This chapter contains the following topics:
Preparing for Installation
This section contains the following topics:
Installation Warnings and Guidelines
![]() Note | Before you install, operate, or service a server, review the Regulatory Compliance and Safety Information for Cisco UCS C-Series Servers for important safety information. |
![]() Warning | IMPORTANT SAFETY INSTRUCTIONS This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. Use the statement number provided at the end of each warning to locate its translation in the translated safety warnings that accompanied this device. Statement 1071 |
![]() Warning | To prevent the system from overheating, do not operate it in an area that exceeds the maximum recommended ambient temperature of: 35° C (95° F). Statement 1047 |
![]() Warning | The plug-socket combination must be accessible at all times, because it serves as the main disconnecting device. Statement 1019 |
![]() Warning | This product relies on the building’s installation for short-circuit (overcurrent) protection. Ensure that the protective device is rated not greater than: 250 V, 15 A. Statement 1005 |
![]() Warning | Installation of the equipment must comply with local and national electrical codes. Statement 1074 |
![]() Warning | This unit is intended for installation in restricted access areas. A restricted access area can be accessed only through the use of a special tool, lock, and key, or other means of security. Statement 1017 |
![]() Caution | To ensure proper airflow it is necessary to rack the servers using rail kits. Physically placing the units on top of one another or “stacking” without the use of the rail kits blocks the air vents on top of the servers, which could result in overheating, higher fan speeds, and higher power consumption. We recommend that you mount your servers on rail kits when you are installing them into the rack because these rails provide the minimal spacing required between the servers. No additional spacing between the servers is required when you mount the units using rail kits. |
![]() Caution | Avoid uninterruptible power supply (UPS) types that use ferroresonant technology. These UPS types can become unstable with systems such as the Cisco UCS, which can have substantial current draw fluctuations from fluctuating data traffic patterns. |
When you are installing a server, use the following guidelines:
-
Plan your site configuration and prepare the site before installing the server. See the Cisco UCS Site Preparation Guide for the recommended site planning tasks.
-
Ensure that there is adequate space around the server to allow for accessing the server and for adequate airflow. The airflow in this server is from front to back.
-
Ensure that the air-conditioning meets the thermal requirements listed in the Environmental Specifications.
-
Ensure that the cabinet or rack meets the requirements listed in the Rack Requirements.
-
Ensure that the site power meets the power requirements listed in the Power Specifications. If available, you can use an uninterruptible power supply (UPS) to protect against power failures.
Network Equipment-Building System (NEBS) Statements
NEBS describes the environment of a typical United States Regional Bell Operating Company (RBOC) central office. NEBS is the most common set of safety, spatial, and environmental design standards applied to telecommunications equipment in the United States. It is not a legal or regulatory requirement, but rather an industry requirement.
The following NEBS statements apply to the different models of Cisco UCS C220 M6 server:
![]() Note | Statement 7001—ESD Mitigation This equipment may be ESD sensitive. Always use an ESD ankle or wrist strap before handling equipment. Connect the equipment end of the ESD strap to an unfinished surface of the equipment chassis or to the ESD jack on the equipment if provided. |
![]() Warning | Statement 7003—Shielded Cable Shielded Cable Requirements for Intrabuilding Lightning Surge The intrabuilding port(s) of the equipment or subassembly must use shielded intrabuilding cabling/wiring that is grounded at both ends. The following port(s) are considered intrabuilding ports on this equipment: RJ-45 Copper Ethernet Ports |
![]() Note | Statement 7004—Special Accessories Required to Comply with GR-1089 Emission and Immunity Requirements To comply with the emission and immunity requirements of GR-1089, shielded cables are required for the following ports: RJ-45 Copper Ethernet Ports |
![]() Warning | Statement 7005—Intrabuilding Lightning Surge and AC Power Fault The intrabuilding port(s) of the equipment or subassembly must not be metallically connected to interfaces that connect to the outside plant (OSP) or its wiring. These interfaces are designed for use as intrabuilding interfaces only (Type 2 or Type 4 ports as described in GR-1089-CORE) and require isolation from the exposed OSP cabling. The addition of primary protectors is not sufficient protection to connect these interfaces metallically to OSP wiring. This statement applies to the intrabuilding ports listed below: RJ-45 Copper Ethernet Ports |
![]() Warning | Statement 7012—Equipment Interfacing with AC Power Ports Connect this equipment to AC mains that are provided with a surge protective device (SPD) at the service equipment that complies with NFPA 70, the National Electrical Code (NEC). |
![]() Note | Statement 7013—Equipment Grounding Systems—Common Bonding Network (CBN) This equipment is suitable for installations using the CBN. |
![]() Note | Statement 7016—Battery Return Conductor Treat the battery return conductor of this equipment as Isolated DC return (DC-I). |
![]() Note | Statement 7018—System Recover Time The equipment is designed to boot up in less than 30 minutes provided the neighboring devices are fully operational. |
![]() Note | Statement 8015—Installation Location Network Telecommunications Facilities This equipment is suitable for installation in network telecommunications facilities. |
![]() Note | Statement 8016—Installation Location Where the National Electric Code (NEC) Applies This equipment is suitable for installation in locations where the NEC applies. |
![]() Note | These Cisco UCS servers are designed to boot up within 30 minutes provided the neighboring devices are fully operational. |
Rack Requirements
The rack must be of the following type:
-
A standard 19-in. (48.3-cm) wide, four-post EIA rack, with mounting posts that conform to English universal hole spacing, per section 1 of ANSI/EIA-310-D-1992.
-
The rack-post holes can be square 0.38-inch (9.6 mm), round 0.28-inch (7.1 mm), #12-24 UNC, or #10-32 UNC when you use the Cisco-supplied slide rails.
-
The minimum vertical rack space per server must be one rack unit (RU), equal to 1.75 in. (44.45 mm).
Supported Cisco Slide Rail Kits
The server supports the following rail kit options:
-
Cisco part UCSC-RAIL-M6= (ball-bearing slide rail kit for UCS C220 and C240 M6 rack servers)
-
Cisco part UCSC-CMA-C220M6= (reversible cable management arm for UCS C220 M6 ball-bearing slide rail kit)
Rack Installation Tools Required
The slide rails sold by Cisco Systems for this server do not require tools for installation.
Slide Rail and Cable Management Arm Dimensions
The slide rails for this server have an adjustment range of 24 to 36 inches (610 to 914 mm).
The optional cable management arm (CMA) adds additional length requirements:
-
The additional distance from the rear of the server to the rear of the CMA is 5.4 inches (137.4 mm).
-
The total length of the server including the CMA is 35.2 inches (894 mm).
Front Bezel
An optional locking front bezel (UCSC-BZL-C220M5) is available to provide additional security by preventing unauthorized access to the front-loading SFF drives. The same bezel is used for both M5 and M6 versions of the UCS C220 server.
Installing the Server in a Rack
This section describes how to install the server in a rack using the supported rail kit (UCSC-RAIL-M6) that is sold by Cisco.
![]() Warning | To prevent bodily injury when mounting or servicing this unit in a rack, you must take special precautions to ensure that the system remains stable. The following guidelines are provided to ensure your safety: This unit should be mounted at the bottom of the rack if it is the only unit in the rack. When mounting this unit in a partially filled rack, load the rack from the bottom to the top with the heaviest component at the bottom of the rack. If the rack is provided with stabilizing devices, install the stabilizers before mounting or servicing the unit in the rack. Statement 1006 |
Procedure
Step1 | Attach the inner rails to the sides of the server:
![]()
| ||||||||||
Step2 | Open the front securing plate on both slide-rail assemblies. The front end of the slide-rail assembly has a spring-loaded securing plate that must be open before you can insert the mounting pegs into the rack-post holes. On the outside of the assembly, push the green-arrow button toward the rear to open the securing plate. ![]()
| ||||||||||
Step3 | Install the outer slide rails into the rack:
| ||||||||||
Step4 | Insert the server into the slide rails:
![]()
| ||||||||||
Step5 | To comply with GR-63-CORE Seismic requirements, you (the end user) must secure the server in the rack more permanently by using the two screws that are provided with the slide rails. With the server fully pushed into the slide rails, open a hinged slam latch lever on the front of the server and insert a screw through the hole that is under the lever. The screw threads into the static part of the rail on the rack post and prevents the server from being pulled out. Repeat for the opposite slam latch. | ||||||||||
Step6 | (Optional) If applicable, do the following:
|
Installing the Cable Management Arm (Optional)
![]() Note | |
Procedure
Step1 | With the server pushed fully into the rack, slide the CMA tab of the CMA arm that is farthest from the server onto the end of the stationary slide rail that is attached to the rack post. Slide the tab over the end of the rail until it clicks and locks. ![]()
| ||||||||
Step2 | Slide the CMA tab that is closest to the server over the end of the inner rail that is attached to the server. Slide the tab over the end of the rail until it clicks and locks | ||||||||
Step3 | Pull out the width-adjustment slider that is at the opposite end of the CMA assembly until it matches the width of your rack. | ||||||||
Step4 | Slide the CMA tab that is at the end of the width-adjustment slider onto the end of the stationary slide rail that is attached to the rack post. Slide the tab over the end of the rail until it clicks and locks. | ||||||||
Step5 | Open the hinged flap at the top of each plastic cable guide and route your cables through the cable guides as desired. |
Reversing the Cable Management Arm (Optional)
Procedure
Step1 | Rotate the entire CMA assembly 180 degrees, left-to-right. The plastic cable guides must remain pointing upward. | ||||
Step2 | Flip the tabs at the ends of the CMA arms so that they point toward the rear of the server. | ||||
Step3 | Pivot the tab that is at the end of the width-adjustment slider. Depress and hold the metal button on the outside of the tab and pivot the tab 180 degrees so that it points toward the rear of the server. ![]()
|
Initial Server Setup
![]() Note | |
Server Default Settings
The server is shipped with these default settings:
-
The NIC mode is Shared LOM EXT.
Shared LOM EXT mode enables the 1-Gb/10-Gb Ethernet ports and the ports on any installed Cisco virtual interface card (VIC) to access the Cisco Integrated Management Interface (Cisco IMC). If you want to use the 10/100/1000 dedicated management ports to access Cisco IMC, you can connect to the server and change the NIC mode as described in Setting Up the System With the Cisco IMC Configuration Utility.
-
The NIC redundancy is Active-Active. All Ethernet ports are utilized simultaneously.
-
DHCP is enabled.
-
IPv4 is enabled.
Connection Methods
There are two methods for connecting to the system for initial setup:
-
Local setup—Use this procedure if you want to connect a keyboard and monitor directly to the system for setup. This procedure can use a KVM cable (Cisco PID N20-BKVM) or the ports on the rear of the server.
-
Remote setup—Use this procedure if you want to perform setup through your dedicated management LAN.
Note
To configure the system remotely, you must have a DHCP server on the same network as the system. Your DHCP server must be preconfigured with the range of MAC addresses for this server node. The MAC address is printed on a label that is on the pull-out asset tag on the front panel. This server node has a range of six MAC addresses assigned to the Cisco IMC. The MAC address printed on the label is the beginning of the range of six contiguous MAC addresses.
This section contains the following topics:
Connecting to the Server Locally For Setup
This procedure requires the following equipment:
-
VGA monitor
-
USB keyboard
-
Either the supported Cisco KVM cable (Cisco PID N20-BKVM); or a USB cable and VGA DB-15 cable
Procedure
Step1 | Attach a power cord to each power supply in your server, and then attach each power cord to a grounded power outlet. Wait for approximately two minutes to let the server boot to standby power during the first bootup. You can verify system power status by looking at the system Power Status LED on the front panel. The system is in standby power mode when the LED is amber. | ||
Step2 | Connect a USB keyboard and VGA monitor to the server using one of the following methods:
| ||
Step3 | Open the Cisco IMC Configuration Utility:
| ||
Step4 | Continue with Setting Up the System With the Cisco IMC Configuration Utility. |
Connecting to the Server Remotely For Setup
This procedure requires the following equipment:
-
One RJ-45 Ethernet cable that is connected to your management LAN.
Before you begin
![]() Note | |
Procedure
Step1 | Attach a power cord to each power supply in your server, and then attach each power cord to a grounded power outlet. Wait for approximately two minutes to let the server boot to standby power during the first bootup. You can verify system power status by looking at the system Power Status LED on the front panel. The system is in standby power mode when the LED is amber. | ||
Step2 | Plug your management Ethernet cable into the dedicated management port on the rear panel. | ||
Step3 | Allow your preconfigured DHCP server to assign an IP address to the server node. | ||
Step4 | Use the assigned IP address to access and log in to the Cisco IMC for the server node. Consult with your DHCP server administrator to determine the IP address.
| ||
Step5 | From the Cisco IMC Server Summary page, click Launch KVM Console. A separate KVM console window opens. | ||
Step6 | From the Cisco IMC Summary page, click Power Cycle Server. The system reboots. | ||
Step7 | Select the KVM console window.
| ||
Step8 | When prompted, press F8 to enter the Cisco IMC Configuration Utility. This utility opens in the KVM console window.
The following are the requirements for Strong Password:
| ||
Step9 | Continue with Setting Up the System With the Cisco IMC Configuration Utility. |
Setting Up the System With the Cisco IMC Configuration Utility
Before you begin
The following procedure is performed after you connect to the system and open the Cisco IMC Configuration Utility.
Procedure
Step1 | Set the NIC mode to choose which ports to use to access Cisco IMC for server management:
| ||
Step2 | Set the NIC redundancy to your preference. This server has three possible NIC redundancy settings:
| ||
Step3 | Choose whether to enable DHCP for dynamic network settings, or to enter static network settings.
The static IPv4 and IPv6 settings include the following:
| ||
Step4 | (Optional) Make VLAN settings. | ||
Step5 | Press F1 to go to the second settings window, then continue with the next step. From the second window, you can press F2 to switch back to the first window. | ||
Step6 | (Optional) Set a hostname for the server. | ||
Step7 | (Optional) Enable dynamic DNS and set a dynamic DNS (DDNS) domain. | ||
Step8 | (Optional) If you check the Factory Default check box, the server reverts to the factory defaults. | ||
Step9 | (Optional) Set a default user password.
| ||
Step10 | (Optional) Enable auto-negotiation of port settings or set the port speed and duplex mode manually.
| ||
Step11 | (Optional) Reset port profiles and the port name. | ||
Step12 | Press F5 to refresh the settings that you made. You might have to wait about 45 seconds until the new settings appear and the message, “Network settings configured” is displayed before you reboot the server in the next step. | ||
Step13 | Press F10 to save your settings and reboot the server.
|
What to do next
![]() Note | |
To manage the server, see the Cisco UCS C-Series Rack-Mount Server Configuration Guide or the Cisco UCS C-Series Rack-Mount Server CLI Configuration Guide for instructions on using those interfaces for your Cisco IMC release. The links to the configuration guides are in the Cisco UCS C-Series Documentation Roadmap.
NIC Mode and NIC Redundancy Settings
NIC Mode | Valid NIC Redundancy Settings |
Shared LOM EXT | Active-active |
Dedicated | None |
Shared LOM | Active-active Active-standby |
Cisco Card | Active-active Active-standby |
This server has the following NIC mode settings that you can choose from:
-
Shared LOM EXT (default)—This is the shared LOM extended mode, the factory-default setting. With this mode, the Shared LOM and Cisco Card interfaces are both enabled. You must select the default Active-Active NIC redundancy setting in the following step.
In this NIC mode, DHCP replies are returned to both the shared LOM ports and the Cisco card ports. If the system determines that the Cisco card connection is not getting its IP address from a Cisco UCS Manager system because the server is in standalone mode, further DHCP requests from the Cisco card are disabled. Use the Cisco Card NIC mode if you want to connect to Cisco IMC through a Cisco card in standalone mode.
-
Shared LOM—The 1-Gb/10-Gb Ethernet ports are used to access Cisco IMC. You must select either the Active-Active or Active-standby NIC redundancy setting in the following step.
-
Dedicated—The dedicated management port is used to access Cisco IMC. You must select the None NIC redundancy setting in the following step.
-
Cisco Card—The ports on an installed Cisco UCS Virtual Interface Card (VIC) are used to access the Cisco IMC. You must select either the Active-Active or Active-standby NIC redundancy setting in the following step.
See also the required VIC Slot setting below.
-
VIC Slot—Only if you use the Cisco Card NIC mode, you must select this setting to match where your VIC is installed. The choices are Riser1, Riser2, or Flex-LOM (the mLOM slot).
-
If you select Riser1, you must install the VIC in slot 1.
-
If you select Riser2, you must install the VIC in slot 2.
-
If you select Flex-LOM, you must install an mLOM-style VIC in the mLOM slot.
-
This server has the following NIC redundancy settings that you can choose from:
-
None—The Ethernet ports operate independently and do not fail over if there is a problem. This setting can be used only with the Dedicated NIC mode.
-
Active-standby—If an active Ethernet port fails, traffic fails over to a standby port. Shared LOM and Cisco Card modes can each use either Active-standby or Active-active settings.
-
Active-active (default)—All Ethernet ports are utilized simultaneously. The Shared LOM EXT mode must use only this NIC redundancy setting. Shared LOM and Cisco Card modes can each use either Active-standby or Active-active settings.
Updating the BIOS and Cisco IMC Firmware
![]() Caution | When you upgrade the BIOS firmware, you must also upgrade the Cisco IMC firmware to the same version, or the server does not boot. Do not power off the server until the BIOS and Cisco IMC firmware are matching or the server does not boot. Cisco provides the Cisco Host Upgrade Utility to assist with simultaneously upgrading the BIOS, Cisco IMC, and other firmware to compatible levels. |
The server uses firmware obtained from and certified by Cisco. Cisco provides release notes with each firmware image. There are several possible methods for updating the firmware:
-
Recommended method for firmware update: Use the Cisco Host Upgrade Utility to simultaneously upgrade the Cisco IMC, BIOS, and component firmware to compatible levels.
See the Cisco Host Upgrade Utility Quick Reference Guide for your firmware release at the documentation roadmap link below.
-
You can upgrade the Cisco IMC and BIOS firmware by using the Cisco IMC GUI interface.
See the Cisco UCS C-Series Rack-Mount Server Configuration Guide.
-
You can upgrade the Cisco IMC and BIOS firmware by using the Cisco IMC CLI interface.
See the Cisco UCS C-Series Rack-Mount Server CLI Configuration Guide.
For links to the documents listed above, see the Cisco UCS C-Series Documentation Roadmap.
Accessing the System BIOS
Procedure
Step1 | Enter the BIOS Setup Utility by pressing the F2 key when prompted during bootup.
| ||
Step2 | Use the arrow keys to select the BIOS menu page. | ||
Step3 | Highlight the field to be modified by using the arrow keys. | ||
Step4 | Press Enter to select the field that you want to change, and then modify the value in the field. | ||
Step5 | Press the right arrow key until the Exit menu screen is displayed. | ||
Step6 | Follow the instructions on the Exit menu screen to save your changes and exit the setup utility (or press F10). You can exit without saving changes by pressing Esc. |
Smart Access Serial
This server supports the Smart Access Serial feature. This feature allows you to switch between host serial and Cisco IMC CLI.
-
This feature has the following requirements:
-
A serial cable connection, which can use either the RJ-45 serial connector on the server rear panel, or a DB-9 connection when using the KVM cable (Cisco PID N20-BKVM) on the front-panel KVM console connector.
-
Console redirection must be enabled in the server BIOS.
-
Terminal type must be set to VT100+ or VTUFT8.
-
Serial-over-LAN (SOL) must be disabled (SOL is disabled by default).
-
-
To switch from host serial to Cisco IMC CLI, press Esc+9.
You must enter your Cisco IMC credentials to authenticate the connection.
-
To switch from Cisco IMC CLI to host serial, press Esc+8.
Note
You cannot switch to Cisco IMC CLI if the serial-over-LAN (SOL) feature is enabled.
-
After a session is created, it is shown in the CLI or web GUI by the name
serial
.
Smart Access USB
This server supports the Smart Access USB feature. The board management controller (BMC) in this server can accept a USB mass storage device and access the data on it. This feature allows you to use the front-panel USB device as a medium to transfer data between the BMC and the user without need for network connectivity. This can be useful, for example, when remote BMC interfaces are not yet available, or are not accessible due to network misconfiguration.
-
This feature has the following requirements:
-
The KVM cable (Cisco PID N20-BKVM) connected to the front panel KVM console connector.
-
A USB storage device connected to one of the USB 2.0 connectors on the KVM cable. The USB device must draw less than 500 mA to avoid disconnect by the current-protection circuit.
Note
Any mouse or keyboard that is connected to the KVM cable is disconnected when you enable Smart Access USB.
-
You can use USB 3.0-based devices, but they will operate at USB 2.0 speed.
-
We recommend that the USB device have only one partition.
-
The file system formats supported are: FAT16, FAT32, MSDOS, EXT2, EXT3, and EXT4. NTFS is not supported.
-
-
The front-panel KVM connector has been designed to switch the USB port between Host OS and BMC.
-
Smart Access USB can be enabled or disabled using any of the BMC user interfaces. For example, you can use the Cisco IMC Configuration Utility that is accessed by pressing F8 when prompted during bootup.
-
Enabled: the front-panel USB device is connected to the BMC.
-
Disabled: the front-panel USB device is connected to the host.
-
-
In a case where no management network is available to connect remotely to Cisco IMC, a Device Firmware Update (DFU) shell over serial cable can be used to generate and download technical support files to the USB device that is attached to front panel USB port.