Cisco UCS C-Series Servers

Cisco UCS C-Series Servers deliver unified computing in an industry-standard form factor to reduce total cost of ownership and increase agility. Each product addresses varying workload challenges through a balance of processing, memory, I/O, and internal storage resources.

About the Release Notes

This document describes the new features, system requirements, open caveats and known behaviors for C-Series software release 4.0(1) including Cisco Integrated Management Controller software and any related BIOS, firmware, or drivers. Use this document in conjunction with the documents listed in the Related Documentation section.


Note

We sometimes update the documentation after original publication. Therefore, you should also refer to the documentation on Cisco.com for any updates.


Revision History

Revision

Date

Description

H0

August 13, 2019

Following changes were made:

  • Updated the Resolved Caveats section.

  • Updated the HUU version to 4.0(1h).

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.0

G0

June 25, 2019

Following changes were made:

  • Updated the Resolved Caveats section.

  • Updated the Security Fixes section.

  • Updated the HUU version to 4.0(1g).

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.0

F0

February 18, 2019

Following changes were made:

  • Updated the Resolved Caveats section.

  • Updated the HUU version to 4.0(1e).

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.0

E0

December 10, 2018

Following changes were made:

  • Updated the Resolved Caveats section.

  • Updated the HUU version to 4.0(1d).

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.0

D0

November 5, 2018

The following software release (Version 4.0(1.240)) was re-posted with a deferral notice and is no longer available for download. See the deferral notice posted with the software for details:

C0

October 11, 2018

Following changes were made:

  • Updated the Resolved Caveats section.

  • Added the Security Fixes section.

  • Updated the HUU version to 4.0(1c).

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.0

B0

September 13, 2018

Following changes were made:

  • Updated the Resolved Caveats section.

  • Updated the HUU versions to 4.0(1b). Firmware for the following hardware was updated:

    • Intel® SSD DC S4500 and DC S4600 Series SATA

    • Micron 5100 SATA SSD (M.2 and U.2)

    • Intel® SSD DC P4500 and P4600 Series NVMe

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.0

A0

August 14, 2018

Created release notes for 4.0(1a).

System Requirements

The management client must meet or exceed the following minimum system requirements:

  • Sun JRE 1.8.0_92 or later

  • HTML based interfaces are supported on:

    • Microsoft Internet Explorer 10.0 or 11

    • Mozilla Firefox 30 or higher

    • Google Chrome 38 or higher

    • Safari 7 or higher


    Note

    If the management client is launched using an unsupported browser, check the help information from the For best results use supported browsers option available in the login window for the supported browser versions.


  • Microsoft Windows 7, Microsoft Windows XP, Microsoft Windows Vista, Microsoft Windows 10, Apple Mac OS X v10.6, Red Hat Enterprise Linux 5.0 or higher operating systems

  • Transport Layer Security (TLS) version 1.2.

Overview of the Server Models

Supported Platforms

The following servers are supported in this release:

  • UCS C125 M5

  • UCS C220 M5

  • UCS C240 M5

  • UCS C480 M5

  • UCS S3260 M5

  • UCS S3260 M4

  • UCS C220 M4

  • UCS C240 M4

  • UCS C460 M4

For information about these servers, see Overview of Servers

Hardware and Software Interoperability

For detailed information about storage switch, operating system, adapter, adapter utility, and storage array interoperability, see the Hardware and Software Interoperability Matrix for your release located at:

http://www.cisco.com/en/US/products/ps10477/prod_technical_reference_list.html

For details about transceivers and cables that are supported on VIC cards, see the Transceiver Modules Compatibility Matrix

You can also see the VIC data sheets for more compatibility information: Cisco UCS Virtual Interface Card Data Sheets

Cisco UCS C-Series and Cisco UCS Manager Release Compatibility Matrix for C-Series Rack-Mount Servers

Cisco UCS C-Series Rack-Mount Servers are managed by built-in standalone software — Cisco Integrated Management Controller (Cisco IMC). However, when a C-Series Rack-Mount Server is integrated with Cisco UCS Manager, the Cisco IMC does not manage the server anymore.

The following table lists the C-Series software standalone and Cisco UCS Manager releases for C-Series Rack-Mount Servers:

Table 1. Cisco C-Series and UCS Manager Software Releases for C-Series Servers

C-Series Standalone Release

Cisco UCS Manager Release

C-Series Servers

4.0(1e)

No support.

All M4, M5 servers and C125 M5

4.0(1d)

4.0(1d)

All M4, M5 servers and C125 M5

4.0(1c)

4.0(1c)

All M4, M5 servers and C125 M5

4.0(1b)

4.0(1b)

All M4, M5 servers and C125 M5

4.0(1a)

4.0(1a)

All M4, M5 servers and C125 M5

3.1(3f)

3.2(3f)

C480 M5, C220 M5, C240 M5, S3260 M5

3.1(3d)

3.2(3e)

C480 M5, C220 M5, C240 M5, S3260 M5

3.1(3c)

3.2(3d)

C480 M5, C220 M5, C240 M5, S3260 M5

3.1(3b)

3.2(3b)

C480 M5, C220 M5, C240 M5

3.1(3a)

3.2(3a)

C480 M5, C220 M5, C240 M5, S3260 M5

3.1(2d)

3.2(2d)

C480 M5, C220 M5, C240 M5

3.1(2c)

3.2(2c)

C480 M5, C220 M5, C240 M5

3.1(2b)

3.2(2b)

C480 M5, C220 M5, C240 M5

3.1(1d)

3.2(1d)

C220 M5, C240 M5

3.0(3a)

3.1(3a)

C220 M4, C240 M4 only

3.0(2b)

No Support

Note 

We support discovery and upgrade or downgrade functions with Cisco UCS Manager.

C220 M4, C240 M4 only

3.0(1d)

No Support

Note 

We support discovery and upgrade or downgrade functions with Cisco UCS Manager.

All M3 and M4 servers except C420 M3

2.0(13e)

3.1(2b)

All M3 and M4 servers except C420 M3

2.0(10b)

3.1(1g)

C220 M4, C240 M4 only

2.0(9c)

3.1(1e)

All other M3/M4 servers

2.0(9f)

2.2(7b)

For all other M3/M4

2.0(10b)

2.2(7b)

C220 M4, C240 M4 only

2.0(9c)

2.2(8f)

For all other M3/M4

2.0(10b)

2.2(8f)

C220 M4, C240 M4 only

2.0(12b)

2.2(8f)

C460 M4 only

2.0(8d)

2.2(6c)

For all other M3/M4

2.0(6d)

2.2(5a)

For all other M3/M4

2.0(4c)

2.2(4b)

For all other M3/M4

2.0(3d)1

2.2(3a)

For all other M3/M4

Upgrade Paths to Release 4.0

The section provides information on the upgrade paths to release 4.0(x). Refer to the table for upgrade paths for various Cisco UCS C-series IMC versions.

Table 2. Upgrade Paths to Release 4.0(x)

Upgrade From Release

Upgrade To Release

Recommended Upgrade Path

All M5 Servers from 3.1(x)

4.0(x)

Follow below upgrade path:

  • You can use Interactive HUU or Non-Interactive HUU (NIHHU) script to update the server.

  • While updating the firmware using the Non-Interactive HUU (NIHUU) tool, use the Python scripts that are released with version 4.0(1a).

  • Use OpenSSL 1.0.1e-fips on the client side (where the NIHUU python scripts are running).

  • Download HUU iso from here.

  • Download NIHUU script from here.

For all M4 servers for releases greater than 2.0(4c)

For all M4 servers from 3.0(x)

4.0(x)

Follow below upgrade path:

  • You can use Interactive HUU or Non-Interactive HUU (NIHHU) script to update the server.

  • While updating the firmware using the Non-Interactive HUU (NIHUU) tool, use the Python scripts that are released with version 4.0(1a).

  • Use OpenSSL 1.0.1e-fips on the client side (where the NIHUU python scripts are running).

  • If you wish to secure Cimc Boot, set flag use_cimc_secure as yes in multiserver_config file present with python script.

  • Download HUU iso from here.

  • Download NIHUU script from here.

For all M4 servers for release lesser than 2.0(4c)

4.0(x)

Follow these steps to upgrade from releases less than 2.0(4c) to 4.0(x):

Upgrade from version less than 2.0(4c) to 2.0(4c)

  • You can use Interactive HUU or Non-Interactive HUU (NIHHU) script to update the server.

  • While updating the firmware using the Non-Interactive HUU (NIHUU) tool, use the Python scripts that are released with version 3.0(3a).

  • Use OpenSSL 1.0.0-fips on the client side (where the NIHUU python scripts are running).

  • Download HUU iso from here.

  • Download NIHUU script from here.

Upgrade from 2.0(4c) to 4.0(x)

  • You can use Interactive HUU or Non-Interactive HUU (NIHHU) script to update the server.

  • While updating the firmware using the Non-Interactive HUU (NIHUU) tool, use the Python scripts that are released with version 4.0(1a).

  • Use OpenSSL 1.0.1e-fips on the client side (where the NIHUU python scripts are running).

  • If you wish to secure Cimc Boot, set flag use_cimc_secure as yes in multiserver_config file present with python script.

  • Download HUU iso from here.

  • Download NIHUU script from here.

Firmware Upgrade Details

Firmware Files

The C-Series software release 4.0(1) includes the following software files:

CCO Software Type File name(s) Comment
Unified Computing System (UCS) Server Firmware

ucs-c125-huu-4.0.1.iso

ucs-c240m5-huu-4.0.1.iso

ucs-c220m5-huu-4.0.1.iso

ucs-c480m5-huu-4.0.1.iso

ucs-s3260-huu-4.0.1.iso

ucs-c240m4-huu-4.0.1.iso

ucs-c220m4-huu-4.0.1.iso

ucs-c460m4-huu-4.0.1.iso

For release specific ISO versions, see Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.0

Host Upgrade Utility
Unified Computing System (UCS) Drivers ucs-cxxx-drivers.4.0.1.iso Drivers
Unified Computing System (UCS) Utilities

ucs-cxxx-utils-efi.4.0.1.iso

ucs-cxxx-utils-linux.4.0.1.iso

ucs-cxxx-utils-vmware.4.0.1.iso

ucs-cxxx-utils-windows.4.0.1.iso

Utilities

Note

Always upgrade the BIOS, the Cisco IMC and CMC from the HUU ISO. Do not upgrade individual components (only BIOS or only Cisco IMC), since this could lead to unexpected behavior. If you choose to upgrade BIOS, and the Cisco IMC individually and not from the HUU ISO, make sure to upgrade both Cisco IMC, and BIOS to the same container release. If the BIOS and the Cisco IMC versions are from different container releases, it could result in unexpected behavior. Cisco recommends that you use the Update All option from the Host Upgrade Utility to update the firmware versions of Cisco IMC, BIOS, and all other server components (VIC, RAID Controllers, PCI devices, and LOM) together.


Host Upgrade Utility

The Cisco Host Upgrade Utility (HUU) is a tool that upgrades the Cisco UCS C-Series firmware.

The image file for the firmware is embedded in the ISO. The utility displays a menu that allows you to choose which firmware components to upgrade. For more information on this utility see:

http://www.cisco.com/en/US/products/ps10493/products_user_guide_list.html

For details of firmware files in Cisco Host Upgrade Utility for individual releases, see Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.0

Updating the Firmware

Use the Host Upgrade Utility to upgrade the C-Series firmware. Host Upgrade Utility can upgrade the following software components:

  • BIOS

  • Cisco IMC

  • CMC

  • Cisco VIC Adapters

  • LSI Adapters

  • LAN on Motherboard

  • PCIe adapter firmware

  • HDD firmware

  • SAS Expander firmware

All firmware should be upgraded together to ensure proper operation of your server.


Note

We recommend that you use the Update All option from the Host Upgrade Utility to update the firmware versions of Cisco IMC, BIOS and all other server components (VIC, RAID Controllers, PCI devices, and LOM) together. Click Exit once you deploy the firmware.


For more information on how to upgrade the firmware using the utility, see:

http://www.cisco.com/c/en/us/support/servers-unified-computing/ucs-c-series-rack-servers/products-user-guide-list.html

Supported Features

Supported Features

The following new software features are supported in Release 4.0(1a):

  • Device Connector Updates—The following updates were added:

    • Added support to configure the C-Series servers using only Cisco Intersight. This option enables you to manage the server configuration either by using both Cisco IMC and Cisco Intersight or by using only Cisco Intersight.

    • Device ID and Claim Code fields were added to the Connections area.

  • Network Adapter Updates—Following changes were added:

    • General Adapter Properties Changes:

      Port Channel—Added an option to enable port channel. When this option is enabled two vNICs and two vHBAs are available for use on the adapter card. When disabled, four vNICs and four vHBAs are available.

    • Port Channel Capable—Added a field that indicates the port channel support on the adapter.

    • External Ethernet Interface changes:

      Admin FEC Mode—Added an option to set the Admin Forward Error Correction (FEC) mode.


      Note

      FEC mode is applicable only for 25G link speed. On the 14xx adapters, FEC mode set on the adapter must match the FEC mode of the switch. Otherwise the link does not work.


    • Operating FEC Mode—Added an option to display the Operating Forward Error Correction (FEC) mode.

  • BIOS Activation Updates— Added support to activate BIOS when the host is ON. A cancel BIOS activation feature to cancel a pending BIOS activation was also added.

  • Security Configuration Updates —Added an option to enable Common Criteria (CC).

  • Flexutil Virtual Drives Updates—Added the Resident Image field that displays the name of the image file present in the virtual drive.

  • XML API Updates—Added XML API support for Cisco Intersight device connector, Port Channel, Port Channel Capable, Admin FEC Mode and Operating FEC Mode.

  • Audit Log Updates—An audit log is generated with the details (changes performed, user details and the interface used) of the configuration changes done on a UCS C-Series server using Cisco IMC.

  • PXE IPv6 Support—Cisco UCS C-Series and S-Series M4 servers now support IPv6 option on PXE boot devices.


    Note

    This option is supported on the C-Series M5 servers from release 3.1(2) and S-Series (S3260 M5) from release 3.1(3).


New Hardware in Release 4.0(1)

Cisco UCS C125 M5 Server

Support for Cisco UCS C125 M5 Servers. The C125 M5 server is Cisco’s first server based on AMD EPYC™ processors. Cisco UCS C125 M5 Servers are housed in the Cisco UCS C4200 Series Rack Server Chassis. Each Cisco UCS C4200 Series Rack Server Chassis supports two to four Cisco UCS C125 M5 Server nodes. The Cisco UCS C125 M5 Server supports the following peripherals:

  • Dual Port 10Gbase-T and 10G/25G SFP28 OCP cards

  • Cisco 12G 9460-8i PCIe 12G SAS RAID controller

  • 32 GB, 64 GB, and 128 GB SD cards

  • 32GB Micro-SD card

  • 240 GB and 960 GB M.2 SATA SSD drives

  • 16 GB Flash USB drive

  • Mini Storage Carriers for SD and M.2 SATA

  • On-board AHCI controllers

New Generation System I/O Control (SIOC) for Cisco UCS S3260 Storage Servers

Cisco UCS S3260 Storage Server system supports a new server SIOC UCS-S3260-PCISIOC with S3260 M5 servers. This SIOC has PCIe slots to replace the network adapters. These slots support both Cisco VIC and third-party adapters. In addition, the new SIOC has two NVME slots.

UCS VIC 1400 Series Adapters

Support for the following UCS VIC 1400 Series adapters on UCS M5 servers.

  • VIC 1455 10/25G PCIe for C-Series and S-Series (UCSC-PCIE-C25Q-04)

  • VIC 1457 10/25G mLOM for C-Series (UCSC-MLOM-C25Q-04)

This release supports 10/25G Ethernet connections between the Nexus switch and C-Series servers that have VIC 1455 or VIC 1457.

You must consider the following while configuring network adapters with 14xx VIC cards:

  • FCoE over port channel is not supported. FCoE is supported in the non port channel mode.

  • VMQ is not supported.

  • VXLAN is supported.

For more information about these VIC cards, see Cisco UCS Virtual Interface Card Data Sheets

Peripherals

  • Intel Xpoint BRAND NVMe Med. Performance Drives for M5 servers including C220, C240, C480 and S3260.

  • Support for the LSI 9400-8e external SAS HBA on UCS C220, C240, and C480 M5 platforms.

Software Utilities

The following standard utilities are available:

  • Host Update Utility (HUU)

  • BIOS and Cisco IMC Firmware Update utilities

  • Server Configuration Utility (SCU)

  • Server Diagnostic Utility (SDU)

The utilities features are as follows:

  • Availability of HUU, SCU on the USB as bootable images. The USB also contains driver ISO, and can be accessed from the host operating system.

Security Fixes

Security Fixes in Release 4.0(1g)

The following Security Fixes were added in Release 4.0(1g):

Release

Defect ID

CVE

Symptom

4.0(1g)

CSCvp34806

  • CVE-2018-12126

  • CVE-2018-12127

  • CVE-2018-12130

  • CVE-2019-11091

Cisco UCS M5 servers are based on Intel® Xeon® Scalable processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.

  • CVE-2018-12126 (Microarchitectural Store Buffer Data Sampling) affects store buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Cisco IMC release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12127 (Microarchitectural Load Port Data Sampling) affects load buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Cisco IMC release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12130 (Microarchitectural Fill Buffer Data Sampling) affects line fill buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Cisco IMC release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2019-11091 (Microarchitectural Uncacheable Data Sampling) affects the uncacheable memory buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Cisco IMC release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M5 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities.

4.0(1g)

CSCvp34790

CSCvp34799

  • CVE-2018-12126

  • CVE-2018-12127

  • CVE-2018-12130

  • CVE-2019-11091

Cisco UCS C-Series and S-Series M4 servers are based on Intel® Xeon® Processor E7 v2, v3, and v4 Product Family processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.

  • CVE-2018-12126 (Microarchitectural Store Buffer Data Sampling) affects store buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Cisco IMC release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12127 (Microarchitectural Load Port Data Sampling) affects load buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Cisco IMC release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12130 (Microarchitectural Fill Buffer Data Sampling) affects line fill buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Cisco IMC release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2019-11091 (Microarchitectural Uncacheable Data Sampling) affects the uncacheable memory buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Cisco IMC release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M4 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities.

4.0(1g)

CSCvp34786

  • CVE-2018-12126

  • CVE-2018-12127

  • CVE-2018-12130

  • CVE-2019-11091

Cisco UCS C-Series and S-Series M4 servers are based on Intel® Xeon® Processor E5 v3 and v4 Product Family processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.

  • CVE-2018-12126 (Microarchitectural Store Buffer Data Sampling) affects store buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Cisco IMC release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12127 (Microarchitectural Load Port Data Sampling) affects load buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Cisco IMC release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12130 (Microarchitectural Fill Buffer Data Sampling) affects line fill buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Cisco IMC release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2019-11091 (Microarchitectural Uncacheable Data Sampling) affects the uncacheable memory buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Cisco IMC release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M4 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities.

Security Fixes for Release 4.0(1c)

The following security fix was addressed in Release 4.0(1c):

Release

Defect ID

CVE

Description

4.0(1c)

CSCvm35067

CVE-2018-3655

Cisco UCS C-Series Servers includes a version of the Intel® Converged Security Management Engine that maybe affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2018-3655. This vulnerability was fixed in release 4.0(1c).

Resolved Caveats

The following section lists resolved caveats.

Resolved Caveats in Release 4.0(1)

Release 4.0(1h)

The following caveat was resolved in Release 4.0(1h):

Table 3. BMC

Defect ID

Symptom

First Affected Release

Resolved in Release

CSCvq83392

Added support for new upgrade or downgrade rules for Adopter BU.

4.0(1g)

4.0(1h)

Release 4.0(1g)

The following caveat was resolved in Release 4.0(1g):

Table 4. BMC

Defect ID

Symptom

First Affected Release

Resolved in Release

CSCvp41543

SSH clients fail to establish a connection to Cisco IMC. This happens when the SSH clients use diffie-hellman-group14-sha1 as default KEX algorithm as support for this KEX algorithm has been removed from Cisco IMC.

Update the SSH clients to the latest version that uses stricter KEX algorithms to establish SSH sessions.

3.0(4j)

4.0(1g)

Release 4.0(1e)

The following caveat was resolved in Release 4.0(1e):

Table 5. BMC

Defect ID

Symptom

First Affected Release

Resolved in Release

CSCvn81570

Modifying the LUN ID for Flex Flash SD card VD fails with the following error: error in configuring device

4.0(1c)

4.0(1e)

CSCvn80088

Unable to initiate non-interactive HUU update when the remote share password provided in the NI HUU contains any of the following special characters ; | ? $ ! @ # % ^ * - _ +

4.0(1a)

4.0(1e)

Release 4.0(1d)

The following caveat was resolved in Release 4.0(1d):

Table 6. BMC

Defect ID

Symptom

First Affected Release

Resolved in Release

CSCvn02204

After upgrading Cisco IMC to version 4.0(1a), SNMP stops working.

4.0(1a)

4.0(1d)

CSCvm89001

Unable to change the expired passwords that have special characters.

3.0(4a)

4.0(1d)

Table 7. Utilities

Defect ID

Symptom

First Affected Release

Resolved in Release

CSCvn26128

Firmware update status of QL45212H and QL41212H adapters show updated but the firmware does not change.

3.0(4j)

4.0(1d)

Release 4.0(1c)

The following caveat was resolved in Release 4.0(1c):

Table 8. BMC

Defect ID

Symptom

First Affected Release

Resolved in Release

CSCvm34402

After upgrading the BMC to 4.0(1a), chassis FANs speed changes to maximum speed (RPM) resulting in noise.

4.0(1a)

4.0(1c)

Release 4.0(1b)

The following caveat was resolved in Release 4.0(1b):

Table 9. BMC

Defect ID

Symptom

First Affected Release

Resolved in Release

CSCvk52168

On the S3260 servers, when you use SLAAC to launch the KVM or Cisco IMC web UI, the BMC SLAAC IP is unresponsive to pings.

3.0(4i)

4.0(1b)

Release 4.0(1a)

The following caveats are resolved in Release 4.0(1a):

Table 10. BIOS

Defect ID

Symptom

First Affected Release

Resolved in Release

CSCve46673

Precision boot order does not list the third party network adapters in legacy mode.

3.1(1d)

4.0(1a)

Table 11. BMC

Defect ID

Symptom

First Affected Release

Resolved in Release

CSCvi52975

Cisco IMC logs and fault history do not display the set time zone. This happens when you modify the default time zone and set the time zone of your choice.

3.1(3a)

4.0(1a)

CSCvi53766

On the S3260 M5 and S3260 M4 servers, the Time Zone configuration page on the Cisco IMC web UI displays a blank screen.

3.1(3a)

4.0(1a)

CSCvg34851

When you use the '$' symbol in your user password, exporting vNIC configuration (export-vnic) using ftp fails.

3.0(3a)

4.0(1a)

CSCvj66524

On the S3260 server, a BIOS POST Timeout error may be displayed on the Cisco IMC. This happens despite the server booting successfully and running without issues.

The following error message appears: "BIOSPOST_TIMEOUT: BIOS POST Timeout occurred: Contact Cisco TAC"

3.0(1c)

4.0(1a)

CSCvj74285

Cisco IMC reboots due to Out of memory (OOM) on M5 servers with firmware version 3.1(3a). Cisco IMC will be not be accessible over a network.

3.1(3a)

4.0(1a)

Table 12. External Storage

Defect ID

Symptom

First Affected Release

Resolved in Release

CSCvh31592

Windows 2016 OS crashes resulting in a BSOD and the host reboots. This happens when high stress IO with IO transaction on RAID 1 volume run for a long period for time.

3.1(3a)

4.0(1a)

CSCvb96598

After upgrading the server to release 3.0(1x), when you try to re-insert a boot device using the 'CTRL-C' utility on the SAS HBA controller, the default add key '+' does not function as expected. The Boot Order field accepts a value or 0 or 1, which indicates the presence of multiple controllers. However, currently, you are unable to modify or enter a value in the field.

This happens when you upgrade from previous releases such as release 2.0(10) or 2.0(13).

3.0(1c)

4.0(1a)

CSCvd07355

On the S3260 servers, enabling or disabling connection management results in unpredictable I/O performance. This happens when the host is online.

3.0(3a)

4.0(1a)

CSCvd25263

In rare situations, the Cisco 12G SAS Modular RAID Controller may encounter a multi-bit ECC error during sustained heavy IO load.

3.0(3a)

4.0(1a)

Table 13. Web Management

Defect ID

Symptom

First Affected Release

Resolved in Release

CSCvj37231

SMTP stops sending mail alerts after Cisco IMC is upgraded to 3.0(4a) version.

3.0(4a)

4.0(1a)

Table 14. HUU

Defect ID

Symptom

First Affected Release

Resolved in Release

CSCus94537

HDD firmware update using HUU takes time as the HDD firmware is updated sequentially. This increases the time to upgrade a server that has many HDD.

2.0(3d)

4.0(1a)

Open Caveats

The following section lists open caveats.

Open Caveats in Release 4.0(1)

Release 4.0(1a)

The following defect is open in Release 4.0(1a):

Table 15. BIOS

Defect ID

Symptom

Workaround

First Affected Release

CSCvk58997

On the M4 servers, booting IPv6 based UEFI PXE using Windows WDS application fails with a server time out error. This happens with all M4 servers in UEFI mode.

Use IPv4 UEFI PXE.

4.0(1a)

CSCvo77732

After upgrading the C460 M4 servers with Intel® Xeon® Processor v2 to 4.0(1a) version, server encounters a CATERR fault and the server becomes unresponsive.

Downgrade to 3.0(x) version.

4.0(1a)

Table 16. VIC

Defect ID

Symptom

Workaround

First Affected Release

CSCvq64055

Cisco VIC1455 and VIC 1457 interfaces take more than four minutes to recover to Link-Up state after the far end Switch configuration is changed to no shut. This happens when a 25G 5M copper passive cable (SFP-H25G-CU5M) cable is connecting the VIC1455 or VIC 1457 and the N9K-C93180YC-EX switch.

Use shorter copper passive cables (SFP-25G-CU1M. SFP-25G-CU2M, SFP-25G-CU3M).

Or

Use optical cables.

4.0(1a)

Open Caveats in the Previous Releases

Refer to the following release notes for Open Caveats in the previous releases:

Release Notes for Cisco UCS C-Series Software

Known Behaviors

The following section lists known behaviors.

Known Behaviors in Release 4.0(1)

Release 4.0(1a)

The following caveat is a known limitation in Release 4.0(1a):

Table 17. CMC

Defect ID

Symptom

Workaround

First Affected Release

CSCvi46521

On the 3260 servers, when you are using a dual VIC single server configuration, you cannot access the second VIC.

You must enable the single server dual VIC feature to use the second VIC.

4.0(1a)

Table 18. External Controllers

Defect ID

Symptom

Workaround

First Affected Release

CSCvk11921

On the C125 servers with QL41232H 25G OCP card, the link does not work. This happens when OCP card is connected to the switch using a 5M SFP cable. The network LED is not on and the network is not functional.

  1. Enter the BIOS setup.

  2. Navigate to Advanced > Qlogic QL41232 Option > Port Level configuration

  3. Change the link Speed to 25Gbps.

  4. Press F10.

  5. Save and exit.

4.0(1a)

Known Behaviors in the Previous Releases

Refer to the following release notes for Known Behaviors in the previous releases:

Release Notes for Cisco UCS C-Series Software

Related Documentation

Related Documentation

For configuration information for this release, refer to the following:

For information about installation of the C-Series servers, refer to the following:

The following related documentation is available for the Cisco Unified Computing System:

Refer to the release notes for Cisco UCS Manager software and the Cisco UCS C Series Server Integration with Cisco UCS Manager Guide at the following locations: