Book Image

Implementing Cisco UCS Solutions - Second Edition

By : Anuj Modi, Prasenjit Sarkar
Book Image

Implementing Cisco UCS Solutions - Second Edition

By: Anuj Modi, Prasenjit Sarkar

Overview of this book

Cisco Unified Computer System (UCS) is a powerful solution for modern data centers and is responsible for increasing efficiency and reducing costs. This hands-on guide will take you through deployment in Cisco UCS. Using real-world examples of configuring and deploying Cisco UCS components, we’ll prepare you for the practical deployments of Cisco UCS data center solutions. If you want to develop and enhance your hands-on skills with Cisco UCS solutions, this book is certainly for you. We start by showing you the Cisco UCS equipment options then introduce Cisco UCS Emulator so you can learn and practice deploying Cisco UCS components. We’ll also introduce you to all the areas of UCS solutions through practical configuration examples. Moving on, you’ll explore the Cisco UCS Manager, which is the centralized management interface for Cisco UCS. Once you get to know UCS Manager, you’ll dive deeper into configuring LAN, SAN, identity pools, resource pools, and service profiles for the servers. You’ll also get hands-on with administration topics including backup, restore, user’s roles, and high availability cluster configuration. Finally, you will learn about virtualized networking, third-party integration tools, and testing failure scenarios. By the end of this book, you’ll know everything you need to know to rapidly grow Cisco UCS deployments in the real world.
Table of Contents (20 chapters)
Title Page
Credits
About the Authors
www.PacktPub.com
Customer Feedback
Preface

Chapter 7. Creating Identity Resource Pools, Policies, and Templates

Computers and their various peripherals have some unique identities, such as universally unique identifiers (UUIDs), media access control (MAC) addresses of network interface cards (NICs), World Wide Node Numbers (WWNNs), and Word Wide Port Numbers (WWPNs) for host bus adapters (HBAs). These identities are used to uniquely identify a computer system in a network. For traditional computers and peripherals, these identities were burned into the hardware and, hence, couldn't be altered easily. Operating systems and some applications rely on these identities and may fail if these identities are changed. In the event of a full computer system failure or the failure of a computer peripheral with a unique identity, administrators have to follow cumbersome firmware upgrade procedures to replicate the identities of the failed components on the replacement components.

The Unified Computing System (UCS) platform introduced the idea...