Implementing Cisco UCS Solutions
上QQ阅读APP看书,第一时间看更新

Step-by-step initial configuration

Following are the rudimentary steps for the initial configuration of UCSM:

  1. First ensure the presence of proper physical cabling between FIs, IOMs, and north-bound switches as explained in Chapter 1, Cisco UCS Physical Architecture and Installing UCS Hardware.
  2. Access FIs using a serial console as there is no IP assigned to them initially.
  3. FI will run an initial configuration wizard that will assign IP and other necessary configurations which are required (detailed steps are provided in Chapter 10, Configuring Backup, Restore, and High Availability).
  4. Make sure that L1/L2 ports are properly connected between FIs so that when the second FI is powered up, it automatically detects the first FI and configures the cluster settings as part of the initial configuration (detailed steps are provided in Chapter 10, Configuring Backup, Restore, and High Availability).
  5. Assign cluster IP to get centralized management access of the cluster, also known as Virtual IP (VIP).
  6. Once the IPs have been assigned, it is also possible to access FIs through Secure Shell (SSH).
  7. Log in to FI and use the following commands to get the status of the cluster as shown in the following screenshot:
    connect local-mgmt
    Show cluster state
    
    Step-by-step initial configuration
  8. After confirming the status of the cluster, log in to the UCSM GUI using the cluster VIP IP using a compatible browser as shown in the following screenshot:
    Step-by-step initial configuration
  9. Configure the UCS global policies, which will be explained in the next section.

Tip

In case it is necessary to reinitialize FI to the default factory setting, use the following commands:

connect local-mgmt
erase-config

On a primary FI, A is automatically added to the name, and on a secondary FI, B is automatically added to the name; so pay attention to the naming convention.

In this chapter, we will only discuss the configuration of UCS global policies. In subsequent chapters, we will be exploring different configurations using the UCSM application.