Skip to main content

BOOT FROM SAN - CISCO UCS 240 M5

Configuring QLogic BIOS to Boot from SAN

1. Take it into legacy mode 

Go to Compute > BIOS











2. Configure Boot order 

Boot order also must be created . Go to Compute > BIOS  > Configuration Order 




Go to Advanced and create Add SAN Boot . As we have 2 HBA Qlogic card we need to create 2 SAN BOOT and add the slot accordingly



Name : SAN-BOOT-ORDER

Status : Enabled 

Order : 1

Slot : 4

LUN : 0  ( Note : LUN ID must be verified from storage )

Name : SAN-BOOT-ORDER

Status : Enabled 

Order : 1

Slot : 6

LUN : 0  ( Note : LUN ID must be verified from storage )


3. While booting the server, press Ctrl-Q to enter the Fast!UTIL configuration utility.


4. Do one of the following : 

  • If you have only one host bus adapter (HBA), it is selected automatically, and the Fast!UTIL Options screen appears.

  • If you have more than one HBA, you need to select it manually. In the Select Host Adapter screen, use the cursor keys to select the chosen HBA and press Enter.

    Note: Booting from SAN requires choosing the lowest numbered HBA that has any LUNs visible.


As you can see we have 2 HBA card and total in 4 ports . Now we need to select all those 4 ports inorder to use all of the 4 ports for booting from the lun in case of failover.

 In the Fast!UTIL Options screen, select Configuration Settings and press Enter. ( Noted : Inorder to use all 4 ports we need to configure it all of the 4 ports available.)



Go to Adapter Settings and enable Host Adapter BIOS 






Then go into Selectable boot settings and enabled  selectable boot





NOTE : You will need to enable selectable boot and  Host adapter BIOS in all 4 ports available which has not been displayed in this blog.


5. You will ne able to see the initiator in your storage as well. 



You will now need to create a LUN and attached the host accordingly. 





6 .Booting ESXi




As you can see in the below screenshot LUN has been detected.




Reference 

https://kb.vmware.com/s/article/1448

Comments

Popular posts from this blog

High Availability Palo Alto (Active/Standby)

 High Availability is usually performed in most of the data centers networks today which ensures application availability . High Availability is usually achieved in case one of the appliance goes down or have some physical or logical connectivity issues.  Achieving high availability in Palo Alto firewall is relatively very easy. Palo Alto firewall can work in both Active/Standby mode or in Active/Active. We will basically be talking about Active/Standby mode in this article. There are basically two links that needs to be configure in Palo Alto for HA. 1. Control Links Control Links are associated with control plane traffic which is mainly used for heartbeat exchanged, configuration synchronization. Dedicate HA ports are available in higher series of Palo Alto or even a HA interface can be created for some inband ports.   2. Data Links Data Links are mainly used for session synchronization, forwarding table synchronization. Dedicated HSCI Ports are available for highe...

SSL Decryption FortiGate

  We have pretty much heard about SSL decryption and of malware hiding inside an encrypted traffic. A large amount of traffic in the internet is pretty much encrypted which basically means that bad things like malware, virus, ransomware can hide inside this encrypted traffic. If majority of these traffic are encrypted our Firewalls are not able to analyze these traffic which can easily infect our organization and the investment which we have done in these firewalls are wasted. There does come around a solution for this and as my topic suggest SSL Decryption also know as Deep Packet Inspection as by some IT folks. The image that I have attached down below clearly suggest about what I am trying to explain. Using deep packet inspection, the firewall simply decrypts the encrypted traffic happening  between client and server, inspects the content to find the threats and block them , then forwards it to the destination re-encrypting it . We will need to first setup the SSL/SSH in...

Virtual Chassis Juniper EX 3400 (PREPROVISONED)

Juniper has always been an technology that I have always liked right from the beginning of my career when I was working as an Jr Network Administrator. The logical command as well as the hierarchy based Juniper devices has always made me love the device. Let me today talk about a very useful and an interesting topic which we usually called stack in the world of Cisco and virtual chassis in the world of Juniper, both of them mean the same thing logically make two or more than two switch as a one and configure and manage the device as a single unity. High Availability, managed configuration and maintenance are few of the benefits that a virtual chassis can provide. The configuration for virtual chassis can be found easily in the juniper sites but my objective about writing this is making it more simpler in context to Juniper's document. There are basically two ways of configuring virtual chassis in Juniper. 1.   Nonprovisioned configuration  :  The master switch assig...