Installation and Upgrade Guide For Cisco5 - 8 PDF
Installation and Upgrade Guide For Cisco5 - 8 PDF
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE
WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO
BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE
FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE
INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE.
IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO
REPRESENTATIVE FOR A COPY.
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply
with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide
reasonable protection against harmful interference when the equipment is operated in a commercial environment. This
equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with
the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a
residential area is likely to cause harmful interference, in which case users will be required to correct the interference at
their own expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates
and may radiate radio-frequency energy. If it is not installed in accordance with Cisco’s installation instructions, it may
cause interference with radio and television reception. This equipment has been tested and found to comply with the
limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications
are designed to provide reasonable protection against such interference in a residential installation. However, there is no
guarantee that interference will not occur in a particular installation.
Modifying the equipment without Cisco’s written authorization may result in the equipment no longer complying with FCC
requirements for Class A or Class B digital devices. In that event, your right to use the equipment may be limited by FCC
regulations, and you may be required to correct any interference to radio or television communications at your own
expense.
You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was
probably caused by the Cisco equipment or one of its peripheral devices. If the equipment causes interference to radio
or television reception, try to correct the interference by using one or more of the following measures:
• Move the equipment to one side or the other of the television or radio.
• Plug the equipment into an outlet that is on a different circuit from the television or radio. (That is, make certain the
equipment and the television or radio are on circuits controlled by different circuit breakers or fuses.)
Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority
to operate the product.
i
Installation and Upgrade Guide for Cisco Secure Access Control System 5.8
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of
California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved.
Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS
ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES,
EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE
PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR
INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING
OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
ii
Preface
Revised: June 17, 2016,
This guide describes the system requirements, installation, upgrade, configuration, troubleshooting, and maintenance
process for Cisco Secure Access Control System Release 5.8 (ACS 5.8).
ACS 5.8 consists of an ACS 5.8 server, the Cisco Application Deployment Engine operating system 2.2, ADE-OS Build
Version: 2.2.2.011, ADE-OS System Architecture: x86_64, Copyright (c) 2005-2015 by Cisco Systems, Inc. All rights
reserved, and ACS 5.8 software.
The ADE-OS and ACS 5.8 software run on a dedicated SNS-3415 or SNS-3495 Access Control System Series appliance
(Cisco SNS-3415 or Cisco SNS-3495), on a dedicated Cisco 1121 Secure Access Control System Series appliance
(CSACS-1121), or on a VMware server. However, ACS 5.8 continues to support CSACS-1121 appliances that you have
used for ACS 5.3. You cannot directly upgrade from ACS 5.3 or 5.4 to 5.8. You have to upgrade ACS 5.3 or 5.4 to either
5.5, 5.6 or 5.7. From ACS 5.5, 5.6 or 5.7, you can directly upgrade to ACS 5.8.
For virtual machine (VM)-based installations, you need to configure the VM environment to meet minimal system
requirements, as well as install the ACS 5.8 software. The supported VMware versions are ESXi 5.0, 5.1, 5.5, and 6.0.
ACS 5.8 is compatible with ADE-OS 2.x. If you are using ACS 5.1, you must upgrade to this ADE-OS version as part of
the ACS 5.8 upgrade.
Warranty, service, and support information is located in the Cisco Information Packet that shipped with your appliance.
Audience
This guide is designed for administrators who install and configure the SNS-3415, SNS-3495, Cisco ACS 1121
appliances and VMware servers or for administrators who upgrade their ACS deployment to Release 5.8.
To use this hardware publication, you should be familiar with networking equipment and cabling and should have a basic
knowledge of electronic circuitry and wiring practices.
Warning: Only trained and qualified personnel should be allowed to install, replace, or service this equipment.
Statement 1030
1
Preface
Document Organization
Document Organization
The topics in this guide are grouped into introduction, installation procedures, upgrade, post-installation tasks, and
reference categories, and are organized in the following way:
2
Preface
Document Organization
2. Preparing to Install the Cisco SNS 3415 and Cisco SNS 3495
Hardware Appliances, page 1
3. Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware
Appliances, page 1
3
Preface
Document Organization
http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_sec
ure_access_control_system/5-6/migration/guide/migration_g
uide.html
http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_sec
ure_access_control_system/5-6/migration/guide/migration_g
uide.html.
Migrating from ACS 4.2 on a different hardware 1. Perform initial installation of ACS 5.8 on a CSACS-1121 Series
platform appliance or Cisco SNS-3415 Series appliance or VMware
server.
http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_sec
ure_access_control_system/5-6/migration/guide/migration_g
uide.html
4
Preface
Document Conventions
Document Conventions
This guide uses the following conventions to convey instructions and information.
Item Convention
Commands, keywords, special terminology, and boldface font
options that should be selected during
procedures
Variables for which you supply values and new or italic font
important terminology
Displayed session and system information, paths screen font
and file names
Information you enter boldface screen font
Variables you enter italic screen font
Menu items and button names boldface font
Indicates menu items to select, in the order you Option > Network Preferences
select them.
Note: Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.
Caution: Means reader be careful. In this situation, you might do something that could result in equipment damage
or loss of data.
5
Preface
Safety Warnings
Safety Warnings
Safety warnings appear throughout this publication in procedures that, if performed incorrectly, might harm you. A
warning symbol precedes each warning statement. The safety warnings provide safety guidelines that you should follow
when working with any equipment that connects to electrical power or telephone wiring. Included in the warnings are
translations in several languages.
For detailed information about compliance guidelines and translated safety warnings, see Regulatory Compliance and
Safety Information for Cisco Secure Access Control System.
This warning symbol means danger. You are in a situation that could cause bodily injury. Before
you work on any equipment, be aware of the hazards involved with electrical circuitry and be
familiar with standard practices for preventing accidents. Use the statement number provided at
the end of each warning to locate its translation in the translated safety warnings that
accompanied this device. Statement 1071
Dit waarschuwingssymbool betekent gevaar. U verkeert in een situatie die lichamelijk letsel kan
veroorzaken. Voordat u aan enige apparatuur gaat werken, dient u zich bewust te zijn van de bij
elektrische schakelingen betrokken risico's en dient u op de hoogte te zijn van de standaard
praktijken om ongelukken te voorkomen. Gebruik het nummer van de verklaring onderaan de
waarschuwing als u een vertaling van de waarschuwing die bij het apparaat wordt geleverd,
wilt raadplegen.
Tämä varoitusmerkki merkitsee vaaraa. Tilanne voi aiheuttaa ruumiillisia vammoja. Ennen kuin
käsittelet laitteistoa, huomioi sähköpiirien käsittelemiseen liittyvät riskit ja tutustu
onnettomuuksien yleisiin ehkäisytapoihin. Turvallisuusvaroitusten käännökset löytyvät laitteen
mukana toimitettujen käännettyjen turvallisuusvaroitusten joukosta varoitusten lopussa näkyvien
lausuntonumeroiden avulla.
Ce symbole d'avertissement indique un danger. Vous vous trouvez dans une situation pouvant
entraîner des blessures ou des dommages corporels. Avant de travailler sur un équipement, soyez
conscient des dangers liés aux circuits électriques et familiarisez-vous avec les procédures
couramment utilisées pour éviter les accidents. Pour prendre connaissance des traductions des
avertissements figurant dans les consignes de sécurité traduites qui accompagnent cet appareil,
référez-vous au numéro de l'instruction situé à la fin de chaque avertissement.
Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die zu Verletzungen
führen kann. Machen Sie sich vor der Arbeit mit Geräten mit den Gefahren elektrischer
Schaltungen und den üblichen Verfahren zur Vorbeugung vor Unfällen vertraut. Suchen Sie mit der
am Ende jeder Warnung angegebenen Anweisungsnummer nach der jeweiligen Übersetzung in
den übersetzten Sicherheitshinweisen, die zusammen mit diesem Gerät ausgeliefert wurden.
6
Preface
Safety Warnings
Questo simbolo di avvertenza indica un pericolo. La situazione potrebbe causare infortuni alle
persone. Prima di intervenire su qualsiasi apparecchiatura, occorre essere al corrente dei pericoli
relativi ai circuiti elettrici e conoscere le procedure standard per la prevenzione di incidenti.
Utilizzare il numero di istruzione presente alla fine di ciascuna avvertenza per individuare le
traduzioni delle avvertenze riportate in questo documento.
Dette advarselssymbolet betyr fare. Du er i en situasjon som kan føre til skade på person. Før du
begynner å arbeide med noe av utstyret, må du være oppmerksom på farene forbundet med
elektriske kretser, og kjenne til standardprosedyrer for å forhindre ulykker. Bruk nummeret i
slutten av hver advarsel for å finne oversettelsen i de oversatte sikkerhetsadvarslene som fulgte
med denne enheten.
Este símbolo de aviso significa perigo. Você está em uma situação que poderá ser causadora de
lesões corporais. Antes de iniciar a utilização de qualquer equipamento, tenha conhecimento dos
perigos envolvidos no manuseio de circuitos elétricos e familiarize-se com as práticas habituais
de prevenção de acidentes. Utilize o número da instrução fornecido ao final de cada aviso para
localizar sua tradução nos avisos de segurança traduzidos que acompanham este dispositivo.
Este símbolo de aviso indica peligro. Existe riesgo para su integridad física. Antes de manipular
cualquier equipo, considere los riesgos de la corriente eléctrica y familiarícese con los
procedimientos estándar de prevención de accidentes. Al final de cada advertencia encontrará el
número que le ayudará a encontrar el texto traducido en el apartado de traducciones que
acompaña a este dispositivo.
Denna varningssignal signalerar fara. Du befinner dig i en situation som kan leda till personskada.
Innan du utför arbete på någon utrustning måste du vara medveten om farorna med elkretsar och
känna till vanliga förfaranden för att förebygga olyckor. Använd det nummer som finns i slutet av
varje varning för att hitta dess översättning i de översatta säkerhetsvarningar som medföljer
denna anordning.
7
Preface
Safety Warnings
Este símbolo de aviso significa perigo. Você se encontra em uma situação em que há risco de
lesões corporais. Antes de trabalhar com qualquer equipamento, esteja ciente dos riscos que
envolvem os circuitos elétricos e familiarize-se com as práticas padrão de prevenção de
acidentes. Use o número da declaração fornecido ao final de cada aviso para localizar sua
tradução nos avisos de segurança traduzidos que acompanham o dispositivo.
Dette advarselssymbol betyder fare. Du befinder dig i en situation med risiko for
legemesbeskadigelse. Før du begynder arbejde på udstyr, skal du være opmærksom på de
involverede risici, der er ved elektriske kredsløb, og du skal sætte dig ind i standardprocedurer til
undgåelse af ulykker. Brug erklæringsnummeret efter hver advarsel for at finde oversættelsen i de
oversatte advarsler, der fulgte med denne enhed.
8
Preface
Safety Warnings
9
Preface
Product Documentation
Product Documentation
Note: The printed and electronic documentation is sometimes updated after original publication. Therefore, you should
also review the documentation on http://www.cisco.com for any updates.
Table 3 on page 10 lists the product documentation that is available for ACS 5.8 on Cisco.com. To find end-user
documentation for all products on Cisco.com, go to: http://www.cisco.com/go/techdocs
Select Products > Security > Access Control and Policy > Policy and Access Management > Cisco Secure Access
Control System.
10
Preface
Documentation Updates
Documentation Updates
Table 4 on page 11 lists the updates to the Installation and Upgrade Guide for Cisco Secure Access Control System 5.8.
Table 4 Updates to the Installation and Upgrade Guide for Cisco Secure ACS 5.8
Date Description
09/29/2015 Cisco Secure Access Control System, Release 5.8
To receive new and revised Cisco technical content directly to your desktop, you can subscribe to the What’s New in
Cisco Product Documentation RSS feed. The RSS feeds are a free service.
11
Preface
Documentation Updates
12
ACS Server Deployment
1
ACS Server Deployment
2
Understanding the ACS Server
Deployment
This chapter provides an overview of possible ACS server deployments and their components.
Deployment Scenarios
This section describes three deployment scenarios in which ACS might be used:
The second server is used as a backup server if the connectivity is lost between the AAA clients and the primary server.
You use replication from the primary ACS server to the secondary server to keep the secondary server in synchronization
with the primary server.
In a small network, this configuration allows you to configure the primary and secondary RADIUS or TACACS servers on
all AAA clients in the same way.
As the number of users and AAA clients increases in an organization, Cisco recommends changing the deployment ACS
from the basic design and using split ACS deployment design; see Figure 2 on page 2.
1
Understanding the ACS Server Deployment
Deployment Scenarios
This property of the servers allows for less stress on each ACS system, provides better loading, and makes you aware
of the functional status of the secondary server through normal operations.
Another advantage of this arrangement is that each server can be used for specific operations, such as device
administration and network admission, but can still be used to perform all the AAA functions in the event of a failure.
With two ACS systems now processing authentication requests and collecting accounting data from AAA clients, Cisco
recommends using one of the systems as a log collector. Figure 2 on page 2 shows the secondary ACS server as the
log collector.
Another advantage of this design is that it also allows for growth as shown in Figure 3 on page 3.
2
Understanding the ACS Server Deployment
Deployment Scenarios
This type of server enables you to use the reports and alerts features that are available in ACS for all ACS servers. This
requires special licensing, which is discussed in the User Guide for Cisco Secure Access Control System 5.8. See
Installing the ACS Server, page 2, for more information on installing the ACS server.
You should also consider having the servers send logs to both a Monitoring and Report server and a generic syslog
server. The addition of the generic syslog server provides a backup if the Monitoring and Report server goes down.
Note: ACS 5.8 does not support large deployments with more than 22 ACS instances.
3
Understanding the ACS Server Deployment
Deployment Scenarios
To optimize AAA performance, each of these remote campuses should have its own AAA infrastructure. See Figure 5 on
page 4. The centralized management model should still be used to maintain a consistent, synchronized AAA policy.
A centralized-configuration, primary ACS server and a separate Monitoring and Report server should still be used.
However, each of the remote campuses will have unique requirements.
Some of the factors to consider when planning a network with remote sites are:
Check whether there is a central or external database (Microsoft Active Directory [AD] or Lightweight Directory
Access Protocol [LDAP]) in use. For the purposes of optimization, each remote site should have a synchronized
instance of the external database available for ACS to access.
4
Understanding the ACS Server Deployment
The location of the AAA clients is also a major consideration. You should place your ACS servers as close as possible
to the AAA clients to reduce the effects of network latency and the possibility of loss of access caused by WAN
failure.
ACS has console access for some functions, such as backup. Consider using a terminal at each site. This allows for
secure console access outside of network access to each server.
If small, remote sites are in close proximity and have reliable WAN connectivity to other sites, you may consider using
an ACS server in a nearby site as a backup server for the local site for redundant configuration.
DNS should be properly configured on all ACS nodes to ensure access to the external databases.
See Installing and Configuring the Cisco Secure Access Control System with CSACS-1121, page 1 for installing ACS
with the CSACS-1121 appliance, Installing and Configuring the Secure Access Control System with the Cisco SNS-3415
and Cisco SNS-3495, page 1 for installing ACS with the Cisco SNS-3415 appliance, or Installing ACS in a VMware Virtual
Machine, page 1 for installing ACS with VMware ESX. In an ACS deployment, ensure that you first install a primary server.
Primary Server
In an ACS deployment, only one instance serves as an ACS primary, which provides the configuration capabilities and
serves as the source for replication.
On an ACS primary server, you can set up all the system configurations that are required for an ACS deployment.
However you must configure licenses and local certificates individually for each ACS secondary server.
Secondary Server
Except the primary server, all the other instances function as a secondary server.
A secondary ACS server receives all the system configurations from the primary server, except that you need to configure
the following on each secondary server:
License—Install a unique base license for each of the ACS secondary servers in the deployment.
New local certificates—You can either configure the local certificates on the secondary servers or import the local
certificates from the primary server.
Logging server—You can configure either the primary server or the secondary server to be the logging server for ACS.
Cisco recommends that you configure a secondary ACS server as the logging server.
Note: You cannot translate a network address between the primary and secondary servers when selecting the installation
location for the secondary server.
5
Understanding the ACS Server Deployment
The secondary server must be activated to join the ACS environment. The administrator can either activate a secondary
server or set up automatic activation. By default, the activation is set to Automatic.
After the secondary server is activated, it is synchronized with the configuration and replication updates from the primary
server.
Logging Server
Either a primary server or one of the secondary servers can function as a logging server.
The logging server receives the logs from the primary server and all the ACS secondary servers in the deployment. Cisco
recommends that you allocate one of the ACS secondary servers as the Monitoring and Report server and exclude this
particular secondary server from the AAA activities.
The three main logging categories are Audit, Accounting, and Diagnostics.
For more details on logging categories and configuration, see the User Guide for Cisco Secure Access Control System
5.8.
6
ACS 5.8 on Cisco 1121 Secure Access
Control System
1
ACS 5.8 on Cisco 1121 Secure Access Control System
2
Introducing the Cisco 1121 Secure Access
Control System Hardware
This chapter gives an overview of the Cisco Secure Access Control System (CSACS-1121) hardware. It covers the
appliance hardware, major components, controls, connectors, and front- and rear-panel LED indicators.
Product Overview
This section describes the power requirements, rack-mount hardware kit, and features of the CSACS-1121 Series
appliance.
The CSACS-1121 Series appliance is configured for AC-input power and has a single auto-ranging AC-input power
supply, mounted in a standard 19-inch (48.3 cm), 4-post equipment rack (using the rack-mount brackets provided). The
CSACS-1121 features include:
Microprocessor—Intel Core 2 Duo 2.4-GHz processor with an 800-MHz front side bus (FSB) and 2 MB of Layer 2
cache.
Four synchronous dynamic RAM (SDRAM) slots that are installed with 4 GB.
1
Introducing the Cisco 1121 Secure Access Control System Hardware
Product Overview
A fixed RJ-45 10BASE-T/100BASE-TX/1000BASE-T network interface connector (located on the rear panel).
Front-to-rear airflow blowers using two 40-mm exhaust fans and ducting for the CPU and memory, two 40-mm
exhaust fans built into the power supply, and one PCI exhaust fan.
Four USB 2.0 ports (two located on the rear panel, two on the front panel).
Rear-access cabling.
— Appliance power
— Locator
— System error
— CD drive activity
For a description of the LEDs, see CSACS-1121 Appliance Front-Panel View, page 4.
— Ethernet activity
— Ethernet link
For a description of the LEDs, see CSACS-1121 Appliance Back-Panel View, page 5
The CSACS-1121 appliance is normally shipped with a rack-mount hardware kit which includes either brackets or
rails that allow the CSACS-1121 to be positioned in a 4-post equipment rack. For more information, see Installing
the Cisco 1121 Secure Access Control System Hardware, page 1
Note: The rack-mount hardware kit does not include a 2-post equipment rack.
2
Introducing the Cisco 1121 Secure Access Control System Hardware
Hardware Features
195213
Note: The serial number for the CSACS-1121 Series appliance is 11 characters long.
Before you submit a request for service online or by phone, use the CPI tool to locate your product serial number. You
can access this tool from the Cisco Support website.
3. Select Cisco Product Identification Tool from the alphabetical drop-down list.
Copy and paste the output of the show command to identify the product.
Search results show an illustration of your product with the serial number label location highlighted. Locate the serial
number label on your product and record the information before you place a service call.
http://tools.cisco.com/Support/CPI/index.do
To access the CPI tool, you require a Cisco.com user ID and password. If you have a valid service contract but do
not have a user ID or password, you can register at:
http://tools.cisco.com/RPF/register/register.do
Hardware Features
This section describes the front- and rear-panel controls, ports, and LED indicators on the CSACS-1121 Series
appliance.
3
Introducing the Cisco 1121 Secure Access Control System Hardware
Hardware Features
Power-control button
Reset button
CD-eject button
195214
9
10
4
Introducing the Cisco 1121 Secure Access Control System Hardware
Hardware Features
AC power connector
Serial connector
Ethernet LEDs
The locations of the rack-mounting brackets are also shown on the left and right sides of the appliance. (See
Rack-Mounting Configuration Guidelines, page 1 for instructions on how to install the mounting brackets.)
8 4
6 4 3
7 5
The following table describes the callouts in Figure 4 on page 5.
5
Introducing the Cisco 1121 Secure Access Control System Hardware
Hardware Features
1 2 276861
Warning: To avoid electric shock, do not connect safety extra-low voltage (SELV) circuits to telephone-network
voltage (TNV) circuits. LAN ports contain SELV circuits, and WAN ports contain TNV circuits. Some LAN and WAN
ports both use RJ-45 connectors. Use caution when connecting cables. Statement 1021
6
Introducing the Cisco 1121 Secure Access Control System Hardware
Regulatory Compliance
Regulatory Compliance
For regulatory compliance and safety information, see Regulatory Compliance and Safety Information for Cisco Secure
Access Control System.
For more information, see Obtaining Documentation and Submitting a Service Request, page 11.
7
Introducing the Cisco 1121 Secure Access Control System Hardware
Regulatory Compliance
8
Preparing to Install the Cisco 1121 Secure
Access Control System Hardware
This chapter describes the safety instructions, site requirements, and tasks you must perform before installing the
CSACS-1121 Series appliance.
Note: Read the Regulatory Compliance and Safety Information for the Cisco 1121 Secure Access Control System before
you begin the installation.
Safety Guidelines
Before you begin installing the CSACS-1121 Series appliance, review the safety guidelines in this chapter and
Rack-Mounting Configuration Guidelines, page 1 to avoid injuring yourself or damaging the equipment.
In addition, before replacing, configuring, or maintaining the appliance, review the safety warnings listed in Safety
Warnings, page 6 and in the Cisco Regulatory Compliance and Safety Information for the Cisco 1121 Secure Access
Control System document.
General Precautions
Observe the following general precautions for using and working with your appliance:
Observe and follow service markings. Do not service any Cisco product except as explained in your appliance
documentation. Opening or removing covers that are marked with the triangular symbol with a lightning bolt may
expose you to electrical shock. Components inside these compartments should be serviced only by an authorized
service technician.
If any of the following conditions occur, unplug the product from the electrical outlet and replace the part, or contact
your authorized service provider:
1
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
Safety Guidelines
— The product does not operate correctly when you follow the operating instructions.
Keep your appliance away from radiators and heat sources. Also, do not block cooling vents.
Do not spill food or liquids on your appliance, and never operate the product in a wet environment.
Do not push any objects into the openings of your appliance. Doing so can cause fire or electric shock by shorting
out interior components.
Allow the product to cool before removing covers or touching internal components.
Use the correct external power source. Operate the product only from the type of power source indicated on the
electrical ratings label. If you are not sure of the type of power source required, consult your service representative
or local power company.
Use only approved power cables. If you have not been provided with a power cable for your appliance or for any
AC-powered option intended for your appliance, purchase a power cable that is approved for use in your country.
The power cable must be rated for the product and for the voltage and current marked on the product’s electrical
ratings label. The voltage and current rating of the cable should be greater than the ratings marked on the product.
To help prevent electric shock, plug the appliance and power cables into properly grounded electrical outlets. These
cables are equipped with three-prong plugs to help ensure proper grounding. Do not use adapter plugs or remove
the grounding prong from a cable. If you must use an extension cord, use a three-wire cord with properly grounded
plugs.
Observe extension cord and power strip ratings. Make sure that the total ampere rating of all products plugged into
the extension cord or power strip does not exceed 80 percent of the extension cord or power strip ampere ratings
limit.
Do not use appliance, or voltage converters, or kits sold for appliances with your product.
To help protect your appliance from sudden, transient increases and decreases in electrical power, use a surge
suppressor, line conditioner, or uninterruptible power supply (UPS).
Position cables and power cords carefully; route cables and the power cord and plug so that they cannot be stepped
on or tripped over. Be sure that nothing rests on your appliance cables or power cord.
Do not modify power cables or plugs. Consult a licensed electrician or your power company for site modifications.
Always follow your local or national wiring rules.
Warning: Read the installation instructions before connecting the system to the power source. Statement 1004
Always disconnect all power cords and interface cables before moving the appliance.
Keep the appliance chassis area clear and dust-free before and after installation.
2
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
Safety Guidelines
Keep tools and assembly components away from walk areas where you or others could trip over them.
Do not perform any action that creates a potential hazard to people or makes the equipment unsafe.
Do not wear loose clothing that may get caught in the appliance chassis.
Wear safety glasses when working under conditions that may be hazardous to your eyes.
Warning: To avoid electric shock, do not connect safety extra-low voltage (SELV) circuits to telephone-network
voltage (TNV) circuits. LAN ports contain SELV circuits, and WAN ports contain TNV circuits. Some LAN and WAN
ports both use RJ-45 connectors. Statement 1021
Warning: Do not touch the power supply when the power cord is connected. For systems with a power switch, line
voltages are present within the power supply even when the power switch is off and the power cord is connected.
For systems without a power switch, line voltages are present within the power supply when the power cord is
connected. Statement 4
Warning: Before working on equipment that is connected to power lines, remove jewelry (including rings,
necklaces, and watches). Metal objects will heat up when connected to power and ground and can cause serious
burns or weld the metal object to the terminals. Statement 43
Warning: Before working on a chassis or working near power supplies, unplug the power cord on AC units;
disconnect the power at the circuit breaker on DC units. Statement 12
Warning: Do not work on the system or connect or disconnect cables during periods of lightning activity. Statement
1001
Warning: This equipment is intended to be grounded. Ensure that the host is connected to earth ground during
normal use. Statement 39
Warning: When installing or replacing the unit, the ground connection must always be made first and disconnected
last. Statement 1046
Locate the room’s emergency power-off switch. Then, if an electrical accident occurs, you can quickly turn off the
power.
Carefully examine your work area for possible hazards, such as moist floors, ungrounded power extension cables,
and missing safety grounds.
3
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
Safety Guidelines
Never perform any action that creates a potential hazard to people or makes the equipment unsafe.
— If possible, send another person to get medical aid. Otherwise, determine the condition of the victim, and then
call for help.
— Determine whether the person needs rescue breathing, external cardiac compressions, or other medical
attention; then take appropriate action.
In addition, use the following guidelines when working with any equipment that is disconnected from a power source but
still connected to telephone wiring or network cabling:
Never install telephone jacks in wet locations unless the jack is specifically designed for it.
Never touch uninsulated telephone wires or terminals unless the telephone line is disconnected at the network
interface.
When unpacking a static-sensitive component from its shipping carton, do not remove the component from the
anti-static packing material until you are ready to install the component in your appliance. Just before unwrapping
the anti-static packaging, be sure to discharge static electricity from your body.
Handle all sensitive components in a static-safe area. If possible, use anti-static floor pads and workbench pads.
Ensure that the CSACS-1121 Series appliance is electrically connected to earth ground.
Wear an ESD-preventive wrist strap, ensuring that it makes good skin contact. Connect the clip to an unpainted
surface of the appliance to channel unwanted ESD voltages safely to ground. To guard against ESD damage and
shocks, the wrist strap and cord must operate effectively.
If no wrist strap is available, ground yourself by touching a metal part of the appliance.
Caution: For the safety of your equipment, periodically check the resistance value of the anti-static wrist strap. It
should be between 1 and 10 Mohm.
Lifting Guidelines
The CSACS-1121 Series appliance weighs between 15 lb (9.071 kg) and 33 lb (14.96 kg) depending on what hardware
options are installed in the appliance. The appliance is not intended to be moved frequently. Before you install the
appliance, ensure that your site is properly prepared so you can avoid having to move the appliance later to
accommodate power sources and network connections.
Whenever you lift the appliance or any heavy object, follow these guidelines:
4
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
Always disconnect all external cables before lifting or moving the appliance.
Ensure that your footing is solid, and balance the weight of the object between your feet.
Lift the appliance slowly; never move suddenly or twist your body as you lift.
Keep your back straight and lift with your legs, not your back. If you must bend down to lift the appliance, bend at
the knees, not at the waist, to reduce the strain on your lower back muscles.
Lift the appliance from the bottom; grasp the underside of the appliance exterior with both hands.
1. Prepare the site (see Site Planning, page 5) and review the installation plans or method of procedures (MOPs).
3. Gather the tools and test equipment required to properly install the appliance.
Site Planning
Warning: This unit is intended for installation in restricted access areas. A restricted access area can be accessed
only through the use of a special tool, lock and key, or other means of security.
Statement 1017
Typically, you should have prepared the installation site beforehand. As part of your preparation, obtain a floor plan of
the site and the equipment rack where the CSACS-1121 Series appliance will be housed.
Determine the location of any existing appliances and their interconnections, including communications and power.
Following the airflow guidelines (see Airflow Guidelines, page 7) to ensure that adequate cooling air is provided to
the appliance.
All personnel involved in the installation of the appliance, including installers, engineers, and supervisors, should
participate in the preparation of a MOP for approval by the customer. For more information, see Method of Procedure,
page 9.
The following sections provide the site requirement guidelines that you must consider before installing the appliance:
5
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
Note: Cisco strongly recommends using four-post racks whenever possible, but your rack must have at least two posts
that provide mounting flanges for mounting an appliance.
310199
1 2
Before installing your CSACS-1121 Series appliance in a rack, review the following guidelines:
Do not block any air vents; usually, 6 inches (15 cm) of space provides proper airflow.
Plan the appliance installation starting from the bottom of the rack.
6
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
Do not extend more than one appliance out of the rack at the same time.
Do not overload the power outlet when installing multiple devices in the rack.
Do not place any object weighing more than 110 lb (50 kg) on top of rack-mounted devices.
Site Environment
The location of your appliance and the layout of your equipment rack or wiring room are extremely important
considerations for proper operation. Equipment placed too close together, inadequate ventilation, and inaccessible
panels can cause malfunctions and shutdowns, and can make maintenance difficult. Plan for access to front and rear
panels of the appliance.
The following precautions will help you plan an acceptable operating environment for your appliance and will help you
avoid environmentally caused equipment failures:
Ensure that the room where your appliance operates has adequate circulation. Electrical equipment generates heat.
Without adequate circulation, ambient air temperature may not cool equipment to acceptable operating
temperatures. For more information, see Airflow Guidelines, page 7.
Ensure that the site of the rack includes provisions for source AC power, grounding, and network cables.
Allow sufficient space to work around the rack during the installation. You need:
— At least 3 feet (9.14 m) adjacent to the rack to move, align, and insert the appliance.
— At least 24 inches (61 cm) of clearance in front of and behind the appliance for maintenance after installation.
To mount the appliance between two posts or rails, the usable aperture (the width between the inner edges of the
two mounting flanges) must be at least 17.7 inches (45.0 cm).
Note: The rack-mount kit does not include a 2-post equipment rack.
To avoid noise interference in network interface cables, do not route them directly across or along power cables.
Always follow ESD-prevention procedures as described in Preventing Electrostatic Discharge Damage, page 4 to
avoid damage to equipment. Damage from static discharge can cause immediate or intermittent equipment failure.
Airflow Guidelines
To ensure adequate airflow through the equipment rack, it is recommended that you maintain a clearance of at least 6
inches (15.24 cm) at the front and the rear of the rack. If airflow through the equipment rack and the appliances that
occupy it, is blocked or restricted, or if the ambient air being drawn into the rack is too warm, an overtemperature
condition within the rack and the appliances that occupy it can occur.
The site should also be as dust-free as possible. Dust tends to clog the appliance fans, reducing the flow of cooling air
through the equipment rack and the appliances that occupy it. This reduction increases the risk of an overtemperature
condition.
Additionally, the following guidelines will help you plan your equipment rack configuration:
Besides airflow, you must allow clearance around the rack for maintenance.
When mounting an appliance in an open rack, ensure that the rack frame does not block the front intakes or the rear
exhausts.
7
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
Maintain normal operation by anticipating and correcting environmental anomalies before they approach critical values
by properly planning and preparing your site before you install the appliance.
Power Considerations
You configure the CSACS-1121 Series appliance with AC-input power only. Ensure that all power connections conform
to the rules and regulations in the National Electrical Codes (NECs), as well as local codes. While planning power
connections to your appliance, the following precautions and recommendations must be followed:
Check the power at your site before installation and periodically after installation to ensure that you are receiving
clean power (free of spikes and noise). Install a power conditioner if necessary.
— An electrical cord for all appliances. (A label near the power cord indicates the correct voltage, frequency,
current draw, and power dissipation for the appliance.)
Warning: This product relies on the building’s installation for short-circuit (overcurrent) protection. Ensure that a
fuse or circuit breaker no larger than 120 VAC, 15A U.S. (240 VAC, 10A international) is used on the phase
conductors (all current-carrying conductors). Statement 13
Install proper grounding to your host equipment rack to avoid damage from lightning and power surges.
Warning: This equipment must be grounded. Never defeat the ground conductor or operate the equipment in the
absence of a suitably installed ground conductor. Contact the appropriate electrical inspection authority or an
electrician if you are uncertain that suitable grounding is available. Statement 1024
The AC-input power supply that operates on input voltage and frequency within the ranges of 100 to 240 VRMS and
50/60 Hz without the need for operator adjustments. Table 2 on page 9 provides additional information on electrical
inputs.
8
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
Method of Procedure
As described previously, part of your preparation includes reviewing installation plans or MOPs. An example of a MOP (a
preinstallation checklist of tasks and considerations that need to be addressed and agreed upon before proceeding with
the installation) is as follows:
1. Assign personnel.
8. On an equipment plan, make a preliminary decision that locates each CSACS-1121 Series appliance that you plan
to install.
10. Verify the list of replaceable parts for installation (screws, bolts, washers, and so on) so that the parts are identified.
11. Check the required tools list to make sure the necessary tools and test equipment are available. For more
information, see Required Tools and Equipment, page 11.
The appliance, cables, and any optional equipment you ordered may be shipped in more than one container. A Notes
section has been provided to record damaged or missing items. Figure 2 on page 10 displays the shipment items with
the CSACS-1121 series appliance.
Note: Do not discard the packaging materials used in shipping your CSACS-1121 Series appliance. You will need the
packaging materials in the future if you move or ship your appliance.
9
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
Documentation
276972
Rack Mounting Kit
Inspect all items for shipping damage. If anything appears to be damaged, or if you encounter problems installing or
configuring your appliance, contact your customer service representative.
Note: The rack-mount kit does not include a 2-post equipment rack.
To access and download the Cisco Information Packet and your warranty and license agreements from Cisco.com:
http://www.cisco.com/en/US/products/prod_warranties_listing.html
1. Click the Information Packet Number field, and ensure that the part number 78-5235-03D0 is highlighted.
2. Select the language in which you would like to read the document.
3. Click Go.
The Cisco Limited Warranty and Software License page from the Information Packet appears.
4. Read the document online, or click the PDF icon to download and print the document.
You must have Adobe Acrobat Reader to view and print PDF files. You can download the reader from the Adobe
website.
78-5236-01C0
2. Select the language in which you would like to read the document.
3. Click Go.
10
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
4. Review the document online, or click the PDF icon to download and print the document in PDF.
You can also contact the Cisco Service and Support website for assistance at:
http://www.cisco.com/en/US/support/
Cisco reserves the right to refund the purchase price as its exclusive warranty remedy.
You need the following tools and equipment to install the CSACS-1121 Series appliance in a 4-post rack:
Warning: Only trained and qualified personnel should be allowed to install, replace, or service this equipment.
Statement 1030
Flat-blade screwdrivers (small, 3/16-inch (0.476 cm) and medium, 1/4-inch [0.625 cm]) to remove the cover if you
are upgrading memory or other components.
Rack-mount Kit. For more information on kit contents, see 4-Post Rack-Mount Hardware Kit, page 2.
11
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
You need to have either of the following for the initial configuration of the CSACS-1121 Series appliance:
or
Console terminal (an ASCII terminal or a PC running terminal-emulation software) that is configured for 9600 baud,
8 data bits, no parity, 1 stop bit, and no hardware flow control.
Console cable for connection to the serial (console) port. A null-modem cable is recommended.
Installation Checklist
To assist you with your installation and to provide a historical record of what was done, and by whom, use the following
installation checklist. Make a copy of this checklist and mark the entries as you complete each task.
After the checklist is completed, include a copy of it for each CSACS-1121 Series appliance in your site log (see Creating
a Site Log, page 12 for information about creating a site log) along with other records for your new appliance.
Use the installation checklist (see Installation Checklist, page 12) to verify the steps in the installation and maintenance
of your appliance. Site Log entries might include the following:
Installation progress—Make a copy of the appliance installation checklist, and insert it into the site log. Make entries
as you complete each task.
12
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
Upgrade, removal, and maintenance procedures—Use the site log as a record of ongoing appliance maintenance and
expansion history. Each time a task is performed on the appliance, update the site log to reflect the following
information:
— Configuration changes.
— Intermittent problems.
The appliance includes an asynchronous serial console port, which enables you to access the appliance locally (using a
console terminal). This section describes important cabling information that must be considered before connecting a
console terminal—either an ASCII terminal or a PC running terminal-emulation software—to the console port.
Note: The console cable is not included with the CSACS-1121 Series appliance.
13
Preparing to Install the Cisco 1121 Secure Access Control System Hardware
14
Installing the Cisco 1121 Secure Access
Control System Hardware
This chapter describes how to install your CSACS-1121 Series appliance and connect it to the network.
It contains:
Before you begin the installation, read the Regulatory Compliance and Safety Information for the Cisco 1121 Secure
Access Control System.
Warning: Only trained and qualified personnel should be allowed to install, replace, or service this equipment.
Statement 1030
Warning: This unit is intended for installation in restricted access areas. A restricted access area can be accessed
only through the use of a special tool, lock and key, or other means of security.
Statement 1017
Mount the appliance in the brackets. When the appliance is installed in the rack, it requires one EIA 1.75-inch (4.4-cm)
vertical mounting space or 1 rack unit (RU) for mounting.
Caution: You must leave clearance in the front and rear of the CSACS-1121 Series appliance, to allow cooling air to
be drawn in through the front and circulated through the appliance and out the rear of the appliance.
The Rack Installation Safety Guidelines, page 6 and the following information will help you plan the equipment rack
configuration:
When mounting an appliance in an equipment rack, ensure that the rack is bolted to the floor.
Because you may install more than one appliance in the rack, ensure that the weight of all the appliances installed
does not make the rack unstable.
1
Installing the Cisco 1121 Secure Access Control System Hardware
Caution: Some equipment racks are also secured to ceiling brackets due to the weight of the equipment in the rack.
If you use this type of installation, ensure that the rack you are using to install the appliances is secured to the
building structure.
As mentioned in Airflow Guidelines, page 7, maintain a 6-inch (15.2-cm) clearance at the front and rear of the
appliance to ensure adequate air intake and exhaust.
Avoid installing appliances in an overly congested rack. Air flowing to or from other appliances in the rack might
interfere with the normal flow of cooling air through the appliances, increasing the potential for overtemperature
conditions within the appliances.
Allow at least 24 inches (61 cm) of clearance at the front and rear of the rack for appliance maintenance.
Caution: To prevent appliance overheating, never install an appliance in an enclosed rack or a room that is not
properly ventilated or air conditioned.
Follow your local practices for cable management. Ensure that cables to and from appliances do not impede access
for performing equipment maintenance or upgrades.
Note: The rack-mount hardware kit does not include a 2-post equipment rack.
2
Installing the Cisco 1121 Secure Access Control System Hardware
Table 1 on page 3 lists the contents of the rack-mount hardware kit (Cisco part number CSACS-1U-RAILS).
1. Press on the rail-adjustment bracket on the rear of the slide rail (see Figure 2 on page 4) to prevent the bracket from
moving.
2. Press the adjustment tabs 1 and 2 (see Figure 2 on page 4) and slide the rail-locking carrier toward the front of the
slide rail until it snaps into place.
3. Press the adjustment Tabs 1 and 2 and slide the rail-locking carrier toward the rear of the slide until it snaps into
place.
3
Installing the Cisco 1121 Secure Access Control System Hardware
If you need to adjust the slide-rail length, lift the release tab (see Figure 3 on page 4) and fully extend the
rail-adjustment bracket from the rear of the slide rail until it snaps into place.
4. Align the pins on the rear rail-locking carrier with the holes on the rear mounting flange.
5. Press the adjustment tab (see Figure 3 on page 4) to secure the rear of the slide rail to the rear mounting flange.
Note: Ensure that the pins are fully extended through the mounting flange and slide rail.
1 Adjustment tab 3 Pins not extended through the mounting flange and slide rail
2 Release tab 4 Pins extended through the mounting flange and slide rail
4
Installing the Cisco 1121 Secure Access Control System Hardware
6. Align the pins (see Figure 4 on page 5) on the front rail-locking carrier to the front mounting flange.
If you have adjusted the rail length, push the rail-locking carrier back toward the rear of the slide rail to align the slide
rail with the mounting flange.
7. Press the adjustment tab to secure the front of the slide rail to the front mounting flange.
Note: Ensure that the pins are fully extended through the mounting flange and the slide rail.
1 Adjustment tab 4 Pins extended through the mounting flange and slide rail
2 Mounting flange 5 Pins not extended through the mounting flange and slide rail
3 Pins
1. Align the server on the slide rails and push it fully into the rack cabinet.
2. Secure the server to the front mounting flanges with the captive thumbscrews (see Figure 5 on page 6).
Note: You must leave the shipping brackets attached to the slide rails unless the shipping brackets impede the server
from sliding fully into the rack cabinet. If you need to remove the shipping brackets, see Step 3.
5
Installing the Cisco 1121 Secure Access Control System Hardware
3. Press the release tab (see Figure 6 on page 7) as indicated on the shipping bracket, and remove the shipping bracket
from the slide rail.
4. Repeat step 3 for the other shipping bracket. Store the shipping brackets for future use.
Note: You must reinstall the shipping brackets on the slide rails before you transport the rack cabinet with the server
installed. To reinstall the shipping brackets, reverse the steps.
6
Installing the Cisco 1121 Secure Access Control System Hardware
Connecting Cables
1 Release tab
Connecting Cables
This section describes how to connect your CSACS-1121 Series appliance to the network and the appliance console.
This section includes:
8 4
6 4 3
7 5
7
Installing the Cisco 1121 Secure Access Control System Hardware
Connecting Cables
Attach cables (such as keyboard, monitor cables, if required) to the rear of the server. Route the cables to the left corner
of the server (as viewed from the rear in Figure 8 on page 8) and use the cable straps to secure the cables to the slide
rails.
This section describes how to connect the CSACS-1121 Series appliance Ethernet port.
The Ethernet connector supports Serial over LAN (SOL) cables. The RJ-45 port supports standard straight-through and
crossover Category 5 unshielded twisted-pair (UTP) cables. Cisco does not supply Category 5 UTP cables; these cables
are available commercially.
2. Connect one end of the cable to the GigabitEthernet 0 port on the appliance.
8
Installing the Cisco 1121 Secure Access Control System Hardware
Connecting Cables
To access the Ethernet port, connect a Category 3, 4, 5, 5E, or 6 unshielded twisted-pair (UTP) cable to the RJ-45
connector on the back of the appliance.
210222
87654321
RJ-45 connector
Table 3 on page 9 lists and describes the RJ-45 pin signals used on the connector.
Note: To avoid system failures, you must ensure that Ethernet interface 0 is up and running successfully.
Table 4 on page 10 lists the ACS 5.8 services that are distributed among the network interfaces.
9
Installing the Cisco 1121 Secure Access Control System Hardware
Connecting Cables
ACS management functions use only Ethernet interface 0, whereas authentication, authorization, and accounting (AAA)
protocols use all of the configured network interfaces. You must connect the ACS nodes in the distributed deployment
only to Ethernet 0. The syslog messages are sent and received at the log collector’s Ethernet 0 interface. Data forwarding
from one interface to another interface is prohibited to prevent potential security issues. The external identity stores are
supported only on Ethernet interface 0. In ACS 5.8, multiple network interface connectors are also supported for the
RADIUS and TACACS+ proxy functionalities.
Cisco recommends you to use IP address from different subnets for different interfaces in ACS. If you use IP address
from same subnet for different interfaces in ACS, it results in ACS to send ARP replies with same MAC address for the
IP addresses from the same subnet. This recommendation is not applicable for NIC bonding feature. The CLI and ACS
management interfaces are accessible from both Ethernet 0 and Ethernet 1 interfaces if you configure both the Ethernet
0 and Ethernet 1 interfaces with IP addresses from the same subnet. Therefore, the IP addresses for the Ethernet 0 and
Ethernet 1 interfaces should be from different subnets to restrict accessing ACS (CLI and ACS Web interface) only using
Ethernet interface 0.
To configure the IP address for Ethernet ports, complete the following steps:
1. Log in to the ACS CLI using the CLI username and password.
Changing the IP may result in undesired side effects on any installed application(s).
6. Enter Y.
10
Installing the Cisco 1121 Secure Access Control System Hardware
Connecting Cables
ACS restarts automatically. Wait for some time to ensure that all the processes are up and running successfully.
In an IPv6-enabled network, the Ethernet interface 0 can work as a dual-stack interface, but configuring an IPv4 address
is mandatory. The Ethernet interfaces other than Ethernet 0 use an IPv6 address or an IPv4 address or both of them. If
you want to use an IPv4 address for the other Ethernet ports, you must configure IPv4 addresses using the ip address
Ipv4 address ip-mask command as described above.
Note: ACS 5.8 supports IPv4 and IPv6 dual-stack networking but does not support pure IPv6 network.
Bond 0—You can combine Ethernet interface 0 and Ethernet interface 1 to make bond 0. Ethernet interfaces 0 and 1
act as slaves of bond 0. For bond 0, Ethernet interface 0 is the primary slave, and Ethernet interface 1 is the
secondary slave. Therefore, when Ethernet interface 0 goes down, Ethernet interface 1 acts as a backup for Ethernet
interface 0 and processes all requests. Ethernet interface 1 cannot be the primary slave in bond 0. Bond 0 takes the
IP address of Ethernet interface 0 and removes the IP address of Ethernet interface 1. Bond 0 takes the MAC address
of Ethernet interface 0 and assigns the same to Ethernet interface 1.
Bond 1—You can combine Ethernet interface 2 and Ethernet interface 3 to make bond 1. Ethernet interfaces 2and 3
act as slaves of bond 1. For bond 1, Ethernet interface 2 is the primary slave, and Ethernet interface 3 is the
secondary slave. Therefore, when Ethernet interface 2 goes down, Ethernet interface 3 acts as a backup for Ethernet
interface 2 and processes all requests. Ethernet interface 3 cannot be the primary slave in bond 1. Bond 1 takes the
IP address of Ethernet interface 2 and removes the IP address of Ethernet interface 3. Bond 1 takes the MAC address
of Ethernet interface 2 and assigns the same to Ethernet interface 3.
Bond 2—You can combine Ethernet interface 4 and Ethernet interface 5 to make bond 2. Ethernet interfaces 4 and 5
act as slaves of bond 2. For bond 2, Ethernet interface 4 is the primary slave, and Ethernet interface 5 is the
secondary slave. Therefore, when Ethernet interface 4 goes down, Ethernet interface 5 acts as a backup for Ethernet
interface 4 and processes all requests. Ethernet interface 5 cannot be the primary slave in bond 2. Bond 2 takes the
IP address of Ethernet interface 4 and removes the IP address of Ethernet interface 5. Bond 2 takes the MAC address
of Ethernet interface 4 and assigns the same to Ethernet interface 5.
ACS can have only three bonds, bond 0, bond 1, and bond 2, as stated above. You cannot bond interfaces 1 and 2,
3 and 4, and 1 and 5, together. It is not possible to make the Ethernet 2 or Ethernet 3 interfaces a backup interface
for Ethernet 0 and so on.
Within a single bond, the two physical Ethernet interfaces that are involved should be from the same subnet. You
cannot create interface bonding with Ethernet interfaces from different subnets. Ethernet interface 0 should be
assigned an IPv4 address before creating bond 0. Similarly, you cannot create bond 1 without an IPv4 or IPv6
address assigned to Ethernet 2 interface.
Ethernet interface 0 acts as both the management interface and the runtime interface, whereas the other interfaces
act as runtime interfaces. In ACS, you can create bond 0 and leave the other Ethernet interfaces as is. In this case,
bond 0 acts as a manangement and runtime interface, and other Ethernet interfaces act as runtime interfaces. If you
create three bonds, bond 0, bond 1, and bond 2, bond 0 acts as a management and runtime interface, and bond 1
and bond 2 act as a runtime interfaces.
11
Installing the Cisco 1121 Secure Access Control System Hardware
Connecting Cables
You can change the IP address of the primary slave interface in a bonding. The new IP address is assigned to the
bonding interface because bonding takes the IP address of the primary slave.
When you break the interface bonding, the IP address assigned to the bonding interface is assigned back to the
primary slave interface. The secondary slave will be down without any IP address. You must manually configure an
IP address for the secondary slave.
If you want to configure interface bonding to an ACS instance in a distributed deployment, deregister the ACS
instance from the deployment, configure interface bonding, and then register the ACS instance back to the
deployment.
Use the show running-config and show interface commands to see the bonding interface information.
1. Log in to the ACS CLI using the CLI username and password.
WARN: IP address of interface eth1 will be removed once NIC bonding is enabled.
Configuring backup interface may result in undesired side effects on any installed application(s).
6. Enter Y.
ACS restarts automatically. Wait for some time to ensure that all processes are up and running successfully.
1. Log in to the ACS CLI using the CLI username and password.
12
Installing the Cisco 1121 Secure Access Control System Hardware
Connecting Cables
WARN: IP address of interface eth3 will be removed once NIC bonding is enabled.
Configuring backup interface may result in undesired side effects on any installed application(s).
6. Enter Y.
ACS restarts automatically. Wait for some time to ensure that all processes are up and running successfully.
1. Log in to the ACS CLI using the CLI username and password.
WARN: IP address of interface eth5 will be removed once NIC bonding is enabled.
Configuring backup interface may result in undesired side effects on any installed application(s).
6. Enter Y.
ACS restarts automatically. Wait for some time to ensure that all processes are up and running successfully.
13
Installing the Cisco 1121 Secure Access Control System Hardware
Connecting Cables
Removing backup interface configuration may result in undesired side effects on any installed application(s).
5. Enter Y.
ACS restarts automatically. Wait for some time to ensure that all processes are up and running successfully.
Removing backup interface configuration may result in undesired side effects on any installed application(s).
5. Enter Y.
14
Installing the Cisco 1121 Secure Access Control System Hardware
Connecting Cables
ACS restarts automatically. Wait for some time to ensure that all processes are up and running successfully.
Removing backup interface configuration may result in undesired side effects on any installed application(s).
5. Enter Y.
ACS restarts automatically. Wait for some time to ensure that all processes are up and running successfully.
Your CSACS-1121 Series appliance has a DCE-mode console port for connecting a console terminal to your appliance.
The appliance uses a DB-9 serial connector for the console port.
The console port on the CSACS-1121 Series appliance includes an EIA/TIA-232 asynchronous serial (DB-9) connector.
This serial console connector (port) allows you to access the appliance locally by connecting a terminal—either a PC
running terminal-emulation software or an ASCII terminal—to the console port.
15
Installing the Cisco 1121 Secure Access Control System Hardware
Connecting Cables
To connect a PC running terminal-emulation software to the console port, use a DB-9 female to DB-9 female
straight-through cable.
To connect an ASCII terminal to the console port, use a DB-9 female to DB-25 male straight-through cable with a DB-25
female to DB-25 female gender changer.
To connect a terminal or a PC running terminal-emulation software to the console port on the CSACS-1121 Series
appliance:
2. Configure your terminal or terminal-emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no
hardware flow control.
Figure 10 on page 16 shows the pin number assignments for the 9-pin, male D-shell serial port connector located on
the back panel of the appliance. These pin number assignments are those defined for RS-232-C and conform to industry
standards.
1 5
83193
6 9
Table 5 on page 16 lists and describes the serial (console) port pin-out.
This section describes how to connect a keyboard and video monitor to the CSACS-1121 Series appliance.
As an alternative to the keyboard and video monitor, you can use a serial console to connect to the CSACS-1121
appliance.
16
Installing the Cisco 1121 Secure Access Control System Hardware
The CSACS-1121 provides USB ports on the front and rear of the appliance that can be used to connect a keyboard and
video monitor.
2. Connect the end of the keyboard cable to the PS/2 (keyboard) port which is located on the back panel of the
appliance.
3. Connect the end of the video monitor cable to the PS/2 (video monitor) port which is located on the back panel of
the appliance.
Cable Management
Cable management is the most visual aspect of your appliance setup. However, cable management is often overlooked
because it can be time consuming.
Equipment racks and enclosures house more equipment today than ever before. This growth has increased the need for
organized cable management both inside and outside the rack. Poor cable management not only leads to damaged
cables or increased time for adding or changing cables, but also blocks critical airflow or access. These problems can
lead to inefficiencies in the performance of your equipment or even downtime.
There are many solutions to address cable management. They can range from simple cable management rings, to
vertical or horizontal organizers, to troughs and ladders.
All CSACS-1121 Series appliance cables should be properly dressed so as not to interfere with each other or other
pieces of equipment. Use local practices to ensure that the cables attached to your appliance are properly dressed.
Proceed to the next section, Powering Up the CSACS-1121 Series Appliance, page 17, to continue the
installation process.
Warning: This equipment is intended to be grounded. Ensure that the host is connected to earth ground during
normal use. Statement 39
17
Installing the Cisco 1121 Secure Access Control System Hardware
Power-Up Procedure
To power up the CSACS-1121 Series appliance and verify its initialization and self-test, follow this procedure. When the
procedure is completed, the appliance is ready to be configured.
2. Plug the AC power cord into the power cord receptacle at the rear of the appliance. (See location 1 in Figure 7 on
page 7.)
3. Connect the other end of the power cord to a power source at your installation site.
4. Press the power button on the front of the appliance. (See location 2 in Figure 11 on page 18.)
The appliance should begin booting. After the operating system boots, you are ready to initialize the basic software
configuration. For configuration procedures, see the software installation guide or user guide.
195214
9
10
18
Installing the Cisco 1121 Secure Access Control System Hardware
— Off when power is off or an error condition has been detected in the operating voltages.
— Off when appliance has not yet booted or an error condition has been detected in the boot process.
For more detailed information about the LEDs, see Troubleshooting, page 1.
1. Remove the large screw (see Figure 12 on page 19) and discard it.
4. Fully extend the rail and insert the screw you saved into the position where the large screw had been located.
6. Repeat the steps from 1.Remove the large screw (see Figure 12 on page 19) and discard it., page 19 to 5.Tighten
all screws to secure the rail., page 19 for the other rail.
7. You must secure the server to the rack, by doing the following:
19
Installing the Cisco 1121 Secure Access Control System Hardware
b. Slide the server out of the rack 150 mm (6 inches) and insert the M6 screws in each slide rail.
c. Secure the server to the rack cabinet with the M6 screws. See Figure 13 on page 20.
8. Ensure that the rails are fully extended to the rear of the rack cabinet.
If you have removed the shipping brackets on the slide rails, you must reinstall them before you transport the rack
cabinet with the server installed. Reverse the instructions on the shipping bracket to reinstall it, as shown in Figure 6
on page 7.
Warning: Ultimate disposal of this product should be handled according to all national laws and regulations.
Statement 1040
20
Installing the Cisco 1121 Secure Access Control System Hardware
The appliance is in constant communication on your network; thus, when the network notices that the appliance is
no longer responding to it, the network stops sending requests to the appliance. This change is visible to users.
Note: If other appliances are attached to the network, the network continues sending requests to the other appliances.
2. Install a new appliance using the same installation procedures that you used for the previous appliance.
3. Configure the new appliance using the same configuration parameters that you used for the removed appliance.
21
Installing the Cisco 1121 Secure Access Control System Hardware
22
Installing and Configuring the Cisco Secure
Access Control System with
CSACS-1121
This chapter describes how to install and initially configure CSACS-1121 and the ACS 5.8 server.
1. Open the box and check the contents. See Unpacking and Checking the Contents of Your Shipment, page 9
2. Read Introducing the Cisco 1121 Secure Access Control System Hardware, page 1
3. Read the general precautions and safety warnings in Preparing to Install the Cisco 1121 Secure Access Control
System Hardware, page 1
4. Install the appliance in the rack. See Installing the Cisco 1121 Secure Access Control System Hardware, page 1
5. Connect the CSACS-1121 to the network and appliance console. See Connecting Cables, page 7
6. Power up the CSACS-1121 appliance. See Powering Up the CSACS-1121 Series Appliance, page 17
7. Run the setup command at the CLI prompt to configure the initial settings for the ACS server. See Running the Setup
Program, page 2.
1. Go to http://www.cisco.com/go/acs. You must already have a valid Cisco.com login credentials to access this link.
1
Installing and Configuring the Cisco Secure Access Control System with CSACS-1121
The Cisco Secure ACS Release 5.8 software image appears on the Cisco.com page. You can test all the Cisco ACS
services once your installation and initial configuration are complete.
Note: You can download the ACS 5.x software images from Cisco.com only when you have a valid Software Application
Support (SAS) contract for a previous version of ACS 5.x software. If you do not have a valid SAS contract for a previous
version, you must contact your Sales Engineer (SE), Accounts Manager (AM), or Cisco partners to publish the software
image on Cisco.com to the specific customers account.
The setup program launches an interactive command-line interface (CLI) that prompts you for the required parameters.
An administrator can use the console or a dumb terminal to configure the initial network settings and provide the initial
administrator credentials for the ACS 5.8 server using the setup program. The setup process is a one-time configuration
task.
The console displays a set of parameters. You must enter the parameters as described in Table 1 on page 3.
Note: You can interrupt the setup process at any time by typing Ctrl-C before the last setup value is entered.
2
Installing and Configuring the Cisco Secure Access Control System with CSACS-1121
3
Installing and Configuring the Cisco Secure Access Control System with CSACS-1121
In addition:
4
Installing and Configuring the Cisco Secure Access Control System with CSACS-1121
Rebooting...
Now, you can log into ACS using the CLI username and password that was configured during the setup process.
Note: You can use this username and password to log into ACS only via the CLI.
Note: The initial setup of the ACS 5.8 server should be configured with an IPv4 address. You can configure the IPv6 IP
address for your server only after the initial setup is completed.
Note: ACS 5.8 supports IPv4 and IPv6 dual stack networking and does not support pure IPv6 network.
1. When the system reboots, at the login prompt enter the username you configured during setup, and press Enter.
2. At password prompt, enter the password you configured during setup, and press Enter.
3. Verify that the application has been installed properly by entering show application, and press Enter.
<name> <Description>
acs Cisco Secure Access Control System 5.8
4. At the system prompt, check the release and ACS version that are installed, at the system prompt by entering show
application version acs and pressing Enter.
-----------------------------
Version: 5.8.0.32
Internal Build ID: B.442
Note: The Version and Internal Build ID may change for different versions of this release.
5. Check the status of ACS processes, at the system prompt by entering show application status acs, and press
Enter.
Note: To get the latest ACS patches and to keep your ACS up-to-date, visit
http://software.cisco.com/download/navigator.html?i=rt
5
Installing and Configuring the Cisco Secure Access Control System with CSACS-1121
To reset the administrator password, at the system prompt, enter 3 if you are using a keyboard and video monitor,
or enter 4 if you are using a serial console port.
Admin username:
[1]:admin
[2]:admin2
[3]:admin3
Enter number of admin for password recovery:1
Password:
Verify password:
Save change&reeboot? [Y/N]:
6
Installing and Configuring the Cisco Secure Access Control System with CSACS-1121
Regulatory Compliance
3. At the console prompt, enter 1 if you are using a keyboard and video monitor, or enter 2 if you are using a serial
console port, and press Enter.
The reimage process uninstalls the existing ADE-OS and ACS versions, and installs the latest versions. For the
installation process, see the section Running the Setup Program, page 2.
Regulatory Compliance
For regulatory compliance and safety information, see Regulatory Compliance and Safety Information for Cisco Secure
Access Control System.
7
Installing and Configuring the Cisco Secure Access Control System with CSACS-1121
Regulatory Compliance
8
ACS 5.8 on Cisco SNS 3400 Servers
1
ACS 5.8 on Cisco SNS 3400 Servers
2
Introducing the Cisco SNS-3415 and
Cisco SNS-3495 Hardware Appliances
This chapter gives an overview of the Cisco Secure Access Control System (Cisco SNS-3415 and Cisco SNS-3495)
hardware. It covers the appliance hardware, major components, controls, connectors, and front- and rear-panel LED
indicators.
Product Overview
This section describes the power requirements, rack-mount hardware kit, and features of the Cisco SNS-3415 and Cisco
SNS-3495 appliances.
Building on the success of the Cisco SNS-3415/3495 server, the enterprise-class Cisco SNS-3415/3495 server further
extends the capabilities of the Cisco Unified Computing System portfolio in a 1U form factor. The Cisco SNS-3415 server
does this with the addition of the Intel Xeon processor E5-2600 product family, which delivers significant performance
and efficiency gains. In addition, the Cisco SNS-3415/3495 server offers up to 256 GB of RAM, 8 drives, and 2 x 1 GbE
lights-out management (LOM) ports that deliver outstanding levels of density and performance in a compact package.
1
Introducing the Cisco SNS-3415 and Cisco SNS-3495 Hardware Appliances
Product Overview
Table 1 Cisco SNS 3415 and Cisco SNS 3495 Hardware Summary
Cisco Secure ACS Hardware Specifications Diagrams
Appliance
Cisco SNS-3415-K9 Cisco UCS C220 M3 Figure 1Cisco SNS-3415/3495
Appliance Front View, page 3
Single socket Intel E5-2609 2.4Ghz
CPU 4 total cores, 4 total threads Figure 2Cisco SNS-3415/3495
Appliance Rear View, page 3
16 GB RAM
1 x 600-GB disk
4 GE network interfaces
2 x 600-GB disks
RAID 0+1
4 GE network interfaces
Note: ACS 5.8 supports an optional redundant power supply unit for Cisco SNS-3415-K9.
2
Introducing the Cisco SNS-3415 and Cisco SNS-3495 Hardware Appliances
Product Overview
4 6
1 2 3 5 7 8
331682
HDD4 HDD5 HDD6 HDD7 HDD8
9 10
1 2 3 4 5
PCIe2
PSU1 PSU2
360856
6 7 8 9 10 11 12
3
Introducing the Cisco SNS-3415 and Cisco SNS-3495 Hardware Appliances
Before you submit a request for service online or by phone, use the CPI tool to locate your product serial number. You
can access this tool from the Cisco Support website.
3. Select Cisco Product Identification Tool from the alphabetical drop-down list.
Copy and paste the output of the show command to identify the product.
Search results show an illustration of your product with the serial number label location highlighted. Locate the serial
number label on your product and record the information before you place a service call.
http://tools.cisco.com/Support/CPI/index.do
To access the CPI tool, you require a Cisco.com user ID and password. If you have a valid service contract but do
not have a user ID or password, you can register at:
http://tools.cisco.com/RPF/register/register.do
4
Introducing the Cisco SNS-3415 and Cisco SNS-3495 Hardware Appliances
Table 2 on page 5 describes the LEDs located on the front panel of the Cisco SNS-3415 or Cisco SNS-3495 appliance
— Boot failed.
5
Introducing the Cisco SNS-3415 and Cisco SNS-3495 Hardware Appliances
Green—One or more Ethernet LOM ports are link-active, but there is no activity.
Green, blinking—One or more Ethernet LOM ports are link-active, with activity.
Hard drive fault Off—The hard drive is operating properly.
Table 3 on page 6 describes the LEDs located on the front panel of the Cisco SNS-3415 or Cisco SNS-3495 appliance.
Amber, blinking—An event warning threshold has been reached, but the power supply
continues to operate.
Amber, solid—A critical fault threshold has been reached, causing the power supply
to shut down (for example, a fan failure or an over-temperature condition).
Power supply AC OK Off—There is no AC power to the power supply.
6
Introducing the Cisco SNS-3415 and Cisco SNS-3495 Hardware Appliances
Note: Power must be connected to the server for these LEDs to be operate.
Figure 3 on page 7 shows the locations of these internal LEDs in Cisco SNS-3415 or Cisco SNS-3495 appliance.
FAN4
331693
7
Introducing the Cisco SNS-3415 and Cisco SNS-3495 Hardware Appliances
Regulatory Compliance
1 Fan module fault LEDs (one next to each fan 2 DIMM fault LEDs (one next to each DIMM
connector on the motherboard) socket on the motherboard)
Table 4 on page 8 describes the internal diagnostic LEDs located inside the Cisco SNS-3415 or Cisco SNS-3495
appliance.
Regulatory Compliance
For regulatory compliance and safety information, see Regulatory Compliance and Safety Information for Cisco Secure
Access Control System.
For more information, see Obtaining Documentation and Submitting a Service Request, page 11.
8
Preparing to Install the Cisco SNS 3415
and Cisco SNS 3495 Hardware Appliances
This section provides information on how you can prepare your site for safely installing the Cisco SNS-3415 or Cisco
SNS-3495 appliance.
Safety Guidelines
Note: Before you install, operate, or service a Cisco SNS-3415 or Cisco SNS-3495 appliance, review the Regulatory
Compliance and Safety Information for Cisco Secure Access Control System for important safety information.
This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any
equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for
preventing accidents. Use the statement number provided at the end of each warning to locate its translation in the
translated safety warnings that accompanied this device.
Statement 1071
Warning: To prevent the system from overheating, do not operate it in an area that exceeds the maximum
recommended ambient temperature of: 40° C (104° F).
Statement 1047
Warning: The plug-socket combination must be accessible at all times, because it serves as the main disconnecting
device.
Statement 1019
Warning: This product relies on the building’s installation for short-circuit (overcurrent) protection. Ensure that the
protective device is rated not greater than: 250 V, 15 A.
Statement 1005
Warning: Installation of the equipment must comply with local and national electrical codes.
Statement 1074
Plan your site configuration and prepare the site before installing the server. See the Cisco UCS Site Preparation
Guide for the recommended site planning tasks.
Ensure that there is adequate space around the server to allow for servicing the server and for adequate airflow. The
airflow in this server is from front to back.
1
Preparing to Install the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
Ensure that the air-conditioning meets the thermal requirements listed in the Server Specifications, page 4.
Ensure that the cabinet or rack meets the requirements listed in the Rack Requirements, page 4.
Ensure that the site power meets the power requirements listed in the Server Specifications, page 4. If available, you
can use an uninterruptible power supply (UPS) to protect against power failures.
Caution: Avoid UPS types that use ferroresonant technology. These UPS types can become unstable with systems
such as the Cisco UCS, which can have substantial current draw fluctuations from fluctuating data traffic patterns.
Note: Keep the shipping container in case the server requires shipping in the future.
Note: The chassis is thoroughly inspected before shipment. If any damage occurred during transportation or any items
are missing, contact your customer service representative immediately.
1. Remove the server from its cardboard container and save all packaging material.
2. Compare the shipment to the equipment list provided by your customer service representative and Figure 1 on
page 3. Verify that you have all items.
3. Check for damage and report any discrepancies or damage to your customer service representative. Have the
following information ready:
Description of damage
2
Preparing to Install the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
1 2
3 4
UC
S CCisc
-S o
eri
es
331685
1 Server 3 Documentation
2 Power cord (optional, up to two) 4 KVM cable
Installation Guidelines
Warning: To prevent the system from overheating, do not operate it in an area that exceeds the maximum
recommended ambient temperature of: 40° C (104° F).
Statement 1047
Warning: The plug-socket combination must be accessible at all times, because it serves as the main disconnecting
device.
Statement 1019
Warning: This product relies on the building's installation for short-circuit (overcurrent) protection. Ensure that the
protective device is rated not greater than: 250 V, 15 A.
Statement 1005
Warning: Installation of the equipment must comply with local and national electrical codes.
Statement 1074
Plan your site configuration and prepare the site before installing the server. See the Cisco UCS Site Preparation
Guide for the recommended site planning tasks.
3
Preparing to Install the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
Server Specifications
Ensure that there is adequate space around the server to allow for servicing the server and for adequate airflow. The
airflow in this server is from front to back.
Ensure that the air-conditioning meets the thermal requirements listed in the Server Specifications, page 4.
Ensure that the cabinet or rack meets the requirements listed in the Rack Requirements, page 4 section.
Ensure that the site power meets the power requirements listed in the Server Specifications, page 4. If available, you
can use an uninterruptible power supply (UPS) to protect against power failures.
Caution: Avoid UPS types that use ferroresonant technology. These UPS types can become unstable with systems
such as the Cisco SNS-3415 or Cisco SNS-3495 appliance, which can have substantial current draw fluctuations
from fluctuating data traffic patterns.
Rack Requirements
This section provides the requirements for the standard open racks.
A standard 19-in. (48.3-cm) wide, four-post EIA rack, with mounting posts that conform to English universal hole
spacing, per section 1 of ANSI/EIA-310-D-1992.
The rack post holes can be square .38-inch (9.6 mm), round .28-inch (7.1 mm), #12-24 UNC, or #10-32 UNC when
you use the supplied slide rails.
The minimum vertical rack space per server must be one RU, equal to 1.75 in. (44.45 mm).
Equipment Requirements
The slide rails supplied by Cisco Systems for this server do not require tools for installation. The inner rails (mounting
brackets) are pre-attached to the sides of the server.
Server Specifications
This section lists the technical specifications for the server and includes the following sections:
Physical Specifications
Table 1 on page 5 lists the physical specifications of the server.
4
Preparing to Install the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
Server Specifications
Environmental Specifications
Table 2 on page 5 lists the environmental specifications of the server.
Power Specifications
The power specifications for the two power supply options are listed in the following sections:
You can get more specific power information for your exact server configuration by using the Cisco UCS Power
Calculator:
http://www.cisco.com/assets/cdc_content_elements/flash/dataCenter/cisco_ucs_power_calculator/
Note: Do not mix power supply types in the server. Both power supplies must be either 450W or 650W.
Note: ACS 5.8 supports an optional redundant power supply unit for Cisco SNS-3415-K9.
5
Preparing to Install the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
Server Specifications
6
Installing the Cisco SNS 3415 and Cisco
SNS 3495 Hardware Appliances
This chapter describes how to install your Cisco SNS-3415 or Cisco SNS-3495 appliance and connect it to the network.
It contains:
Before you begin the installation, read the Regulatory Compliance and Safety Information for the Cisco 3415 or 3495
Secure Access Control System.
Warning: Only trained and qualified personnel should be allowed to install, replace, or service this equipment.
Statement 1030
Warning: This unit is intended for installation in restricted access areas. A restricted access area can be accessed
only through the use of a special tool, lock and key, or other means of security.
Statement 1017
Warning: To prevent bodily injury when mounting or servicing this unit in a rack, you must take special precautions
to ensure that the system remains stable. The following guidelines are provided to ensure your safety:
This unit should be mounted at the bottom of the rack if it is the only unit in the rack.
When mounting this unit in a partially filled rack, load the rack from the bottom to the top with the heaviest
component at the bottom of the rack.
If the rack is provided with stabilizing devices, install the stabilizers before mounting or servicing the unit in the
rack.
Statement 1006
To install the slide rails and the server into a rack, follow these steps:
1. Open the front securing latch (see Figure 1 on page 2). The end of the slide-rail assembly marked “FRONT” has a
spring-loaded securing latch that must be open before you can insert the mounting pegs into the rack-post holes.
a. On the rear side of the securing-latch assembly, hold open the clip marked “PULL.”
b. Slide the spring-loaded securing latch away from the mounting pegs.
c. Release the clip marked “PULL” to lock the securing latch in the open position.
1
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
332061
Table 0-1
a. Position a slide-rail assembly inside the two left-side rack posts (see Figure 2 on page 3).
Use the “FRONT” and “REAR” markings on the slide-rail assembly to orient the assembly correctly with the front and
rear rack posts.
b. Position the front mounting pegs so that they enter the desired front rack-post holes from the front.
Note: The mounting pegs that protrude through the rack-post holes are designed to fit round or square holes, or
smaller #10-32 round holes when the mounting peg is compressed. If your rack has #10-32 rack-post holes, align
the mounting pegs with the holes and then compress the spring-loaded pegs to expose the #10-32 inner peg.
c. Expand the length-adjustment bracket until the rear mounting pegs protrude through the desired holes in the rear
rack post.
2
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
Use your finger to hold the rear securing latch open when you insert the rear mounting pegs to their holes. When
you release the latch, it wraps around the rack post and secures the slide-rail assembly.
2 5 6
3
331689
1 Front-left rack post 4 Length-adjustment bracket
2 Front mounting pegs 5 Rear mounting pegs
3 Slide-rail assembly 6 Rear securing latch
d. Attach the second slide-rail assembly to the opposite side of the rack. Ensure that the two slide-rail assemblies
are level and at the same height with each other.
e. Pull the inner slide rails on each assembly out toward the rack front until they hit the internal stops and lock in
place.
Note: The inner rails are pre-attached to the sides of the server at the factory. You can order replacement inner rails
if these are damaged or lost (Cisco PID UCSC-RAIL1-I).
a. Align the inner rails that are pre-attached to the server sides with the front ends of the empty slide rails.
b. Push the server into the slide rails until it stops at the internal stops.
c. Push in the plastic release clip on each inner rail (labelled PUSH), and then continue pushing the server into the
rack until its front latches engage the rack posts.
4. Attach the (optional) cable management arm (CMA) to the rear of the slide rails:
Note: The CMA is designed for mounting on either the right or left slide rails. These instructions describe an
installation to the rear of the right slide rails, as viewed from the rear of server.
a. Slide the plastic clip on the inner CMA arm over the flange on the mounting bracket that attached to the side of
the server. See Figure 3 on page 4.
3
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
Note: Whether you are mounting the CMA to the left or right slide rails, be sure to orient the engraved marking, “UP”
so that it is always on the upper side of the CMA. See Figure 3 on page 4.
b. Slide the plastic clip on the outer CMA arm over the flange on the slide rail. See Figure 3 on page 4.
c. Attach the CMA retaining bracket to the left slide rail. Slide the plastic clip on the bracket over the flange on the
end of the left slide
1 4
7
2
331690
6
1 Flange on rear of outer left slide rail 5 Inner CMA arm attachment clip
2 CMA retaining bracket 6 “UP” orientation marking
3 Flange on rear of right mounting 7 Outer CMA arm attachment clip
bracket
4 Flange on rear of outer right slide rail 8
http://www.cisco.com/en/US/products/ps10739/products_installation_and_configuration_guides_list.html
Configuring CIMC
You can perform all operations on the Cisco SNS-3415 or Cisco SNS-3495 appliance through the CIMC. To do this, you
must first configure an IP address and IP gateway to access the CIMC from a web-based browser.
4
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
Configuring CIMC
3. During bootup, press F8 when prompted to open the BIOS CIMC Configuration Utility. The following screen appears.
5
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
Connecting Cables
4. Set the NIC mode to your choice for which ports to use to access the CIMC for server management (see Figure 1
on page 3 for identification of the ports):
— Dedicated—The 1-Gb Ethernet management port is used to access the CIMC. You must select NIC redundancy
None and select IP settings.
— Shared LOM (default)—The two 1-Gb Ethernet ports are used to access the CIMC. This is the factory default
setting, along with Active-active NIC redundancy and DHCP enabled.
— Cisco Card—The ports on an installed Cisco UCS P81E VIC are used to access the CIMC. You must select a NIC
redundancy and IP setting.
Note: The Cisco Card NIC mode is currently supported only with a Cisco UCS P81E VIC (N2XX-ACPCI01) that is
installed in PCIe slot 1.
5. Use this utility to change the NIC redundancy to your preference. This server has three possible NIC redundancy
settings:
— None—The Ethernet ports operate independently and do not fail over if there is a problem.
— Active-standby—If an active Ethernet port fails, traffic fails over to a standby port.
6. Choose whether to enable DHCP for dynamic network settings, or to enter static network settings.
Note: Before you enable DHCP, your DHCP server must be preconfigured with the range of MAC addresses for this
server. The MAC address is printed on a label on the rear of the server. This server has a range of six MAC addresses
assigned to the CIMC. The MAC address printed on the label is the beginning of the range of six contiguous MAC
addresses.
Note: Changes to the settings take effect after approximately 45 seconds. Refresh with F5 and wait until the new
settings appear before you reboot the server in the next step.
Note: If you chose to enable DHCP, the dynamically assigned IP and MAC addresses are displayed on the console
screen during bootup.
Note: By default, the baud rate of the serial port is set to 115200. After you configure CIMC, log in to the CIMC user
interface and change the serial port buad rate to 9600.
Connecting Cables
This section describes how to connect your Cisco SNS-3415 or Cisco SNS-3495 appliance to the network and the
appliance console. This section includes:
Attach cables (such as keyboard, monitor cables, if required) to the rear of the server. Route the cables properly and use
the cable straps to secure the cables to the slide rails. See Figure 2 on page 3 Figure 2Cisco SNS-3415/3495 Appliance
Rear View, page 3 for reference on the rear view of the appliance.
6
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
Connecting Cables
This section describes how to connect the Cisco SNS-3415 or Cisco SNS-3495 appliance Ethernet port.
The Ethernet connector supports Serial over LAN (SOL) cables. The RJ-45 port supports standard straight-through and
crossover Category 5 unshielded twisted-pair (UTP) cables. Cisco does not supply Category 5 UTP cables; these cables
are available commercially.
2. Connect one end of the cable to the GigabitEthernet 0 port on the appliance.
To access the Ethernet port, connect a Category 3, 4, 5, 5E, or 6 unshielded twisted-pair (UTP) cable to the RJ-45
connector on the back of the appliance.
87654321
RJ-45 connector
Table 2 on page 8 lists and describes the RJ-45 pin signals used on the connector.
7
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
Connecting Cables
Your Cisco SNS-3415 or Cisco SNS-3495 appliance has a DCE-mode console port for connecting a console terminal to
your appliance. The appliance uses a DB-9 serial connector for the console port.
The console port on the Cisco SNS-3415 or Cisco SNS-3495 appliance includes an EIA/TIA-232 asynchronous serial
(DB-9) connector. This serial console connector (port) allows you to access the appliance locally by connecting a
terminal—either a PC running terminal-emulation software or an ASCII terminal—to the console port.
To connect a PC running terminal-emulation software to the console port, use a DB-9 female to DB-9 female
straight-through cable.
To connect an ASCII terminal to the console port, use a DB-9 female to DB-25 male straight-through cable with a DB-25
female to DB-25 female gender changer.
To connect a terminal or a PC running terminal-emulation software to the console port on the Cisco SNS-3415 or Cisco
SNS-3495 appliance:
2. Configure your terminal or terminal-emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no
hardware flow control.
This section describes how to connect a keyboard and video monitor to the Cisco SNS-3415 or Cisco SNS-3495
appliance.
You can connect the keyboard and video monitor to the Cisco SNS-3415 or Cisco SNS-3495 appliance using the KVM
connector available in the front panel of the Cisco SNS-3415 or Cisco SNS-3495 appliance. A KVM cable is shipped
along with the appliance that provides two USB, one VGA, and one serial connector.
The Cisco SNS-3415 or Cisco SNS-3495 appliance does not provide support for a mouse.
The Cisco SNS-3415 or Cisco SNS-3495 provides USB ports on the rear of the appliance that can be used to connect
a keyboard and video monitor.
8
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
2. Connect the end of the keyboard cable to the PS/2 (keyboard) port which is located on the back panel of the
appliance.
3. Connect the end of the video monitor cable to the PS/2 (video monitor) port which is located on the back panel of
the appliance.
Cable Management
Cable management is the most visual aspect of your appliance setup. However, cable management is often overlooked
because it can be time consuming.
Equipment racks and enclosures house more equipment today than ever before. This growth has increased the need for
organized cable management both inside and outside the rack. Poor cable management not only leads to damaged
cables or increased time for adding or changing cables, but also blocks critical airflow or access. These problems can
lead to inefficiencies in the performance of your equipment or even downtime.
There are many solutions to address cable management. They can range from simple cable management rings, to
vertical or horizontal organizers, to troughs and ladders.
All Cisco SNS-3415 or Cisco SNS-3495 appliance cables should be properly dressed so as not to interfere with each
other or other pieces of equipment. Use local practices to ensure that the cables attached to your appliance are properly
dressed.
Proceed to the next section, Connecting and Powering On the Cisco SNS-3415/3495 Appliance, page 9, to continue
the installation process.
Note: The server is shipped with a default NIC mode called Shared LOM, default NIC redundancy is active-active, and
DHCP is enabled. Shared LOM mode enables the two 1-Gb Ethernet ports to access the Cisco Integrated Management
Interface (CIMC). If you want to use the 1-Gb Ethernet dedicated management port, or a port on a Cisco UCS P81E Virtual
Interface Card (VIC) to access the CIMC, you must first connect to the server and change the NIC mode as described in
Step 3 of the following procedure. In that step, you can also change the NIC redundancy and set static IP settings.
9
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
1. Attach a supplied power cord to each power supply in your server, and then attach the power cord to a grounded
AC power outlet. See the Power Specifications, page 5 for power specifications. Wait for approximately two minutes
to let the server boot in standby power during the first bootup.
You can verify power status by looking at the Power Status LED (see ):
Amber—The server is in standby power mode. Power is supplied only to the CIMC and some motherboard functions.
Green—The server is in main power mode. Power is supplied to all server components.
Note: During bootup, the server beeps once for each USB device that is attached to the server. Even if there are no
external USB devices attached, there is a short beep for each virtual USB device such as a virtual floppy drive, CD/DVD
drive, keyboard, or mouse. A beep is also emitted if a USB device is hot-plugged or hot-unplugged during BIOS
power-on self test (POST), or while you are accessing the BIOS Setup utility or the EFI shell.
2. Connect a USB keyboard and VGA monitor by using the supplied KVM cable connected to the KVM connector on
the front panel (see Figure 1 on page 3).
Note: Alternatively, you can use the VGA and USB ports on the rear panel. However, you cannot use the front panel VGA
and the rear panel VGA at the same time. If you are connected to one VGA connector and you then connect a video
device to the other connector, the first VGA connector is disabled.
3. See the Configuring CIMC, page 4 to enter in to the BIOS CIMC Configuration Utility. Use this utility to set NIC mode,
NIC redundancy, and choose whether to enable DHCP or set static network settings.
4. Connect to the CIMC for server management. Connect Ethernet cables from your LAN to the server, using the ports
that you selected in Step 3. The Active-active and Active-passive NIC redundancy settings require you to connect
to two ports.
5. Enter the IP address of the CIMC in your browser to connect to the CIMC Setup Utility. The CIMC IP address is
configured in Step 3 (either a static address or the address assigned by your DHCP server).
To manage the server, see the Cisco UCS C-Series Rack-Mount Server Configuration Guide or the Cisco UCS C-Series
Rack-Mount Server CLI Configuration Guide for instructions on using those interfaces. The links to these documents are
in the C-Series documentation roadmap:
http://www.cisco.com/go/unifiedcomputing/c-series-doc
10
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
The server uses firmware obtained from and certified by Cisco. Cisco provides release notes with each firmware image.
There are several methods for updating the firmware:
Recommended method for systems running firmware level 1.2 or later: Use the Cisco Host Upgrade Utility to
simultaneously upgrade the CIMC is 1.4.7a, BIOS 1.4.7b.0, LOM, LSI storage controller, and Cisco UCS P81E VIC
firmware to compatible levels.
See the Cisco Host Upgrade Utility Quick Reference Guide for your firmware level at the documentation roadmap link
below.
Note: Your system firmware must be at minimum level 1.2 to use the Cisco Host Upgrade Utility. If your firmware is
prior to level 1.2, you must use the methods below to update the BIOS and CIMC firmware individually.
You can upgrade the BIOS using the EFI interface, or upgrade from a Windows or Linux platform. See the Cisco UCS
C-Series Rack-Mount Server BIOS Upgrade Guide.
You can upgrade the CIMC and BIOS firmware by using the CIMC GUI interface. See the Cisco UCS C-Series
Rack-Mount Server Configuration Guide.
You can upgrade the CIMC and BIOS firmware by using the CIMC CLI interface. See the Cisco UCS C-Series
Rack-Mount Server CLI Configuration Guide.
For links to the documents listed above, see the documentation roadmap at the following URL:
http://www.cisco.com/go/unifiedcomputing/c-series-doc
1. Enter the BIOS setup utility by pressing the F2 key when prompted during bootup.
Note: The version and build of the current BIOS are displayed on the Main page of the utility.
4. Press Enter to select the field that you want to change, and then modify the value in the field.
5. Press the right arrow key until the Exit menu screen is displayed.
6. Follow the instructions on the Exit menu screen to save your changes and exit the setup utility (or Press F10). You
can exit without saving changes by pressing Esc.
11
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
FAN1
PCIe1
CPU1
FAN2
PCIe2
FAN3
PSU2
FAN4
FAN4
CPU2
FAN5
PSU1
333940
123
3 2 1
If the BIOS BootBlock is corrupted, you might see the system get stuck on the following message:
12
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
Note: As indicated by the message shown above, there are two procedures for recovering the BIOS. Try procedure 1
first, then if that does not recover the BIOS, use procedure 2.
Note: The server must have CIMC version 1.4(6) or later to use these procedures.
2. Copy the contents of the extracted Initializing and configuring memory/hardware folder to the root directory a USB
thumb drive. The recovery folder contains the recovery file that is required in this procedure.
Note: The recovery.cap file must be in the root directory of the USB thumb drive. Do not rename this file. The USB
thumb drive must be formatted with either FAT16 or FAT32 file systems.
3. Insert the USB thumb drive into a USB port on the server.
5. Return the server to main power mode by pressing the Power button on the front panel.
The server boots with the updated BIOS boot block. When the BIOS detects a valid recovery.cap file on the USB
thumb drive, it displays this message:
6. Wait for server to complete the BIOS update, then remove the USB thumb drive from the server.
Note: During the BIOS update, the CIMC will shut down the server and the screen will be blank for about 10 minutes.
Do not unplug the power cords during this update. The CIMC will power on the server after the update is complete.
2. Copy the contents of the extracted recovery folder to the root directory of a USB thumb drive. The recovery folder
contains the recovery.cap file that is required in this procedure.
Note: The recovery.cap file must be in the root directory of the USB thumb drive. Do not rename this file. The USB
thumb drive must be formatted with either FAT16 or FAT32 file systems.
3. Power off the server as described in Shutting Down and Powering Off the Server.
5. Slide the server out the front of the rack far enough so that you can remove the top cover. You might have to detach
cables from the rear panel to provide clearance.
Caution: Caution If you cannot safely view and access the component, remove the server from the rack.
6. Remove the top cover as described in Removing and Replacing the Server Top Cover.
7. Move the shorting jumper to pins 2 and 3 of the J41 header (see Figure 2-5).
8. Reconnect AC power cords to the server. The server powers up to standby power mode.
9. Insert the USB thumb drive that you prepared in Step 2 into a USB port on the server.
13
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
10. Return the server to main power mode by pressing the Power button on the front panel.
The server boots with the updated BIOS boot block. When the BIOS detects a valid recovery.cap file on the USB
thumb drive, it displays this message:
11. Wait for server to complete the BIOS update, then remove the USB thumb drive from the server.
Note: During the BIOS update, the CIMC will shut down the server and the screen will be blank for about 10 minutes.
Do not unplug the power cords during this update. The CIMC will power on the server after the update is complete.
12. After the server has fully booted, power off the server again and disconnect all power cords.
13. Move the jumper back to the default pins 1 and 2 of the J41 header.
Note: If you do not move the jumper, after recovery completion you see the prompt, “Please remove the recovery
jumper.”
14. Replace the top cover, replace the server in the rack, replace power cords and any other cables, then power on the
server by pressing the Power button.
Caution: Clearing the CMOS removes any customized settings and might result in data loss. Make a note of any
necessary customized settings in the BIOS before you use this clear CMOS procedure.
1. Power off the server as described in Shutting Down and Powering Off the Server.
3. Slide the server out the front of the rack far enough so that you can remove the top cover. You might have to detach
cables from the rear panel to provide clearance.
Caution: If you cannot safely view and access the component, remove the server from the rack.
4. Remove the top cover as described in Removing and Replacing the Server Top Cover.
5. Move the shorting jumper to pins 2 and 3 of the J37 header (see Figure 2-5).
6. Reinstall the top cover and reconnect AC power cords to the server. The server powers up to standby power mode,
indicated when the Power LED on the front panel is amber.
7. Return the server to main power mode by pressing the Power button on the front panel. The server is in main power
mode when the Power LED is green.
Note: You must allow the entire server, not just the service processor, to reboot to main power mode to complete
the reset. This is because the state of the jumper cannot be determined without the host CPU running.
8. Press the Power button to shut down the server to standby power mode, and then remove AC power cords from the
server to remove all power.
10. Move the shorting jumper from header pins 2 and 3, back to its default position on pins 1 and 2.
14
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
Note: If you do not move the jumper, the CMOS settings are reset to the default every time that you power-cycle the
server.
11. Replace the top cover, replace the server in the rack, replace power cords and any other cables, then power on the
server by pressing the Power button.
15
Installing the Cisco SNS 3415 and Cisco SNS 3495 Hardware Appliances
16
Installing and Configuring the Secure
Access Control System with the Cisco
SNS-3415 and Cisco SNS-3495
This chapter describes how to install and initially configure the Cisco SNS-3415 or Cisco SNS-3495 and the ACS 5.8
server.
1. Open the box and check the contents. See Unpacking and Inspecting the Server, page 2
2. Read Introducing the Cisco SNS-3415 and Cisco SNS-3495 Hardware Appliances, page 1.
3. Read the general precautions and safety warnings in Preparing to Install the Cisco SNS 3415 and Cisco SNS 3495
Hardware Appliances, page 1
4. Install the appliance in the rack. See Preparing for Server Installation, page 3
5. Connect the Cisco SNS-3415 or Cisco SNS-3495 to the network and appliance console. See Connecting Cables,
page 6
6. Power up the Cisco SNS-3415 or Cisco SNS-3495 appliance. See Connecting and Powering On the Cisco
SNS-3415/3495 Appliance, page 9
7. Power up the Cisco SNS-3415 or Cisco SNS-3495 appliance to the network and appliance console. See Connecting
Cables, page 6
8. Run the setup command at the CLI prompt to configure the initial settings for the ACS server. See Running the Setup
Program, page 5. The setup can be done by using the appliance console or CIMC.
You can use the Cisco UCS Server Configuration Utility, Release 3.0 User Guide to configure the
Cisco SNS-3415 or Cisco SNS-3495 appliance. You can also see the Cisco UCS C-Series Rack Server guides for more
information on Cisco SNS-3415 or Cisco SNS-3495 appliance.
1
Installing and Configuring the Secure Access Control System with the Cisco SNS-3415 and Cisco SNS-3495
1. Go to http://www.cisco.com/go/acs. You must already have a valid Cisco.com login credentials to access this link.
The Cisco Secure ACS Release 5.8 software image appears on the Cisco.com page. You can test all the Cisco ACS
services once your installation and initial configuration are complete.
Note: You can download the ACS 5.x software images from Cisco.com only when you have a valid Software Application
Support (SAS) contract for a previous version of ACS 5.x software. If you do not have a valid SAS contract for a previous
version, you must contact your Sales Engineer (SE), Accounts Manager (AM), or Cisco partners to publish the software
image on Cisco.com to the specific customers account.
Configure the Cisco Integrated Management Interface (CIMC) and use it to install Cisco Secure ACS 5.8 remotely
via the network. See Configuring CIMC, page 4, Installing ACS 5.8 on the Cisco SNS-3415/3495 Appliance
Remotely Using CIMC, page 2 and Running the Setup Program, page 5.
Create a bootable USB Drive and use it to install Cisco Secure ACS 5.8. See Creating a Bootable USB Drive, page 4,
Installing ACS 5.8 on the Cisco SNS-3415/3495 Appliance Using the USB Drive, page 3, and Running the Setup
Program, page 5.
Installing ACS 5.8 on the Cisco SNS-3415/3495 Appliance Remotely Using CIMC
After you have configured the CIMC for your appliance, you can use it to manage your Cisco SNS-3415 or Cisco
SNS-3495 appliance. You can perform all operations including BIOS configuration on your Cisco SNS-3415 or Cisco
SNS-3495 appliance through the CIMC.
1. Connect to the CIMC for server management. Connect Ethernet cables from your LAN to the server, using the ports
that you selected in NIC Mode setting. The Active-active and Active-passive NIC redundancy settings require you
to connect to two ports.
2. Use a browser and the IP address of the CIMC to log in to the CIMC Setup Utility. The IP address is based upon your
CIMC config settings that you made (either a static address or the address assigned by your DHCP server).
Note: The default user name for the server is admin. The default password is password.
6. Click Add Image to select the ACS 5.8 ISO from the system running your client browser.
7. Check the Mapped check box against the virtual CD/DVD drive that you have created.
9. Choose Macros > Ctrl-Alt-Del to boot the Cisco SNS-3415 or Cisco SNS-3495 appliance using the ISO image.
10. Enter F6 to bring up the boot menu. A screen similar to the following one appears.
2
Installing and Configuring the Secure Access Control System with the Cisco SNS-3415 and Cisco SNS-3495
11. Select the CD/DVD that you mapped and press Enter. The following message is displayed.
13. After you enter the network configuration parameters in the Setup mode, the appliance automatically reboots, and
returns to the shell prompt mode.
14. Exit from the shell prompt mode. The appliance comes up.
Installing ACS 5.8 on the Cisco SNS-3415/3495 Appliance Using the USB Drive
To install ACS 5.8 on the Cisco SNS-3415 or Cisco SNS-3495 appliance using the USB drive, complete the following
steps:
2. Plug in your bootable USB drive that has the Cisco Secure ACS ISO image into the USB port.
3
Installing and Configuring the Secure Access Control System with the Cisco SNS-3415 and Cisco SNS-3495
7. Now, continue reimaging the Cisco SNS-3415 or Cisco SNS-3495 using the USB drive.
9. After you enter the network configuration parameters in Setup mode, the appliance automatically reboots and
returns to the shell prompt mode.
10. Exit from the shell prompt mode. The appliance comes up.
— Linux machine with RHEL-5 or RHEL-6, CentOS 5.x or CentOS 6.x. If you are going to use your PC or MAC,
ensure that you have installed a Linux VM on it.
You should have access permissions to the drives in the local Linux machine.
2. Copy the iso-to-usb.sh script and the Cisco Secure ACS 5.8 ISO image to a directory on your linux machine.
For example, # ./iso-to-usb.sh ACS_v5.8.0.32.iso/dev/sdc where iso-to-usb.sh is the name of the script,
ACS_v5.8.0.32.iso is the name of the ISO image, and /dev/sdc is your USB device.
4
Installing and Configuring the Secure Access Control System with the Cisco SNS-3415 and Cisco SNS-3495
*** W A R N I N G ***
THIS SCRIPT WILL DELETE ALL EXISTING CONTENT ON YOUR USB DRIVE: /dev/sdb/
ARE YOU SURE YOU WANT TO CONTINUE? [Y/N]: y
Deleting partition table on USB drive: /dev/sdb...
Creating new partition table on USB drive: /dev/sdb...
Formatting BOOT partition: /dev/sdb1 as VFAT...
Formatting DATA partition: /dev/sdb2 as EXT2...
Copying syslinux files to USB partition: /dev/sdb1...
Copying ISO file to USB partition: /dev/sdb2...
DONE!
Note: After you execute the command iso-to-usb.sh, your USB drive will be partitioned in a format where non-Linux
operating systems will not recognize all of the spaces available in it. To repartition your USB drive for general purpose
use with Windows or MAC operating system, you need to run the command repurpose-usb.sh utility in this directory.
This utility will repartition and reformat your USB key for general use.
The setup program launches an interactive command-line interface (CLI) that prompts you for the required parameters.
An administrator can use the console or a dumb terminal to configure the initial network settings and provide the initial
administrator credentials for the ACS 5.8 server using the setup program. The setup process is a one-time configuration
task.
The console displays a set of parameters. You must enter the parameters as described in Table 1 on page 6.
Note: You can interrupt the setup process at any time by typing Ctrl-C before the last setup value is entered.
5
Installing and Configuring the Secure Access Control System with the Cisco SNS-3415 and Cisco SNS-3495
6
Installing and Configuring the Secure Access Control System with the Cisco SNS-3415 and Cisco SNS-3495
In addition:
7
Installing and Configuring the Secure Access Control System with the Cisco SNS-3415 and Cisco SNS-3495
Generating configuration...
Rebooting...
Now, you can log into ACS using the CLI username and password that was configured during the setup process.
Note: You can use this username and password to log in to ACS only via the CLI.
Note: The initial setup of the ACS 5.8 server should be configured with an IPv4 IP address. You can configure the IPv6
IP address for your server only after the initial setup is completed.
Note: ACS 5.8 supports IPv4 and IPv6 dual stack networking and does not support pure IPv6 network.
1. When the system reboots, at the login prompt enter the username you configured during setup, and press Enter.
2. At password prompt, enter the password you configured during setup, and press Enter.
3. Verify that the application has been installed properly by entering the show application command, and press Enter.
<name> <Description>
acs Cisco Secure Access Control System 5.8
4. At the system prompt, check the release and ACS version that are installed, by entering the show application
version acs command and pressing Enter.
-----------------------------
Version : 5.8.0.32
Internal Build ID : B.442
Note: The Version and Internal Build ID may change for different versions of this release.
5. Check the status of ACS processes, at the system prompt by entering show application status acs, and press
Enter.
Note: To get the latest ACS patches and to keep your ACS up-to-date, visit
http://software.cisco.com/download/navigator.html?i=rt
8
Installing and Configuring the Secure Access Control System with the Cisco SNS-3415 and Cisco SNS-3495
Note: You can also use the bootable USB drive and CIMC to reset the administrator password.
To reset the administrator password, at the system prompt, enter 3 if you are using a keyboard and video monitor,
or enter 4 if you are using a serial console port.
Admin username:
[1]:admin
[2]:admin2
[3]:admin3
Enter number of admin for password recovery:1
Password:
Verify password:
Save change&reeboot? [Y/N]:
9
Installing and Configuring the Secure Access Control System with the Cisco SNS-3415 and Cisco SNS-3495
Reimage using CIMC. See Installing ACS 5.8 on the Cisco SNS-3415/3495 Appliance Remotely Using CIMC, page 2
Reimage using bootable USB drive. See Installing ACS 5.8 on the Cisco SNS-3415/3495 Appliance Using the USB
Drive, page 3
Regulatory Compliance
For regulatory compliance and safety information, see Regulatory Compliance and Safety Information for Cisco Secure
Access Control System.
10
ACS 5.8 on VMware Virtual Machines
1
ACS 5.8 on VMware Virtual Machines
2
Installing ACS in a VMware Virtual Machine
This chapter describes the system requirements and installation of ACS 5.8 in a VMware virtual machine.
Table 1 on page 1 lists the minimum system requirements to install ACS 5.8 on a VMware virtual machine.
Note: ACS partitions the available disk space automatically during the installation
process.
Note: It is recommended that you allocate the hard disk size to be greater than 500
GB for the secondary instance, which acts as a log collector.
NIC (Network Interface Card) 1 Gb dedicated NIC interface
Hypervisor VMware ESXi 5.5
1
Installing ACS in a VMware Virtual Machine
Note: If you want to upgrade the ACS installed on virtual machine to ACS 5.8, the virtual machine disk size should be
greater than or equal to 500 GB.
The disk space management mechanism in ACS 5.8 manages the system automatically and configures the available file
volumes on the file system per file type, such as local store, logs, configuration, cache, and so on. The actual file size
limits are calculated at the time of installation, based on the hard coded relative disk quota configuration (percent based),
using the disk size as an input. However, ACS database logs have a fixed size. ACS 5.8 gets installed with a variable hard
disk size between 60 GB and 750 GB, based on the disk size that was chosen while creating the VMware instance. If you
want to change the size of the ACS disk after the installation, complete the following procedure:
While restoring the backed up data, a warning message is displayed when the backup size or ACS view database size
exceeds the corresponding disk quota. However, the restore operation will not be interrupted. The restore operation fails
only when the hard limit of /opt partition size is reached.
In ACS 5.8, the log collector server can be installed on a 60 GB disk space. An ACS view log collector node usually
requires more space to maintain a database of logs and reports. Therefore, the recommended disk size for the secondary
instance, which acts as a log collector server, is 500 GB.
When you allocate 60 GB for the log collector server, the view database gets only 5.8 GB as total disk space. As a result
of this, some of the functionalities may not work properly. The functionalities that may be affected are backup, full backup,
incremental backup, logging recovery, purge, database compress operation, and so on.
While creating the VMware instances, ensure that the resources allocated for VMware instances with respect to CPU
cores, RAM, and disk, are not more than the actual physical resources of the VMware host server. For example, if the
VMware host server has a total of 10 CPU cores, then the sum of the allocated CPU cores for all the VMware instances
that are created on that server should not exceed 10.
Note: In large ACS distributed deployment environments that are hosted on the VM, it is recommended that all VM
hosting servers have CPUs from the same vendor.
Note: It is recommended that if hyper threading is enabled on any one of the VMware hosts, it should be enabled on all
the VMware hosts that host the ACS VM as part of the same deployment.
Note: ACS 5.8 does not get installed over multiple disks (by defining one Logical volume Manager [LVM] disk).
You should have valid Cisco.com login credentials to access this link.
2
Installing ACS in a VMware Virtual Machine
5. Choose Help > About VMware vSphere to verify the VMware ESX and vSphere client versions.
3
Installing ACS in a VMware Virtual Machine
This section describes the VM configuration process using the VMware vSphere Client.
To configure the VM for ESXi 5.5 and 6.0, complete the following steps:
2. Click Inventory.
3. Right-click the host container on the left-pane of VMware vSphere Client and choose New Virtual Machine.
4. In the Configuration Type dialog box, choose Typical as the VM configuration, as shown in Figure 4 on page 4, and
click Next.
5. Enter the name you will use to reference the VM, and click Next.
Note: Use the hostname that you will use for your VM host.
6. Choose a data store that has a minimum of 500 GB free space available, and click Next.
4
Installing ACS in a VMware Virtual Machine
7. Click the Linux radio button, and from the Version drop-down list, choose Red Hat Enterprise Linux 6 (64-bit) and
click Next.
8. Select the number of NICs that you want to use in the network window, and click Next. You can use up to four NICs.
Note: ACS does not support VMXNET2 (Enhanced) and VMXNET3 adapters.
5
Installing ACS in a VMware Virtual Machine
9. Select the disk size as 500 GB in the virtual disk capacity window, and click Next.
Note: You can configure the minimum virtual disk space requirement to be 60 GB. There may be a critical issue if
you use 60 GB as virtual disk space. You can view the workaround in the troubleshooting section.
6
Installing ACS in a VMware Virtual Machine
Note: Do not choose VMware thin provisioning as a storage type because ACS supports only thick provisioning on all
supported VMware servers.
If ACS is installed in a VMware with thin provisioning storage type, you are recommended to:
3. Restore the backup in the newly converted thick provisioned storage VMware.
Note: Do not over-provision hardware resources such as RAM, CPU, and disks for your virtual machines.
4. Verify the configuration details—such as Name, Guest OS, Virtual CPU, Memory, and Virtual Disk Size—of the newly
created VM.
5. Check the Edit the virtual machine settings before completion check box, and click Next.
7
Installing ACS in a VMware Virtual Machine
7. From the Number of virtual processors drop-down list, choose 2 (if 2 is available), or you can choose any number
and click Finish.
8. The virtual machine is installed and will be listed in the VMware drawer, as follows.
8
Installing ACS in a VMware Virtual Machine
The VM must be configured with a virtual DVD drive, in order to boot from the ACS 5.8 DVD.
See Configuring the VM Using the DVD Drive, page 9 to configure the VM using the DVD drive of your VMware ESX server
host.
1. In the VMware vSphere Client, highlight the newly created VM, and choose Edit Virtual Machine Settings.
The Virtual Machine Properties window appears. Figure 14 on page 9 displays the properties of a VM that was
created with the name ACS 5.8.
9
Installing ACS in a VMware Virtual Machine
3. Choose the Host Device option, and from the drop-down list, choose your DVD host device.
4. Choose the Connect at Power On option, and click OK to save your settings.
You can now use the DVD drive of the VMware ESX server to install the ACS server.
When you complete the configuration, click the Console tab, right-click the VM from the left pane, and choose GUEST
> Send Ctrl+Alt+Del to restart the VM.
2. Insert the ACS 5.8 Install Disk in to the VMware ESX host CD/DVD drive, and power on the VM.
3. Store the ACS 5.8 recovery ISO image in the VMware vSphere client, to access the VMware Server.
4. Click the CD icon on the tool bar and choose Connect CD/DVD 1 > Connect to ISO image on local disk.
10
Installing ACS in a VMware Virtual Machine
Move to the console tab. You will lose your cursor control as soon as you enter the console tab.
7. Press Enter.
The machine restarts with the ACS 5.8 recovery ISO image loaded. Now, the user is prompted with the install option
for ACS 5.8.
When the ACS 5.8 Install Disk boots, the console displays:
You can select either the monitor and keyboard port, or the console port to perform the initial setup.
8. At the system prompt, type 1 to select a monitor and keyboard port, or type 2 to select a console port, and press
Enter.
The Setup Wizard appears and guides you through the initial configuration.
11
Installing ACS in a VMware Virtual Machine
For more information on the setup process, see Running the Setup Program, page 2.
See the VMware support website for more details. Some helpful links are:
http://www.vmware.com/support/
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1017910
http://communities.vmware.com/community/vmtn
A new line of text appears, which says Virtual machine detected, configuring VMware Tools when you run the initial
Setup Wizard. You can also do the following to check if the VMware Tools are installed:
Click the Summary tab of the virtual machine in the vSphere client. You can see that the text “Running” appears
against VMware Tools. This confirms that the VMware Tools are installed and running.
12
Installing ACS in a VMware Virtual Machine
You can use the CLI command show inventory. When you run this CLI, a list appears that shows the NIC driver
information. If the VMware Tools are installed, then the driver information is listed as VMware Virtual Ethernet Driver.
13
Installing ACS in a VMware Virtual Machine
14
Upgrading ACS to Release 5.8
1
Upgrading ACS to Release 5.8
2
Upgrading the Cisco Secure Access
Control System
This chapter explains how to upgrade an ACS deployment or a standalone ACS server from 5.5, 5.6 or 5.7 (after installing
the latest available patch in 5.5, 5.6 or 5.7) to 5.8.
Note: If you are using ACS 5.0, 5.1, 5.2, 5.3, or 5.4, you must first upgrade to ACS 5.5, 5.6 or 5.7 before upgrading to
ACS 5.8.
— Upgrading an ACS Server Using the Application Upgrade Bundle, page 10—For an incremental upgrade of an
ACS server from 5.6 to 5.8.
— Reimaging and Upgrading an ACS Server, page 11—To back up ACS 5.6 application data and restore it on ACS
5.8.
Upgrading ACS 5.6 or ACS 5.7 on the CSACS-1121 to the Cisco SNS-3415 or Cisco SNS-3495 with ACS 5.8,
page 14
The upgrade process involves upgrading an ACS server, which includes the Monitoring and Report Viewer and the
configuration information in the database.
Note: ACS 5.8 upgrades ADE-OS 1.x to the 2.x version as a part of the application upgrade process.
During the upgrade process, ACS upgrades the ACS server to 5.8 and restores the data to the ACS 5.8 server. As part
of the restore operation, ACS converts the configuration data to a 5.8-compatible format.
ACS stores the data upgrade information in the acsupgrade.log file. To view the content of this log file, download the
support bundle.
For information on downloading the support bundle, see the CLI Reference Guide for Cisco Secure Access Control
System 5.8. Also, see ADE.log, which logs the details of all operations that are performed in the ACS CLI. If you are
migrating ACS from 4.x to 5.8, follow the migration procedure as described in the Migration Guide for Cisco Secure
Access Control System 5.8.
1
Upgrading the Cisco Secure Access Control System
Note: If you try to upgrade or restore the backup from ACS 5.5 or 5.6 or 5.7 to ACS 5.8 when duplicate group name
entries exist in the Users and Identity Stores > External Identity Stores > Active Directory page, the upgrade or backup
restore process fails.
You must have a repository that is configured with an FTP, Network File System (NFS), or Secure FTP (SFTP) network
server (but not a TFTP repository) to perform the ACS upgrade.
To create a repository, use the repository command. For more details about the commands that are used in this chapter,
see the CLI Reference Guide for Cisco Secure Access Control System 5.8.
Upgrade Paths
You can use the following upgrade paths to upgrade the ACS server from 5.x versions to ACS 5.8:
Path 1: ACS 5.7 to ACS 5.8. To upgrade from ACS 5.7 to 5.8, see Upgrading an ACS Server from 5.7 to 5.8, page 10.
Path 2: ACS 5.6 to ACS 5.8. To upgrade from ACS 5.6 to 5.8, see Upgrading an ACS Server from 5.6 to 5.8, page 12.
Path 3: ACS 5.5 to ACS 5.8. To upgrade from ACS 5.5 to 5.8, see Upgrading an ACS Server from 5.5 to 5.8, page 12
Path 4: ACS 5.4 to ACS 5.6 to ACS 5.8. To upgrade from ACS 5.4 to 5.6, see the Installation and Upgrade Guide for
Cisco Secure Access Control System 5.6. To upgrade from ACS 5.6 to 5.8, see Upgrading an ACS Server from 5.6
to 5.8, page 12.
Path 5: ACS 5.3 to ACS 5.5 to ACS 5.8. To upgrade from ACS 5.3 to 5.5, see the Installation and Upgrade Guide for
Cisco Secure Access Control System 5.5. To upgrade from ACS 5.5 to 5.8, see Upgrading an ACS Server from 5.5
to 5.8, page 12.
Path 6: ACS 5.2 to ACS 5.4 to ACS 5.6 to ACS 5.8. To upgrade from ACS 5.2 to 5.4, see the Installation and Upgrade
Guide for Cisco Secure Access Control System 5.4. Use Path 4 to upgrade from ACS 5.4 to ACS 5.8.
Path 7: ACS 5.1 to ACS 5.3 to ACS 5.5 to ACS 5.8. To upgrade from ACS 5.1 to 5.3, see the Installation and Upgrade
Guide for Cisco Secure Access Control System 5.3. Use Path 5 to upgrade from ACS 5.3 to ACS 5.8.
Path 8: ACS 5.0 to ACS 5.2 to ACS 5.4 to ACS 5.6 to ACS 5.8. To upgrade from ACS 5.0 to 5.2, see the Installation
and Upgrade Guide for Cisco Secure Access Control System 5.2. Use Path 6 to upgrade from ACS 5.2 to ACS 5.8.
Note: If you want to upgrade the ACS installed on a virtual machine to ACS 5.8, the virtual machine disk size should be
greater than or equal to 500 GB.
Note: ACS does not support interoperability between ACS 5.7 and ACS 5.8 deployments.
Usually, in a deployment scenario where multiple ACS instances are involved, the primary ACS instance functions as a
master database for the configuration data, and one of the secondary ACS instances stores the Monitoring and Report
data. You can also use the primary instance to store the Monitoring and Report data.
Initially, you need to upgrade the log collector server to ACS 5.8 and use this server as a common log collector between
the ACS 5.7 and 5.8 deployments, until the 5.8 upgrade for all servers is complete.
2
Upgrading the Cisco Secure Access Control System
There are some exceptions to this usual setup, which you can handle as described below:
If the ACS 5.7 primary server functions as a log collector in your 5.7 deployment, you should promote any one of the
secondary servers as the primary server in the deployment before upgrading the existing primary server. See Promoting
a Secondary Server to Primary, page 8.
Note: Before upgrading any secondary server, you must deregister it from the primary server.
a. From the primary ACS server, choose System Administration > Configuration > Log Configuration > Log
Collector.
b. From the Select Log Collector Server drop-down list, choose the new secondary instance to be the log
collector, and click Set Log Collector.
The ACS services of the new secondary log collector are restarted.
2. Enter the show application status acs command in EXEC mode to check whether all process are up and running
successfully, and press Enter.
You can now see that all processes are up and running.
3. Deregister the old log collector server from the deployment, and delete it from the ACS 5.7 primary server so that it
is now a standalone server:
a. From the web interface of the ACS 5.7 primary server, choose System Administration >
Operations > Distributed System Management.
b. From the Secondary Instances table, check the check box next to the secondary instance that you want to
deregister.
c. Click Deregister.
This operation will deregister the selected ACS Instance from the Primary Instance.
3
Upgrading the Cisco Secure Access Control System
d. Click OK.
g. From the Secondary Instances table, check the check box next to the deregistered secondary instance that you
want to delete.
h. Click Delete.
i. Click OK.
The Secondary Instances table on the Distributed System Management page appears without the deleted secondary
instance.
From the ACS CLI, enter the following backup command in EXEC mode to perform a backup and place the backup
in a remote repository:
Note: When you back up your data, if the data size exceeds the allowed disk quota of ACS, a warning message is
displayed in the CLI, and an alarm is triggered in ACS Monitoring and Reports.
Perform the procedure in Upgrading an ACS Server from 5.7 to 5.8, page 10.
When all the process are up and running on the log collector server, you need to view the Monitoring and Report
Viewer; choose Monitoring Configuration > System Operations > Data Upgrade Status to confirm if the upgrade
is successful. The Data Upgrade Status page appears with the status of the Monitoring and Report Viewer data
upgrade.
When the database upgrade completes, ACS displays the following message:
Now the old log collector is upgraded to 5.8 and functions as the ACS 5.8 standalone primary server, as well as a
log collector. For more information, see Upgrading the ACS Monitoring and Report Viewer, page 9.
6. Define the 5.8 log collector as a remote log target for the 5.7 deployment.
a. Choose System Administration > Configuration > Log Configuration > Remote Log Targets.
b. Click Create.
— Description—(Optional) A description of the remote log target. Maximum description length is 1024 characters.
4
Upgrading the Cisco Secure Access Control System
— IP Address—IP address of the remote log target, in the format x.x.x.x. Specify the IP address of the 5.8 log
collector server.
— Use Advanced Syslog Options—Click to enable advanced syslog options, which include port number, facility
code, and maximum length.
— Port—The port number of the remote log target that is used as the communication channel between the ACS and
the remote log target (default is 514). Enter 20514 for the port number.
— Facility Code—(Optional) Choose an option from the Facility Code drop-down list.
— Maximum Length—The maximum length of the remote log target messages. Valid options are from 200 to 8192.
d. Click Submit.
The remote log target configuration is saved. The Remote Log Targets page appears with the new remote log target
configuration.
Now, the authentication details from the 5.7 deployment are logged in both the 5.7 and 5.8 log collector servers.
7. On the 5.7 primary server, configure the appropriate logging categories for the remote log target:
a. Choose System Administration > Configuration > Log Configuration > Logging Categories > Global.
The Logging Categories page appears; from here, you can view the logging categories.
b. Click the name of the logging category that you want to configure, or click the radio button next to the name of
the logging category that you want to configure, and click Edit.
— Log Severity—Use the drop-down list to choose the severity level. Valid options are FATAL, ERROR, WARN, INFO,
and DEBUG.
— Local Target is Critical—Check the check box to make this local target the critical target. Usable for accounting
and for AAA audit (passed authentication) logging category types only.
d. Click the Remote Syslog Target tab and choose Remote Targets to view the logs.
e. Click Submit.
The Logging Categories page appears, with your configured logging category. Proceed with Upgrading the
Secondary Servers, page 5.
Note: To ensure that you preserve the local certificates of the secondary server, you should promote each secondary
server to the primary role and then perform the ACS 5.8 upgrade.
Before upgrading a secondary ACS server, ensure that the server is active and that it is not in local mode.
5
Upgrading the Cisco Secure Access Control System
To verify the status from the web interface of the secondary server, choose System Administration > Operations > Local
Operations.
1. Verify if the secondary server is a log collector. If so, change the log collector server to any other secondary server;
otherwise, proceed to Step 2.
a. From the ACS 5.7 primary server, System Administration > Configuration > Log Configuration > Log Collector.
b. From the Select Log Collector drop-down list, choose a different server to configure as a log collector.
2. Deregister the secondary server from the 5.7 deployment and delete it from the ACS 5.7 primary server, so that it
now becomes a standalone server:
b. From the Secondary Instances table, check the check box next to the secondary instance that you want to
deregister.
c. Click Deregister.
This operation will deregister the selected ACS Instance from the Primary Instance.
d. Click OK.
g. From the Secondary Instances table, check the check box next to the secondary instance that you want to delete.
h. Click Delete.
i. Click OK.
The Secondary Instances table on the Distributed System Management page appears without the deleted secondary
instance.
From the ACS CLI, issue the following backup command in EXEC mode to perform a backup and place the backup
in a repository:
Note: When you back up your data, if the data size exceeds the allowed disk quota of ACS, a warning message is
displayed in the CLI, and an alarm is triggered in ACS Monitoring and Reports.
4. Upgrade the ACS server to 5.8. See Upgrading an ACS Server from 5.7 to 5.8, page 10.
6
Upgrading the Cisco Secure Access Control System
a. Choose System Administration > Operations > Local Operations > Deployment Operations.
b. Complete the following mandatory fields under the Registration dialog box:
— Primary Instance—The hostname of the 5.8 primary server with which you wish to register the secondary
instance.
— Hardware Replacement—Check to enable the existing ACS instance to re-register with the primary instance and
get a copy of the configuration that is already present in the primary instance.
— Recovery Keyword—Specify the same hostname that was used in the 5.7 deployment to ensure that you
associate this secondary server with the Monitoring and Report data that was collected earlier.
After you submit this information, this instance connects to the primary instance. The primary instance finds the
associated ACS instance records based on the keyword and marks each record as registered.
This operation will register this ACS Instance as a secondary to the specified Primary Instance.
ACS will be restarted. You will be required to login again. Do you wish to continue?
d. Click OK.
ACS restarts automatically. Wait for some time to ensure that all processes are up and running successfully.
Note: When you register a secondary instance to a primary instance, you can use any account that is created on the
primary instance. The credentials that you create on the primary instance are replicated to the secondary instance.
After the registration is complete, ACS performs a full synchronization and sends the ACS 5.8 configuration data to
the 5.8 secondary server.
See the Importing Server Certificates and Associating Certificates to Protocols section and the Generating
Self-Signed Certificates section of the User Guide for Cisco Secure Access Control System 5.8.
Upgrade the ACS 5.7 primary server to ACS 5.8 after all the secondary servers are upgraded to ACS 5.8. When there is
no secondary server that is registered with the primary server, the primary server itself acts as a log collector.
7
Upgrading the Cisco Secure Access Control System
b. Check if there are secondary servers listed in the Secondary Instances table. If there are any secondary servers,
upgrade those servers before upgrading the 5.7 primary server. See Upgrading the Secondary Servers, page 5.
2. Upgrade the ACS server to 5.8. See Upgrading an ACS Server from 5.7 to 5.8, page 10.
3. Register the newly upgraded 5.8 server with the existing primary ACS 5.8 server:
a. Choose System Administration > Operations > Local Operations > Deployment Operations.
b. Complete the following mandatory fields under the Registration dialog box:
— Primary Instance—The hostname of the primary server with which you wish to register the secondary instance.
— Hardware Replacement—Check to enable the existing ACS instance to re-register with the primary instance and
get a copy of the configuration that is already present in the primary instance.
— Recovery Keyword—Specify the same hostname that was used in the 5.7 deployment to ensure that you
associate this server with the Monitoring and Report data that was collected earlier.
After you submit this information, this instance connects to the primary instance. The primary instance finds the
associated ACS instance records based on the keyword and marks each record as registered.
This operation will register this ACS Instance as a secondary to the specified Primary Instance.
ACS will be restarted. You will be required to login again. Do you wish to continue?
d. Click OK.
ACS will restart automatically. Wait for some time to ensure that all processes are up and running successfully.
Note: When you register a secondary to a primary instance, you can use any account that is created on the primary
instance. The credentials that you create on the primary instance are replicated to the secondary instance.
Promote this instance as the ACS 5.8 primary server again. See Promoting a Secondary Server to Primary, page 8.
2. In the Secondary Instances table, check the check box next to the secondary server that you want to promote to
primary.
3. Click Promote.
8
Upgrading the Cisco Secure Access Control System
This operation will promote the selected ACS Instance to become the new Primary Instance. As a
consequence, the current Primary Instance will be demoted to a Secondary.
4. Click OK.
The system promotes the chosen secondary server to primary and moves it to the Primary Instances table. The
existing primary server is automatically moved to the Secondary Instances table.
When the registration completes, ACS performs a full synchronization and sends the ACS 5.8 configuration data to
the newly promoted primary server.
The maximum disk space that is available for the ACS Monitoring and Report Viewer is 43% of /opt partition.
Restoring the Monitoring and Report Viewer Data After Upgrade, page 91
To monitor the status of the ACS View data upgrade, login to ACS web interface after all the services are up and running,
from the Monitoring and Report Viewer, choose Monitoring and Reports > Dashboard.
The Monitoring and Reports dashboard displays the status as “Data Upgrade in Progress” if the upgrade is in
progress. If the dashboard does not display any status, then the upgrade is completed successfully. The dashboard
displays the “upgrade failed” message when the ACS View upgrade is failed.
The report data is available only for the period during which you create a backup and not for the period when you restore
the data. For example, if you back up the data in June and restore it in August, the report data that is available is the data
for June and not for August. To get the latest report data, you need to run the reports again.
9
Upgrading the Cisco Secure Access Control System
1. Place the ACS 5.8 application upgrade bundle (ACS_5.8.tar.gz) in a remote repository.
To configure the repository, follow the procedure that is given in the CLI Reference Guide for Cisco Access Control
System 5.8.
Note: When you upgrade ACS from an older version to version 5.8, if the upgrade bundle size exceeds the allowed
disk quota, a warning message is displayed in the CLI, and an alarm is triggered in ACS Monitoring and Reports.
3. Enter yes.
While ACS upgrades the ACS 5.7 configuration data, it also converts the ACS 5.7 Monitoring and Report Viewer data
to the 5.8 format.
4. To monitor the status of the ACS View data upgrade, login to ACS web interface after all the services are up and
running, from the Monitoring and Report Viewer, choose Monitoring and Reports > Dashboard.
The Monitoring and Reports dashboard displays the status as “Data Upgrade in Progress” if the upgrade is in
progress. If the dashboard does not display any status, then the upgrade is completed successfully. The dashboard
displays the “upgrade failed” message when the ACS View upgrade is failed.
5. Click OK.
6. Enter the show application version acs command to check whether the ACS version was upgraded successfully.
10
Upgrading the Cisco Secure Access Control System
-----------------------------
Version : 5.8.0.32
Internal Build ID : B.442
7. Enter the show application status acs command in EXEC mode to check whether all processes are up and running
successfully, and press Enter.
Now you can see that all processes are up and running and that ACS is successfully upgraded to version 5.8.
2. Enter the following backup command in EXEC mode to perform a backup and place the backup in a repository.
Note: When you back up your data, if the data size exceeds the allowed disk quota, a warning message is displayed
in the CLI, and an alarm is triggered in ACS Monitoring and Reports.
Note: Ensure that you use a remote repository for the ACS 5.7 data backup. Otherwise, you might loose the
backed-up data after you install 5.8.
3. Use the ACS 5.8 recovery DVD to install ACS 5.8. See Reimaging the ACS Server, page 6.
This re images the ACS server to a fresh ACS 5.8 server that does not have any configuration data.
4. Configure a repository in the fresh ACS 5.8 server to restore the backed-up data.
5. Restore the data that was previously backed up in Step 2 to the ACS 5.8 server.
Note: When you restore the backed-up data, if the data size exceeds the allowed disk quota, a warning message is
displayed in the CLI, and an alarm is triggered in ACS Monitoring and Reports.
11
Upgrading the Cisco Secure Access Control System
Note: If you restore the ADE-OS backup in a different hardware, you must change the IP address of the ACS machine
to bring it up and running state.
While restoring the data, using the 5.7 backup file, this command restores the ACS 5.7 configuration data. It also
converts and upgrades the ACS 5.7 Monitoring and Report Viewer data to the 5.8 format.
If the backed-up data size exceeds the allowed disk quota of ACS, a warning message is displayed in the CLI, and
an alarm is displayed in ACS Monitoring and Reports.
6. To monitor the status of the ACS View data upgrade, login to ACS web interface after all the services are up and
running, from the Monitoring and Report Viewer, choose Monitoring and Reports > Dashboard.
The Monitoring and Reports dashboard displays the status as “Data Upgrade in Progress” if the upgrade is in
progress. If the dashboard does not display any status, then the upgrade is completed successfully. The dashboard
displays the “upgrade failed” message when the ACS View upgrade is failed.
7. Click OK.
Warning: The ACS restore does not update PKI on EAP or management interface. HTTPS uses a self-signed
certificate, even if the database has a CA signed certificate only.
The work-around for this is:
1. Create a temporary self-signed certificate and assign EAP or management interface to it.
2. Re-assign EAP or management interface to the CA signed certificate.
3. Delete the self-signed certificate.
Note: If the backup data is huge in size, the extraction process might take a minimum of one hour to many hours to
complete.
Note: Restore the backup file in the same ACS server, to avoid IP conflict issues.
http://www.cisco.com/cisco/software/navigator.html?a=a&i=rpm
1. Log in to Cisco.com and navigate to Security > Access Control and Policy > Policy and Access Management >
Cisco Secure Access Control System > Cisco Secure Access Control System 5.8.
3. Install the ACS 5.8 cumulative patch by running the following acs patch command in EXEC mode. To install the ACS
patch:
12
Upgrading the Cisco Secure Access Control System
Note: When you upgrade ACS from an older version to version 5.8, if the upgrade bundle size exceeds the allowed
disk quota, a warning message is displayed in the CLI, and an alarm is triggered in ACS Monitoring and Reports.
4. Enter yes.
Generating configuration...
Saved the ADE-OS running configuration to startup successfully
Getting bundle to local machine...
md5: aa45b77465147028301622e4c590cb84
sha256: 3b7f30d572433c2ad0c4733a1d1fb55cceb62dc1419b03b1b7ca354feb8bbcfa
% Please confirm above crypto hash with what is posted on download site.
% Continue? Y/N [Y]?
5. The ACS 5.8 patch install displays the md5 and sha256 checksum. Compare it with the value displayed on Cisco.com
at the download site. Do one of the following:
Enter Y if the crypto hashes match. If you enter Y, ACS proceeds with the installation steps.
Enter N if the crypto hashes do not match. If you enter N, ACS stops the installation process.
6. Enter yes.
The ACS version is upgraded to the applied patch. Check whether all services are running properly using
the show application status acs command in ACS CLI EXEC mode.
7. Enter the show application version acs command in EXEC mode to check if the patch is installed properly. ACS
displays the following message:
------------------------------
Version: 5.8.0.32.1
Internal Build ID: B.443
Patches:
5-8-0-32-1
acs/admin #
Note: During patch installation, if the patch size exceeds the allowed disk quota, a warning message is displayed in the
ACS CLI, and an alarm is displayed in the ACS Monitoring and Reports page.
13
Upgrading the Cisco Secure Access Control System
Upgrading ACS 5.6 or ACS 5.7 on the CSACS-1121 to the Cisco SNS-3415 or Cisco SNS-3495 with ACS 5.8
Upgrading ACS 5.6 or ACS 5.7 on the CSACS-1121 to the Cisco SNS-3415 or
Cisco SNS-3495 with ACS 5.8
If you have ACS 5.6 or ACS 5.7 installed on the CSACS-1121 appliance and would like to upgrade to the Cisco
SNS-3415 or Cisco SNS-3495, perform the following steps:
2. Install ACS in a Cisco SNS-3415 or Cisco SNS-3495 appliance with ACS 5.8 installed on it.
Note: The application upgrade command is not applicable if you want to move to ACS 5.8 on a Cisco SNS-3415 or
Cisco SNS-3495 appliance. You must install ACS 5.8 on the Cisco SNS-3415 or Cisco SNS-3495 appliance and restore
the backup obtained from your CSACS-1121 appliance.
14
Post-Installation Tasks
1
Post-Installation Tasks
2
Post-Installation Tasks
This chapter describes the tasks that you must perform after completing the ACS installation successfully.
Licenses, page 1
Licenses
To operate ACS, you must install a valid license. ACS prompts you to install a valid base license when you first access
the web interface.
Types of Licenses
Table 1 on page 2 shows ACS 5.8 license support:
1
Post-Installation Tasks
Permanent—This license does not have an expiration date. Supports deployments with up to
500 network devices (AAA Clients).
Evaluation—Expires 90 days from the time the license is issued. Supports deployments with
up to 50 managed devices.
The number of devices is determined by the number of unique IP addresses that you configure.
This includes the subnet masks that you configure. For example, a subnet mask of 255.255.255.0
implies 256 unique IP addresses and hence the number of devices is 256.
Add-On Licenses Add-on licenses can only be installed on an ACS server with permanent base license. A large
deployment needs permanent base license to be installed.
Logging In
When you log into the ACS web interface for the first time, you are prompted to install the license file.
Note: Launching the ACS web interface using IPv6 addresses is not supported in Mozilla Firefox version 4.x or later.
2. In the Username field, enter ACSAdmin, which is the default username. The value is not case-sensitive.
3. In the Password field, enter default, which is the default password. The value is case-sensitive.
Note: Click Reset to clear the Username and Password fields and start over, if needed.
2
Post-Installation Tasks
5. Enter default in the Old Password field, then enter a new password in the New Password and Confirm Password
fields.
If you forget your password, use the acs reset-password <username> command to reset your password to its
default setting. You are prompted to change your password after a reset. See CLI Reference Guide for Cisco Secure
Access Control System 5.8 for more information.
The license page appears only the first time that you log into ACS.
7. Click Browse and choose a valid, unique base license for the ACS server.
For more information on installing a valid license, see the User Guide for Cisco Secure Access Control System 5.8.
If your login is successful, the main page of the ACS web interface appears.
Note: When you use Internet Explorer to view the ACS web interface, if the Enhanced Security Configuration (ESC) is
enabled, you would observe issues in displaying pages and pop-ups of the ACS web interface. To overcome this issue,
you must disable the ESC from the Internet Explorer settings.
Logging Out
To log out of the ACS web interface:
1. Click Logout in the ACS web interface header to end your administrative session.
3
Post-Installation Tasks
Configuring ACS
A dialog box appears, prompting you to confirm whether you want to log out of ACS.
2. Click OK.
Caution: For security reasons, Cisco recommends that you log out of the ACS when you complete your
administrative session. If you do not log out, the ACS web interface logs you out after 30 minutes of inactivity, and
does not save any unsubmitted configuration data.
For more information on using the Web Interface, see the User Guide for Cisco Secure Access Control System 5.8.
Configuring ACS
Use the ACS web interface for initial configuration setup. The ACS web interface allows you to access pages, perform
configuration tasks, and view interface configuration errors.
When you finish installing the license file, perform the following ACS configuration setup:
— Configuring dictionaries
— Configuring logs
For details on each operation and other administrative functions, such as ACS Monitoring and Reports, see the User
Guide for Cisco Secure Access Control System 5.8.
For details on migration and problems with migration, see the Migration Guide for Cisco Secure Access Control System
5.8.
For up-to-date information on Cisco.com, see the Release Notes for Cisco Secure Access Control System 5.8.
4
Reference
1
Reference
2
Troubleshooting
The CSACS-1121, Cisco SNS-3415, and Cisco SNS-3495 series appliances undergoes extensive testing before it
leaves the factory. If you encounter problems, use the information in this appendix to help isolate problems or to eliminate
the appliance as the source of the problem.
Note: The procedures in this chapter assume that you are troubleshooting the initial CSACS-1121 series, Cisco
SNS-3415, or Cisco SNS-3495 series appliances startup, and that the appliance is in the original factory configuration.
If you have removed or replaced components, or changed any default settings, the recommendations in this chapter
might not apply.
This appendix does not cover every possible issue that might occur on an appliance but instead focuses on those events
that are frequently seen by the customer.
Troubleshooting Overview
At the initial system boot, you should verify the following:
The external power cable is connected, and the proper power source is being applied. For more information, see
Power Considerations, page 8, Power Specifications, page 5, Powering Up the CSACS-1121 Series Appliance,
page 17, Connecting and Powering On the Cisco SNS-3415/3495 Appliance, page 9, and Troubleshooting the
Power and Cooling Systems in the CSACS-1121 Series Appliance, page 3.
The appliance fan and blower are operating. See Airflow Guidelines, page 7, Environmental Specifications, page 5,
and Troubleshooting the Power and Cooling Systems in the CSACS-1121 Series Appliance, page 3.
The adapter cards (if installed) are properly installed in their slots, and each initializes (is enabled by the appliance
software) without problems.
When each of these conditions is met, the hardware installation is complete, and you should proceed to perform a basic
configuration. For proper configuration features, see Chapter 5, “Installing and Configuring the Cisco Secure Access
Control System with CSACS-1121,” or Chapter 9, “Installing and Configuring the Secure Access Control System with
the Cisco SNS-3415 and Cisco SNS-3495,” or the User Guide for Cisco Secure Access Control System 5.8.
If you cannot locate the source of the problem, contact a customer service representative for information on how to
proceed. For technical support information, see the Cisco Information Packet publication that is shipped with your
appliance. Before you call, ensure that you have the following information ready:
1
Troubleshooting
Problem Solving
Appliance chassis type and serial number. For more information, see Cisco Product Identification Tool, page 3.
Brief description of the problem you are facing and the steps you have taken to isolate and resolve the problem.
Note: Be sure to provide the customer service representative with any upgrade or maintenance information that was
performed on the CSACS-1121, Cisco SNS-3415, and Cisco SNS-3495 series appliances after your initial installation.
For site log information, see Creating a Site Log, page 12 and Site Log, page 1
Problem Solving
The key to problem solving is to isolate the problem to a specific location by comparing what the CSACS-1121, Cisco
SNS-3415, or Cisco SNS-3495 series appliance is doing with what it should be doing.
In other words, when troubleshooting, define the specific symptoms, identify all potential problems that could be causing
the symptoms, and then systematically eliminate each potential problem (from most likely to least likely) until the
symptoms disappear.
The following steps provide guidelines you can use during the troubleshooting process.
1. Analyze the problem and create a clear problem statement. Define symptoms and potential causes.
2. Gather the facts that you need to help isolate possible causes.
4. Create an action plan based on those causes. Begin with the most likely problem and devise a plan in which you
manipulate only one variable.
5. Implement the action plan. Perform each step carefully while testing to see whether the symptom disappears.
6. Analyze the results to determine whether the problem has been resolved. If the problem is resolved, consider the
process complete.
If the problem has not been resolved, create an action plan based on the next most probable cause on your list.
Return to 4.Create an action plan based on those causes. Begin with the most likely problem and devise a plan in
which you manipulate only one variable., page 2 and repeat the process until the problem is solved.
Be sure to undo anything that you changed while implementing your action plan. Remember to change only one
variable at a time.
Note: The LEDs on the front and back panel of the appliance enable you to determine the performance and operation of
the appliance. For a description of these LEDs, see Reading the LEDs, page 4.
Power and cooling systems (external power source, power cable, and appliance fans). Also, check for inadequate
ventilation, air circulation, or environmental conditions.
Adapter card—Checking the LEDs on the adapter card can help you to identify a failure.
Cables—Verify that the external cables connecting the appliance to the network are all secure.
2
Troubleshooting
Problem Solving
Troubleshooting the Power and Cooling Systems in the CSACS-1121 Series Appliance
Both the power LED and the fans can help you troubleshoot a power problem. Check the following items to help isolate
the problem:
When the CSACS-1121 Series appliance is connected to the power source, is the appliance power LED on the front
panel on? If not, check the AC power cord connection; if the power LED is still off, the problem might be due to a
power supply failure.
Does the appliance shut down after being on for only a short time?
— Check for an environmentally induced shutdown. For more information, see Environmental Reporting Features,
page 3 section.
— Check the fans. If the fans are not working, the appliance will overheat and shut itself down.
If the fans are not working, you might need to check the power supply connection to the fans.
Checking this connection will require you to shut down the appliance, remove any external cables, and open up the
appliance.
— Ensure that the appliance intake and exhaust vents are clear.
— Check the environmental site requirements in Temperature and Humidity Guidelines, page 8.
Does the appliance partially boot, but the LEDs do not light? Check for a power supply failure by inspecting the power
LED on the front panel of the appliance:
— If the LED is off, see the Cisco Information Packet for warranty information, or contact your customer
service representative.
If the power supply shuts down or latches off, an AC cycle switches off for 15 seconds and switches on for 1 second to
reset the power supply. For more information, see Regulatory Compliance, page 7.
Fan failure
Take steps to correct the problem. For information about environmental operating conditions, see Temperature and
Humidity Guidelines, page 8.
3
Troubleshooting
— Check the LEDs on the adapter card. Each adapter card has its own set of LEDs.
— Verify that your software release supports the adapter card. See the documentation that was included with your
adapter card.
— Verify that your software release supports the adapter card. See the documentation that was included with your
adapter card.
The CSACS-1121 Series appliance does not boot properly, or it constantly or intermittently reboots:
— Check the appliance chassis or the application software. For warranty information, see the Cisco Information
Packet publication that is shipped with your appliance or contact your customer service representative.
If you are using the console port with a terminal, and the CSACS-1121 Series appliance boots but the console screen
is frozen:
— Verify that the parameters for your terminal are set as follows:
a. The terminal should have the same data rate that the appliance has (9600 bps is the default).
b. 8 data bits.
d. 1 stop bit.
The CSACS-1121 Series appliance powers on and boots only when an adapter card is removed. Check the adapter
card. For warranty information, see the Cisco Information Packet publication that is shipped with your appliance or
contact your customer service representative.
The CSACS-1121 Series appliance powers on and boots only when a particular cable is disconnected. There might
be a problem with the cable. For warranty information, see the Cisco Information Packet publication that is shipped
with your appliance or contact your customer service representative.
4
Troubleshooting
5
Troubleshooting
Front-Panel LEDs
195214
9
10
Back-Panel LEDs
6
Troubleshooting
276861
1 2
See Cisco SNS-3415/3495 Appliance Back-Panel View, page 6, to view the available back-panel LEDs in the Cisco
SNS-3415 or Cisco SNS-3495 appliance.
See Internal Diagnostic LEDs, page 7, to view the available internal diagnostic LEDs in the Cisco SNS-3415 or Cisco
SNS-3495 appliance.
Note: The serial number for the CSACS-1121 Series appliance is 11 characters long.
7
Troubleshooting
On the SNS-3415 or SNS-3495 appliance, the serial number for the server is printed on a label on the top of the server,
near the front.
Before you submit a request for service online or by phone, use the CPI tool to locate your product serial number. You
can access this tool from the Cisco Support website.
Copy and paste the output of the show command to identify the product.
Search results show an illustration of your product with the location of the serial number label highlighted. Locate
the serial number label on your product and record the information before you place a service call.
http://tools.cisco.com/Support/CPI/index.do
Access to the CPI tool on the Cisco Support website requires a Cisco.com user ID and password. If you have a valid
service contract but do not have a user ID or password, you can register at:
http://tools.cisco.com/RPF/register/register.do
8
Site Log
The site log provides a record of all actions related to installing and maintaining the CSACS-1121 Series appliance. Keep
the log in an accessible place near the appliance chassis so that anyone who performs tasks has access to it. Use the
installation checklist (see the Installation Checklist, page 12) to verify the steps for the installation and maintenance
process of your appliance.
Installation progress—Make a copy of the appliance installation checklist, and insert it into the site log. Make entries
as you complete each task.
Upgrade, removal, and maintenance procedures—Use the site log as a record of ongoing appliance maintenance and
expansion history. Each time a task is performed on the appliance, update the site log to reflect the following
information:
— Configuration changes
— Intermittent problems
Table 1 on page 1 shows a sample site log. Make copies of the sample, or design your own site log to meet the needs
of your site and equipment.
1
Site Log
2
Maintaining the CSACS-1121 and Cisco
SNS-3400 Series Appliances
The CSACS-1121, Cisco SNS-3415, and Cisco SNS-3495 Series appliances are configured to order and is ready for
installation when it leaves the factory. After you install and configure your appliance, you may have to perform specific
maintenance procedures and operations to ensure that the appliance is operating properly.
These preventive procedures will maintain your appliance in good operating condition and minimize the need for costly,
time-consuming service procedures.
Caution: To help prevent problems, before performing any procedures in this chapter, review Safety Warnings,
page 6 and the Safety Guidelines, page 1 sections.
The following sections discuss various environmental factors that can adversely affect appliance performance and
longevity. This section includes:
Cooling, page 2
Temperature, page 3
Humidity, page 3
Altitude, page 4
Magnetism, page 4
1
Maintaining the CSACS-1121 and Cisco SNS-3400 Series Appliances
Caution: Never spray cleaning solution on the surfaces of the appliance. Over spray can penetrate into the
appliance and cause electrical problems and corrosion.
Appliance
Use a lint-free, nonabrasive cloth to perform cleaning. Do not use a solvent, abrasive cleaning agents, or tissue paper. If
the appliance is dirty (for example, with thick dust), use a soft damp cloth and gently wipe the surface of the appliance.
Adapter Cards
Check the connections on the adapter cards. Ensure that they are secured to the appliance and have not been jarred
loose or mechanically damaged.
Corrosion
The oil from a person’s fingers, or prolonged exposure to high temperature or humidity, can corrode the gold-plated
edge connectors and pin connectors on adapter cards in the appliance. This corrosion on adapter card connectors is a
gradual process that can eventually lead to intermittent failure of electrical circuits.
To prevent corrosion, you should avoid touching contacts on adapter cards. Protecting the appliance from corrosive
elements is especially important in moist and salty environments, which tend to promote corrosion. Also, as a further
deterrent to corrosion, the appliance should not be used in extreme temperatures, as explained in the Temperature,
page 3 section.
Cooling
Exhaust fans in the power supply and in the appliance cool the power supply and the appliance by drawing air in through
various openings in the front of the appliance and blowing it out the back.
However, the fans also draw dust and other particles into the appliance, causing contaminant buildup, which results in
an increase in the appliance’s internal temperature and interferes with the operation of various appliance components.
To avoid these conditions, we recommend keeping your work environment clean to reduce the amount of dust and dirt
around the appliance, thereby reducing the amount of contaminants drawn into the appliance by the fans.
2
Maintaining the CSACS-1121 and Cisco SNS-3400 Series Appliances
Temperature
Temperature extremes can cause a variety of problems, including premature aging and failure of integrated circuits (ICs)
or mechanical failure of devices. Extreme temperature fluctuations can cause ICs to become loose in their sockets,
causing expansion and contraction of disk drive platters, resulting in read or write data errors.
The heat emission of an ACS appliance would be in the range of 341 to 1024 BTUs (100 to 300 W).
To minimize the negative effects of temperature on appliance performance, follow these guidelines:
Table 1 on page 3 lists the air temperature that you must maintain according to the altitude where your ACS server
is placed.
.
Ensure that the appliance has adequate ventilation. Do not place it within a closed-in wall unit or on top of cloth,
which can act as insulation. Do not place it where it will receive direct sunlight, particularly in the afternoon. Do not
place it next to a heat source of any kind, including heating vents during winter.
Adequate ventilation is particularly important at high altitudes. Appliance performance may not be optimum when the
appliance is operating at high temperatures as well as high altitudes. Do the following:
Ensure that all slots and openings on the appliance remain unobstructed, especially the fan vents on the back of the
appliance.
Clean the appliance at regular intervals to avoid any buildup of dust and debris, which can cause the appliance to
overheat.
If the appliance has been exposed to abnormally cold temperatures, allow a 2-hour warm-up period to bring it up
to normal operating temperature before turning it on. Failure to do so may cause damage to internal components,
particularly the hard disk drive.
Humidity
High-humidity conditions can cause moisture migration and penetration into the appliance. This moisture can cause
corrosion of internal components and degradation of properties such as electrical resistance, thermal conductivity,
physical strength, and size. Extreme moisture buildup inside the appliance can result in electrical shorts, which can cause
serious damage to the appliance.
Each appliance is rated to operate at 8 to 80 percent relative humidity, with a humidity gradation of 10 percent per hour.
Buildings in which climate is controlled by air conditioning in the warmer months and by heat during the colder months
usually maintain an acceptable level of humidity for appliances.
However, if an appliance is located in an unusually humid location, a dehumidifier can be used to maintain the humidity
within an acceptable range.
3
Maintaining the CSACS-1121 and Cisco SNS-3400 Series Appliances
Altitude
Operating an appliance at high altitudes (low atmospheric pressure) reduces the efficiency of forced and convection
cooling which can result in electrical problems related to arcing and corona effects. This condition can also cause sealed
components with internal pressure, such as electrolytic capacitors, to fail or perform at reduced efficiency.
Electrostatic Discharge
Electrostatic discharge (ESD) results from the buildup of static electricity on the human body and certain other objects.
This static electricity is often produced by simple movements, such as walking across a carpet.
ESD is a discharge of a static electrical charge that occurs when a person whose body contains such a charge touches
a component in the appliance. This static discharge can cause components, especially ICs, to fail. ESD is a problem
particularly in dry environments where the relative humidity is below 50 percent.
To reduce the effects of ESD, you should observe the following guidelines:
Wear a grounding wrist strap. If a grounding wrist strap is unavailable, touch an unpainted metal surface on the
appliance chassis periodically to neutralize any static charge.
RFI is defined as any EMI with a frequency above 10 kHz. This type of interference can travel from the appliance to other
devices through the power cable and power source, or through the air, like transmitted radio waves. The Federal
Communications Commission (FCC) publishes specific regulations to limit the amount of EMI and RFI emitted by
computing equipment. Each appliance meets these FCC regulations.
Ensure that the screws on all peripheral cable connectors are securely fastened to their corresponding connectors
on the back of the appliance.
Always use shielded cables with metal connector shells for attaching peripherals to the appliance.
Magnetism
Hard disk drives are susceptible to the effects of magnetism as they store data magnetically. Hard disk drives should
never be stored near magnetic sources such as:
Monitors
Printers
Fluorescent lights
4
Maintaining the CSACS-1121 and Cisco SNS-3400 Series Appliances
Place the appliance on a dedicated power circuit (rather than sharing a circuit with other electrical equipment). In
general, do not allow the appliance to share a circuit with any of the following:
— Copier machines
— Teletype machines
— Laser printers
— Fax machines
Besides the above equipment, the greatest threats to an appliance’s power supply are surges or blackouts caused by
electrical storms.
If a blackout occurs—even a temporary one—while the appliance is turned on, turn off the appliance immediately and
disconnect it from the electrical outlet. Leaving the appliance on may cause problems when the power is restored.
To maintain the Cisco SNS-3415 or Cisco SNS-3495 appliance, see Maintaining the Server Chapter in the Cisco UCS
C220 M3 Server Installation and Service Guide.
5
Maintaining the CSACS-1121 and Cisco SNS-3400 Series Appliances