for the
monitored equipment. Enter up to 512 characters. If the information includes spaces, you must enclose your
entry in quotes (" ").
Examples This example shows how to configure the customer site ID:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # set side-id SanJose
switch-A /monitoring/callhome* # commit-buffer
switch-A /monitoring/callhome #
set size
To specify the size of a disk partition, use the set size command.
Usage Guidelines Use this command to specify the size of a disk partition in MBytes.
Syntax Description community Community name. This name can be between 1 and 32 alphanumeric
characters long.
Usage Guidelines Cisco recommends that you enable only the communication services that are required to interface with other
network applications.
The community name can be any alphanumeric string. You can create only one community string.
switch-A#scope monitoring
switch-A /monitoring #
set sol-policy
To set the serial over LAN (SoL) policy, use the set sol-policy command.
Syntax Description name SoL policy name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to associate the specified SoL policy with the service profile you used to enter service
profile mode.
switch-A /org/service-profile #
set speed
To set the speed, use the set speed command.
memory mode
set speed {speed| unspec}
Syntax Description speed Baud rate. The range of valid values is 0 to 65535.
Usage Guidelines Use this command to specify the memory data rate.
switch-A /org/service-profile/sol-config #
Examples This example shows how to set the data transfer rate to 40 GBPS.
UCS-A # scope eth-traffic-mon
UCS-A /eth-traffic-mon # scope fabric a
UCS-A /eth-traffic-mon/fabric # scope eth-mon-session sample
UCS-A /eth-traffic-mon/fabric/eth-mon-session # scope dest-interface 1 22
UCS-A /eth-traffic-mon/fabric/eth-mon-session/dest-interface # set speed 8gbps
UCS-A /eth-traffic-mon/fabric/eth-mon-session/dest-interface* # commit-buffer
UCS-A /eth-traffic-mon/fabric/eth-mon-session/dest-interface #
Examples This example shows how to set the data transfer rate to 8 GBPS.
UCS-A # scope fc-traffic-mon
UCS-A /fc-traffic-mon # scope fabric a
UCS-A /fc-traffic-mon/fabric # scope fc-mon-session sample
UCS-A /fc-traffic-mon/fabric/fc-mon-session # scope dest-interface 1 22
UCS-A /fc-traffic-mon/fabric/fc-mon-session/dest-interface # set speed 8gbps
UCS-A /fc-traffic-mon/fabric/fc-mon-session/dest-interface* # commit-buffer
UCS-A /fc-traffic-mon/fabric/fc-mon-session/dest-interface #
Usage Guidelines Use this command to set the speed on an uplink Ethernet port.
set src-templ-name
To set the source template name, use the set src-templ-name command.
Syntax Description name Source template name. The range of valid values is 1 to 16.
Usage Guidelines Use this command to associate the specified source template with the service profile you used to enter service
profile mode.
Examples This example shows how to set the source template name:
switch-A /org/service-profile #
set sshkey
To set an SSH key, use the set sshkey command.
Usage Guidelines Use this command to specify the SSH key used for passwordless access.
switch-A /security #
set ssl
To enable or disable SSL when communicating with an LDAP server, use the set ssl command.
Usage Guidelines Use this command to enable or disable SSL encryption when communicating with the LDAP server.
Syntax Description disabled Disables the Uefi operating system legacy video configuration.
platform-default Sets the Uefi operating system legacy video configuration to the platform
default option.
Usage Guidelines A BIOS policy for an organization must be created to use this command.
Examples This example shows how to enable the Uefi OS legacy video configuration.
UCS-A # scope org Test
UCS-A /org # scope bios-policy sample
UCS-A /org/bios-policy # set uefi-os-legacy-video-config legacy-video enabled
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
set state
To specify the name of the state or province in which the company requesting the certificate is headquartered,
use the set state command.
Syntax Description State, province or county name The name of the state, province or county in which the organization
requesting the certificate is headquartered. The name can include a maximum
of 64 characters and can be alphanumeric.
Usage Guidelines You should create a certificate request before specifying the state details.
Examples The following example shows how to set the state information for a certificate request.
UCS-A # scope security
UCS-A /security # scope keyring test
UCS-A /security/keyring # create certreq
UCS-A /security/keyring/certreq* # set state New York
UCS-A /security/keyring/certreq* # commit buffer
UCS-A /security/keyring/certreq #
set dns
set e-mail
set ip
set locality
set org-name
Command Description
set org-unit-name
set subject-name
set stats-policy
To set the statistics policy, use the set stats-policy command.
Syntax Description name Statistics policy name. The range of valid values is 1 to 16.
Use this command to associate the specified statistics policy with the service profile you used to enter service
profile mode, or the template you used to enter virtual NIC template or virtual HBA template modes.
switch-A /org/service-profile #
set stepping
To set stepping, use the set stepping command.
Syntax Description number Stepping number. The range of valid value is 0 to 4294967295.
Usage Guidelines Use this command to specify the processor stepping number.
Examples This example shows how to set the minimum number of cores:
switch-A /org/server-qual/processor #
set street-address
To configure a street address that will appear in Call Home messages, use the set street-address command.
Usage Guidelines Use this command to configure a mailing address for sending RMA replacement equipment. Enter up to 255
characters. If the information includes spaces, you must enclose your entry in quotes (" ").
set subject-name
To specify the certificate request subject name, use the set subject-name command.
Syntax Description Certificate request subject name The subject name of the certificate request. The name can be
alphanumeric.
Usage Guidelines You should create a certificate request before specifying the subject name details.
Examples The following example shows how to set the subject name information for a certificate request.
UCS-A # scope security
UCS-A /security # scope keyring test
UCS-A /security/keyring # create certreq
UCS-A /security/keyring/certreq* # set subject-name bgdl-samc1
UCS-A /security/keyring/certreq* # commit buffer
UCS-A /security/keyring/certreq #
set dns
set e-mail
set ip
set locality
set org-name
set org-unit-name
Command Description
set state
set subnet
To set a subnet for an external management static IP address, use the set subnet command.
Syntax Description subnet The subnet that you would like to set. It must be in the a.b.c.d format.
2.0(1) This command was introduced in the static IP parameters command mode
(/org/service-profile/vnic-iscsi/eth-if/ip-if/static-ip-params).
Usage Guidelines You must create a service profile before you use this command in the organization command mode.
Examples This example shows how to set the subnet for an external management static IP address of a service profile:
UCS-A # scope org
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope ext-static-ip
UCS-A /org/service-profile/ext-static-ip # set subnet 1.2.3.4
UCS-A /org/service-profile/ext-static-ip* # commit-buffer
UCS-A /org/service-profile/ext-static-ip #
set switch-priority
To configure the urgency level for Call Home messages, use the set switch-priority command.
set switch-priority {emergencies| alerts| critical| errors| warnings| notifications| information| debugging}
Syntax Description switch-priority options Specifies the message urgency threshold for Call Home messages. See
Usage Guidelines for the urgency level options.
Usage Guidelines Use this command to specify the message urgency threshold for Call Home messages.
The following table shows the level options in order of decreasing urgency:
Examples This example shows how to specify the urgency level as Critical:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # set switch-priority critical
switch-A /monitoring/callhome* # commit-buffer
switch-A /monitoring/callhome #
Usage Guidelines Use this command to set the urgency threshold level for syslog console messages. After configuring the syslog
console information, you must enable the sending of messages using the enable syslog command.
Note The state keyword is deprecated. Use the enable syslog console or disable syslog console commands
to enable or disable the syslog console.
Examples This example shows how to set the urgency threshold level of syslog console messages to alerts:
switch-A# scope monitoring
switch-A /monitoring # set syslog console level alerts
switch-A /monitoring* # enable syslog console
switch-A /monitoring* # commit-buffer
switch-A # /monitoring #
set syslog file {level {emergencies| alerts| critical| errors| warnings| notifications| information| debugging}|
name name| size size}+
Syntax Description level Specifies the message urgency threshold for the syslog file. See Usage Guidelines
for the level options.
size File size in bytes. The range of valid values is 4096 to 4194304.
Command Default The default level is Critical and the default file size is 4194304 bytes.
Usage Guidelines Use this command to set the file name, the maximum file size, and the urgency threshold level of syslog
messages for the syslog file. After configuring the syslog file information, you must enable the writing of
messages to the file using the enable syslog command.
The following table shows the level options in order of decreasing urgency.
Note The state keyword is deprecated. Use the enable syslog file or disable syslog file commands to enable
or disable the syslog file.
Examples This example shows how to enable the syslog file and configure the name, size, and urgency level:
switch-A# scope monitoring
switch-A /monitoring # enable syslog file
switch-A /monitoring* # set syslog file name logsSanJose7
switch-A /monitoring* # set syslog file size 4096
switch-A /monitoring* # set syslog file level alerts
switch-A /monitoring* # commit-buffer
switch-A /monitoring #
set syslog monitor level {emergencies| alerts| critical| errors| warnings| notifications| information|
debugging}+
Syntax Description level Specifies the message urgency threshold for the syslog monitor. See Usage Guidelines
for the level options.
Usage Guidelines Use this command to set the urgency threshold level of syslog messages to monitor. After configuring the
syslog monitor information, you must enable monitoring using the enable syslog command.
The following table shows the level options in order of decreasing urgency.
Note Messages at levels below Critical are displayed on the terminal monitor only if you have entered the
terminal monitor command.
Note The state keyword is deprecated. Use the enable syslog monitor or disable syslog monitor commands
to enable or disable the syslog monitor.
Examples This example shows how to enable the syslog monitor and configure the urgency threshold level of syslog
messages to monitor:
switch-A# scope monitoring
switch-A /monitoring # enable syslog monitor
switch-A /monitoring* # set syslog monitor level warnings
switch-A /monitoring* # commit-buffer
switch-A /monitoring #
set syslog remote-destination {server-1| server-2| server-3} {level {emergencies| alerts| critical| errors|
warnings| notifications| information| debugging}| hostname hostname| facility {local0| local1| local2|
local3| local4| local5| local6| local7}}+
level Specifies the message urgency threshold for sending to the remote
destination. See Usage Guidelines for the level options.
facility Specifies the facility number for the messages sent to the remote destination.
local n The local facility number. The range of valid values is local0 through
local7.
Command Default The default for Hostname is None. The default level is Critical.
Usage Guidelines Use this command to configure the host name, message urgency level, and facility number for the sending of
syslog messages to a remote syslog server. After configuring the remote server information, you must enable
the sending of messages using the enable syslog command. You can independantly configure and enable
up to three remote servers using the server- n keyword.
The following table shows the level options in order of decreasing urgency.
Note The state keyword is deprecated. Use the enable syslog remote-destination or disable syslog
remote-destination commands to enable or disable the syslog remote-destination.
Examples This example shows how to enable and configure a syslog remote destination:
switch-A# scope monitoring
switch-A /monitoring # enable syslog remote-destination server-1
switch-A /monitoring* # set syslog remote-destination server-1 hostname ITEast1 level alerts
switch-A /monitoring* # commit-buffer
switch-A /monitoring #
set target
To set a target, use the set target command.
b Specifies switch B.
Usage Guidelines Use this command to set the Fibre Channel or Ethernet pin target to the specified switch and port, or switch
and port channel. Scope to /fc-uplink/pin-group to set the Fibre Channel pin target. Scope to
/eth-uplink/pin-group to set the Ethernet pin target.
switch-A /eth-uplink/pin-group #
set template
To specify a service profile template, use the set template command.
Syntax Description template Specifies the name of a service profile template. Enter up to 32 characters.
Usage Guidelines Use this command to specify a service profile template for creating a service profile instance for the server.
Examples The following example shows how to specify a service profile template:
switch-A# scope org /
switch-A /org # create server-autoconfig-policy AutoConfigFinance
switch-A /org/server-autoconfig-policy* # set destination org finance
switch-A /org/server-autoconfig-policy* # set qualifier ServPoolQual22
switch-A /org/server-autoconfig-policy* # set template ServTemp2
switch-A /org/server-autoconfig-policy* # commit-buffer
switch-A /org/server-autoconfig-policy #
set template-name
To set the template name, use the set template-name command.
Syntax Description name Template name. The range of valid values is 1 to 16.
switch-A /org/service-profile/vnic #
set throttling
To limit the number of Call Home messages received for the same event, use the set throttling command.
Usage Guidelines Use this command to limit the number of Call Home messages received for the same event. If the number of
messages sent exceeds a maximum limit within a preset time frame, further messages for that alert type are
discarded within that time frame.
Examples This example shows how to enable throttling of duplicate Call Home messages:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # set throttling on
switch-A /monitoring/callhome* # commit-buffer
switch-A /monitoring/callhome #
set timeofday-hour
To configure the hour of the day for sending a periodic Call Home inventory message, use the set
timeofday-hour command.
Usage Guidelines Use this command to configure the hour of day for sending a periodic Call Home inventory message. The
range is 0 to 23; the default is 0.
Examples This example shows how to enable the periodic sending of a Call Home inventory message at 17:30 hours
every 14 days:
UCS-A# scope monitoring
UCS-A /monitoring # scope callhome
UCS-A /monitoring/callhome # scope inventory
UCS-A /monitoring/callhome/inventory # set send-periodically on
UCS-A /monitoring/callhome/inventory* # set interval-days 14
UCS-A /monitoring/callhome/inventory* # set timeofday-hour 17
UCS-A /monitoring/callhome/inventory* # set timeofday-minute 30
UCS-A /monitoring/callhome/inventory* # commit-buffer
UCS-A /monitoring/callhome/inventory #
set timeofday-minute
To configure the minutes field of the time of day for sending a periodic Call Home inventory message, use
the set timeofday-minute command.
Usage Guidelines Use this command to configure the minutes field of the time of day for sending a periodic Call Home inventory
message. The range is 0 to 59; the default is 0.
Examples This example shows how to enable the periodic sending of a Call Home inventory message at 17:30 hours
every 14 days:
UCS-A# scope monitoring
UCS-A /monitoring # scope callhome
UCS-A /monitoring/callhome # scope inventory
UCS-A /monitoring/callhome/inventory # set send-periodically on
UCS-A /monitoring/callhome/inventory* # set interval-days 14
UCS-A /monitoring/callhome/inventory* # set timeofday-hour 17
UCS-A /monitoring/callhome/inventory* # set timeofday-minute 30
UCS-A /monitoring/callhome/inventory* # commit-buffer
UCS-A /monitoring/callhome/inventory #
set timeout
To set a timeout, use the set timeout command.
Syntax Description timeout Timeout interval, in seconds. The range of valid values is 1 to 60.
switch-A#scope security
switch-A /security/ldap #
set timezone
To set the time zone for system services, use the set timezone command.
set timezone
Usage Guidelines Use this command to set the time zone for system services that require time of day. You are prompted with
a sequence of choices to select your time zone.
Examples This example shows how to select the time zone for Los Angeles:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # set timezone
Please identify a location so that time zone rules can be set correctly.
Please select a continent or ocean.
1) Africa 4) Arctic Ocean 7) Australia 10) Pacific Ocean
2) Americas 5) Asia 8) Europe
3) Antarctica 6) Atlantic Ocean 9) Indian Ocean
#? 2
Please select a country.
1) Anguilla 18) Ecuador 35) Paraguay
[...truncated...]
11) Cayman Islands 28) Jamaica 45) United States
[...truncated...]
#? 45
Please select one of the following time zone regions.
1) Eastern Time
[...truncated...]
15) Mountain Standard Time - Arizona
16) Pacific Time
17) Alaska Time
[...truncated...]
#? 16
The following information has been given:
United States
Pacific Time
Therefore timezone 'America/Los_Angeles' will be set.
Local time is now: Fri May 15 07:39:25 PDT 2009.
Universal Time is now: Fri May 15 14:39:25 UTC 2009.
Is the above information OK?
1) Yes
2) No
#? 1
UCS-A /system/services #
set total
To set the maximum number of concurrent web sessions for all users, use the set total command.
Syntax Description maximum number of sessions The total number of concurrent web sessions. The value must be a
number between 1 and 256.
Command Default By default, the number of concurrent web sessions for all users is set to the maximum of 256.
Usage Guidelines The value for the maximum number of concurrent sessions for all users must be a number between 1 and 256.
Examples This example shows how to set the total number of concurrent web sessions for all users to 30.
Switch-A # scope system
Switch-A /system # scope services
Switch-A /system/services # scope web-session-limits
Switch-A /system/services/web-session-limits # set total 30
Switch-A /system/services/web-session-limits* # commit-buffer
Switch-A /system/services/web-session-limits #
scope web-session-limits
Usage Guidelines Use this command to configure the number of transmit queue resources to allocate. Enter a number between
1 and 256.
This command replaces the set work-queue count command.
Examples This example shows how to configure the number of transmit queue resources for an Ethernet policy:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set recv-queue count 100
switch-A /org/eth-policy* # set trans-queue count 100
switch-A /org/eth-policy* # set comp-queue count 200
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
Usage Guidelines Use this command to configure the number of descriptors in the transmit queue. Enter a number between 64
and 4096.
This command replaces the set work-queue ring-size command.
Examples This example shows how to configure the transmit queue ring size for an Ethernet policy:
switch-A# scope org
switch-A /org # enter eth-policy EthPolicy19
switch-A /org/eth-policy # set trans-queue count 100
switch-A /org/eth-policy* # set trans-queue ring-size 1024
switch-A /org/eth-policy* # commit-buffer
switch-A /org/eth-policy #
set trustpoint
To specify the trustpoint for a keyring, use the set trustpoint command.
Usage Guidelines Use this command to specify the trustpoint for a keyring. The trustpoint name can be up to 16 characters.
Examples This example shows how to specify the trustpoint for a keyring:
switch-A# scope security
switch-A /security # scope keyring MyKR05
switch-A /security/keyring # set trustpoint CiscoCA5
switch-A /security/keyring* # commit-buffer
switch-A /security/keyring #
Command Default All configuration information (server, fabric, and system-related) is backed up.
Usage Guidelines Use this command to specify the configuration and state information to be backed up.
Examples This example specifies that fabric and server-related configuration are to be backed up:
server-A# scope system
server-A /system # create backup ftp: full-state enabled
Password:
server-A /system/backup* # set type logical-configuration
server-A /system/backup* # commit-buffer
server-A /system/backup #
Syntax Description ext2 The partition uses the EXT2 file system.
Usage Guidelines Use this command to specify the file system of a disk partition.
Examples This example shows how to specify the NTFS file system for a new partition:
server-A# scope org /
server-A /org # scope service-profile ServInst90
UCS-A /org/service-profile # create local-disk-config
UCS-A /org/service-profile/local-disk-config* # set mode no-raid
UCS-A /org/service-profile/local-disk-config* # create partition
UCS-A /org/service-profile/local-disk-config/partition* # set size 10000
UCS-A /org/service-profile/local-disk-config/partition* # set type ntfs
UCS-A /org/service-profile/local-disk-config/partition* # commit-buffer
UCS-A /org/service-profile/local-disk-config/partition #
Syntax Description initial-template Instances created from this template will not automatically update if this
template is updated.
updating-template Instances created from this template will automatically update if this
template is updated.
Command Default Instances created from this template will not automatically update if this template is updated.
Usage Guidelines Use this command to set the updating policy of a vHBA (virtual host bus adapter) or vNIC (virtual network
interface card) template.
Examples This example shows how to specify that instances created from a vNIC template will automatically update if
the template is updated:
switch-A# scope org org10
switch-A /org # scope vnic-templ sp10
switch-A /org/vnic-templ # set type updating-template
switch-A /org/vnic-templ* # commit-buffer
switch-A /org/vnic-templ #
set units
To set memory units, use the set units command.
Syntax Description units Memory units. The range of valid values is 0 to 65535.
Usage Guidelines Memory units refer to the DRAM chips mounted on the PCB.
switch-A /org/server-qual/memory #
set uplink-fail-action
To set an uplink fail action, use the set uplink-fail-action command.
Syntax Description link-down Specifies that down virtual interfaces are marked link down.
Command Modes Network control policy within the organization command mode (/org/nw-ctrl-policy)
Network control policy within Ethernet storage command mode (/eth-storage/nw-ctrl-policy)
Usage Guidelines This configuration will be applicable only in end host mode (default mode).
Warning is useful when you want to maintain blade-to-blade connectivity inside the UCSM system when all
uplink ports go down. You do this, however, at the expense of not providing fabric failover when uplink
connectivity is lost.
set uplink-trunking
To set uplink trunking for a Fabric, use the set uplink-trunking command.
Examples This example shows how to enable uplink trunking for a Fabric:
UCS-A # scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # set uplink-trunking enabled
UCS-A /fc-uplink/fabric* # commit-buffer
UCS-A /fc-uplink/fabric #
Syntax Description disabled Use this option to disable the USB device from being configured as
non-bootable.
platform-default Use this option to set the USB device boot configuration to be the same as
the default option of the platform.
Examples This example shows how to enable the boot configuration for USB drive.
UCS-A # scope org
UCS-A /org # scope bios-policy test
UCS-A /org/bios-policy # set usb-boot-config make-device-non-bootable enabled
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
platform-default Sets the front panel locking configuration to the platform default option.
Usage Guidelines You must create a BIOS policy before you use this command.
Examples This example shows how to set the USB front panel locking configuration to the platform default option:
UCS-A # scope org test
UCS-A /org # scope bios-policy sample
UCS-A /org/bios-policy # set usb-front-panel-access-lock-config usb-front-panel-lock
platform-default
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
set usb-system-idle-power-optimizing-setting-config
usb-idle-power-optimizing
To set the power optimization schedule when the USB system is idle, use the set
usb-system-idle-power-optimizing-setting-config usb-idle-power-optimizing command.
Usage Guidelines You must create a BIOS policy before you use this command.
Examples This example shows how to set the USB system power optimization schedule to the platform default option:
UCS-A # scope org test
UCS-A /org # scope bios-policy sample
UCS-A /org/bios-policy # set usb-system-idle-power-optimizing-setting-config
usb-idle-power-optimizing platform-default
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
set user
To specify a user name for logging in to a remote server, use the set user command.
Usage Guidelines Use this command to specify the user name for logging in to a remote server for a file transfer.
Examples This example specifies the user name for logging in to a remote file server:
server-A# scope system
server-A /system # scope import-config host35
server-A /system/import-config # set user User13
server-A /system/import-config* # commit-buffer
server-A /system/import-config #
set user-id
To set a user identification for an iSCSI authentication profile, use the set user-id command.
Syntax Description user-id The user identification for an ISCSI authentication profile. The value can include
a maximum of 128 characters.
Usage Guidelines An iSCSI authentication profile must be created to use this command.
The name of the user ID can include a maximum of 128 characters. The name can be alphanumeric and can
include special characters.
Examples This example shows how to set the user ID for an ISCSI authentication profile.
UCS-A # scope org test
UCS-A /org # create auth-profile sample
UCS-A /org/auth-profile* # set user-id exampleuser
UCS-A /org/auth-profile* # set password
Enter password:
Confirm password:
UCS-A /org/auth-profile* # commit-buffer
UCS-A /org/auth-profile #
set userid
To specify the username the system should use to log in to the remote server, use the set userid command.
Syntax Description userid The login user name for the remote server.
Usage Guidelines Use this command to specify the user name the system should use to log in to the remote server. This field
does not apply if the protocol is TFTP.
Examples This example shows how to specify the user name for logging in to the remote server:
switch-A# scope firmware
switch-A /firmware # scope download-task ucs-k9-bundle.1.1.0.279.bin
switch-A /firmware/download-task # set userid User123
switch-A /firmware/download-task #
set user-label
To assign an identifying label to the server, use the set user-label command.
1.4(1) This command was introduced in other command modes. The maximum number of
characters for the user label was increased from 16 to 32.
set uuid-prefix
To specify the prefix for UUID pool values, use the set uuid-prefix command.
derived Use the prefix of the UUID burned into the hardware at manufacture.
Usage Guidelines Use this command to specify the Universally Unique Identifier (UUID) prefix to be combined with UUID
suffix pool values for dynamic UUID assignment.
The prefix contains 16 hexadecimal characters in three hyphen-separated groups, in the form
nnnnnnnn-nnnn-nnnn .
Examples This example shows how to specify a UUID prefix for the UUID suffix pool:
switch-A# scope org org10
switch-A /org # scope uuid-suffix-pool usp10a
switch-A /org/uuid-suffix-pool # set uuid-prefix 12345678-9abc-def0
switch-A /org/uuid-suffix-pool* # commit-buffer
switch-A /org/uuid-suffix-pool #
set v3privilege
To specify the SNMPv3 security level for the SNMP trap destination, use the set v3privilege command.
Syntax Description auth Specifies keyed-hash authentication with the trap destination.
priv Specifies keyed-hash authentication and data encryption (privacy) with the trap
destination.
Command Default User name authentication (noauth) is used with the trap destination.
Usage Guidelines Use this command to specify the Simple Network Management Protocol version 3 (SNMPv3) security level
for the SNMP trap destination.
Examples This example shows how to set the SNMPv3 security level for the SNMP trap destination:
switch-A# scope monitoring
switch-A /monitoring # scope snmp-trap 192.20.1.28
switch-A /monitoring/snmp-trap # set v3privilege auth
switch-A /monitoring/snmp-trap* # commit-buffer
switch-A /monitoring/snmp-trap #
set vcon
To set up a vCon (virtual adapter), use the set vcon command.
2 Specifies adapter 2.
set vcon-profile
To associate a vCon (virtual adapter) profile, use the set vcon-profile command.
Usage Guidelines Associates the specified vNIC/vHBA placement policy with the service profile.
set version
To set the version number, use the set version command.
Usage Guidelines Use this command to specify the package image version number. Changing this number triggers firmware
updates on all components using the firmware through a service profile.
switch-A /org/fw-host-packpack-image #
Usage Guidelines Use this command to specify the Simple Network Management Protocol (SNMP) version for the SNMP trap
destination.
Examples This example shows how to specify SNMPv3 for the SNMP trap destination:
switch-A# scope monitoring
switch-A /monitoring # scope snmp-trap 192.20.1.28
switch-A /monitoring/snmp-trap # set version v3
switch-A /monitoring/snmp-trap* # commit-buffer
switch-A /monitoring/snmp-trap #
set vhba
To set a vHBA, use the set vhba command.
Syntax Description name vHBA name. The range of valid values is 1 to 16.
switch-A /org/boot-policy/storage/san-image/path #
set virtual-ip
To set up a virtual IP address, use the set virtual-ip command.
Syntax Description address Virtual IP address. Enter the argument in the format A.B.C.D.
switch /system #
set vlan-id
To set an ID for the VLAN of the fabric, use the set vlan-id command.
Syntax Description vlan-id The ID of the VLAN. The ID must be a number, and between 1-3967, and
4049-4093.
Usage Guidelines A VLAN for the fabric must be created to use this command.
Examples This example shows how to set the ID for the VLAN of the fabric.
Switch-A # scope eth-storage
Switch-A /eth-storage # scope fabric a
Switch-A /eth-storage/fabric # scope vlan 200
Switch-A /eth-storage/fabric/vlan # set vlan-id 250
Switch-A /eth-storage/fabric/vlan* # commit-buffer
Switch-A /eth-storage/fabric/vlan #
set vmretention
To set virtual machine retention for a VM lifecycle policy , use the set vmretention command.
Syntax Description vmretention Use this option to not set a retention policy.
Examples This example shows how to set the VM retention for the lifecycle policy to 5 days.
Switch-A # scope system
Switch-A /system # scope vm-mgmt
Switch-A /system/vm-mgmt # scope vm-life-cycle-policy
Switch-A /system/vm-mgmt/vm-life-cycle-policy # set vmretention 5-days
Switch-A /system/vm-mgmt/vm-life-cycle-policy* # commit-buffer
Switch-A /system/vm-mgmt/vm-life-cycle-policy #
set vnic
To set the vNIC, use the set vnic command.
Syntax Description vnic VNIC name. The range of valid values is 1 to 16.
A vNIC is a virtualized network interface that is configured on a physical network adapter and appears to be
a physical NIC to the operating system of the server. The type of adapter in the system determines how many
vNICs you can create. For example, a Cisco UCS CNA M71KR adapter has two NICs, which means you can
create a maximum of two vNICs for each of those adapters.
switch-A /org/boot-policy/lan/path #
set vnicretention
To set a VNIC retention policy for the VM lifecycle policy, use the set vnicretention command.
set vnicretention
set vnicretention {vnicretention| 1-day| 1-hour| 5-days}
Syntax Description vnicretention Use this option to not set a retention policy
Examples This example shows how to set the VNIC retention for the lifecycle policy to 5 days.
Switch-A # scope system
Switch-A /system # scope vm-mgmt
Switch-A /system/vm-mgmt # scope vm-life-cycle-policy
Switch-A /system/vm-mgmt/vm-life-cycle-policy # set vnicretention 5-days
Switch-A /system/vm-mgmt/vm-life-cycle-policy* # commit-buffer
Switch-A /system/vm-mgmt/vm-life-cycle-policy #
set weight
To set the weight, use the set weight command.
Syntax Description weight Weight number. The range of valid values is 0 to 10.
set width
To set the width, use the set width command.
Usage Guidelines Use this command to specify the bit width of the data bus.
switch-A /org/server-qual/memory #
set wwn
To set a World Wide Name (WWN), use the set wwn command.
Syntax Description name WWN name. The name entered must be in hh:hh:hh:hh:hh:hh:hh:hh format.
switch-A /org/boot-policy/storage/san-image/path* #
set wwpn-pool
To specify a pool of world wide port names (WWPN) for a vHBA template, use the set wwpn-pool command.
Usage Guidelines Use this command to specify an existing pool of world wide port names (WWPN) for dynamic assignment
to a vHBA (virtual host bus adapter) template.
Examples This example shows how to specify a WWPN pool for a vHBA:
switch-A# scope org org10
switch-A /org # scope vhba-templ vhba10
switch-A /org/vhba-templ # set wwpn-pool MyWwpnPool13
switch-A /org/vhba-templ* # commit-buffer
switch-A /org/vhba-templ #
show adapter
To display adapter information, use the show adapter command.
Server 1/1:
Adapter PID Vendor Serial Operational State
------- ---------- ----------------- ------------ -----------------
1 N20-AE0002 Cisco Systems Inc EXM12510017 Operable
2 N20-AE0003 Cisco Systems Inc EXM12510018 Operable
switch-A /org/server-qual #
Command Description
show server-qual
show assoc
To display service profile association information, use the show assoc command.
show assoc
show audit-logs
To display the audit log, use the show audit-logs command.
show auth-domain
To display information on the authentication domains, use the show auth-domain command.
Syntax Description name (Optional) The name of the authentication domain. Using this option will display
information on only the specified authentication domain.
detail (Optional) This option will display information on all authentication domains that
have been created.
Command Default By default, this command will list the authentication domains that have been created.
Examples This example shows how to view information on all the authentication domains:
Switch-A # scope security
Switch-A /security # show auth-domain detail
Authentication Domain:
Authentication Domain Name: Default
Default Realm: Local
Authentication Server group: Default
show authentication
To display authentication information, use the show authentication command.
show authentication
Examples This example shows how to display console and default authentication information:
show auth-server-group
To display information on the authentication server groups, use the show auth-server-group command.
Syntax Description authentication server group (Optional) Name of the authentication server group. This option will display
information on the specified authentication server group.
detail (Optional) This option will display information on all authentication server
groups that have been created.
Command Default By default, this command will list the authentication server groups that have been created.
Usage Guidelines Authentication server groups must be created to use this command.
Examples This example shows how to view information on the authentication server groups.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # show auth-server-group detail
show backup
To display backup information, use the show backup command.
Backup:
Hostname Type User Protocol Administrative State De
scription
---------- --------------------- ---------- -------- -------------------- --
---------
10.193.1.29
All Configuration jennall Scp Disabled
192.168.1.1
Full State Tftp Disabled
192.168.1.2
Full State jennall Scp Disabled
expand Displays some backup information. The command does not display the following:
• Clear on backup
• Interval
switch-A /org/ep-log-policy #
show beacon-led
To display information on the beacon LED, use the show beacon-led command.
Examples This example shows how to display detailed information on the beacon LED:
UCS-A # scope fabric-interconnect A
UCS-A /scope fabric-interconnect # scope card 1
UCS-A /scope fabric-interconnect/card # show beacon-led detail
Beacon LED:
Administrative State: Off
State: Unknown
Current Task: Test
scope beacon-led
Examples This example shows how to display the FSM status of the beacon LED:
UCS-A # scope fabric-interconnect A
UCS-A /fabric-interconnect # scope card 1
UCS-A /fabric-interconnect/card # show beacon-led fsm status
FSM 1:
Remote Result: Not Applicable
Remote Error Code: None
Remote Error Description:
Status: Nop
Previous Status: Illuminate Success
Timestamp: 2011-05-31T15.30.751
Try: 0
Progress(%): 100
Current Task:
UCS-A /fabric-interconnect/card #
show bios
To display BIOS information, use the show bios command.
Bios Firmware:
Server Model Vendor Running-Vers
------- ---------- ----------------- ------------
1/1 N20-B6620-1 Intel Corp. S5500.86B.08.00.0022.110620081457
switch-A /chassis/server #
show bladeserver-disc-policy
To display information on all blade server discovery policies, use the show bladeserver-disc-policy command.
Syntax Description name (Optional) The name of the blade server discovery policy. This option will display
information only on the specified policy.
detail (Optional) This option will display information on all blade server discovery policies
that are configured.
Command Default By default, this command displays information on the configured blade server discovery policies in a tabular
format.
Examples This example shows how to view information on all blade server discovery policies.
Switch-A # scope org
Switch-A /org # show bladeserver-disc-policy detail
Name: Default
Qualifier: all-chassis
Action: Immediate
Scrub Policy: Default
Description: Sample text
Command Description
delete bladeserver-disc-policy
show boot-definition
To display boot definition information, use the show boot-definition command.
Syntax Description detail (Optional) Displays details about the boot definition.
Boot Definition:
Reboot on Update: Yes
switch-A /org/service-profile #
show boot-order
To display the boot order, use the show boot-order command.
show boot-order
show chassis
show boot-option-retry-config
To display information on the boot option retry configuration, use the show boot-option-retry-config
command.
Syntax Description expand (Optional) Displays expanded information on the boot option retry configuration.
detail (Optional) Displays detailed information on the boot option retry configuration.
Command Default By default, this command displays the expanded information of the retry configuration.
Usage Guidelines A BIOS policy must be created prior to using this command in the BIOS policy commnade mode.
Examples This example shows how to view detailed information on the boot option retry configuration for a server.
Switch-A # scope server 1/1
Switch-A /chassis/server # scope bios
Switch-A /chassis/server/bios # scope bios-settings
Switch-A /chassis/server/bios/bios-settings # show boot-option-retry-config detail
Switch-A /chassis/server/bios/bios-settings #
create org
show boot-policy
To display boot policy information, use the show boot-policy command.
Syntax Description name (Optional) Displays information about a specific boot policy.
Boot Policy:
Name Purpose Reboot on Update
-------------------- ----------- ----------------
org10/bp10 Operational No
org10/bp11 Operational Yes
switch-A /org #
Command Description
show org
show boot-target
To display information about a boot-target, use the show boot-target command.
detail (Optional) Displays detailed information about the specified boot target.
expanded (Optional) Displays information about the boot target in an expanded format..
Usage Guidelines By default, the show boot-target command displays the output in expanded format.
Examples The following example shows how to display information about all boot targets in the system:
server# scope org
server /org # scope wwn-pool default
server /org/wwn-pool # scope initiator 20:00:00:25:B5:00:00:00
server /org/wwn-pool/initiator # show boot-target secondary
Boot Target:
Type LUN WWN
--------- ---------- ---
Primary 0 00:00:00:00:00:00:00:00
Secondary 1200 20:00:00:00:20:00:00:23
server /org/wwn-pool/initiator #
The following example shows how to display the detailed information about the secondary boot target:
server# scope org
server /org # scope wwn-pool default
server /org/wwn-pool # scope initiator 20:00:00:25:B5:00:00:00
server /org/wwn-pool/initiator # show boot-target secondary detail
Boot Target:
Type: Secondary
LUN: 1200
WWN: 20:00:00:00:20:00:00:23
server /org/wwn-pool/initiator #
The following example shows how to display information about the secondary boot target, in expanded format:
server# scope org
server /org # scope wwn-pool default
server /org/wwn-pool # scope initiator 20:00:00:25:B5:00:00:00
server /org/wwn-pool/initiator # show boot-target secondary expand
Boot Target:
Type LUN WWN
--------- ---------- ---
Secondary 1200 20:00:00:00:20:00:00:23
server /org/wwn-pool/initiator #
show callhome
To display callhome information, use the show callhome command.
Callhome:
Admin State: On
Throttling State: On
Contact Information: admin
Customer Contact Email: tgv@tgv.com
From Email: ref@tgv.com
Reply To Email: admin021@tgv.com
Phone Contact e.g., +1-011-408-555-1212: +16504441234
Street Address: 12 First St.
Contract Id:
Customer Id:
Site Id:
Urgency: Debugging
SMTP Server Address: adminHost
SMTP Server Port: 25
switch-A /monitoring #
show cap-qual
To display capacity qualification information, use the show cap-qual command.
Syntax Description fcoe (Optional) Displays Fibre Channel over Ethernet information.
Syntax Description id (Optional) To display information on a specific fabric card. It must be a value
between 0 and 4294967295.
Command Default By default, this command displays information on all fabric cards.
Examples This example shows how to display information on a specific fabric card.
UCS-A # scope fabric-interconnect a
UCS-A /fabric-interconnect # show card 1
Fabric Card
-----------
ID Overall Status
-- --------------
1 Operable
UCS-A /fabric-interconnect #
scope beacon-led
show cat-updater
To display information about previous capability catalog file updates, use the show cat-updater command.
Syntax Description filename (Optional) To display information about a specific update, enter the name of the
capability catalog update file.
Usage Guidelines Use this command to display information about previous capability catalog file update operations. If you do
not specify an update file name, all previous update operations are displayed.
Examples The following example shows how to display the details of previous capability catalog update operations:
UCS-A# scope system
UCS-A /system # scope capability
UCS-A /system/capability # show cat-updater
Catalog Updater:
File Name Protocol Server Userid Status
--------- -------- --------------- --------------- ------
ucs-catalog.1.0.0.4.bin
Scp 192.0.2.111 user1 Failed
UCS-A /system/capability #
show certreq
To display a certificate request, use the show certreq command.
show certreq
Request:
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
switch-A /chassis/server #
show chassis-conn-policy
To display information on the chassis connectivity policy, use the show chassis-conn-policy command.
a Specifies Fabric A.
b Specifies Fabric B.
Command Default By default, this command displays information on the chassis connectivity policy configured for Fabric A
and B.
Examples This example shows how to display information on the chassis connectivity policy for Fabric A:
UCS-A # scope org test
UCS-A /org # show chassis-connectivity-policy 1 a
UCS-A /org #
Command Description
set link-aggregation-pref
show chassis
To display chassis information, use the show chassis command.
show chassis [id | decommissioned | detail | fabric | firmware | fsm | inventory [detail | expand | fabric |
fan | iom | psu | server] | iom | version]
fsm status (Optional) Displays information about the finite state machine.
version (Optional) Displays the version numbers of all the devices in the chassis.
show cimc
To display Cisco Integrated Management Controller (CIMC) information, use the show cimc command.
expand (Optional) Displays details about the CIMC, including the management interface
IP address, and the management endpoint log.
CIMC:
Product Name: Cisco B200-M1
PID: N20-B6620-1
VID: V01
Vendor: Cisco Systems Inc
Serial (SN): QCI125200H9
Revision: 0
GUID:
Current Task:
switch-A /chassis/server #
Command Description
show server
show cimxml
To display Common Information Model (CIM) XML port information, use the show cimxml command.
show cimxml
Examples This example shows how to display CIM XML port information:
Name: cimxml
Admin State: Disabled
Port: 5988
switch-A /system/services #
Syntax Description detail (Optional) Displays information about the CPU statistics class.
expand (Optional) Displays expanded information about the CPU statistics class.
Examples This example shows how to display information about the CPU statistics class:
Stats Class:
Stats Class: Cpu Stats
Stats Property:
Stats Property: Cpu Stats Cpu Temp
Norm Value: 0.000000
Stats Property: Cpu Stats Cpu Temp Avg
Norm Value: 0.000000
switch-A /eth-server/stats-threshold-policy #
Syntax Description detail (Optional) Displays detailed information about the DIMM environment statistics.
Examples This example shows how to display information about the DIMM environment statistics class:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # show class dimm-env-stats detail
Stats Class:
Stats Class
-----------
Dimm Env Stats
server /org/stats-threshold-policy #
Syntax Description detail (Optional) Displays detailed information about the environment statistics class
configuration.
expand (Optional) Displays information about the environment statistics class configuration
in expanded format. This is the default output format.
Examples This example shows how to display information about all configured environment statistics classes:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # show class env-stats
Stats Class:
Stats Class
-----------
Env Stats
server /eth-server/stats-threshold-policy #
Usage Guidelines Use this command to display an Ethernet port error statistics class.
Examples This example shows how to display an Ethernet port error statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # show class ethernet-port-err-stats
Stats Class:
Stats Class
-----------
Ethernet Port Err Stats
switch-A /org/stats-threshold-policy #
Usage Guidelines Use this command to display an Ethernet port multicast statistics class.
Examples This example shows how to display an Ethernet port multicast statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # show class ethernet-port-multicast-stats
Stats Class:
Stats Class
-----------
Ethernet Port Multicast Stats
switch-A /org/stats-threshold-policy #
Usage Guidelines Use this command to display an Ethernet port over-under-sized statistics class.
Examples This example shows how to display an Ethernet port over-under-sized statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # show class ethernet-port-over-under-sized-stats
Stats Class:
Stats Class
-----------
Ethernet Port Over Under Sized Stats
switch-A /org/stats-threshold-policy #
Usage Guidelines Use this command to display an Ethernet port statistics class.
Examples This example shows how to display an Ethernet port statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # show class ethernet-port-stats
Stats Class:
Stats Class
-----------
Ethernet Port Stats
switch-A /org/stats-threshold-policy #
Usage Guidelines Use this command to display an Ethernet port large packet statistics class.
Examples This example shows how to display an Ethernet port large packet statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # show class ethernet-port-stats-by-size-large-packets
Stats Class:
Stats Class
-----------
Ethernet Port Stats By Size Large Packets
switch-A /org/stats-threshold-policy #
Usage Guidelines Use this command to display an Ethernet port small packet statistics class.
Examples This example shows how to display an Ethernet port small packet statistics class:
switch-A# scope org org3
switch-A /org # scope stats-threshold-policy p10
switch-A /org/stats-threshold-policy # show class ethernet-port-stats-by-size-small-packets
Stats Class:
Stats Class
-----------
Ethernet Port Stats By Size Small Packets
switch-A /org/stats-threshold-policy #
Syntax Description detail (Optional) Displays detailed information about the Ethernet pause statistics class
configuration.
expand (Optional) Displays information about the Ethernet pause statistics class configuration,
in expanded format. This is the default output format.
Examples This example shows how to display the configuration information of the Ethernet pause statistics class:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # show class ether-pause-stats
Stats Class:
Stats Class
-----------
Ether Pause Stats
server /eth-server/stats-threshold-policy #
Syntax Description detail (Optional) Displays detailed information about the Ethernet IO card statistics.
expand (Optional) Displays information about the Ethernet IO card statistics, in expanded
format. This is the default output format.
Examples This example shows how to display all the IO card statistics classes configured in the system:
server# scope eth-server
server /eth-server # scope stats-threshold-policy default
server /eth-server/stats-threshold-policy # show class io-card-stats
Stats Class:
Stats Class
-----------
Io Card Stats
server /eth-server/stats-threshold-policy #
Syntax Description detail (Optional) Displays detailed information about the memory array environment
statistics.
expand (Optional) Displays information about the memory array environment statistics, in
expanded format. This is the default output format.
Examples This example shows how to enter the memory array environment statistics class mode:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # show class memory-array-env-stats
Stats Class:
Stats Class
-----------
Memory Array Env Stats
server /org/stats-threshold-policy #
Syntax Description expand (Optional) To view information on the motherboard temperature statistics class
and the properties that are set for it.
Command Default By default, the command displays the detailed information of the class.
Usage Guidelines A statistics threshold policy and a motherboard temperature statistics class must be created to use this command.
Examples This example shows how to view expanded information on the motherboard temperature statistics class.
UCS-A # scope org test
UCS-A /org/ # scope stats-threshold-policy sample
UCS-A /org/stats-threshold-policy # show class motherboard-temp-stats expand
Stats Class:
Stats Class: Motherboard Temp Stats
Stats Property:
Stats Property: Motherboard Temp Stats Motherboard Rear Temperature Min
Norm Value: 1.000000
Threshold Value:
Direction Severity Esc Value Deesc Value
--------- -------- --------- ------------
Above Normal Warning 0.000000 2.000000
UCS-A /org/stats-threshold-policy/class #
Command Description
enter class motherboard-temp-stats
Syntax Description detail (Optional) Displays detailed configuration information about the PCIe fatal completion
error statistics class.
expand (Optional) Displays information about the PCIe fatal completion error statistics class,
in an expanded format. This is the default output format.
Usage Guidelines
Examples This example shows how to display configuration information of all PCIe fatal completion error statistics
classes in the system:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # show class pcie-fatal-completion-error-stats
server /org/stats-threshold-policy #
Syntax Description detail (Optional) Displays detailed configuration information about the PCIe fatal error
statistics class.
expand (Optional) Displays information about the PCIe fatal error statistics class, in an
expanded format. This is the default output format.
Examples This example shows how to display the configuration information of all PCIe fatal error statistics classes in
the system:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # show class pcie-fatal-error-stats
server /org/stats-threshold-policy #
Syntax Description detail (Optional) Displays detailed configuration information about the PCIe fatal protocol
error statistics class.
expand (Optional) Displays information about the PCIe fatal protocol error statistics class,
in an expanded format. This is the default output format.
Usage Guidelines
Examples This example shows how to display configuration information of all PCIe fatal protocol error statistics classes
in the system:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # show class pcie-fatal-protocol-error-stats
server /org/stats-threshold-policy #
Syntax Description detail (Optional) Displays detailed configuration information about the PCIe fatal receive
error statistics class.
expand (Optional) Displays information about the PCIe fatal receive error statistics class, in
an expanded format. This is the default output format.
Examples This example shows how to display the configuration information of all PCIe fatal receive error statistics
classes in the system:
server# scope org
server /org # scope stats-threshold-policy default
server /org/stats-threshold-policy # show class pcie-fatal-receiving-error-stats
server /org/stats-threshold-policy #
show cli
To display CLI information, use the show cli command.
mode-info (Optional) Displays information about the mode you are in.
Examples This example shows how to display information about your session configuration:
Command Default By default, the command displays the list of commands that were run.
Switch-A /org/service-profile #
set timezone
show cluster
To display cluster information, use the show cluster command.
Syntax Description extended-state Displays extended information about the state of the cluster.
Examples This example shows how to display extended information about the state of the cluster:
show connectivity
To display connectivity information, use the show connectivity command.
show connectivity
show console-auth
To display the console authentication information, use the show console-auth command.
Syntax Description detail (Optional) Displays additional information of the authentication mechanism.
Command Default This command displays information on the console authentication mechanism in a tabular format.
Console authentication:
Realm: Local
Authentication Server Group: Default
show core-export-target
To display core export target information, use the show core-export-target command.
Syntax Description detail (Optional) Displays details about the core export target.
fsm status (Optional) Displays the status of the finite state machine.
Examples This command shows how to display core export target information:
show cores
To displays the core dump file, use the show cores command.
Examples This example shows how to display the core dump file:
Core Files:
Name Fabric ID
---------- ---------
1266567175_SAM_Pubs-B_svc_sam_bladeAG_log.18412.tar.gz
B
1266270932_SAM_Pubs-B_svc_sam_bladeAG_log.8876.tar.gz
B
1265702128_SAM_Pubs-A_svc_sam_portAG_log.8802.tar.gz
A
1265443496_SAM_Pubs-A_svc_sam_bladeAG_log.22792.tar.gz
A
1265130233_SAM_Pubs-A_svc_sam_bladeAG_log.8801.tar.gz
A
1264676542_SAM_Pubs-A_svc_sam_portAG_log.12062.tar.gz
A
1263728238_SAM_Pubs-A_svc_sam_portAG_log.3266.tar.gz
A
switch-A /monitoring/sysdebug #
show cpu
To display CPU information, use the show cpu command.
Server 1/1:
ID Presence Architecture Socket Cores Speed (GHz)
— -------------------- ----------------- ------ ----------- -----------
1 Equipped Xeon CPU1 4 2.266000
2 Equipped Xeon CPU2 4 2.266000
switch-A /chassis/server #
show default-auth
To display information on the default authentication mechanism, use the show default-auth command.
Syntax Description detail (Optional) To view the realm group and the authentication server group for the default
authentication mechanism.
Command Default By default, this command lists the realm and the authentication server group details in a tabular format.
Usage Guidelines An authentication domain must be created to use this command within the authentication domain mode.
Examples This example shows how to view the default authentication mechanism for an authentication domain.
Switch-A # scope security
Switch-A /security # scope auth-domain Sample
Switch-A /security/auth-domain # show default-auth detail
Default authentication:
Realm: Local
Authentication server group: Testing
show destination
To display destination information, use the show destination command.
Destination:
Email: bob@cisco.com
Email: sally@cisco.com
switch-A /monitoring/callhome/profile #
show disk
To display disk information, use the show disk command.
Usage Guidelines You can also use the show disk command without any arguments or keywords to display a list of disks.
Note If the server contains one or more SATA devices, such as a hard disk drive or solid state drive, this
command displays ATA in the Vendor field. Use the expand keyword to display additional vendor
information.
SEAGATE ST973402SS 0
SEAGATE ST973451SS 0
switch-A /system/capability #
show distributed-virtual-switch
To display distributed virtual switch information, use the show distributed-virtual-switch command in
folder mode.
Examples This example shows how to display distributed virtual switch information:
switch-A# scope system
switch-A /system # scope vm-mgmt
switch-A /system/vm-mgmt # scope vmware
switch-A /system/vm-mgmt/vmware # scope vcenter vc10
switch-A /system/vm-mgmt/vmware/vcenter # scope data-center dc10
switch-A /system/vm-mgmt/vmware/vcenter/data-center # scope folder f10
switch-A /system/vm-mgmt/vmware/vcenter/data-center # show distributed-virtual-switch dvs10
switch-A /system/vm-mgmt/vmware/vcenter/data-center #
show dns
To display DNS information, use the show dns command.
show dns
show download-task
To display download task information, use the show download-task command.
fsm (Optional)
Download task:
File Name Protocol Server Userid State
--------- -------- --------------- --------------- -----
ucs-dplug.4.0.1a.N2.1.1.61.gbin
Scp 10.193.1.28 jaunderw Failed
ucs-k9-bundle.1.0.1.61.gbin
Scp t1.nuovasystems jaunderw Failed
ucs-k9-bundle.1.0.1.71.gbin
Scp t1.nuovasystems jaunderw Failed
switch-A /firmware #
show dynamic-conn-policy
To display dynamic vNIC connection policy information, use the show dynamic-conn-policy command.
Examples This example shows how to display a list of dynamic vNIC connection policies:
show egress-policy
To display egress-policy information, use the show egress-policy command in qos-policy mode.
Syntax Description detail Displays all egress policy information, in list format.
Examples This example shows how to display expanded egress policy information:
switch-A# scope org
switch-A /system # scope qos-policy
switch-A /system/vm-mgmt # show egress-policy expand
switch-A /system/vm-mgmt/vmware #
show environment
To display environment information, use the show environment command.
detail (Optional)
expand (Optional)
Examples This example shows how to display information about the motherboard:
switch-A#scope chassis 1
Server 1/1:
Oper Power: On
Motherboard:
Threshold Status: OK
Power State: N/A
Thermal Status: OK
Voltage Status: OK
CMOS Battery Voltage Status: OK
switch-A /chassis/server #
show error-recovery
To display error recovery information, use the show error-recovery command.
show eth-classified
To Ethernet classified information, use the show eth-classified command.
Examples This example shows how to display the platinum Ethernet classified class:
show eth-if
To display Ethernet interface information, use the show eth-if command.
Ethernet Interface:
Name: default
Dynamic MAC Addr: 00:00:00:00:00:00
Default Network: Yes
VLAN ID: 1
switch-A /org/service-profile/vnic #
Usage Guidelines Ethernet interfaces for the iSCSI VNIC must be created to use this command.
Examples This example shows how to display expanded information on the Ethernet interface.
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # show eth-if expand
Ethernet Interface:
IPv4 Interface:
Static target:
Priority: 1
Name: trial
Port: 3260
Auth Name: sample
Target Lun:
Target LUN ID:
--------------
1
UCS-A /org/service-profile/vnic-iscsi #
show eth-mon-session
To display the Ethernet traffic monitoring session, use the show eth-mon-session command.
Syntax Description name (Optional) Name of the Ethernet traffic monitoring session.
detail Displays information on all Ethernet traffic monitoring session, in list format.
Usage Guidelines You can use the show command without any options to view all the Ethernet traffic monitoring sessions.
Examples This example shows how to view information on a specific Ethernet traffic monitoring session:
Switch-A # scope eth-traffic-mon
Switch-A /eth-traffic-mon # scope fabric a
Switch-A /eth-traffic-mon/fabric # show eth-mon-session Default detail
Switch-A /eth-traffic-mon/fabric #
show eth-profile
To display Ethernet profile information, use the show eth-profile command.
Syntax Description profile-name (Optional) Displays information about a specific Ethernet profile.
Eth Profile:
Name
----
org10/ep10
org10/ep11
org10/ep12
switch /org #
show eth-target
To display information on the Ethernet target endpoint, use the show eth-target command.
Syntax Description name (Optional) To view information on a specific Ethernet target endpoint.
Command Default By default, this command displays expanded information on the Ethernet target endpoints.
Usage Guidelines To use this command, Ethernet target endpoints must be configured for a fabric interface.
Examples This example shows how to display information on a specific Ethernet target endpoint.
Switch-A # scope eth-storage
Switch-A /eth-storage # scope fabric a
Switch-A /eth-storage/fabric # scope interface 1 2
Switch-A /eth-storage/fabric/interface # show eth-target Test
Switch-A /eth-storage/fabric/interface #
create interface
show eth-uplink
To display Ethernet uplink information, use the show eth-uplink command.
Syntax Description detail (Optional) Displays some detail about the Ethernet uplink.
Ethernet Uplink:
Mode: End Host
Fabric:
Id: A
Id: B
Stats Threshold Policy:
Full Name: fabric/lan/thr-policy-default
VLAN:
Name VLAN ID Fabric ID Native VLAN
---------- ---------- --------- -----------
default 1 Dual Yes
switch#
Related Commands
Command Description
show eth-profile
show fabric-interconnect
show event
To display event information, use the show event command.
show execute-disable
To view execute-disable information, use the show execute-disable command.
Examples This example shows how to view expanded execute-disable information for a BIOS Policy.
Switch-A # scope org Test
Switch-A /org # scope bios-policy sample
Switch-A /org/bios-policy # show execute-disable expand
Execute Disable
Bit
---
Enabled
Switch-A /org/bios-policy #
show extension-key
To display extension key information, use the show extension-key command in vmware mode.
Syntax Description detail Specifies detailed extension key information, in list format.
fsm status Specifies the extension key finite state machine status.
Extension Key:
Key: Cisco-UCSM-DOC-TEAM-EXT-KEY
Current Task: Busy
switch-A /system/vm-mgmt/vmware #
show ext-eth-if
To display external Ethernet interface information, use the show ext-eth-if command.
Ext Interface:
Adapter Id Id Mac Fabric ID Oper State
---------- ---------- ----------------- --------- ----------
1 1 00:23:04:C6:A2:8C A Link Up
1 2 00:23:04:C6:A2:8D B Link Up
switch-A /chassis/server/adapter #
show ext-ipv6-rss-hash
To display IPv6 RSS hash profile information, use the show ext-ipv6-rss-hash command.
Syntax Description detail (Optional) Displays details about the external IPv6 RSS hash profile.
expand (Optional) Displays details about the external IPv6 RSS hash profile.
Command Default Displays information about the external IPv6 RSS hash profile.
Examples This example shows how to display the external IPv6 RSS hash profile:
show fabric
To display fabric interconnect information, use the show fabric command.
fc-uplink mode
show fabric [ a | b | detail | expand]
chassis mode
show fabric [detail]
Locale:
show fabric-interconnect
To display fabric interconnect information, use the show fabric-interconnect command.
Fabric Interconnect:
ID OOB IP Addr OOB Gateway OOB Netmask Operability
-- --------------- --------------- --------------- -----------
A 10.193.66.91 10.193.64.1 255.255.248.0 Operable
B 10.193.66.92 10.193.64.1 255.255.248.0 Operable
switch-A#
Examples This example shows how to display a list of fabric interconnect hardware:
switch-A# show fabric-interconnect inventory
switch-A#
Examples This example shows how to display the fabric interconnect mode:
switch-A# show fabric-interconnect mode
switch-A#
show fabric-port-channel
To display information on the fabric port channels, use the show fabric-port-channel command.
Syntax Description port channel id (Optional) The ID of the port channel interface. It must be a value between
1024 and 4096.
expand Displays expanded information on the port channel interface, including member
port information.
Usage Guidelines The fabric port channels must be available to use this command.
Examples This example shows how to display information on the fabric port channels available in fabric A in the Ethernet
server mode:
UCS-A # scope eth-server
UCS-A /eth-server # scope fabric a
UCS-A /eth-server/fabric # show fabric-port-channel
UCS-A /eth-server/fabric #
Command Description
show host-port-channel
show failover
To display failover timeout information, use the show failover command.
Examples This example shows how to display detailed failover timeout information:
show fan
To display fan information, use the show fan command.
capability mode
show fan [vendor model hardware-rev | detail | expand]
fan-module mode
show fan [detail | expand]
Fan Module:
Vendor Model HW Revision
------------------------ ------------------------ -----------
Cisco 73-11624-02 04
Cisco Systems N5K-C5010-FAN 0
Cisco Systems N5K-C5020-FAN 0
Cisco Systems Inc N10-FAN1= 0
Cisco Systems Inc N10-FAN2= 0
Cisco Systems Inc N20-FAN5 0
N/A N10-FAN1 0
N/A N10-FAN2 0
switch-A /system/capability #
show fan-module
To display fan module information, use the show fan-module command.
Syntax Description tray module (Optional) Displays a specific module in a specific tray.
Fan Module:
Tray Module Overall Status
---------- ---------- --------------
1 1 Operable
1 2 Operable
1 3 Operable
1 4 Operable
1 5 Operable
1 6 Operable
1 7 Operable
1 8 Operable
switch-A /system/capability #
Syntax Description detail (Optional) Displays detailed information about the fault policy.
Fault Policy:
Clear Action: Retain
Retention Interval: 00:01:00:00
Flap Interval (sec): 10
switch-A /monitoring # show fault policy
show fc
To display Fibre Channel class information, use the show fc command.
show fc [detail]
Syntax Description detail (Optional) Displays detailed Fibre Channel class information.
Examples This example shows how to display Fibre Channel class information:
FC Class:
Priority: 1
Cos: 3
Weight: 5
Bw Percent: 50
Drop: No Drop
Mtu: Fc
Admin State: Enabled
switch-A /eth-server/qos #
show fc-if
To display Fibre Channel interface information, use the show fc-if command.
Syntax Description detail (Optional) Displays detailed Fibre Channel interface information.
Examples This example shows how to display Fibre Channel interface information:
show fc-profile
To display Fibre Channel profile information, use the show fc-profile command.
detail (Optional) Displays limited details about all Fibre Channel profiles.
expand (Optional) Displays expanded information about all Fibre Channel profiles.
Examples This example shows how to display a list of Fibre Channel profiles:
FC Profile:
Name
----
org10/fcp10
org10/fcp11
switch-A /org/ #
Command Description
show org
show fc-storage
To display information on the Fibre Channel storage device, use the show fc-storage command.
Syntax Description expand (Optional) To view additional information about the Fibre Channel storage device.
detail (Optional) To view detailed information about the Fibre Channel storage device.
Command Default By default, this command displays the Fibre Channel over Ethernet native VLAN ID.
Examples This example shows how to view expanded information on the Fibre Channel storage device.
Switch-A # scope org Test
Switch-A /org # show fc-storage expand
FC Storage:
VSAN:
Name: VSAN100_storage
ID: 100
FCoE VLAN ID: 100
Default zoning: disabled
Overall status: ok
Member Port:
Fabric ID Slot ID Port ID Oper State State Reason Oper Speed
--------- ------- ------- ---------- ------------ ----------
A 2 3 Down Administratively down Indeterminate
Name: test
ID: 200
FCoE VLAN ID: 200
Default zoning: disabled
Overall status: ok
Member Port:
Fabric ID Slot ID Port ID Oper State State Reason Oper Speed
--------- ------- ------- ---------- ------------ ----------
A 3 4 Down Administratively down Indeterminate
Switch-A /org #
create vsan
create vlan
show feature
To display information on a feature, use the show feature command.
Syntax Description name Name of the feature. The name can include a maximum of 64 characters.
vendor Name of the vendor. The name can include a maximum of 510 characters.
version Version of the feature. The version can include a maximum of 510 characters.
Command Default By default, this command displays the license feature information in a tabular format.
Examples This example shows how to display detailed information on a license feature.
Switch-A # scope license
Switch-A /license # show feature detail
License feature:
Name: ETH_PORT_ACTIVATION_PKG
Vendor: cisco
Version: 1.0
Type: Counted
Grace Period: 120
Switch-A /license #
clear file
show file
To view licenses installed on a fabric interconnect, use the show file command.
Syntax Description license file name (Optional) The name of a license file. Use this option to view the details of a
specific license file.
detail (Optional) Displays the licenses installed on the fabric interconnect with the
level of detail specified in the command.
Examples This example shows how to view the licenses details installed on a fabric interconnect.
Switch-A # scope license
Switch-A /license # show file detail
Scope: B
State: Installed
Features
Feature names:ETH_PORT_ACTIVATION_PKG
Vendor: cisco
Version: 1.0
Quantity: 24
Lines:
Line ID: 1
Type: Increment
Expiry Date: Never
Pak:
Quantity: 24
Signature: F302020202020
Switch-A /license #
show usage
show host-port-channel
To display information on host port channels, use the show host-port-channel command.
Syntax Description port channel id (Optional) ID of the port channel. It must be a value between 1024 and 4096.
expand Displays expanded information on the host port channel, including member
port information.
Usage Guidelines Host port channels must be configured to use this command.
Examples This example shows how to display information on host port channels within a fabric in the Ethernet server
mode:
UCS-A # scope eth-server
UCS-A /eth-server # scope fabric a
UCS-A /eth-server/fabric # show host-port-channel
UCS-A /eth-server/fabric #
scope host-port-channel
Command Default By default, the command lists information on all IQN identities configured for an IQN pool.
Usage Guidelines IQN pools and prefixes must be configured to use this command.
Examples This example shows how to display information on IQN identities for an IQN pool.
UCS-A # scope org
UCS-A /org # scope iqn-pool sample
UCS-A /org/iqn-pool # show identity iqn
UCS-A /org/iqn-pool #
create block
set iqn-prefix
show identity
Examples This example shows how to display identity information for a server:
switch-A# scope server 1/1
switch-A /chassis/server # show identity
Server 1/1:
Burned-In UUID: 6bf4c501-d3a9-11dd-b4d9-000bab01bfd6
Dynamic UUID: 6bf4c501-d3a9-11dd-b4d9-000bab01bfd6
Ext Interface:
switch-A /chassis/server #
show identity
Examples This example shows how to display identifier information for a service profile:
switch-A# scope org /org100
switch-A /org # scope service-profile sp100
switch-A /org/service-profile # show identity
switch-A /org/service-profile #
Syntax Description id Displays identity information for a specific MAC address. Specify a MAC
address in the format NN:NN:NN:NN:NN:NN.
detail (Optional) Displays details about the identity information in list format.
Examples This example shows how to display the MAC address identity information for a system:
switch-A# scope org /org100
switch-A /org # show identity mac-addr
MAC Address Assigned Owner Assigned Service Profile
----------------- -------- --------- ------------------------
00:25:B5:00:00:00 Yes Pool org-root/ls-Blade6-Default/ether-eth1
00:25:B5:00:00:01 No Pool
00:25:B5:00:00:02 No Pool
00:25:B5:00:00:03 No Pool
--More--
switch-A /org #
Syntax Description id Displays identity information for a specific UUID. Specify a UUID in the form
NNNN-NNNNNNNNNNNN.
detail (Optional) Displays details about the identity information in list format.
Examples This example shows how to display the UUID identity information for a system:
switch-A# scope org /org100
switch-A /org # show identity uuid
switch-A /org #
Syntax Description id Displays identity information for a specific WWN. Specify a unique WWN in
the form HH:HH:HH:HH:HH:HH:HH:HH.
detail (Optional) Displays details about the identity information in list format.
Examples This example shows how to display the WWN identity information for a system:
switch-A# scope org /org100
switch-A /org # show identity wwn
WWN Assigned Owner Assigned Service Profile
----------------------- -------- --------- ------------------------
20:00:00:25:B5:00:00:00 No Pool
20:00:00:25:B5:00:00:01 No Pool
20:00:00:25:B5:00:00:02 No Pool
20:00:00:25:B5:00:00:03 No Pool
--More--
--More--
switch-A /org #
show interface
To display information about one or more interfaces on a fabric interconnect, use the show interface command.
show interface
show interface [slot-id port-id|fsm] [expand|detail]
Syntax Description slot-id (Optional) Slot identification number. The range of valid values is 2 to 5.
port-id (Optional) Port identification number. The range of valid values is 1 to 40.
detail (Optional) Displays details about the interface, including the admin state,
operating state, and port mode.
Usage Guidelines Use this command to display information about one or more interfaces on a fabric interconnect.
Examples This example shows how to display expanded information about interfaces on a fabric interconnect:
switch-A# scope eth-storage
switch-A# /eth-storage # scope fabric b
switch-A# /eth-storage/fabric # show interface expand
Slot ID: 3
Port Id: 15
Admin State: Enabled
Oper State: Sfp Not Present
State Reason: Unknown
switch-A /eth-storage/fabric #
Examples This example shows how to display detailed information about a specific interface:
switch-A# scope eth-storage
switch-A# /eth-storage # scope fabric b
switch-A# /eth-storage/fabric # show interface 2 7 detail
show inventory
To display the configuration of the Call Home periodic system inventory message, use the show inventory
command.
Usage Guidelines Use this command to display the configuration of the Call Home periodic system inventory message.
Examples This example shows how to display the configuration of the Call Home periodic system inventory message:
switch-A# scope monitoring
switch-A /monitoring # scope callhome
switch-A /monitoring/callhome # show inventory detail
switch-A /monitoring/callhome/inventory #
expand Displays details of the physical components of the fabric interconnect such as ports
and the transceivers in them, the power supply unit and FAN components.
Command Default By default, this command displays ID, PID, vendor, serial number, hardware revision, and total memory of
the fabric interconnect in a tabular format.
Examples This example shows how to display expanded information for a fabric interconnect.
UCS-A # scope fabric-interconnect a
UCS-A /fabric-interconnect # show inventory expand
A:
Fabric Card:
Ether Port:
FAN:
PSU:
UCS-A /fabric-interconnect #
show ipmi-user
To display IPMI user information, use the show ipmi-user command.
Syntax Description ipmi-user-name (Optional) Displays information about a specific IPMI user.
IPMI user:
User Name End point user privilege Password
---------- ------------------------ --------
epu10 Readonly
epu11 Readonly
switch-A /org/ipmi-access-profile #
enter ipmi-user
show ipmi-access-profile
show iqn-pool
To display information on the IQN pools, use the show iqn-pool command.
Command Default By default, this command displays information on all configured IQN pools.
Usage Guidelines IQN pools must be configured before you use this command.
Examples This example shows how to view expanded information for a configured IQN pool.
UCS-A # scope org
UCS-A /org # show iqn-pool Sample1 expand
IQN Pool:
Name: Sample1
IQN prefix: example
Size: 3
Assigned: 0
Pooled:
Name Assigned Assigned To Dn
---- ---------- ---------------
Test:0 No
Test:1 No
Test:2 No
UCS-A /org #
scope iqn-pool
enter iqn-pool
delete iqn-pool
show iscsi-policy
To display information on the iSCSI policy, use the show iscsi-policy command.
Command Default By default, the command lists the iSCSI policies that are available.
Examples This example shows how to display detailed information on the iSCSI policy.
UCS-A # scope org
UCS-A /org # show iscsi-policy detail
Name: sample
Description: sample iscsi adapter policy
UCS-A /org #
set descr
set iscsi-protocol-item
show iscsi-protocol-profile
To display information on the iSCSI protocol items, use the show iscsi-protocol-profile command.
Usage Guidelines The iSCSI protocol items must be defined for an ISCSI adapter policy to use this command.
Examples This example shows how to view expanded information on the iSCSI protocol items.
UCS-A # scope org
UCS-A /org # scope iscsi-policy sample
UCS-A /org/iscsi-policy # show iscsi-protocol-profile expand
UCS-A /org/iscsi-policy #
show iscsi
To display information on the boot iSCSI, use the show iscsi command.
Usage Guidelines An iSCSI for a boot policy must be created to use this command.
Examples This example shows how to display expanded information on the boot iSCSI.
UCS-A # scope org test
UCS-A /org # scope boot-policy default
UCS-A /org/boot-policy # show iscsi expand
Boot ISCSI:
Order: 4
UCS-A /org/boot-policy #
create path
set iscsivnicname
show ldap-group
To display information on LDAP groups, use the show ldap-group command.
Command Default By default, this command will list the LDAP groups on the system.
Examples This example shows how to display information on all LDAP groups on the system:
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # show ldap-group detail
Locales:
Name: Sample
Command Description
create ldap-group
enter ldap-group
delete ldap-group
show ldap-group-rule
To display information on the LDAP group rules, use the show ldap-group-rule command.
Syntax Description detail (Optional) Displays additional information on the LDAP group rules.
Command Default By default, this command lists the LDAP group rule that is enabled.
Usage Guidelines To use this command in the LDAP server mode, an LDAP server must be created.
Examples This example shows how to view the LDAP group rules information for an LDAP server.
Switch-A # scope security
Switch-A /security # scope ldap
Switch-A /security/ldap # scope server Default
Switch-A /security/ldap/server # show ldap-group-rule detail
Switch-A /security/ldap/server #
show local-disk-config-policy
To display local disk configuration policy information, use the show local-disk-config-policy command.
Syntax Description name (Optional) Displays information about a specific local disk configuration policy.
show maint-policy
To display information on the maintenance policies, use the show maint-policy command.
Syntax Description name (Optional) Name of the maintenance policy. This option will display information
only on the specified policy.
detail (Optional) This option displays information on all the maintenance policies that are
created.
Command Default By default, this command will list the maintenance policies that are created, and the respective scheduler
information.
Examples This example shows how to view detailed information on the maintenance policies.
Switch-A # scope org
Switch-A /org # show maint-policy detail
Maintenance Policy:
Name: Default
Scheduler: Timed
Uptime Disruptions: Immediate
Name: Sample
Scheduler: Test
Uptime Disruptions: Immediate
Command Description
delete maint-policy
show member-port-channel
To display information on configure member port channels, use the show member-port-channelcommand.
b Specifies fabric B.
Command Default By default, the command displays information on all configured member port channels.
Usage Guidelines You must create a VSAN or a VLAN and member port channels before you use this command.
Examples This example shows how to display information on the member port channels:
UCS-A # scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # scope vsan sample
UCS-A /fc-uplink/fabric/vsan # show member-port-channel
UCS-A /fc-uplink/fabric/vsan #
enter member-port-channel
scope member-port-channel
delete member-port-channel
show member-port
To display information on configured member ports, use the show member-port command.
b Specifies fabric B.
Command Default By default, this command displays information on all configured member ports.
1.4(1) This command is not available in the Port Channel mode within /eth-uplink/switch
mode.
This command can be used in the VLAN mode within Ethernet Storage.
(/eth-storage/vlan).
Usage Guidelines You must configure member ports before you use this command.
Member Port:
UCS-A /fc-uplink/vsan #
enter member-port
scope member-port
delete member-port
show member-port fc
To display information on the Fibre Channel member ports, use the show member-port fc command.
b Specifies fabric B.
Command Default By default, this command displays all the Fibre Channel member ports that have been configured.
Command Modes VSAN within a fabric in the Fibre Channel storage mode (/fc-storage/fabric/vsan)
VSAN within the Fibre Channel storage mode (/fc-storage/vsan)
Usage Guidelines You must configure Fibre Channel member ports before you use this command.
Examples This example shows how to display information on the Fibre Channel member ports:
UCS-A # scope fc-storage
UCS-A /fc-storage # scope vsan sample
UCS-A /fc-storage/vsan # show member-port fc a 1 22
FC Member Port:
UCS-A /fc-storage/vsan #
enter member-port fc
scope member-port fc
delete member-port fc
b Specifies fabric B.
Command Default By default, this command displays information on all the Fibre channel over Ethernet member ports.
Command Modes VSAN within the Fibre Channel storage command mode (/fc-storage/vsan)
VSAN within a fabric (/fc-storage/fabric/vsan)
Usage Guidelines You must create Fibre Channel over Ethernet member ports before you use this command.
Examples This example shows how to display information on Fibre channel over Ethernet member ports:
UCS-A # scope fc-storage
UCS-A /fc-storage # scope vsan sample
UCS-A /fc-storage/vsan # show member-port fcoe a 1 223
UCS-A /fc-storage/vsan #
show mgmt-if-mon-policy
To display information on the management interface monitor settings, use the show mgmt-if-mon-policy
command.
show mgmt-if-mon-policy
Examples This example shows how to display information on the management interface monitor settings.
Switch-A # scope monitoring
Switch-A /monitoring # show mgmt-if-mon-policy
Switch-A /monitoring #
show mon-src
To display information on a monitor source session, use the show mon-src command.
Syntax Description name (Optional) Use this option to view information on a specific monitor source
session.
expand Use this option to view detailed information on all monitor source sessions.
detail Use this option to view information on the monitor source sessions
Command Default By default, this command lists the monitor source session, and the direction of the session in a tabular format.
Usage Guidelines A monitor source session must be created to use this command.
Examples This example shows how to display the monitor source session information for a VNIC in a service profile.
Switch-A # scope org
Switch-A /org # scope service-profile sample
Switch-A /org/service-profile # scope vnic example
Switch-A /org/service-profile/vnic # show mon-src Testing
Monitor Source:
Name Direction
----- ----------
Testing Both
show nw-ctrl-policy
To display network control policy information, use the show nw-ctrl-policy command.
Syntax Description name (Optional) The name of the network control policy. This option displays information
on the specified network control policy.
expand (Optional) Lists all the network control policies that are configured, along with
additional information.
detail (Optional) Lists all the network control policies along with information on CPD and
the uplink fail action.
Command Default By default, this command displays all the configured network control policies along with CDP and uplink
fail action specifications.
1.4(1) This command was introduced in the Ethernet storage command mode.
Usage Guidelines A network control policy must be configured to use this command.
To use the detail or expand option, the uplink fail action must be configured to use this command.
Examples This example shows how to display network control policy information:
UCS-A # scope org org10
UCS-A /org # show nw-ctrl-policy nCP100
UCS-A /org #
scope nw-ctrl-policy
enter nw-ctrl-policy
delete nw-ctrl-policy
set uplink-fail-action
Syntax Description name (Optional) The name of the one time schedule occurrence. This option will display
information on the specified one-time schedule.
detail (Optional) This option displays information on all one time occurrence schedules that
have been configured. It also displays additional information on each schedule.
Command Default By default, this command displays the name, the start date, and the executed tasks of the schedule.
Usage Guidelines A schedule and one-time occurrence schedule must be created prior to using this command.
Examples This example shows how to view detailed information on the one-time occurrence schedule.
Switch-A # scope system
Switch-A /system # scope schedule Default
Switch-A /system/schedule # show occurrence one-time detail
One-Time Occurrence:
Name: Sample
Start Date: 2010-11-02 T12:23:00:00
Max Duration (dd:hh:mm:ss):None
Max Concur Tasks: Unlimited
Max Tasks: Unlimited
Min Interval (dd:hh:mm:ss): None
Executed Jobs: 0
Switch-A /system/schedule #
Command Description
enter occurrence one-time
delete occurrence one-time
Syntax Description name (Optional) The name of the recurring occurrence of a schedule. This option displays
information on the specified recurring occurrence of the schedule.
detail (Optional) This option displays information on all recurring occurrences that have
been created.
Command Default By default, this command displays information on all recurring occurrences of the schedule in a tabular format.
Usage Guidelines A schedule policy and a recurring occurrence for the schedule must be created to use this command.
Examples This example shows how to view information on the recurring occurrence of a schedule.
Switch-A # scope system
Switch-A /system # scope schedule Default
Switch-A /system/schedule # show occurrence recurring detail
Recurring Occurrence:
Name: Trial
Day: Every day
Hour: Every hour
Minute: Every Minute
Max Duration (dd:hh:mm:ss): None
Max Concur Tasks: 0
Max Tasks: 4
Min Interval (dd:hh:mm:ss): None
Executed Tasks: 0
Name: Sample
Day: Monday
Hour: Every hour
Minute: Every Minute
Max Duration (dd:hh:mm:ss): None
Max Concur Tasks: 2
Max Tasks: 4
show password-profile
To display information on the password profile, use the show password-profile command.
Syntax Description detail (Optional) Displays detailed information on the password profile.
Command Default By default, this command displays if changing passwords during an interval is enabled or not.
Usage Guidelines You must be an administrator user or have aaa privileges to use this command.
Examples This example shows how to display detailed information on the password profile:
UCS-A # scope security
UCS-A /security # show password-profile detail
Password Profile:
UCS-A /security #
set change-count
set change-interval
Command Description
set no-change-interval
set change-during-interval
set history-count
show pending-changes
To view the changes that are pending for a service profile, use the show pending-changes command.
Syntax Description expand (Optional) To view expanded information on the changes that are pending.
detail (Optional) To view detailed information on the changes that are pending.
Command Default By default, the command displays expanded information on a service profile.
Examples This example shows how to view detailed information on a service profile.
Switch-A # scope org Test
Switch-A /org # scope service-profile sample
Switch-A /org/service-profile # show pending-changes detail
Pending Changes:
----------------
Scheduler: Test
Changed by: admin
Acked by: user
Modified date: 2011-10-03 T09:47:32.618
State: Untriggered
Admin State: Untriggered
Pending Changes: 1
Pending Disruptions: 0
Switch-A /org/service-profile #
show service-profile
show pooled
To display information on the pools, use the show pooled command.
IP pool configuration
show pooled a.b.c.d detail expand
ID The name of the UUID suffix pool. You should have configured this name to use
this option.
Suffix To display information on a specific IQN pool. You should have configured a
suffix for an IQN pool to use this option.
Command Default By default, this command lists all the pools that are available.
2.0(2) This command was introduced in the IQN pool command mode.
Usage Guidelines Pools must be configured before you use this command.
Examples This example shows how to display pools configured for an UUID suffix pool.
UCS-A # scope org
UCS-A /org # scope uuid-suffix-pool Sample1
UCS-A /org/uuid-suffix-pool # show pooled expand
Pooled:
ID Assigned Assigned to dn
-- -------- --------------
0000-000000000001 No
0000-000000000002 No
0000-000000000003 No
UCS-A /org/uuid-suffix-pool #
show port-channel
To view information on a port channel, use the show port-channel command.
Syntax Description port-channel-id (Optional) Specify a port channel ID to view information on a specific port
channel.
detail (Optional) Use this option to view information on all port channels that are
created.
expand (Optional) Use this option to view detailed information on all port channels that
are created and the associated member port channels.
Command Default By default, the command displays information on all configured port channels in a tabular format.
Command Modes Fabric interconnect within the Ethernet Uplink mode (/eth-uplink/fabric)
Fabric interconnect within the Ethernet storage mode (/eth-storage/fabric)
Fabric interconnect within the Fibre Channel Uplink mode (/fc-uplink/fabric)
1.4(1) This command was introduced in the Fabric Interconnect mode within the Fibre
Channel uplink mode (/fc-uplink/fabric) and Ethernet storage mode
(/eth-storage/fabric).
Usage Guidelines You must create port channels before you use this command.
Examples This example shows how to view detailed information on all port channels:
UCS-A # scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # show port-channel detail
Port Channel:
Channel ID: 1
Name: Sample
Admin State: Enabled
Oper State: Up
Switch-A /eth-uplink/fabric #
scope port-channel
enter port-channel
delete port-channel
show power-budget
To display the committed power usage level of a server, use the show power-budget command.
Usage Guidelines Use this command to display the committed power usage level of a server.
Examples The following example displays the power usage level setting for server 4 in chassis 2:
UCS-A# scope server 2/4
UCS-A /chassis/server # show power-budget
Power Budget:
Committed (W): 1000
Oper Committed (W): Disabled
UCS-A /chassis/server #
show power-control-policy
To display information on the configured power policies, use the show power-control-policy command.
Syntax Description name (Optional) The name of the power control policy. This option displays information
on the specified power control policy.
expand This option lists all the power control policies and the organization for which they
have been created.
detail This option lists all the power control policies and lists additional information on the
priorities configured for each power control policy.
Command Default By default, this command lists all the power control policies that have been configured.
Examples This example shows how to view information on the power control policies.
Switch-A # scope org
Switch-A /org # show power-control-policy detail
Power Policy:
Name: Sample
Admin Priority: 5
Oper Priority: 5
Name: Test
Admin Priority: 2
Oper Priority: 2
Switch-A /org #
Command Description
scope power-control-policy
enter power-control-policy
set power-control-policy
delete power-control-policy
show power-group
To view information on power groups, use the show power-group command.
Syntax Description name (Optional) The name of the power group. This option displays information on the
specified power group.
expand This option lists all the power groups that are configured along with additional
information such as configured chassis.
detail This option lists all the configured power groups and provides detailed information
on each power group.
Command Default By default, this command lists the configured power groups in a tabular format.
Usage Guidelines Power groups must be created and a chassis must be associated with each power group to view complete
information on the power groups.
Examples This example shows how to view detailed information of the power groups.
Switch-A # scope power-cap-mgmt
Switch-A /power-cap-mgmt # show power-group expand
Group:
Name: Default
Peak (W): Unbound
Operstate: Cap ok
Chassis:
ID Status
-- ------
1 Cap OK
Name: Sample
Peak (W): Unbound
Operstate: Cap ok
Chassis:
ID Status
-- ------
1 Cap OK
Switch-A /power-cap-mgmt #
show pre-login-banner
To view the pre-login banner message of the switch, use the show pre-login-banner command.
Usage Guidelines A pre-login banner message must be set to use this command.
Examples This example shows how to view the pre-login banner message.
UCS-A # scope security
UCS-A /security # scope banner
UCS-A /security/banner # show pre-login-banner
clear message
show psu-policy
To display PSU policy information, use the show psu-policy command in org mode.
PSU Policy:
Redundancy: n-plus-1
Description: psup100
switch-A /org #
show rackserver-disc-policy
To display information on the rack server discovery policy, use the show rackserver-disc-policy command.
Syntax Description detail (Optional) To view detailed information on a rack server discovery policy.
Command Default Displays information on the rackserver disc policy in a tabular format.
Examples This example shows how to view detailed information on the rack server disc policy.
Switch-A # scope org Sample
Switch-A /org # show rackserver-disc-policy detail
Switch-A /org #
show raid-battery
To display information on the battery backup unit (BBU), use the show raid-battery command.
Examples This example shows how to view information on the batter backup unit of a server:
UCS-A # scope chassis 1
UCS-A /chassis # scope server 3
UCS-A /chassis/server # scope raid-controller 1 sas
UCS-A /chassis/server/raid-controller # show raid-battery detail
UCS-A /chassis/server/raid-controller #
show scheduler
To display information on a scheduler policy, use the show scheduler command.
Syntax Description name (Optional) The name of the scheduler. This option displays information on the
specified scheduler.
expand (Optional) Lists all the schedulers and the maintenance policies that have been
configured for each policy.
detail (Optional) Lists all the schedulers that have been configured.
Command Default By default, this command only lists the schedulers that have been configured.
Name: Default
Examples This example shows how to display security-related finite state machine information:
switch-A# show security fsm status
FSM 1:
Remote Result: Not Applicable
Remote Error Code: None
Remote Error Description:
Status: Nop
Previous Status: Update User Ep Success
Timestamp: 2010-02-18T05:19:05.705
Try: 0
Progress (%): 100
Current Task:
switch-A#
show sel
To display the contents of the system event log (SEL) of a server, use the show sel command.
Examples This example shows how to display the contents of the SEL for server 1 in chassis 1:
switch-A# show sel 1/1
1 | 02/15/2010 17:23:27 | BIOS | System Event #0x83 | Timestamp clock synch | SEL
timestamp clock updated, event is first of pair | Asserted
2 | 02/15/2010 17:23:28 | BMC | Drive slot(Bay) SAS0_LINK_STATUS #0x21 | Transition
to Degraded | Asserted
3 | 02/15/2010 17:23:28 | BMC | Drive slot(Bay) SAS0_LINK_STATUS #0x21 | Transition
to On Line | Deasserted
4 | 02/15/2010 17:23:28 | BMC | Platform alert LED_SAS0_FAULT #0x59 | LED is blinking
fast | Asserted
5 | 02/15/2010 17:23:28 | BMC | Platform alert LED_SAS0_FAULT #0x59 | LED is on |
Deasserted
6 | 02/15/2010 17:23:28 | BMC | Platform alert LED_FPID #0x5b | LED is on | Asserted
7 | 02/15/2010 17:23:28 | BMC | Platform alert LED_FPID #0x5b | LED is off | Deasserted
switch-A#
Examples This example shows how to display the actual boot order of server 3 in chassis 1:
switch-A# show server actual-boot-order 1/3
Server 1/3:
Last Update: 2010-02-18T05:20:33.603
Network Device
(1) Cisco NIC 11:0.0
(2) Cisco NIC 12:0.0
CD/DVD
(1) Cisco Virtual CD/DVD 1.19
HDD
(1) #0100 ID00 LUN0 FUJITSU MBC207
FDD
(1) Cisco Virtual HDD 1.19
(2) Cisco Virtual Floppy 1.19
Internal EFI Shell
switch-A#
Syntax Description uuid dynamic-uuid (Optional) Displays information about network adapters in a server with a dynamic
universally unique identifier (UUID). Specify a dynamic UUID in the form
NNNNNNNN-NNNN-NNNN-NNNN-NNNNNNNNNNNN.
Examples This example shows how to display information about network adapters in server 3 in chassis 1:
switch-A# show server adapter 1/3
Server 1/3:
Adapter PID Vendor Serial Overall Status
------- ---------- ----------------- ------------ --------------
1 N20-AC0002 Cisco Systems Inc QCI13110017 Operable
switch-A#
Command Description
show server adapter status
Syntax Description uuid dynamic-uuid (Optional) Displays identity information about network adapters in a server with
a dynamic universally unique identifier (UUID). Specify a dynamic UUID in the
form NNNNNNNN-NNNN-NNNN-NNNN-NNNNNNNNNNNN.
server-id (Optional) Displays identity information about network adapters in a specific server,
expressed as chassis-number/server-number.
Examples This example shows how to display identity information about network adapters in server 3 in chassis 1:
switch-A# show server adapter identity 1/3
Server 1/3:
Burned-In UUID: 12345678-abcd-ef12-3456-0123456789ab
Dynamic UUID: 12345678-abcd-ef12-abcd-0000000015d9
Adapter 1:
Product Name: Cisco UCS VIC M81KR Virtual Interface Card
PID: N20-AC0002
VID: V01
Vendor: Cisco Systems Inc
Serial: QCI13110017
Revision: 0
Ext Interface:
switch-A#
Syntax Description uuid dynamic-uuid (Optional) Displays inventory information about network adapters in a server with
a dynamic universally unique identifier (UUID). Specify a dynamic UUID in the
form NNNNNNNN-NNNN-NNNN-NNNN-NNNNNNNNNNNN.
Examples This example shows how to display inventory information about network adapters in server 3 in chassis 1:
switch-A# show server adapter inventory 1/3
Server 1/3:
Adapter PID Vendor Serial Overall Status
------- ---------- ----------------- ------------ --------------
1 N20-AC0002 Cisco Systems Inc QCI13110017 Operable
switch-A#
Command Description
show server adapter status
Examples This example shows how to display Layer 2 information about the network adapters:
switch-A# scope server 1/5
switch-A /chassis/server # show server adapter layer2
Ext Interface:
switch-A#
Syntax Description uuid dynamic-uuid (Optional) Displays status information about network adapters in a server with a
dynamic universally unique identifier (UUID). Specify a dynamic UUID in the
form NNNNNNNN-NNNN-NNNN-NNNN-NNNNNNNNNNNN.
server-id (Optional) Displays status information about network adapters in a specific server,
expressed as chassis-number/server-number.
Examples This example shows how to display status information about network adapters in server 3 in chassis 1:
switch-A# show server adapter status 1/3
Server 1/3:
Overall Status
--------------
Operable
switch-A#
Command Description
show server adapter layer2
Examples This example shows how to display the boot order of server 5 in chassis 1:
switch-A# show server boot-order 1/5
Boot Definition:
Full Name: sys/chassis-1/blade-5/boot-policy
Reboot on Update: No
Boot LAN:
Order: 1
switch-A#
Syntax Description uuid dynamic-uuid (Optional) Displays information about the CPUs in a server with a dynamic
universally unique identifier (UUID). Specify a dynamic UUID in the form
NNNNNNNN-NNNN-NNNN-NNNN-NNNNNNNNNNNN.
server-id (Optional) Displays information about the CPUs in a specific server, expressed
as chassis-number/server-number.
Examples This example shows how to display information about the CPUs in server 5 in chassis 1:
switch-A# show server cpu 1/5
Server 1/5:
ID Presence Architecture Socket Cores Speed (GHz)
--- -------------------- ----------------- ------ ----------- -----------
1 Equipped Xeon CPU1 4 2.666000
2 Equipped Xeon CPU2 4 2.666000
switch-A#
Command Description
show server identity
show server inventory
Syntax Description uuid dynamic-uuid (Optional) Displays identity information about a server with a dynamic universally
unique identifier (UUID). Specify a dynamic UUID in the form
NNNNNNNN-NNNN-NNNN-NNNN-NNNNNNNNNNNN.
Examples This example shows how to display identity information about server 5 in chassis 1:
switch-A# show server identity 1/5
Server 1/5:
Burned-In UUID: 0d05e5b2-0707-11df-b252-000bab01c0fb
Dynamic UUID: 0d05e5b2-0707-11df-b252-000bab01c0fb
Ext Interface:
switch-A#
show server-host-id
To view the host ID of a Fabric Interconnect, use the show server-host-id command.
detail This option will display the host ID for all fabric interconnects that are available.
Examples This example shows how to view the host ID of all fabric interconnects.
Switch-A # scope license
Switch-A /license # show server-host-id
Switch-A /license #
show usage
Syntax Description ID The server ID. The value must be a number between 1 and 255.
Command Default By default, the command lists status information on all servers.
Examples This example shows how to display status information for a specific server using the chassis and blade ID.
UCS-A # scope server 1/1
UCS-A /chassis/server # show server status 1/1
UCS-A /chassis/server #
Command Default By default, this command displays information on all service profiles that are created.
UCS-A /org #
Command Default By default, this command displays information on all service profiles that are created.
Examples This example shows how to display service profile circuit information
UCS-A # scope org
UCS-A /org # show service-profile circuit
UCS-A /org #
Examples This example shows how to display detailed information on all service profiles:
UCS-A # scope org
UCS-A /org # show service-profile detail
Service Profile:
Service Profile Name: Sample
Type: Instance
Server: 1/2
Selected Server: 1
User Label:
Description:
Assignment: Assigned
Association: Associated
Power State: On
Op State: Config Failure
Oper Qualifier:
Conf State: Failed
Config Qual: Insufficient resources, System UUID Assignment
Dynamic UUID: Derived
Server Pool: default
Source Template:
UUID Suffix Pool: Default
Oper UUID Suffix Pool: org-root/uuid-pool-default
Boot Policy:
Oper Boot Policy: org-root/boot-policy-default
BIOS Policy:
Oper BIOS Policy:
Host f/w Policy:
Oper Host f/w Policy:
Dynamic vNIC Connectivity Policy:
Oper Dynamic vNIC Connectivity Policy:
Local Disk Policy: default
Oper Local Disk Policy: org/local-disk-config-default
Maintenance Policy:
UCS-A /org #
Examples This example shows how to display expanded information on all service profiles:
UCS-A # scope org
UCS-A /org # show service-profile expand
Service Profile:
Service Profile Name: Sample
Type: Instance
Server: 1/2
Assignment: Assigned
Association: Associated
Pending Changes:
State Pending Changes Pending Disruptions
----- --------------- -------------------
Untriggered 0 0
Boot Definition:
Full name: org-root/ls-test/boot-policy
Reboot on Update: No
vNIC:
Name: test
Fabric ID: A
Dynamic MAC Addr: Derived
Ethernet Interface:
Name: Sample
Dynamic MAC Addr: Derived
Default Network: No
VLAN ID: 1
Operational VLAN: fabric/lan/net-default
UCS-A /org #
Syntax Description fsm status To display information on the FSM status of the service
profile.
Command Default By default, this command displays information on all service profiles that are created.
Examples This example shows how to display FSM information for a specific service profile.
UCS-A # scope org
UCS-A /org # show service-profile fsm status sample
FSM 1:
Remote Result:
Remote Error Code:
Remote Error Description:
Status:
Previous Status:
Timestamp:
Try:
Flags:
Progress (%):
Current Task:
FSM 2:
Status: NoP
Previous Status: NoP
Timestamp: Never
Try: 0
Flags: 0
UCS-A /org #
Command Default By default, the command displays identity information on all configured service profiles.
Usage Guidelines A service profile must be created before you use this command.
Examples This example shows how to display identity information for a specific service profile.
UCS-A # scope org
UCS-A /org # show service-profile identity name sample1
vNIC FC Node: 1
WWN Pool: node-default
Dynamic WWNN: Pool Derived
UCS-A /org #
show service-profile inventory{adapter | bios | board | cpu | detail | expand | memory | mgmt | name |
org | server | storage | uuid}
Command Default By default, this command displays all service profiles, along with information on the type of template used,
the server it is associated with, and the association status.
Usage Guidelines A service profile must be created before you use this command.
Examples This example shows how to display inventory information of all configured service profile.
UCS-A # scope org
UCS-A /org # show service-profile inventory adapter
UCS-A /org #
Command Description
show service-profile status
show service-profile status {detail | expand | name | org | power | server | Thermal | UUID | voltage}
Command Default By default, this command lists the status of all the service profiles that are configured.
Examples This example shows how to display the power status of all service profiles:
UCS-A # scope org
UCS-A /org # show service-profile status
UCS-A /org #
show snmp-user
To display SNMPv3 user information, use the show snmp-user command.
showsnmp-user [user-name]
show sol-policy
To display SoL policy information, use the show sol-policy command.
Syntax Description sol-policy-name (Optional) Displays information about a specific SoL policy.
Examples This example shows how to display details about all SoL policies:
SOL Policy:
Name: org10/sol-p10
Admin State: Disable
Speed: 9600
Description:
Name: org10/sol-p11
Admin State: Disable
Speed: 9600
Description:
switch-A /org #
show sshkey
To display the SSH public key of the host, use the show sshkey command in local management mode.
show sshkey
Usage Guidelines Use this command to display the SSH public key of the host.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
Examples This example shows how to display the SSH public key of the host:
switch-A # connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAxlYfe7GDtmCdgZ2TfQivPrQmXh6E808oOofhqgMBA72b
ACu/QJxYeR+S7yqfHJYl1P/Uu+XC3GPueAk5sC3aMMbocwYVt58BsmXeeRubaoO51t1GCQjwwEivQRgI
JGK2dyu1ZWzfiGgaYku3gCYqC59PS7F2TYIoJCWnXwIRI58= root@
switch-A(local-mgmt)#
show static-target-if
To display information on the static target interface priority, use the show static-target-if command.
Syntax Description priority (Optional) To display information on a specific target interface priority.
Command Default By default, the command displays information on the static target interface priority in a tabular format.
Usage Guidelines A static target interface priority must be set to use this command.
Examples This example shows how to display detailed information on the static target interface priority.
UCS-A # scope org Test
UCS-A /org # scope service-profile sample
UCS-A /org/service-profile # scope vnic-iscsi trial
UCS-A /org/service-profile/vnic-iscsi # scope eth-if
UCS-A /org/service-profile/vnic-iscsi/eth-if # show static-target-if detail
Static target:
Priority: 1
Name: testing
Port: 3260
IP address: 10.0.0.0
Auth Name: example
UCS-A /org/service-profile/vnic-iscsi/eth-if #
show stats
To display the power usage of a server, use the show stats command.
show stats
Usage Guidelines Use this command to display the power usage of a server.
Examples The following example displays the power usage for server 4 in chassis 2:
UCS-A# scope server 2/4
UCS-A /chassis/server # show stats
Mb Power Stats:
Time Collected: 2010-04-20T08:45:31.209
Monitored Object: sys/chassis-2/blade-4/board
Suspect: No
Consumed Power (W): 116.653679
Input Voltage (V): 12.051000
Input Current (A): 9.680000
Thresholded: Input Voltage Min
Mb Temp Stats:
Time Collected: 2010-04-20T08:45:31.209
Monitored Object: sys/chassis-2/blade-4/board
Suspect: No
Fm Temp Sen Io (C): 19.000000
Fm Temp Sen Rear (C): 18.000000
Fm Temp Sen Rear L (C):: N/A
Fm Temp Sen Rear R (C): N/A
Thresholded: 0
UCS-A /chassis/server #
show storage-controller
To display information on storage controllers, use the show storage-controller command.
model Model number of the storage controller. You must specify the model number if
you have specified the vendor name.
hw-rev Hardware revision number of the storage controller. You must specify the hardware
revision number if you have specified the vendor name.
Command Default By default, the command lists all the storage controllers that are configured.
Examples This example shows how to display information on all storage controllers:
UCS-A # scope system
UCS-A /system # scope capability
UCS-A /system/capability # show storage-controller expand
Storage Controllers:
UCS-A /system/capability #
show tech-support
To view technical information on the chassis, fabric extender module (fex), server and the UCS Manager, use
the showtech-support command.
Syntax Description chassis The ID of the chassis. The ID must be a numeric value between 1 and 255.
fex The ID of the Fabric extender module. The ID must be a numeric value between 1
and 255.
server The rack ID of the server. The value must be a numeric value.
Usage Guidelines A fabric must be specified to enter the Local Management command mode.
The chassis and Fabric extender module ID must be values between 1 and 255.
Examples This example shows how to view information on the Unified Computing System Manager software on a
switch.
Switch-A # connect local-mgmt a
Switch-A (local-mgmt) # show tech-support ucsm
Switch-A (local-mgmt) #
show clock
show cluster
show file
show license
show mgmt-ip-debug
show open-network-ports
show pmon
show processes
show sel
show sshkey
show version
show usage
To view license usage for a fabric interconnect, use the show usage command.
Syntax Description a (Optional) Use this option to view the license usage for scope A.
b (Optional) Use this option to view the license usage for scope B.
detail (Optional) Use this option to view the complete details of the license usage for scope
A and B.
Feature (Optional) Use this option to view the license usage based on a feature name.
Command Default By default, the command displays license usage information according to a feature name in a tabular format.
Examples This example shows how to view detailed license usage information for a fabric interconnect:
Switch-A # scope license
Switch-A /license # show usage detail
Switch-A /license #
show server-host-id
show vcenter
To display VCenter information, use the show vcenter command in vmware mode.
fsm status Displays all VCenter finite state machine information, in list format.
vCenter:
Name: vc10
Description: test
Hostname or IP address:
Certificate:
vCenter Server Version:
switch-A /system/vm-mgmt/vmware #
show vcon
To display vCon information, use the show vcon command.
Pubs-A /org/service-profile* #
show vcon-policy
To display vCon policy information, use the show vcon-policy command.
Syntax Description policy-name The name of the policy. Displays the specified vCon policy.
detail Displays the vCon policy that is associated with the service profile that you
entered.
Pubs-A /org #
Related Commands
• create vcon-policy
• scope org
show vif-ns
To display VIF namespace information, use the show vif-ns command.
Server: 1/1
Adapter: sys/chassis-1/blade-1/adaptor-1/
Fabric ID Side VIF NS Size VIf used Allocation Status
--------- ---- ----------- -------- ------------------
A Left 61 1 Available
B Left 61 1 Available
UCS-A /chassis/server #
show virtual-machine
To display virtual machine information, use the show virtual-machine command in vmware mode.
show vlan-port-count
To view the Virtual LAN port count for a Fabric interconnect module, use the show vlan-port-count command.
show vlan-port-count
Syntax Description
This command has no arguments or keywords.
Command Default Displays the Virtual LAN port count for a Fabric interconnect module.
1.4(1) The number of VLAN port instances that you can configure for a fabric is
reduced from 8000 to 6000.
Examples This example shows how to view the Virtual LAN port counts for Fabric A.
Switch-A # scope fabric-interconnect a
Switch-A /fabric-interconnect # show vlan-port-count
VLAN-Port Count:
VLAN-Port Limit Access VLAN-Port Count Border VLAN-Port Count Alloc Status
--------------------------------------------------------------------------
6000 5 10 Available
Switch-A /fabric-interconnect #
show activate
show environment
show event
Command Description
show fan
show fault
show file
show firmware
show fsm
show image
show inventory
show psu
show stats
show storage
show version
show vm-life-cycle-policy
To display information on the virtual machine life cycle policy, use the show vm-life-cycle-policy command.
Syntax Description expand Displays additional information on the VM life cycle policy.
Command Default By default, the command displays additional information on the VM life cycle policy.
Examples This example shows how to display detailed information on the VM lifecycle policy.
Switch-A # scope system
Switch-A /system # scope vm-mgmt
Switch-A /system/vm-mgmt # show vm-life-cycle-policy detail
Switch-A /system/vm-mgmt #
show web-session-limits
To view information on the configured Web session limits, use the show web-session-limits command.
Syntax Description detail (Optional) Use this option to view detailed information on all Web session limits
that have been configured.
Command Default By default, the command displays information on the configured Web session limits in a tabular format.
Usage Guidelines Web session limits should have been configured prior to using this command.
Examples This example shows how to view information on the configured Web session limits.
Switch-A # scope system
Switch-A /system # scope services
Switch-A /system/services # show web-session-limits detail
Web Sessions:
Maximum logins for single user: 32
Maximum sessions: 256
Switch-A /system/services #
set peruser
set total
ssh
To log in to a host that supports SSH, use the ssh command.
ssh host-name
Syntax Description host-name Host name or IP address. Specify the IP address in the format A.B.C.D.
Usage Guidelines Use this command to log in to a host that supports SSH.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
tail-mgmt-log
To display the last ten lines of a management log file and monitor new entries, use the tail-mgmt-log
command in local management command mode.
tail-mgmt-log filebase
Syntax Description filebase Base name of a management log file. See Usage Guidelines
for valid base names.
Usage Guidelines Use this command to display the ten most recent lines of a management log file and monitor new entries.
Using the filebase argument, this command accesses the management log file at /var/sysmgr/sam_logs/
filebase .log , displaying the ten most recent lines of the log file. After displaying the stored lines, the command
remains open, displaying any new lines until you press the Ctrl-C key combination.
The following list shows the valid values for the filebase argument:
• httpd
• svc_sam_bladeAG
• svc_sam_cliD
• svc_sam_controller
• svc_sam_dcosAG
• svc_sam_dme
• svc_sam_extvmmAG
• svc_sam_hostagentAG
• svc_sam_nicAG
• svc_sam_pamProxy
• svc_sam_portAG
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
Examples This example shows how to monitor the most recent entries of a management log file:
switch-A# connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
telnet
To log in to a host that supports Telnet, use the telnet command in local management command mode.
Syntax Description host-name Host name or IP address. Specify the IP address in the format A.B.C.D.
Usage Guidelines Use this command to log in to a host that supports Telnet.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
SanJose login:
terminal length
To set the number of lines to be displayed in the terminal window, use the terminal length command.
Syntax Description lines Specifies the number of lines to be displayed in the terminal window.
Usage Guidelines Use this command to set the number of lines to be displayed in the terminal window. The range for lines is
0 to 511 lines. Enter 0 to eliminate pausing.
Examples This example shows how to set the terminal length to 12 lines:
switch-A# terminal length 12
switch-A *# commit-buffer
switch-A #
terminal monitor
To enable the display of syslog messages in the terminal window, use the terminal monitor command.
Syntax Description no Disables the display of syslog messages in the terminal window.
Usage Guidelines Use this command to display syslog messages in the terminal window. To prevent the display of syslog
messages in the terminal window, enter the terminal no monitor command.
Examples This example shows how to enable the display of syslog messages in the terminal window:
switch-A# terminal monitor
switch-A *# commit-buffer
switch-A #
terminal session-timeout
To configure an inactivity timeout for terminal window sessions, use the terminal session-timeout command.
Syntax Description minutes Specifies the number of minutes of inactivity before the terminal session
disconnects.
Usage Guidelines Use this command to configure the inactivity timeout for terminal window sessions. The range of minutes
is 0 to 525600 minutes. To prevent the session from disconnecting due to inactivity, enter 0 minutes.
Examples This example shows how to configure an inactivity timeout of 60 minutes for a terminal window session:
switch-A# terminal session-timeout 60
switch-A *# commit-buffer
switch-A #
terminal width
To set the number of characters per line to be displayed in the terminal window, use the terminal width
command.
Syntax Description characters Specifies the number of characters per line to be displayed in the terminal
window.
Usage Guidelines Use this command to set the number of characters per line to be displayed in the terminal window. The range
for characters is 24 to 511 characters.
Examples This example shows how to set the terminal display width to 40 characters per line:
switch-A# terminal width 40
switch-A *# commit-buffer
switch-A #
top
To enter root from any mode, use the top command.
top
Examples This example shows how to enter root from any mode:
switch#
traceroute
To view the route to a network host, use the traceroute command in local management command mode.
Syntax Description host-name The host name or IP address of the destination network host.
source source (Optional) Specifies the IP address to be used as the source address in
outgoing probe packets.
Usage Guidelines Use this command to trace the route of IP packets to a network host.
You can use the optional source keyword to force the source address of the probe packets to be another IP
address of the sending host.
This command is available on the local management port command line. Use the connect local-mgmt
command to connect to that command line.
Examples This example shows how to trace the route to a network host:
switch-A # connect local-mgmt a
Cisco UCS 6100 Series Fabric Interconnect
switch-A(local-mgmt)#
up
To move up one mode, use the up command.
up
switch-A /org/service-profile # up
switch-A /org #
update catalog
To update and apply the capability catalog, use the update catalog command.
Syntax Description url Specifies the URL of a capability catalog update file.
Usage Guidelines Use this command to perform a capability catalog update. Specify a URL containing the protocol, user,
password, remote hostname, and remote path for the capability catalog update file. The URL can be specified
using the syntax of one of the following protocols:
• FTP— ftp:// hostname/path
• SCP— scp:// username@hostname/path
• SFTP— sftp:// username@hostname/path
• TFTP— tftp:// hostname:port-num/path
If the remote host requires a username and password, use the URL format for the specific protocol, such as
ftp:// user:password@ hostname/path for FTP.
When a username is specified without a password, you are prompted for a password.
Examples This example shows how to update and apply the capability catalog using SCP:
UCS-A# scope system
UCS-A /system # scope capability
UCS-A /system/capability # update catalog
scp://user1@192.0.2.111/catalogs/ucs-catalog.1.0.0.4.bin
Password:
UCS-A /system/capability #
update firmware
To update the firmware, use the update firmware command.
switch-A# /chassis/iom #
where
To determine where you are in the CLI, use the where command.
where
Examples This example shows how to determine where you are in the CLI:
Mode: /org/service-profile
Mode Data:
scope org
enter org org10
enter service-profile sp10 instance
switch-A /org/service-profile #
A chassis 8
discovery policy 8
acknowledge chassis 92 chassis discovery policy 8
acknowledge fault 94 about 8
acknowledge fex command 93 Cisco Discovery Protocol 15
acknowledge server 95 Cisco UCS Manager 35
acknowledge slot 96 about 35
activate firmware 97 Cisco VM-FEX 33
activate firmware (fabric) command 99 clear alertgroups 115
activate internal firmware command 101 clear auth-server-group command 116
adapters 33, 34 clear backup action 117
NIC 33 clear cores 118
VIC 34 clear file command 119
virtualization 33 clear message command 120
add alertgroups 102 clear password-history command 121
add backup action 104 clear sel (/chassis/server) command 122, 123
add privilege 105 clear sshkey 124
administration 35 CLI session limits 43
apply pending-changes immediate command 108 cluster force primary 125
architectural simplification 1 cluster lead 126
associate server 109 commands for object management 41
associate server-pool 111 commit-buffer 128
autoconfiguration policy 17 communication services 43, 44
about 17 web session limits 43, 44
connect adapter 129
connect bmc 130
B connect clp 131
connect iom command 132
backup sel 112 connect local-mgmt 133
banner 44, 45, 46, 47 connect-nxos command 134
pre-login 44, 45, 46, 47 converged network adapters 33
best effort system class 29 virtualization 33
boot policies 7 copy 135
about 7 create 41
bronze system class 29 create adapter command 137
burned in values 6 create auth-domain command 138
create auth-profile command 139
create auth-server-group command 141
create auto-target-if command 142
C create backup command 143
cd 113 create bios-policy 145
create bladeserver-disc-policy command 146
fabric interconnects 38
high availability 38
fault collection policy 20 I
about 20 IEEE 802.1Qbh 33
faults 20 IEEE 802.3x link-level flow control 3
collection policy 20 inheritance, servers 18
lifecycle 20 inherited values 6
FCoE 3 initial templates 7
features 30, 31 install file command 747
opt-in 30 IP addresses 25
stateless computing 31 management IP pool 25
Fibre Channel 3 IP pools 25
link-level flow control 3 management 25
over Ethernet 3 IPMI access profiles 13
priority flow control 3 about 13
Fibre Channel adapter policies 11
about 11
Fibre Channel system class 30
firmware 13, 14 L
host package 13
management package 14 LAN 19
vNIC policy 19