Users Guide

Enabling or disabling IO Identity Optimization using RACADM
To enable I/O Identity Optimization, use the command:
racadm set idrac.ioidopt.IOIDOptEnable Enabled
After enabling this feature, you must restart the system for the settings to take effect.
To disable I/O Identity Optimization, use the command:
racadm set idrac.ioidopt.IOIDOptEnable Disabled
To view the I/O Identity Optimization setting, use the command:
racadm get iDRAC.IOIDOpt
Configuring persistence policy settings
Using IO identity, you can configure policies specifying the system reset and power cycle behaviors that determine the persistence or
clearance of the virtual address, initiator, and storage target settings. Each individual persistence policy attribute applies to all ports and
partitions of all applicable devices in the system. The device behavior changes between auxiliary powered devices and non-auxiliary
powered devices.
NOTE: The Persistence Policy feature may not work when set to default, if the VirtualAddressManagement attribute is
set to FlexAddress (not for MX platforms) or RemoteAssignedAddress (for MX platforms) mode on iDRAC and if the
FlexAddress or Remote-Assigned Address feature is disabled in CMC (not for MX platforms) or OME Modular (for MX
platforms), ensure that you set the VirtualAddressManagement attribute to Console mode in iDRAC or enable the
FlexAddress or Remote-Assigned Address feature in CMC or OME Modular.
You can configure the following persistence policies:
Virtual Address: Auxiliary powered devices
Virtual Address: Non-Auxiliary powered devices
Initiator
Storage target
Before applying the persistence policy, make sure to:
Inventory the network hardware at least once, that is, enabled Collect System Inventory On Restart.
Enable I/O Identity Optimization.
Events are logged to the Lifecycle Controller log when:
I/O Identity Optimization is enabled or disabled.
Persistence policy is changed.
Virtual address, initiator and target values are set based on the policy. A single log entry is logged for the configured devices and the
values that are set for those devices when the policy is applied.
Event actions are enabled for SNMP, email, or WS-eventing notifications. Logs are also included in the remote syslogs.
Default values for persistence policy
Table 46. Default values for persistence policy
Persistence Policy AC Power Loss Cold Boot Warm Boot
Virtual Address: Auxiliary
Powered Devices
Not selected Selected Selected
Virtual Address: Non-Auxiliary
Powered Devices
Not selected Not selected Selected
Initiator Selected Selected Selected
Storage Target Selected Selected Selected
Inventorying, monitoring, and configuring network devices 187