Overview

Cisco Intersight Infrastructure Services (IIS) enable the streamlined deployment, monitoring, management, and support of physical and virtual infrastructure. IIS supports Cisco Unified Computing System™ (UCS) servers and third-party devices. In addition, IIS provides the following advanced management and support capabilities along with global visibility of infrastructure health and status.

  • Telemetry data can be analyzed without any manual intervention when a problem occurs.

  • Service Request (SR) and a Return Material Authorization (RMA) are raised automatically.

Intersight Managed Mode (IMM) is a new IIS architecture that manages the UCS Fabric Interconnected systems through a Redfish-based standard model. IMM unifies the capabilities of the UCS Systems and the cloud-based flexibility of Intersight, thus unifying the management experience for the standalone and Fabric Interconnect attached systems.

About the Release Notes

This document contains information on new hardware, known issues and workarounds for following components:

  • FI kernel and system

  • Chassis IOM and IFM I/O modules

This document also includes the following:

  • Updated information after the documentation was originally published.

  • Related firmware and BIOS on blade, rack, and modular servers and other Cisco Unified Computing System (UCS) components associated with the release.


    Note


    This document contains information specific to components that apply to Cisco Intersight Managed Mode (IMM). For information on known issues and limitations related to Cisco UCS Servers in UCSM Managed Mode (UMM) or Standalone modes, see:


Revision History

The following table shows the online change history for this document.

Revision Date Description

December 16, 2024

X-Series M7 5.2(2.240080), M6 5.2(2.240078), B-Series 5.2(2.240080), and C-Series 4.3(4.242066) Server Firmware versions have been released. There is no corresponding Infrastructure Firmware release.

December 12, 2024

Included security fix CSCwj35846 to Release 4.3(4.240066).

December 09, 2024

C-Series Server Firmware version 4.3(2.240107) has been released. There is no corresponding Infrastructure Firmware release.

November 22, 2024

Removed Security fix CSCwk78644 from Release 4.3(4.240074).

November 19, 2024

Included Firmware Version Equivalency Between Cisco Intersight, Cisco IMC, and Cisco UCS Manager.

November 07, 2024

Updated release notes to include Compatibility and Support Matrix for Cisco Fabric Interconnects and MDS Switches, change in the title of this document, and changes to the About the Release Notes section.

October 22, 2024

Updated release notes for Cisco UCS 6400 and 6500 Series FI Infrastructure firmware release 4.3(5.240032) and Cisco UCS 9108 100G FI Infrastructure firmware release 4.3(5.240162).

This release includes updates to:

October 08, 2024

C-Series Server Firmware version 4.3(2.240090) has been released. There is no corresponding Infrastructure Firmware release.

September 26, 2024

C-Series Server Firmware version 4.3(4.242038) has been released. There is no corresponding Infrastructure Firmware release.

September 03, 2024

Updated release notes for Intersight Infrastructure Firmware Release 4.3(4.240074).

This release includes updates to:

It does not include any new hardware support.

August 20, 2024

C-Series Server Firmware version 4.3(4.241063) has been released. There is no corresponding Infrastructure Firmware release.

August 13, 2024

C-Series Server Firmware version 4.3(2.240077) has been released. There is no corresponding Infrastructure Firmware release.

July 25, 2024

Updated release notes for Intersight Infrastructure Firmware Release 4.3(4.240078).

This release includes updates to New Hardware Support in Infrastructure Firmware Release 4.3(4.240078) and Open Caveats in Release 4.3(4.240078).

June 25, 2024

C-Series Server Firmware version 4.3(4.241014) has been released. There is no corresponding Infrastructure Firmware release.

June 05, 2024

Updated release notes for Intersight Infrastructure Firmware Release 4.3(4.240066).

June 03, 2024

C-Series Server Firmware version 4.3(2.240053) has been released. There is no corresponding Infrastructure Firmware release.

May 22, 2024

C-Series Server Firmware version 4.3(2.240037) has been released. There is no corresponding Infrastructure Firmware release.

April 24, 2024

C-Series Server Firmware version 4.3(3.240043) has been released. There is no corresponding Infrastructure Firmware release.

April 17, 2024

Updated the Cross Version Firmware Support table.

March 07, 2024

C-Series Server Firmware version 4.3(2.240009) has been released. There is no corresponding Infrastructure Firmware release.

February 15, 2024

Updated release notes for Intersight Infrastructure Firmware Release 4.3(3.240007)

January 24, 2024

Updated release notes for Intersight Infrastructure Firmware Release 4.3(2.240002)

November 14, 2023

Updated release notes for Intersight Infrastructure Firmware Release 4.3(2.230129)

August 16, 2023

Created release notes for Intersight Infrastructure Firmware Release 4.3(2.230117)

New Software Support

Intersight software features may not align with the Intersight firmware release schedule. To know more about the latest software features, see the What's New section in Intersight Help Center.

New Hardware Support

New Hardware Support in Infrastructure Firmware Release 4.3(5.240032) — None

New Hardware Support in Infrastructure Firmware Release 4.3(4.240074) — None

New Hardware Support in Infrastructure Firmware Release 4.3(4.240078)

Cisco UCS X-Series Direct

The Cisco UCS® X-Series Direct simplifies your data center, adapting to the unpredictable needs of modern applications while also providing edge scale computing capabilities for remote branch office workloads. It transforms the Cisco UCS X-Series Modular System into a self-contained system with a pair of integrated Fabric Interconnects and up to eight server nodes. For customers with multiple locations, Cisco Intersight is the preferred management platform, as it can seamlessly manage all UCS X-Series Direct domains installed on several geographic locations with a cloud based single management interface.

Cisco UCS X-Series Direct can be managed in Intersight Managed Mode through the SaaS, Connected Virtual Appliance, or Private Virtual Appliance deployment models. Intersight Managed Mode allows for the configuration of compute, network, storage, and GPU accelerators to meet application requirements through user-defined policies.

Components of Cisco UCS X-Series Direct

Cisco UCS X-Series Direct is made up of the following components:

  • Cisco UCS X9508 Chassis

  • A pair of Cisco UCS Fabric Interconnects 9108 100G (UCSX-S9108-100G)

  • One or more of the following servers:

    • Up to eight two-socket Cisco UCS X210c M6/M7 Compute Nodes

    • Up to four four-socket Cisco UCS X410c M7 Compute Nodes

  • Optional components:

    • Cisco UCS 9416 X-Fabric Modules

    • Cisco UCS X440p PCIe Node with up to four GPUs used in conjunction with the 9416 X-Fabric Modules

For more information on Cisco UCS X-Series Direct support in Intersight Managed Mode, see Supported Hardware for Intersight Managed Mode.

Note


This support is currently not available in UCSM Managed Mode; that is, Cisco UCS X-Series Direct in a UCS domain managed by UCS Manager is not fully supported for claiming as a target in Intersight.


New Hardware Support in Infrastructure Firmware Release 4.3(2.230129)

Support for the following Cisco UCS VIC 15000 Series Secure Boot-enabled mLOM adapters:

  • UCSX-ML-V5D200GV2 - Cisco UCS VIC 15230 (2x100G/4x25G) mLOM on X-Series M6 and M7 servers.

  • UCSC-M-V5D200GV2 - Cisco UCS VIC 15237 (2x40/100/200G) mLOM adapter on C-Series M6 and M7 servers.

  • UCSC-M-V5Q50GV2 - Cisco UCS VIC 15427 (4x10/25/50G) mLOM adapter on C-Series M6 and M7 servers.

For more information, see Supported Hardware for Intersight Managed Mode.

New Hardware Support in Infrastructure Firmware Release 4.3(2.230117)

  • Support for the following Cisco UCS VIC 15000 Series Secure Boot-enabled PCIe adapters on Cisco UCS C-Series M6 and M7 servers with server firmware version 4.3(2.230207):

    • UCSC-P-V5D200G - Cisco UCS VIC 15235 2x40/100/200G

    • UCSC-P-V5Q50G - Cisco UCS VIC 15425 4x10/25/50G

For more information, see Supported Hardware for Intersight Managed Mode.

Cross Version Firmware Support

X-Series Server Firmware Version

Infrastructure Firmware Version

4.1(3)

4.2(1)

4.2(2)

4.2(3)

4.3(2)

4.3(3)

4.3(4)

4.3(5)

5.3(0)

N/A

No

No

Yes

Yes

Yes

Yes

Yes

5.2(2)

N/A

No

No

Yes

Yes

Yes

Yes

Yes

5.2(1)

N/A

No

No

Yes

Yes

Yes

Yes

Yes

5.2(0)

N/A

No

No

Yes

Yes

Yes

Yes

Yes

5.1(1)

N/A

No

No

Yes

Yes

Yes

Yes

Yes

5.1(0)

N/A

No

No

Yes

Yes

Yes

Yes

Yes

5.0(4)

N/A

Yes

Yes

Yes

Yes

Yes

Yes

Yes

5.0(2)

N/A

Yes

Yes

Yes

No

No

No

No

5.0(1)

N/A

Yes

Yes

Yes

No

No

No

No

C-Series Server Firmware Version

Infrastructure Firmware Version

4.1(3)

4.2(1)

4.2(2)

4.2(3)

4.3(2)

4.3(3)

4.3(4)

4.3(5)

4.3(5)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

4.3(4)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

4.3(3)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

4.3(2)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

4.3(1)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

4.2(3)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

4.2(2)

Yes

Yes

Yes

Yes

No

No

No

No

4.2(1)

Yes

Yes

Yes

Yes

No

No

No

No

4.1(3)

Yes

Yes

Yes

Yes

No

No

No

No

B-Series Server Firmware Version

Infrastructure Firmware Version

4.1(3)

4.2(1)

4.2(2)

4.2(3)

4.3(2)

4.3(3)

4.3(4)

4.3(5)

5.3(0)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

5.2(2)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

5.2(1)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

5.2(0)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

5.1(0)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

4.3(3)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

4.3(2)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

4.2(3)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

4.2(2)

Yes

Yes

Yes

Yes

No

No

No

No

4.2(1)

Yes

Yes

Yes

Yes

No

No

No

No

4.1(3)

Yes

Yes

Yes

Yes

No

No

No

No

Compatibility and Support Matrix for Cisco Fabric Interconnects and MDS Switches

Fabric Interconnect and MDS Support Matrix

Fabric Interconnect

Older Supported Release of MDS

Recommended release of MDS

UCS-FI-6454

8.4, 9.2

9.4

UCS-FI-64108

8.4, 9.2

9.4

UCS-FI-6536

9.2

9.4

UCSX-S9108-100G

9.4


Note


For older supported release only MDS recommended minor version are supported. For more information, see Recommended Releases for Cisco MDS 9000 Series Switches.


Security Fixes

Security Fixes in Release 4.3(5.240032)

Defect ID - CSCwk78644

Cisco UCS 6400 Series Fabric Interconnects and UCS 6500 Series Fabric Interconnects includes third-party software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposure (CVE) ID:

Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server

CVE-2024-6387—A race condition has been identified in the sshd service related to its signal handler. If a client fails to authenticate within the LoginGraceTime period (default is 120 seconds, previously 600 seconds in older OpenSSH versions), the sshd SIGALRM handler is triggered asynchronously. This handler, however, invokes several functions that are not safe to call from within a signal handler, such as syslog().

The affected third-party software component has been upgraded to a version that includes fixes for the vulnerability. Future versions of the product(s) will not be affected by this vulnerability.

Security Fixes in Release 4.3(4.240066)

Defect ID - CSCwj35846

Cisco UCS 6400 Series Fabric Interconnects and UCS 6500 Series Fabric Interconnects are affected by the vulnerabilities identified by the following Common Vulnerability and Exposure (CVE) ID:

Cisco NX-OS Software Image Verification Bypass Vulnerability

CVE-2024-20397—A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification.

This vulnerability is due to insecure bootloader settings. An attacker could exploit this vulnerability by executing a series of bootloader commands. A successful exploit could allow the attacker to bypass NX-OS image signature verification and load unverified software.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Caveats

The open and resolved bugs for a release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains up-to-date information about bugs and vulnerabilities in this product and other Cisco hardware and software products.

Resolved Caveats

Resolved Caveats in Release 4.3(5.240032) - None

Resolved Caveats in Release 4.3(4.240074)

The following table lists the resolved caveats in release 4.3(4.240074).

Defect ID

Description

First Bundle Affected

CSCwk28221

When changing the FCoE VLAN from 3121 to 3120 in Cisco UCS Manager while FI is in FC Switch mode, initiators can FLOGI and obtain FCID but fail to PLOGI to target ports, resulting in indefinite timeouts. Admin down/up of the FC link or port-channel resolves the issue. This change causes path loss in ESXi, with host logs showing successful FLOGI and FCID assignment but PLOGI timeouts.

4.3(2b)

CSCwk29071

On Cisco UCS-FI-6332-16UP FI running release 4.1(3j), the Transmit Fault Count increases by 3 when executing the show interface transceiver details command or generating tech support logs. This issue is observed on Fabric Interconnects (FI-A and FI-B) equipped with Cisco FINISAR SFP modules (DS-SFP-FC16G-SW) but does not occur with Cisco AVAGO SFP modules. The increment is specific to Cisco FINISAR SFP modules and does not indicate any hardware errors.

4.1(3j)A

CSCwk49974

Cisco UCS-FI-6454 Fabric Interconnects Cisco UCS Manager release 4.3(4a) experience unexpected reboots when performing SNMP bulkwalkget requests with packet sizes greater than the MTU (1500). This issue is due to SNMP jumbo packet fragmentation, leading to kernel panics and high impact on data traffic if failover is not configured.

4.3(3a)A

CSCwk09092

During an upgrade of Cisco UCS Manager from 4.2(3g) to 4.3(3a) on Cisco UCS-FI-6454 Fabric Interconnects in UCS Manager Cluster mode, the Data Management Engine (DME) consumes 100% of FI CPU resources, leading to significant slowness. This results in the DME being inaccessible and unable to use scope commands. The Cisco UCS Manager GUI becomes inaccessible, CLI logins take excessive time and often fall to the default role regardless of the account, and changes in Cisco UCS Manager cannot be made. The issue persists through failover, pmon stop/start, and container restarts.

4.3(3a)A

CSCwk66102

After upgrading Cisco UCS Manager from 4.3(2e)A to 4.3(3c)A on Cisco UCSX-FI-6536 Fabric Interconnects, the Communication Service FSM fails with the following error:

[FSM:FAILED]:

communication service configuration

(FSM:sam:dme:CommSvcEpUpdateSvcEp).

Remote-Invocation-Error:

name to naming property('snmpCommSecP.name')

mismatch: Rn:

'[SNMP String]',

Prop:'SNMP

String'

This issue occurs despite the SNMP string being correctly set. The failure may impact LDAP authentication if FQDN is used for the LDAP server(s) due to DNS not being programmed when the FSM fails.

4.3(3c)A

CSCwm02504

When updating the UBM firmware on Cisco UCS X210c M6 servers with UCSX-X10C-RAIDF, the update may fail with the following error:

Error: Failed to get product serial number

This results in the UBM getting stuck in an activating state, which can be observed under the installed firmware tab by expanding the RAID controller. This issue is typically found in IMM-based firmwares, as no UCS Manager firmwares have featured a 0x42e UBM firmware.

4.3(3a)A

Resolved Caveats in Release 4.3(4.240078) — None

Resolved Caveats in Release 4.3(4.240066) — None

Resolved Caveats in Release 4.3(3.240007)

The following table lists the resolved caveats in release 4.3(3.240007).

Defect ID

Description

First Bundle Affected

CSCwb21460

On the Cisco HyperFlex HXAF220 M5 Node (HXAF220C-M5SN), the server firmware upgrade to 4.2(1i) version on multiple Hyperflex servers was unsuccessful due to firmware mismatch.

5.0(1b)

Resolved Caveats in Release 4.3(2.240002)

The following table lists the resolved caveats in release 4.3(2.240002).

Defect ID

Description

First Bundle Affected

CSCwe95417

After updating the firmware to 4.2(2c)A, issues were reported where the Chassis power chart cannot be accessed.

4.2(2c)A

CSCwh67130

The Cisco UCS 6400 Series Fabric Interconnect/Cisco UCSX-I-9108 Intelligent Fabric Module (IFM) connected to the Cisco UCSX-9508 Chassis experienced connectivity issues with the upstream network, despite the network connectivity was stable.

4.2(1i)A

CSCwh86319

Unable to deploy server profile templates or upgrade firmware on Cisco UCS 6400 and 6500 Series Fabric Interconnects. This was due to the accumulation of log files in the sw_trace_logs directory, though there were no alterations made to logger settings.

4.3.2.230117

Resolved Caveats in Release 4.3(2.230129)

The following table lists the resolved caveats in release 4.3(2.230129)

Defect ID

Description

First Bundle Affected

CSCwf52054

After the upgrading to the firmware version 4.2(3d), Cisco UCS 2200, 2300, or 2400 series IOM goes to offline state.

4.2(3d)

CSCwh15315

The third-party Small Form-Factor Pluggable (SFP) goes into unsupported state after upgrading to release 4.2(2a) or later.

4.2(2a)

CSCwh30074

The UCS-FI-6332-16UP experienced an unexpected reboot with a reset reason of vlan_mgr hap reset.

4.2(2c)

CSCwf56305

Cisco UCS VIC 1455 shows incorrect Port enumeration.

4.2(2a)

CSCwf88211

On Cisco UCS X210c M6 and UCS C240 M6 servers, alerts may be generated indicating that the vNIC interface is down: AdapterHostEthInterfaceDown vNIC is not operational. However, the alert has no impact on server communication and other sources report that the interface is operational.

4.2(3h)

CSCwh60769

The DIMM with the label DIMM_PX_X1 triggers a severity warning with Fault code - F0502 indicating the server has an invalid field replaceable unit (FRU).
Severity: Warning
Code: F0502
ID: 327373
Status: None
Description: DIMM DIMM_PX_X1 on server 1/6 
has an invalid FRU
Affected Object: sys/chassis-X/blade-X
/board/memarray-X/mem-X
Name: Memory Unit Identity Unestablishable
Cause: Identity Unestablishable

4.3(2b)

CSCwb82433

Cisco UCS C220 M5 servers equipped with Cisco UCS VIC 1400 series adapter and have Geneve feature enabled, go offline after the Cisco UCS VIC adapters fail to respond.

4.1(3d)

CSCwf91291

The RAID controller in Cisco UCS X210c servers may read incorrect voltage value and mark the battery as dead. This results in the following error:

Battery Backup unit IMM/ chassis-x/server-y/ controller-1/ BBU is marked bad and needs to be replaced
.

4.3(2c)

Resolved Caveats in Release 4.3(2.230117)

The following table lists the resolved caveats in release 4.3(2.230117)

Defect ID

Description

First Bundle Affected

CSCvy59090

In a rare event when all the fans are Inoperable and a thermal event occurs, the IOM CMC may shutdown the entire chassis.

4.1(3b)

CSCvf88524

Creating and storing kernel dump on any alternate drive (other than C drive) corrupts the OS even if the Challenge-Handshake Authentication Protocol (CHAP) is enabled in the boot policy and in iSCSI SAN.

4.1(3b)

CSCvh04298

The IOMs connected to an FI no longer reboot unexpectedly due to software-controlled resets.

4.1(3b)

CSCwf00940

UCSX-210C-M6, UCSX-210C-M7, and UCSX-410C-M7 Compute Nodes fail to boot with UCSX-X10C-RAIDF-D/ UCSX-X10C-RAIDF front mezzanine installed, and with the following SEL log:

Platform alert PWR_SEQ_FAIL #0xa5 | Predictive Failure asserted | Asserted

Power Fault Monitor log: FMEZZ_BLD_CARD_PWRGD TON_MAX Fault

Cisco UCS X210c RAID module power good response is high when host is powered on.

New Vision PSOC image is released to improve AERO RAID Controller board power good response.

The issue is resolved.

4.2(3c)

Open Caveats

Open Caveats in Release 4.3(5.240032)

The following table lists the open caveats in release 4.3(5.240032)

Defect ID

Description

Workaround

First Bundle Affected

CSCwm70985

During or immediately after a firmware upgrade/downgrade on NVIDIA L40s GPUs, no read/write operations should be performed on the card. However, PNUOS performs read operations using the nvidia-smi utility to check the GPU mode immediately after the upgrade. This issue occurs when upgrading/downgrading firmware on NVIDIA L40 GPUs, causing PNUOS to crash and raise a major fault.

You can perform mode changes using NVIDIA tools on the host OS if required. This limitation does not affect other L-series GPUs, which continue to support mode changes.

4.3(5.240160)A

Open Caveats in Release 4.3(4.240074)

The following table lists the open caveats in release 4.3(4.240074):

Defect ID

Description

Workaround

First Bundle Affected

CSCwm09720

In Cisco UCS Manager releases 4.3(3) and 4.3(4), the MC Server generates a high volume of delta events in Cisco UCS X9508 chassis, causing a flood of events to Cisco bladeAG. This results in continuous Cisco bladeAG crashes, preventing blade discovery and user SP operations. The issue is due to the mc_delta_psu_fw_version function incorrectly setting the "used" length, generating unnecessary 256KB delta events. Initializing the "used" length to 0 prevents these delta events.

As a workaround, increase the virtual memory limit of bladeAG to 800MB.

4.3(3c)C

CSCwk82692

In Cisco UCS Manager releases 4.3(3a) through 4.3(4b) on Cisco UCS 6454/64108/6536 Fabric Interconnects, bladeAG processes may reach the 400MB memory limit and crash due to memory aborts. This results in blades being stuck in a consistent discovery loop.

The bladeAG service experience multiple restarts, causing users to be unable to perform blade operations such as power on/off and complete discovery until the process stabilizes. This issue is observed in domains with a minimum of 16+ Cisco UCS X-Series chassis.

As a workaround, increase the virtual memory limit of bladeAG to 800MB.

4.3(3c)A

Open Caveats in Release 4.3(4.240078)

The following table lists the open caveats in release 4.3(4.240078)

Defect ID

Description

Workaround

First Bundle Affected

CSCwj68704

In the Cisco UCS X-Series Direct configuration, using QSFP-100G-AOC7M/25M/30M or QSFP-100G-SR4-S transceivers to connect to an IXIA device results in an unstable connection with persistent link flapping.

As a workaround, switch to using a 40G or 10G connection when the SPAN (Switched Port Analyzer) destination port is connected to an IXIA device.

4.3(4.240078)

CSCwk80589

In Cisco UCS X-Series Direct, the X-Series compute node shows missing GPU information after the chassis is power-cycled.

In a Cisco UCS X-Series Direct system with X-Series compute nodes containing the Cisco UCS X440p PCIe node, when the chassis is powered off and then powered back on, and the server power remains off (which occurs if the server is not associated with any profile), the GPU inventory shows the FRU details as empty.

As a workaround, perform a rediscovery of the affected server.

4.3(4.240078)

CSCwk44340

When a Cisco UCS X-Series Direct system overheats, a 'Missing' alarm is raised on all the compute nodes. Even after the system recovers, the servers are not re-discovered. As a result, the alarms do not get cleared until the blade is removed or the Cisco IMC reconnects.

As a workaround, reboot the Cisco IMC.

4.3(4.240078)

CSCwk69678

For Cisco UCS X-Series Direct, Out-of-Band virtual KVM sessions are not getting launched from Intersight. If the Out-of-Band IP address is configured and the device connector firmware is upgraded, the IP filtering rules are retained in both the Fabric Interconnects, causing Out-of-Band IP address to stop working.

As a workaround, deploy the Server Profile after the device connector upgrade.

4.3(4.240078)

CSCwk73957

In Cisco UCS X-Series Direct, the primary Fabric Interconnect does not reboot immediately upon erasing the inadb; it waits for the secondary Fabric Interconnect to come online.

There is no known workaround.

4.3(4.240078)

CSCwi92005

When a chassis is rediscovered and the device connector is stopped and subsequently reconnected, the chassis inventory workflow is expected to fail and then restart upon reconnection of the device connector. However, this expected behavior is not occurring in Cisco UCS X-Series Direct.

As a workaround, rediscover the chassis.

4.3(4.240078)

CSCwk09309

For Cisco UCS X-Series Direct in Intersight Managed Mode, after the removal of the primary IFM, an IO card offline alarm is observed along with the expected IO card missing alarm.

There is no known workaround.

4.3(4.240078)

Open Caveats in Release 4.3(4.240066) — None

Open Caveats in Release 4.3(3.240007) — None

Open Caveats in Release 4.3(2.240002) — None