Skip to content

Commit 5e45360

Browse files
authored
Merge pull request #3124 from Vijayakannan-M/cms/Vijayakannan-M/hpe-dev-portal/blog/configure-isut-and-ams-for-vlcm-based-firmware-updates-on-gen-12-servers
Create Blog “configure-isut-and-ams-for-vlcm-based-firmware-updates-on-gen-12-servers”
2 parents 7885a21 + b59a057 commit 5e45360

File tree

1 file changed

+103
-0
lines changed

1 file changed

+103
-0
lines changed
Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,103 @@
1+
---
2+
title: How to configure iSUT and AMS for vLCM-Based firmware updates on HPE
3+
Gen12 servers (High Security Mode)
4+
date: 2025-10-01T02:30:17.312Z
5+
author: Vijayakannan M
6+
authorimage: /img/Avatar3.svg
7+
disable: false
8+
tags:
9+
- OV4VC
10+
- VLCM
11+
- COM4VC
12+
- hpe-oneview
13+
- HPE Gen12
14+
---
15+
<style> li { font-size: 27px; line-height: 33px; max-width: none; } </style>
16+
17+
HPE Gen12 servers introduce enhanced security by supporting only High Security modes (SecureStandard, CNSA, FIPS). This impacts how you configure Intelligent System Update Tool **(iSUT)** and Agentless Management Service **(AMS)** for vSphere Lifecycle Manager **(vLCM)** based firmware updates.
18+
19+
Unlike previous generations, configuration through the HPE OneView for VMware vCenter **(OV4VC)** and HPE Compute Ops Management plug-in for VMware vCenter **(COM4VC)** vLCM Pre-Check page is not available in these modes, as iLO credentials are now required. Instead, you must manually configure AMS and iSUT by creating an application account and providing valid HPE iLO credentials.
20+
21+
In this blog post, I’ll show you how to configure iSUT and AMS to enable vLCM-based firmware updates on HPE Gen12 servers.
22+
23+
- - -
24+
25+
## **Prerequisites**
26+
27+
* HPE Gen12 server with iLO 7
28+
* vSphere environment with vLCM enabled
29+
* iLO credentials with sufficient privileges
30+
* Access to server CLI (SSH or local console)
31+
32+
- - -
33+
34+
## **Step 1: Create an Application Account on iLO 7**
35+
36+
Application accounts are service accounts in iLO 7, used by host applications (like iSUT and AMS) to securely authenticate and communicate with iLO.
37+
38+
**To create an application account using CLI:**
39+
40+
```shell
41+
sut appaccount create -u <ilo_username> -p <ilo_password>
42+
```
43+
44+
**Alternatively, to proceed without creating an application account, provide the iLO credentials using the following CLI command:**
45+
46+
```shell
47+
sut -set ilousername=<ilo_username> ilopassword=<ilo_password>
48+
```
49+
50+
- - -
51+
52+
## **Step 2: Set iSUT Mode to AutoDeploy**
53+
54+
Set the iSUT mode to `AutoDeploy` to enable automated firmware updates:
55+
56+
```shell
57+
sut -set mode=AutoDeploy
58+
```
59+
60+
- - -
61+
62+
## **Step 3: Configure AMS Application Account (for VMware)**
63+
64+
For VMware environments, create the AMS application account:
65+
66+
```shell
67+
/opt/amsdv/bin/amsdCli appaccount create -u <iLO_username> -p <iLO_password>
68+
```
69+
70+
- - -
71+
72+
## **Step 4: Verify Application Account in iLO**
73+
74+
1. Open the **iLO GUI**
75+
2. Navigate to **iLO Settings** > **User Management** > **Users**
76+
3. Select **Application Account**
77+
4. Confirm the application account details are present
78+
79+
- - -
80+
81+
## **Step 5: Check AMS status in iLO GUI**
82+
83+
* Ensure AMS status is reported as **Available** in the iLO GUI.
84+
85+
- - -
86+
87+
## **Step 6: Verify iSUT and AMS status in vSphere**
88+
89+
1. Log in to **VMware vSphere**.
90+
2. Select the required **cluster** and click the **Configure** tab.
91+
3. In the left panel, go to **Cluster > Configure > HPE Server Hardware**.
92+
4. On the **vLCM Pre-Check** panel, check the **iSUT mode** and **AMS state**.
93+
5. Refresh the page and confirm both statuses are **green**.
94+
95+
- - -
96+
97+
## **Conclusion**
98+
99+
With AMS and iSUT properly configured, you are ready to proceed with vLCM-based firmware updates on HPE Gen12 servers, including both **ProLiant** and **Synergy** models. This ensures secure, automated, and compliant lifecycle management in high-security environments.
100+
101+
- - -
102+
103+
**Tip:** Always refer to the latest HPE and VMware documentation for updates on security practices and supported configurations.

0 commit comments

Comments
 (0)