|
| 1 | +--- |
| 2 | +title: How to configure iSUT and AMS for vLCM-Based firmware updates on HPE |
| 3 | + Gen12 servers (High Security Mode) |
| 4 | +date: 2025-10-01T02:30:17.312Z |
| 5 | +author: Vijayakannan M |
| 6 | +authorimage: /img/Avatar3.svg |
| 7 | +disable: false |
| 8 | +tags: |
| 9 | + - OV4VC |
| 10 | + - VLCM |
| 11 | + - COM4VC |
| 12 | + - hpe-oneview |
| 13 | + - HPE Gen12 |
| 14 | +--- |
| 15 | +<style> li { font-size: 27px; line-height: 33px; max-width: none; } </style> |
| 16 | + |
| 17 | +HPE Gen12 servers introduce enhanced security by supporting only High Security modes (SecureStandard, CNSA, FIPS). This impacts how you configure Intelligent System Update Tool **(iSUT)** and Agentless Management Service **(AMS)** for vSphere Lifecycle Manager **(vLCM)** based firmware updates. |
| 18 | + |
| 19 | +Unlike previous generations, configuration through the HPE OneView for VMware vCenter **(OV4VC)** and HPE Compute Ops Management plug-in for VMware vCenter **(COM4VC)** vLCM Pre-Check page is not available in these modes, as iLO credentials are now required. Instead, you must manually configure AMS and iSUT by creating an application account and providing valid HPE iLO credentials. |
| 20 | + |
| 21 | +In this blog post, I’ll show you how to configure iSUT and AMS to enable vLCM-based firmware updates on HPE Gen12 servers. |
| 22 | + |
| 23 | +- - - |
| 24 | + |
| 25 | +## **Prerequisites** |
| 26 | + |
| 27 | +* HPE Gen12 server with iLO 7 |
| 28 | +* vSphere environment with vLCM enabled |
| 29 | +* iLO credentials with sufficient privileges |
| 30 | +* Access to server CLI (SSH or local console) |
| 31 | + |
| 32 | +- - - |
| 33 | + |
| 34 | +## **Step 1: Create an Application Account on iLO 7** |
| 35 | + |
| 36 | +Application accounts are service accounts in iLO 7, used by host applications (like iSUT and AMS) to securely authenticate and communicate with iLO. |
| 37 | + |
| 38 | +**To create an application account using CLI:** |
| 39 | + |
| 40 | +```shell |
| 41 | +sut appaccount create -u <ilo_username> -p <ilo_password> |
| 42 | +``` |
| 43 | + |
| 44 | +**Alternatively, to proceed without creating an application account, provide the iLO credentials using the following CLI command:** |
| 45 | + |
| 46 | +```shell |
| 47 | +sut -set ilousername=<ilo_username> ilopassword=<ilo_password> |
| 48 | +``` |
| 49 | + |
| 50 | +- - - |
| 51 | + |
| 52 | +## **Step 2: Set iSUT Mode to AutoDeploy** |
| 53 | + |
| 54 | +Set the iSUT mode to `AutoDeploy` to enable automated firmware updates: |
| 55 | + |
| 56 | +```shell |
| 57 | +sut -set mode=AutoDeploy |
| 58 | +``` |
| 59 | + |
| 60 | +- - - |
| 61 | + |
| 62 | +## **Step 3: Configure AMS Application Account (for VMware)** |
| 63 | + |
| 64 | +For VMware environments, create the AMS application account: |
| 65 | + |
| 66 | +```shell |
| 67 | +/opt/amsdv/bin/amsdCli appaccount create -u <iLO_username> -p <iLO_password> |
| 68 | +``` |
| 69 | + |
| 70 | +- - - |
| 71 | + |
| 72 | +## **Step 4: Verify Application Account in iLO** |
| 73 | + |
| 74 | +1. Open the **iLO GUI** |
| 75 | +2. Navigate to **iLO Settings** > **User Management** > **Users** |
| 76 | +3. Select **Application Account** |
| 77 | +4. Confirm the application account details are present |
| 78 | + |
| 79 | +- - - |
| 80 | + |
| 81 | +## **Step 5: Check AMS status in iLO GUI** |
| 82 | + |
| 83 | +* Ensure AMS status is reported as **Available** in the iLO GUI. |
| 84 | + |
| 85 | +- - - |
| 86 | + |
| 87 | +## **Step 6: Verify iSUT and AMS status in vSphere** |
| 88 | + |
| 89 | +1. Log in to **VMware vSphere**. |
| 90 | +2. Select the required **cluster** and click the **Configure** tab. |
| 91 | +3. In the left panel, go to **Cluster > Configure > HPE Server Hardware**. |
| 92 | +4. On the **vLCM Pre-Check** panel, check the **iSUT mode** and **AMS state**. |
| 93 | +5. Refresh the page and confirm both statuses are **green**. |
| 94 | + |
| 95 | +- - - |
| 96 | + |
| 97 | +## **Conclusion** |
| 98 | + |
| 99 | +With AMS and iSUT properly configured, you are ready to proceed with vLCM-based firmware updates on HPE Gen12 servers, including both **ProLiant** and **Synergy** models. This ensures secure, automated, and compliant lifecycle management in high-security environments. |
| 100 | + |
| 101 | +- - - |
| 102 | + |
| 103 | +**Tip:** Always refer to the latest HPE and VMware documentation for updates on security practices and supported configurations. |
0 commit comments