System Access Configuration
Host System Requirements
Feature Name |
Release Information |
Description |
---|---|---|
HugePage memory and CPU allocation |
NFVIS Release 4.2.1 |
The system memory allocations are enhanced and all memory apart from the amount reserved for system is converted to HugePage memory. The VMs are deployed using hugepage memory even when DPDK is enabled on the system. |
NFVIS resource allocation enhancement |
NFVIS Release 4.10.1 |
The system memory allocations are updated. |
The following resources are required for a standalone Cisco Enterprise NFVIS:
Total Cores |
Before NFVIS 3.12.x Release |
NFVIS 3.12.x till NFVIS 4.9.x |
NFVIS 4.10.x and later Releases |
---|---|---|---|
12 or less |
1 |
1 + (1 core per socket applicable to DPDK systems) |
1 + (1 core per socket applicable to DPDK systems) |
Between 12 and 16 (including 16) |
2 |
1 + (1 core per socket applicable to DPDK systems) |
1 + (1 core per socket applicable to DPDK systems) + (1 if Multi-NUMA node system*) |
More than 16 |
4 |
2 + (1 core per socket applicable to DPDK systems) |
2 + (1 core per socket applicable to DPDK systems) + (1 if Multi-NUMA node system*) |
* Indicates that Multi-NUMA node systems require an additional CPU core system reserved. This additional core is helpful in processing the cross NUMA nodes, indirectly improving the performance of Cisco NFVIS functions on the system cores. |
Note |
|
Reserved System Memory |
Up to 16 GB |
Up to 32 GB |
Up to 64 GB |
Up to 128 GB |
Greater than 128 GB |
---|---|---|---|---|---|
Reserved for NFVIS 3.12.x and earlier releases |
3 GB |
3 GB |
4 GB |
4 GB |
4 GB |
Reserved for NFVIS 3.12.x and 4.1.x releases |
3 GB |
3 GB |
4 GB |
8 GB |
8 GB |
Reserved for NFVIS 4.2.1 release |
3 GB |
3 GB |
4 GB |
8 GB |
16 GB |
Reserved for NFVIS 4.2.2 till NFVIS 4.8.1 |
3 GB |
4 GB |
4 GB |
8 GB |
16 GB |
Reserved for NFVIS 4.9.1 |
3 GB |
4 GB |
4 GB |
8 GB/ 10 GB* |
16 GB/ 20 GB* |
Reserved for NFVIS 4.10.1 and later releases |
5 GB/ 6 GB* |
5 GB/ 6 GB* |
5 GB/ 6 GB* |
8 GB/ 10 GB* |
16 GB/ 20 GB* |
* Indicates the memory allocation is applicable only for Multi-NUMA node systems. In case of single node systems, the memory allocation values without * is applicable. |
Note |
|
Total System Memory |
Additional memory required for DPDK support per NUMA node |
---|---|
Upto 63 GB |
1 |
64 GB - 127 GB |
2 |
128 GB - 256 GB |
4 |
Starting from NFVIS 4.2 release, all memory apart from the amount reserved for system is converted to HugePage memory. The system memory is allocated on socket 0 on system with multiple CPU sockets.
Note |
When you use Cisco Catalyst Edge uCPE 8300 for high throughput requirements, we recommend that you use NVME based storages (M.2 NVME or U.2 NVME) or E1.S based. |
Note |
The additional memory required for DPDK support is counted per NUMA node available on the system. |
System Setting Hostname
You must adhere to the following rules for hostname on NFVIS:
-
Must contain minimum length of 2 and maximum length of 255.
-
Must begin with a letter or digit and can contain alphabets, numbers and hyphen.
-
Must not be deleted.
-
The hostname range is from 1 to 58. The hostname range must contain a letter or a digit, it may contain alphabets, numbers, and hyphens.
Dual WAN Support
Dual WAN support provides multiple links to NFVIS connectivity. Starting from NFVIS 3.10.1 release, a second WAN bridge configured with DHCP by default is supported on ENCS 5000 series platform.
During NFVIS system initialization, NFVIS attempts to establish connectivity through DHCP on both WAN bridges. This allows connectivity to NFVIS during initial deployment even if the network is down on one of the WAN bridges. Once DHCP assigns an IP address through one WAN bridge, the other WAN bridge can be configured with static IP address for connectivity to NFVIS.
Restrictions for Dual WAN Support
-
The DHCP toggle behavior is not supported during the upgrade flow. It is only triggered during fresh installation of NFVIS or after a factory default reset.
-
Active/standby or redundant WAN bridges are not supported. NFVIS does not detect connectivity failure from one WAN bridge and switchover to another WAN bridge. In case connectivity fails on the WAN bridge with DHCP configurations, connectivity through the other WAN bridge is established only if static IP is applied to the second WAN bridge and static routing is configured for connectivity through that bridge.
-
IPv6 is not supported for dual WAN toggle.
-
If wan2-br is DHCP enabled WAN bridge, you must remove DHCP from wan2-br to apply default gateway from static IP configurations.
Dual WAN Bridge and DHCP Toggle
Note |
This feature is supported only on ENCS 5000 series devices. |
In zero touch deployment, NFVIS requests for IPv4 assignments through DHCP for two WAN interfaces. During system initialization a second WAN bridge is configured with GE0-1 port attached. NFVIS toggles between the two default WAN bridges sending DHCP requests on any one of the WAN bridges at a time, for 30 second intervals. The toggling stops as soon as one WAN bridge is assigned an IP address through DHCP. The bridge with the assigned IP address is configured with DHCP. The other WAN bridge has no default IP configuration and can be manually configured with a static IP address if required.
If neither of the bridges is assigned an IP address through DHCP, the WAN DHCP toggle can be terminated by logging in to NFVIS using the default credentials. In this case, wan-br is configured with DHCP and wan2-br has no default IP configuration.
After zero touch deployment, the toggle feature is terminated and it is not possible to toggle between WAN bridges. To add additional connectivity to the NFVIS host, static IP address can be configured on the other WAN bridge and system static routing can be applied. A default gateway is not supported as the system default gateway is set through DHCP. If DHCP configuration is not required, then both WAN bridges can be configured with static IP addresses, and a default gateway can then be applied under system settings.
Accessing NFVIS
For initial login, use admin as the default user name, and Admin123# as the default password. Immediately after the initial login, the system prompts you to change the default password. You must set a strong password as per the on-screen instructions to proceed with the application. All other operations are blocked until default password is changed. API returns 401 unauthorized error if the default password is not reset.
If wan-br or wan2-br have not obtained IP addresses through DHCP, the zero touch deployment is terminated. To manually apply the IP configurations answer 'y' and the system proceeds with DHCP assignment on wan-br until the configurations are changed. For DHCP assignment to continue to request IP address for PnP flow on both WAN interfaces answer 'n'.
You must adhere to the following rules to create a strong password:
-
Must contain at least one upper case and one lower case letter.
-
Must contain at least one number and one special character (# _ - * ?).
-
Must contain seven characters or greater. Length should be between 7 and 128 characters.
You can change the default password in three ways:
-
Using the Cisco Enterprise NFVIS portal.
-
Using the CLI (When you first log into Cisco Enterprise NFVIS through SSH, the system will prompt you to change the password).
-
Using PnP (for details, see the Cisco Network Plug-n-Play Support).
-
Using console (After the initial login using the default password, you are prompted to change the default password).
NFVIS Version: 3.10.0-9 Copyright (c) 2015-2018 by Cisco Systems, Inc. Cisco, Cisco Systems, and Cisco Systems logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. The copyrights to certain works contained in this software are owned by other third parties and used and distributed under third party license agreements. Certain components of this software are licensed under the GNU GPL 2.0, GPL 3.0, LGPL 2.1, LGPL 3.0 and AGPL 3.0. nfvis login: console (automatic login) login: login: login: login: login: admin Cisco Network Function Virtualization Infrastructure Software (NFVIS) NFVIS Version: 3.10.0-9 Copyright (c) 2015-2018 by Cisco Systems, Inc. Cisco, Cisco Systems, and Cisco Systems logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. The copyrights to certain works contained in this software are owned by other third parties and used and distributed under third party license agreements. Certain components of this software are licensed under the GNU GPL 2.0, GPL 3.0, LGPL 2.1, LGPL 3.0 and AGPL 3.0. admin@localhost's password: admin connected from ::1 using ssh on nfvis nfvis# show version
NFVIS Version: 3.12.3 Copyright (c) 2015-2020 by Cisco Systems, Inc. Cisco, Cisco Systems, and Cisco Systems logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. The copyrights to certain works contained in this software are owned by other third parties and used and distributed under third party license agreements. Certain components of this software are licensed under the GNU GPL 2.0, GPL 3.0, LGPL 2.1, LGPL 3.0 and AGPL 3.0. login: admin NFVIS service is OK Warning: Permanently added 'localhost' (RSA) to the list of known hosts. admin@localhost's password: Cisco Network Function Virtualization Infrastructure Software (NFVIS) NFVIS Version: 3.12.3-RC8 Copyright (c) 2015-2020 by Cisco Systems, Inc. Cisco, Cisco Systems, and Cisco Systems logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. The copyrights to certain works contained in this software are owned by other third parties and used and distributed under third party license agreements. Certain components of this software are licensed under the GNU GPL 2.0, GPL 3.0, LGPL 2.1, LGPL 3.0 and AGPL 3.0. admin connected from ::1 using ssh on nfvis admin logged with default credentials Setting admin password will disable zero touch deployment behaviors. Do you wish to proceed? [y or n]y Please provide a password which satisfies the following criteria: 1.At least one lowercase character 2.At least one uppercase character 3.At least one number 4.At least one special character from # _ - * ? 5.Length should be between 7 and 128 characters Please reset the password : Please reenter the password : Resetting admin password New admin password is set nfvis# System message at 2020-01-08 03:10:10... Commit performed by system via system using system. nfvis#
Note |
To commit the target configuration to the active (running) configuration, use the commit command in any configuration mode. Changes made during a configuration session are inactive until the commit command is entered. By default, the commit operation is pseudo-atomic, meaning that all changes must succeed for the entire commit operation to succeed. |
Connect to the System
Using IPv4
The three interfaces that connect the user to the system are the WAN and WAN2 interfaces and the management interface. By default, the WAN interface has DHCP configuration and the management interface is configured with a static IP address of 192.168.1.1. If the system has a DHCP server connected to the WAN interface, the WAN interface is assigned an IP address from this server. You can use this IP address to connect to the system.
You can connect to the server locally (with an Ethernet cable) using the static management IP address. However, to be able to use a static IP address to remotely connect to a server, the default gateway needs to be configured first.
You can connect to the system in the following ways:
-
Using the local portal—After the initial login, you are prompted to change the default password.
-
Using the KVM console—After the initial login using the default password, you are prompted to change the default password.
-
Using PnP—After the initial provisioning through PnP, the configuration file pushed by the PNP server must include the new password for the default user (admin).
Using IPv6
IPv6 can be configured in static, DHCP stateful and Stateless Autoconfiguration (SLAAC) mode. By default, DHCP IPv6 stateful is configured on the WAN interface. If DHCP stateful is not enabled on the network, the router advertisement (RA) flag decides which state the network stays in. If the RA shows the Managed (M) flag, then the network stays in DHCP mode, even if there is no DHCP server in the network. If the RA shows the Other (O) flag, then the network switches from DHCP server to SLAAC mode.
SLAAC provides IPv6 address and default gateway. Stateless DHCP is enabled in the SLAAC mode. If the server has DNS and domain configured, then SLAAC also provides those values via stateless DHCP.
Perform Static Configuration without DHCP
Note |
Starting from NFVIS 3.10.1 release, for ENCS 5400 and ENCS 5100, wan2-br obtains an IP address from DHCP. To configure default gateway, first use the no bridges bridge wan2-br dhcp command. |
If you want to disable DHCP and use static configuration, you need to perform the initial configuration by setting the WAN IP address and/or management IP address, and the default gateway. You can also configure a static IP on a created bridge.
To perform initial configuration on the system without using DHCP:
configure terminal
system settings mgmt ip address 192.168.1.2 255.255.255.0
bridges bridge wan-br ip address 209.165.201.22 255.255.255.0
system settings default-gw 209.165.201.1
commit
Note |
When an interface is configured with a static IP address, DHCP is automatically disabled on that interface. |
Now you can either use the management IP or WAN IP to access the portal.
To configure static IPv6 on the WAN interface:
configure terminal
system settings mgmt ipv6 address 2001:DB8:1:1::72/64
bridges bridge wan-br ipv6 address 2001:DB8:1:1::75/64
system settings default-gw-ipv6 2001:DB8:1:1::76
commit
Note |
When an interface is configured with a static IPv6 address, DHCP IPv6 is automatically disabled on that interface. There are three options for IPv6 - static, DHCP and SLAAC, out of which only one can be enabled at a time. Secure overlay is not supported when WAN interface is configured with IPv6. |
To configure DHCP on the WAN interface:
configure terminal
no system settings default-gw
system settings wan dhcp
commit
exit
hostaction wan-dhcp-renew
Note |
Starting from NFVIS 3.10.1, you can configure DHCP IPv6 on any bridge. You can only have one DHCP IPv6 bridge or management interface active at a time. You cannot have DHCP IPv6 and default IPv6 gateway or SLAAC IPv6 configured at the same time. |
To configure DHCP IPv6 on the WAN interface:
configure terminal
no system settings default-gw-ipv6
system settings wan dhcp-ipv6
commit
exit
hostaction wan-dhcp-renew
Verify Initial Configuration
Use the show system settings-native command to verify initial configuration. Use show bridge-settings and show bridge-settings bridge_name commands to verify the configuration for any bridge on the system.
Here is an extract from the output of the show system settings-native command when both WAN and management interfaces have a static configuration:
system settings-native mgmt ip-info interface lan-br
system settings-native mgmt ip-info ipv4_address 192.168.1.2
system settings-native mgmt ip-info netmask 255.255.255.0
!
!
!
system settings-native mgmt dhcp disabled
system settings-native wan ip-info interface wan-br
system settings-native wan ip-info ipv4_address 209.165.201.22
system settings-native wan ip-info netmask 255.255.255.0
!
!
!
system settings-native wan dhcp disabled
!
!
system settings-native gateway ipv4_address 209.165.201.1
system settings-native gateway interface wan-br
Here is an extract from the output of the show system settings-native command when the management interface has a DHCP configuration and the WAN interface has a static configuration:
system settings-native mgmt ip-info interface MGMT
system settings-native mgmt ip-info ipv4_address 192.168.1.2
system settings-native mgmt ip-info netmask 255.255.255.0
!
!
!
system settings-native mgmt dhcp enabled
system settings-native wan ip-info interface wan-br
system settings-native wan ip-info ipv4_address 209.165.201.22
system settings-native wan ip-info netmask 255.255.255.0
!
!
!
system settings-native wan dhcp disabled
Here is an extract from the output of the show system settings-native command when the WAN interface has a DHCP configuration and the management interface has a static configuration:
system settings-native mgmt ip-info interface lan-br
system settings-native mgmt ip-info ipv4_address 209.165.201.2
system settings-native mgmt ip-info netmask 255.255.255.0
!
!
!
system settings-native mgmt dhcp disabled
system settings-native wan ip-info interface wan-br
system settings-native wan ip-info ipv4_address 209.165.201.22
system settings-native wan ip-info netmask 255.255.255.0
!
!
!
system settings-native wan dhcp enabled
Configuring VLAN for NFVIS Management Traffic
A VLAN creates independent logical networks within a physical network. VLAN tagging is the practice of inserting a VLAN ID into a packet header in order to identify which VLAN the packet belongs to.
You can configure a VLAN tag on the WAN bridge (wan-br) interface to isolate Cisco Enterprise NFVIS management traffic from VM traffic. You can also configure VLAN on any bridge on the system (wan2-br for ENCS5400 or ENCS 5100, and user-br for all systems)
By default, WAN bridges and LAN bridges are in trunk mode and allows all VLANs. When you configure native VLAN, you must also configure all the allowed VLANs at the same time. The native VLAN becomes the only allowed VLAN if you do not configure all the VLANs. If you want a network that allows only one VLAN, then create another network on top of wan-net and lan-net and make it access network.
Note |
You cannot have the same VLAN configured for the NFVIS management and VM traffc. |
For more details on the VLAN configuration, see the Understanding and Configuring VLANs module in the Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide.
Configuring the IP Receive ACL
To filter out unwanted traffic, you can configure ip-receive-acl to block or allow certain traffic based on the IP address and service ports.
To configure the source network for Access Control List (ACL) access:
configure terminal
system settings ip-receive-acl 198.0.2.0/24
action accept priority 10
commit
Verifying the Trusted IP Connection
Use the show running-config system settings ip-receive-acl command to display the configured source network for ACL access to the management interface
nfvis# show running-config system settings ip-receive-acl
system settings ip-receive-acl 198.51.100.11/24
service
[ ssh https scpd]
action accept
priority 100
Port 22222 and Management Interface ACL
Port 22222 is used for SCP server and is closed by default on an NFVIS system. You cannot SCP a file into NFVIS from an external server. If you need to SCP file from an external server, you must first open the port.
To open port 22222:
config terminal
system settings ip-receive-acl address/mask_len service scpd priority 2 action accept
commit
The Access Control List (ACL) is identify by address. If this ACL is removed, all ACLs sharing the same address are also removed. Ensure that you configure the ACLs that share the same address once again.
Note |
From 3.8.1 release, only users with administrator priviledges can use the SCP command on port 22222 to upload or download only from restricted folders like /data/intdatastore/. For more information, see Host System Operations. |
Caution |
SCP command cannot be used to copy files from one NFVIS device to another NFVIS device. |
Use the show running-config system settings ip-receive-acl command to verify the interface configuration:
nfvis# show running-config system settings ip-receive-acl
system settings ip-receive-acl 10.156.0.0/16
service [ ssh https scpd ]
action accept
priority 100
!
Configuring Secondary IP Address and Source Interface
Secondary IP Address
The Cisco Enterprise NFVIS supports multiple IP addresses per interface. You can configure a secondary IP address on the WAN interface, as an additional IP address to reach the software. Set the external routes for secondary IP address to reach the NFVIS. Routers configured with secondary addresses can route between the different subnets attached to the same physical interface.
To access secondary IP address through ISRv, the WAN physical port is removed from wan-br similar to single IP address.
To configure Secondary IP Address:
nfvis(config)# system settings wan secondary ip address 1.1.2.3 255.255.255.0
Source Interface
The Source Interface feature lets you assign an IP address to a source interface.. The IP address configured is used for packets generated by the NFVIS. The packets generated use the default route.
Prerequisites for configuring Source Interface
-
The IP address must be one of the IP addresses configured in system settings.
-
The source interface IP address can be one of the following:
-
mgmt
-
WAN
-
WAN Secondary IP
-
WAN2 IP or IP configured on any bridge
-
-
Source-interface configuration must be applied if the WAN IP is static.
-
For DHCP, source interface IP address is accepted but cannot be applied. The configuration takes effect once you switch from DHCP to static.
To configure source Interface:
nfvis(config)# system settings source-interface
1.1.2.3
The secondary IP address and source interface related errors are logged in show log nfvis_config.log file.
Secondary IP Address and Source Interface APIs and Commands
APIs |
Commands |
---|---|
|
|
|
|
CIMC Access Control
NFVIS administrators have authoritative control control over ENCS 5400 devices. This includes capability to change the IP address used to reach the CIMC and modifying the CIMC and BIOS passwords.
CIMC Access using NFVIS
Note |
CIMC access using NFVIS is supported only on ENCS 5400. When CIMC access is enabled on NFVIS, ISRv can gain access to the host CIMC and internal switch management console. You must have authorization from Cisco Interactive Debug (CID) to access both consoles. |
To access CIMC using NFVIS WAN or management interface IP address, use the system settings cimc-access enable command. Once you configure CIMC access on NFVIS, the stand alone CIMC access using CIMC IP address is disabled and you will be able to access CIMC using NFVIS management interface IP address. The configurations remain on the device even after the device reboot.
When the CIMC access is configured, it enables a few ports to access services like SSH, SNMP, HTTP and HTTPs into the CIMC.
The following port numbers are being used for forwarding services to CIMC:
-
20226 for SNMP
-
20227 for SSH
-
20228 for HTTP
-
20229 for HTTPS
If you are unable to access CIMC using NFVIS, check the show log nfvis_config.log file.
Use system settings cimc-access disable to disable this feature.
BIOS-CIMC Update
For releases 3.8.1 and later, if the BIOS or CIMC versions on Cisco ENCS 5400 routers are lower than the image version in the NFVIS ISO or upgrade package, the BIOS and CIMC versions on the routers are automatically upgraded to the version of the bundled image during NFVIS upgrade or installation. The CPU microcode is also upgraded as part of this upgrade or installation. Note that the upgrade process takes longer than in previous releases and the process cannot be stopped midway.
For Cisco ENCS 5100 routers, BIOS is automatically upgraded to the new version, but the server needs to be rebooted manually for the upgrade to show.
BIOS and CIMC Password
Feature Name |
Release Information |
Description |
---|---|---|
BIOS and CIMC password |
NFVIS 4.2.1 |
New password restrictions and security measures are added for CIMC and BIOS. |
To change the BIOS and CIMC password for ENCS 5400, use hostaction change-bios-password newpassword or hostaction change-cimc-password newpassword commands. The change in the password will take effect immediately after the commands are executed.
Note |
New password restrictions added for CIMC and BIOS in NFVIS 4.2.1 release. |
You must adhere to the following rules to create a strong password for CIMC:
-
Must contain at least one upper case and one lower case letter.
-
Must contain at least one number and one special character from #, @ or _.
-
Length should be between 8 and 20 characters.
-
Should not contain the following string (case sensitive): admin
You must adhere to the following rules to create a strong password for BIOS:
-
The first letter cannot be #.
-
Must contain at least one upper case and one lower case letter.
-
Must contain at least one number and one special character from #, @ or _.
-
Length should be between 8 and 20 characters.
-
Should not contain the following string (case sensitive): bios
Starting from BIOS version 2.11 and CIMC 3.2.10, the new BIOS password security measures are:
-
BIOS password can only be set through CIMC XML API or NFVIS. It can no longer be configured in the BIOS setup menu.
-
BIOS password is retained after BIOS updates and it does not have to be reconfigured after a BIOS update.
-
Only an admin password can be set and user-level BIOS password can no longer be set.
BIOS and CIMC Password APIs and Commands
BIOS and CIMC Password APIs |
BIOS and CIMC Password Commands |
---|---|
|
|
UEFI Secure Boot on ENCS 5400
The Unified Extensible Firmware Interface (UEFI) Secure Boot mode ensures that all EFI drivers and applications, ROMs or operating systems are signed and verified for authenticity and integrity before they are loaded and executed. This feature can be enabled through the GUI or CLI. When you enable UEFI secure boot mode, the boot mode is set to UEFI mode and you cannot modify the configured boot mode until the UEFI boot mode is disabled.
Note |
If you enable UEFI secure boot on an unsupported OS, on the next reboot, you cannot boot the device from that particular OS when you try to reboot the next time. If you try to reboot from such unsupported OS, an error is reported and recorded under System Software Events in the GUI. You must disable the UEFI secure boot option using Cisco IMC to be able to boot from the OS that does not support UEFI secure boot. |
Enabling UEFI Secure Boot Mode
To enable UEFI secure boot mode:
Server# scope bios
Server /bios # set secure-boot enable
Setting Value : enable
Commit Pending.
Server /bios *# commit
Reboot the server to have your configuration boot mode settings to take effect.
Disabling UEFI Secure Boot Mode
To disable UEFI secure boot mode:
Server# scope bios
Server /bios # set secure-boot disable
Setting Value : enable
Commit Pending.
Server /bios *# commit
Reboot the server to have your configuration boot mode settings to take effect.
To install NFVIS in UEFI mode, map the iso image through vmedia or kvm first, then enable secure boot and change the BIOS set-up parameters.
encs# scope bios
encs /bios # scope advanced
encs /bios/advanced # set BootOpRom UEFI
encs /bios/advanced # set BootOrderRules Loose
encs /bios/advanced *# commit
Reboot the device to start the installation.
To configure the UEFI virtual-mapped image as the first boot option, enter the BIOS menu using F2 key when BIOS boots up. Use direction keys to move UEFI: Cisco CIMC-mapped image or KVM-mapped image to the top of the boot option list. For BIOS v2.10 onwards, you can also configure the UEFI boot order through CIMC GUI or CLI. For more information see, Install Cisco Enterprise NFVIS.
Note |
All VNFs and configurations are lost at reboot. Secure boot in UEFI mode works differently from the legacy mode. Therefore, there is no compatibility in between legacy mode and UEFI mode. The previous environment is not kept. |
PXE Boot Mode
PXE (Preboot Execution Environment) boot mode is a new configuration option in the BIOS Advanced option list in CIMC, which can be configured like any other BIOS configuration option in the list. PXE boot mode allows you to configure PXE boot for legacy mode, UEFI mode, or disable it when not in use. Starting from NFVIS 4.5, BIOS 2.13 and CIMC 3.2.12.1, PXE boot is disabled by default.
It is recommended that you disable PXE boot mode when not using PXE, in order to gain boot time savings.
Enable or Disable Access to NFVIS Portal
The Cisco Enterprise NFVIS portal access is enabled by default. You can disable the access if required.
To disable the portal access:
configure terminal
system portal access disabled
commit
Note |
You can enable the portal access using the enabled keyword with the system portal access configuration. |
Verifying the Portal Access
Use the show system portal status command to verify the portal access status as shown below:
nfvis# show system portal status
system portal status "access disabled"
Portal Access APIs and Commands
Portal Access APIs |
Portal Access Commands |
---|---|
|
|