Users Guide

For the list of I/O Identity Optimization attributes that you can modify in the XML conguration le, see the NIC Prole document available
at delltechcenter.com/idrac.
NOTE: Do not modify non I/O Identity Optimization attributes.
Enabling or disabling IO Identity Optimization using web interface
To enable or disable I/O Identity Optimization:
1 In the iDRAC Web interface, go to Overview > Hardware > Network Devices.
The Network Devices page is displayed.
2 Click the I/O Identity Optimization tab, select the I/O Identity Optimization option to enable this feature. To disable, clear this
option.
3 Click Apply to apply the setting.
Enabling or disabling IO Identity Optimization using RACADM
To enable I/O Identity Optimization, use the command:
racadm set idrac.ioidopt.IOIDOptEnable Enabled
After enabling this feature, you must restart the system for the settings to take eect.
To disable I/O Identity Optimization, use the command:
racadm set idrac.ioidopt.IOIDOptEnable Disabled
To view the I/O Identity Optimization setting, use the command:
racadm get iDRAC.IOIDOpt
Conguring persistence policy settings
Using IO identity, you can congure policies specifying the system reset and power cycle behaviors that determine the persistence or
clearance of the virtual address, initiator, and storage target settings. Each individual persistence policy attribute applies to all ports and
partitions of all applicable devices in the system. The device behavior changes between auxiliary powered devices and non-auxiliary
powered devices.
NOTE
: The Persistence Policy feature may not work when set to default, if the VirtualAddressManagement attribute is set to
FlexAddress mode on iDRAC and if the FlexAddress feature is disabled in CMC. Ensure that you set the
VirtualAddressManagement attribute to Console mode in iDRAC or enable the FlexAddress feature in CMC.
You can congure the following persistence policies:
Virtual Address: Auxiliary powered devices
Virtual Address: Non-Auxiliary powered devices
Initiator
Storage target
Before applying the persistence policy, make sure to:
Inventory the network hardware at least once, that is, enabled Collect System Inventory On Restart.
Enable I/O Identity Optimization.
Events are logged to the Lifecycle Controller log when:
I/O Identity Optimization is enabled or disabled.
192
Inventorying, monitoring, and conguring network devices