Cisco UCS Manager

Cisco UCS™ Manager, Release 4.0 provides unified, embedded management of all software and hardware components of the Cisco Unified Computing System™ (Cisco UCS) across multiple chassis, Cisco UCS servers, and thousands of virtual machines. Cisco UCS Manager manages Cisco UCS as a single entity through an intuitive GUI, a command-line interface (CLI), or an XML API for comprehensive access to all Cisco UCS Manager functions. For more information on Cisco UCS Manager, see Cisco UCS Manager on Cisco.com.

This document contains information on new features, resolved caveats, open caveats, and workarounds for Cisco UCS Manager, Release 4.0. This document also includes the following:

  • Current information that became available after the technical documentation was published

  • Related firmware and BIOSes on blade and rack servers and other Cisco Unified Computing System (UCS) components associated with the release

Upgrading directly to Cisco UCS Manager 4.0(x) is supported from Release 2.2(8), and 3.1(3) and later releases. For UCS Mini, upgrading directly to Cisco UCS Manager Release 4.0(x) is supported from Release 3.1(3) and later releases. See Cisco UCS Manager Firmware Management Guide, Release 4.0 for details.

Revision History

Release

Date

Description

4.0(2d)

March 13, 2019

Created release notes for Cisco UCS Manager Release 4.0(2d).

4.0(2b)

January 19, 2019

Created release notes for Cisco UCS Manager Release 4.0(2b).

January 22, 2019

Corrected the UCS Mini model number in the New Hardware in Release 4.0(2b) section.

4.0(2a)

January 02, 2019

Created release notes for Cisco UCS Manager Release 4.0(2a).

January 08, 2019

Updated the Open Caveats for Release 4.0(2a) to include CSCvk63036.

March 03, 2019

Added UCSC-GPU-V100-32 to the list of new hardware.

4.0(1d)

December 20, 2018

Created release notes for Cisco UCS Manager Release 4.0(1d).

4.0(1c)

October 11, 2018

Created release notes for Cisco UCS Manager Release 4.0(1c).

4.0(1b)

September 13, 2018

Created release notes for Cisco UCS Manager Release 4.0(1b).

4.0(1a)

August 14, 2018

Created release notes for Cisco UCS Manager Release 4.0(1a).

August 27, 2018

Added the L1 Terminal Fault caveats — CSCvm03356, CSCvm03351, and CSCvm03339 — to the list of Security Fixes.

Top Reasons to Move to Cisco UCS Manager Release 4.0

Here are the top reasons to move to Cisco UCS Manager Release 4.0:

  • Support for UCS 6454 Fabric Interconnects

  • Support for C4200 chassis and Cisco UCS C125 M5 Servers

  • Support for VIC 1400 series adapter cards on UCS M5 servers

  • Support for Cisco UCS C480 M5 ML Servers

  • Support for a new SIOC with S3260 storage servers

  • Support for Hyperflex 3.5 and later releases

  • Support for new peripherals

New Features in Release 4.0

Cisco UCS Manager, Release 4.0 is a unified software release for all supported UCS hardware platforms.

New Hardware Features

New Software Features

New Hardware in Release 4.0(2a)

Cisco UCS C480 M5 ML Server

The Cisco UCS C480 M5 ML Rack Server is a purpose-built server for Deep Learning. It is storage- and I/O-optimized for training models. The Cisco UCS C480 M5 ML Server delivers outstanding levels of storage expandability and performance options for standalone or Cisco UCS-managed environments in a 4RU form factor. It offers these capabilities:

  • 8 NVIDIA SXM2 V100 32G modules with NVLink interconnect

  • Latest Intel® Xeon® Scalable processors with up to 28 cores per socket and support for two processor configurations

  • 2666-MHz DDR4 memory and 24 DIMM slots for up to 3 terabytes (TB) of total memory

  • 4 PCI Express (PCIe) 3.0 slots for up to 4 10/25 or 40/100G Cisco VICs (VIC 1455 and VIC 1495)

  • Flexible storage options with support for up to 24 Small-Form-Factor (SFF) 2.5-inch, SAS/SATA Solid-State Disks (SSDs) and Hard-Disk Drives (HDDs)

  • Up to 6 PCIe NVMe disk drives

  • Cisco 12-Gbps SAS Modular RAID Controller in a dedicated slot

  • M.2 boot options

  • Dual embedded 10 Gigabit Ethernet LAN-On-Motherboard (LOM) ports

UCS VIC 1400 Series Adapters

Support for the following new UCS VIC 1400 Series adapters on UCS M5 servers and UCS C125 servers:

  • VIC 1495 40/100G PCIe for C-Series (UCSC-PCIE-C100-04)

  • VIC 1497 40/100G mLOM for C-Series (UCSC-MLOM-C100-04)

This release introduces support for 40G Ethernet connections between the UCS 6300 Series Fabric Interconnects and C-Series servers in direct connect mode while using VIC 1495 or VIC 1497.

In this release, UCS VIC 1400 Series adapters for B-Series are supported on UCS Mini Fabric Interconnects. UCS 6454, UCS 6300 Series, and 6200 Series Fabric Interconnects support all UCS VIC 1400 Series adapters.


Note

Cisco C-Series servers cannot be integrated with Cisco UCS Manager using a combination of Cisco UCS 6324 Fabric Interconnect and Cisco UCS VIC 14xx.



Note

You cannot install VIC adapters from different series on the same server. For example, you cannot install UCS VIC 1300 Series adapters and UCS VIC 1400 Series adapters on the same server.


For more details regarding server and adapter combinations, refer the Server Spec Sheets:

UCS Mini with UCS VIC 1400 Series Adapters

Starting with Cisco UCS Manager Release 4.0(2), UCS Mini (6324) Fabric Interconnects support the following UCS VIC 1400 Series adapters for B-Series servers on the primary chassis:

  • UCSB-MLOM-40G-04 (UCS VIC 1440)

  • UCSB-VIC-M84-4P (UCS VIC 1480)

Peripherals

  • Support for NVIDIA V100 PCIe PG500-200 250W 32GB GPU cards (UCSC-GPU-V100-32) for UCS C240 M5 servers.

  • Support for TPM2 (UCSX-TPM2-002-C) for all UCS servers.

  • Support for hot-plug NVMe drive support on HyperFlex.

  • Support for the High Voltage DC 1200 Watt Power Supply (N9K-PUV-1200W) on UCS 6454 Fabric Interconnects

  • Support for Intel® OptaneTM NVMe Extreme Performance Drives (UCSC-NVMEXP-I750)

  • Support for the QLogic 10G Network Adapter card (UCSC-PCIE-QD10GC) on UCS C125.

  • Support for the QLogic 25G Network Adapter card (UCSC-PCIE-QD25GF) on UCS C125.

  • Support for the QLogic 100G Network Adapter card (UCSC-PCIE-QS100GF) on UCS C480 M5 ML.

New Hardware in Release 4.0(1a)

Fourth Generation Fabric Interconnect

The Cisco UCS 6454 Fabric Interconnect is a core part of the Cisco Unified Computing System, providing both network connectivity and management capabilities for the system. The Cisco UCS 6454 offers line-rate, low-latency, lossless 10/25/40/100 Gigabit Ethernet, Fibre Channel over Ethernet (FCoE), and Fibre Channel functions.

The Cisco UCS 6454 54-Port Fabric Interconnect is a one-rack-unit (1RU) 10/25/40/100 Gigabit Ethernet, FCoE and Fibre Channel switch offering up to 3.82 Tbps throughput and up to 54 ports. The switch has 40 10/25-Gbps fixed Ethernet, 8 10/25-Gbps Ethernet or 8/16/32G Fibre Channel ports and 6 40/100-Gbps Ethernet uplink ports. All Ethernet ports are capable of supporting FCoE.

Cisco UCS C125 M5 Server

Cisco UCS Manager 4.0(1) supports Cisco UCS C125 M5 Servers on UCS 6300 Series and UCS 6454 Fabric Interconnects. The C125 M5 server is Cisco’s first server based on AMD EPYC™ processors. Cisco UCS C125 M5 Servers are housed in the Cisco UCS C4200 Series rack server chassis. Each Cisco UCS C4200 Series rack server chassis supports two to four Cisco UCS C125 M5 Server nodes. The Cisco UCS C125 M5 Server supports the following peripherals:

  • Dual Port 10Gbase-T and 10G/25G SFP28 OCP cards

  • Cisco 12G 9460-8i PCIe 12G SAS RAID controller

  • 32 GB, 64 GB, and 128 GB SD cards

  • 32GB Micro-SD card


    Note

    This is not managed through Cisco UCS Manager.


  • 240 GB and 960 GB M.2 SATA SSD drives

  • 16 GB Flash USB drive


    Note

    This is not managed through Cisco UCS Manager.


  • Mini Storage Carriers for SD and M.2 SATA

  • On-board AHCI controllers

New Generation SIOC for Cisco UCS S3260 Storage Servers

Cisco UCS S3260 Storage Server system supports a new server SIOC UCS-S3260-PCISIOC with S3260 M5 servers. This SIOC has PCIe slots to replace the network adapters. These slots support both Cisco VIC and third-party adapters. Additionally, the new SIOC has two NVME slots. For a complete list of supported cards and adapters, see the Cisco UCS S3260 Server Integration with Cisco UCS Manager, Release 4.0 guide.

UCS VIC 1400 Series Adapters

Support for the following UCS VIC 1400 Series adapters on UCS M5 servers:

  • VIC 1440 10/40G mLOM for B-Series (UCSB-MLOM-40G-04)

  • VIC 1480 10/40G PCIe for B-Series (UCSB-VIC-M84-4P)

  • VIC 1455 10/25G PCIe for C-Series and S-Series (UCSC-PCIE-C25Q-04)

  • VIC 1457 10/25G mLOM for C-Series (UCSC-MLOM-C25Q-04)

In Cisco UCS Manager Release 4.0(1), UCS VIC 1400 Series adapters are supported on UCS 6454, UCS 6300 Series, and 6200 Series Fabric Interconnects. They are not supported on UCS Mini. This release supports 10G/25G Ethernet connections between the UCS 6454 Fabric Interconnect and C-Series servers that have VIC 1455 or VIC 1457.


Note

You cannot install VIC adapters from different series on the same server. For example, you cannot install UCS VIC 1300 Series adapters and UCS VIC 1400 Series adapters on the same server.


The following tables illustrate the supported VIC 1400 Series adapter/server combinations for Cisco UCS Manager Release 4.0(1):

Table 1. VIC 1400 Series Adapter Support for M5 B-Series Servers

FI

IOM

1400 Series VIC Adapters

VIC 1440

VIC 1440 + Port Expander

VIC 1480

VIC 1440 + VIC 1480

UCSB-MLOM-40G-04

UCSB-MLOM-40G-04 + UCSB-MLOM-PT-01

UCSB-VIC-M84-4P

UCSB-MLOM-40G-04 + UCSB-VIC-M84-4P

6200 Series

2204/2208

B480 M5, B200 M5

NA

B480 M5, B200 M5

B480 M5, B200 M5

6300 Series

2304

B480 M5, B200 M5

B480 M5, B200 M5

B480 M5, B200 M5

B480 M5, B200 M5

2204/2208

B480 M5, B200 M5

NA

B480 M5, B200 M5

B480 M5, B200 M5

6454

2204/2208

B480 M5, B200 M5

NA

B480 M5, B200 M5

B480 M5, B200 M5

Table 2. VIC 1400 Series Adapter Support for M5 C-Series and S-Series Servers

FI

FEX

1400 Series VIC Adapters

VIC 1455

VIC 1457

UCSC-PCIE-C25Q-04

UCSC-MLOM-C25Q-04

6200 Series

Direct Attach

C220 M5, C240 M5, C480 M5, S3260 M5 (with UCS-S3260-PCISIOC)

C220 M5, C240 M5

2232 PP

C220 M5, C240 M5, C480 M5, S3260 M5 (with UCS-S3260-PCISIOC)

C220 M5, C240 M5

2232-T

NA

NA

6300 Series

Direct Attach

C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260-PCISIOC)

C220 M5, C240 M5

Direct Attach (Break-out)

C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260-PCISIOC)

C220 M5, C240 M5

2232 PP

C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260-PCISIOC)

C220 M5, C240 M5

2232-T

NA

NA

2348

C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260-PCISIOC)

C220 M5, C240 M5

6454

Direct Attach (10G/25G)

C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260-PCISIOC)

C220 M5, C240 M5

2232 PP

C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260-PCISIOC)

C220 M5, C240 M5

2232-T

NA

NA


Note

For more details regarding server and adapter combinations, refer the Server Spec Sheets:


Peripherals

  • Support for the HX-PCIE-OFFLOAD-1 co-processor card with C240Hx M5 servers

  • Support for the High Voltage DC 1200 Watt Power Supply N9K-PUV-1200W on UCS 6332-16UP fabric interconnects

  • Intel Optane NVMe Med. Performance Drives for M5 servers including C220, C240, C480, B200, B480, and S3260 and Hyperflex equivalents.

  • Support for the LSI 9400-8e external SAS HBA on UCS C220, C240, C480 M5 servers.

New Software Features in Release 4.0(2a)

Software Enablement for New Hardware (Listed in the New Hardware section)

Cisco UCS 6454 Fabric Interconnect Enhancements

This release introduces support for the following features on the Cisco UCS 6454 Fabric Interconnect:

  • Support for Ethernet and Fibre Channel switching modes.

    In the Ethernet switching mode:

    • VLAN Port Count Optimization Enabled is not supported. Without VLAN Port Count Optimization Enabled, the Cisco UCS 6454 Fabric Interconnect supports 16000 PV count.

    In the Fibre Channel switching mode:

    • FCoE uplink is not supported

  • Support for splitting a single 40/100G QSFP port into four 10/25G ports using a supported breakout cable. These ports can be used only as Ethernet uplink or FCoE uplink ports connecting to a 10/25G switch. They cannot be configured as server ports, FCoE storage ports, appliance ports or monitoring ports.

  • Support for MAC Security on Cisco UCS 6454 Fabric Interconnects

Cisco UCS C480 M5 ML Server

This release introduces support for Cisco UCS C480 M5 ML Servers.

The following features are not supported on Cisco UCS C480 M5 ML Servers:
  • Rear NVME cage and PCIe NVME Switch Card

  • Rear auxilliary drive cage

  • Cisco 12G 9460-8i RAID controller (UCSC-SAS9460-8i)

UCS VIC 1400 Series Adapter Enhancements

This release adds support for the newly introduced UCS VIC 1495 and 1497 adapters on UCS M5 servers.

The UCS VIC 1400 Series adapters now support the following features:

  • Support for UCS Mini on UCS VIC 1440 and UCS VIC 1480 adapters on the primary chassis.

  • Support for NVMe over Fibre Channel, which defines a mapping protocol for applying the NVMe interface to Fibre Channel. This release adds support for the FC NVME Initiator adapter policy on UCS 6300 Series Fabric Interconnects and UCS 6454 Fabric Interconnects.

    FC NVME Target and FC Target are available as Tech Preview options.

  • FC Multi Queue—Enhanced I/O queue range support for FC Multi Queue. The new range is between 1 and 64 queues.

  • Support for Windows 2016 VMQ and SET.

  • Increased Tx and Rx queues for the eNIC driver—Is supported on all VIC 1400, 1300, and 1200 Series adapter cards on B-series and C-series servers. To efficiently use this speed, the number of Tx and Rx queues have been increased from 8 to 256 each. The eNIC driver now supports 256 Tx queues and 256 Rx queues. However, the maximum number of supported Rx and Tx queues cannot be more than the number of CPU cores in the system.

Out of Band NVME Support on New Generation SIOC for Cisco UCS S3260 Storage Servers

Enhancement to support out of band NVME on the UCS-S3260-PCISIOC new generation SIOC for S3260 M5 servers.

Feature Enhancements

  • UCS Mini Fabric Interconnect Enhancements⎯Cisco UCS Manager Release 4.0(2) introduces the following enhancements for Cisco UCS Mini:

    • Cisco UCS Mini Fabric Interconnects now support the following VIC 1400 Series adapter cards for B-Series servers on the primary chassis:

      • UCSB-MLOM-40G-04 (UCS VIC 1440)

      • UCSB-VIC-M84-4P (UCS VIC 1480)

    • Cisco UCS Mini Fabric Interconnects with VIC 1300 Series adapter cards now support the following features:

      • usNIC

      • VXLAN

      • NetFlow

  • Slow Drain—Cisco UCS Manager Release 4.0(2) introduces the QoS Slow Drain Detection and Mitigation feature on Cisco UCS 6454 Fabric Interconnects. This feature provides various enhancements that enable you to detect slow drain devices that cause congestion in the network, and also mitigate it.

  • Simplified RAID0 Configuration—Cisco UCS Manager provides the ability to configure a range of disk slots into individual RAID0 LUNs by using the LUN set option.

  • Support for SED security policies on B-Series M5 servers—Cisco UCS Manager Release 4.0(2) extends the SED security policies to UCS B-Series M5 servers.

  • Support for Redfish version 1.01 on UCS C-Series servers that are attached to the Fabric Interconnect.

  • Life Left on NVMe drives—NVMe statistics are now enhanced to display Life Left on NVMe drives based on their workload.

  • Parallel Disk Update—Support for parallel firmware update on multiple disks.

  • Support for optimized memory initialization and test processes to reduce boot times on UCS M5 servers—Cisco UCS Manager Release 4.0(2) introduces the following BIOS tokens to improve boot time for UCS M5 servers:

    • Adaptive Memory Training Control

    • OptionROM Launch Optimization Control

    • BIOS Tech Message Level Control

    The default value for all three tokens is Enabled.

  • Certificate Manager for Device Connector—The Certificate Manager allows you to view a list of trusted certificates and import a valid trusted certificate.

New Software Features in Release 4.0(1a)

Software Enablement for New Hardware (Listed in the New hardware section)

Cisco UCS 6454 Fabric Interconnect

This release introduces Cisco UCS 6454 Fabric Interconnects that support 10/25 Gigabit ports in the fabric with 40/100 Gigabit uplink ports. The Cisco UCS Manager Getting Started Guide, Release 4.0 provides details about the specific ports. The Cisco UCS 6454 Fabric Interconnect introduces the following new features:

  • Support for 10/25 Gigabit ports in the fabric with 40/100 Gigabit uplink ports

  • Support for VIC 1400 Series adapters

  • 128 additional VLANs reserved for internal usage

  • Forward Error Correction (FEC) configurations for ports

The following features are not supported on Cisco UCS 6454 Fabric Interconnects:

  • Chassis Discovery Policy in Non-Port Channel Mode

  • Chassis Connectivity Policy in Non-Port Channel Mode

  • Ethernet or FC switching modes

  • Service profiles with dynamic vNICs

  • Multicast Optimize for QoS

  • Netflow

  • MAC security

  • Port profiles and distributed virtual switches

  • VMFEX

The following features are configured differently on Cisco UCS 6454 Fabric Interconnects:

  • Unified Ports—Cisco UCS 6454 fabric interconnects support up to 8 unified ports, which can be configured as FC.

  • VLAN Optimization—On Cisco UCS 6454 Fabric Interconnects, the PV count is as follows:

    • with VLAN port count optimization disabled—16000

    • with VLAN port count optimization enabled—64000

Cisco UCS C125 M5 Server

This release introduces support for Cisco UCS C125 M5 Servers.

The following are the two main differences between C125 M5 servers and other rack servers.

  • Power capping is not supported on Cisco UCS C125 M5 Servers.

  • For Cisco UCS C125 M5 Servers, ensure that you select the same Fan Speed Policy for all the servers in an enclosure. Cisco UCS Manager applies the Fan Speed Policy of the server which gets associated last. Having the same Fan Speed Policy for the all the server ensures that the desired Fan Speed Policy is applied irrespective of which server is associated last.

UCS VIC 1400 Series Adapters

Support for UCS VIC 1400 Series adapters on UCS M5 servers.

These adapters introduce support for the following new features:

  • Stateless offloads with VxLAN and NVGRE encapsulation for Windows

  • VMMQ for Windows

  • UDP RSS for ESXi and Linux

  • IPv6 Header support

  • NetFlow

  • QoS support

  • Port channel support with UCS VIC 1455 and 1457 adapters


    Note

    Cisco UCS Manager Release 4.0(1) supports only single link port channel for FC/FCoE between VIC 1455 or 1457 adapters that are on direct-connect rack-servers, and UCS 6300 Series Fabric Interconnects.


The following features are not supported on UCS VIC 1400 Series adapters:

  • VM-FEX for Hyper-V

  • VM-FEX for VMware

  • Dynamic vNICs

  • A port channel with four member ports on UCS VIC 1455 and 1457 adapters

  • usNIC on Cisco UCS C125 M5 Servers

New Generation SIOC for Cisco UCS S3260 Storage Servers

Support for S3260 M5 servers with a new server SIOC UCS-S3260-PCISIOC and the VIC 1400 Series adapter cards.

Feature Enhancements

  • Pre-enablement support for Hyperflex 3.5 release features

  • Support for KMIP client on C480 M5 to support integration with key management servers

  • Support for the IPv6 option on PXE boot devices on Cisco UCS Manager managed C-Series and S-Series M4 servers.

  • Support for the Login Profile feature, which provides the ability to block login requests to Cisco UCS Manager for a specific period after failed login attempts. This feature is currently supported only on UCS 6454 Fabric Interconnects and on Cisco UCS Manager Release 4.0(1) and later releases.

Deprecated Hardware and Software in Cisco UCS Manager Release 4.0

Cisco UCS Manager Release 4.0 does not support UCS B-Series M2 generation blade servers.

Cisco UCS Manager and Cisco UCS C-Series Release Compatibility Matrix for C-Series Rack-Mount Servers

Cisco UCS C-Series Rack-Mount Servers are managed by built-in standalone software— Cisco Integrated Management Controller(Cisco IMC). However, when a C-Series Rack-Mount Server is integrated with Cisco UCS Manager, the Cisco IMC does not manage the server anymore.

Each Cisco UCS Manager release incorporates its corresponding C-Series Standalone release and some previous C-Series standalone releases. For example, Cisco UCS Manager Release 4.0(1) is integrated with C-Series Standalone Release 4.0(1) for the M5 servers and Release 3.0(4) for all M3 and M4 servers. Hence, it supports all the M5, M4 and M3 servers supported by C-Series Standalone releases.

The following table lists the Cisco UCS Manager and C-Series software standalone releases for C-Series Rack-Mount Servers:

Table 3. Cisco UCS Manager and C-Series Software releases for C-Series Servers

Cisco UCS Manager Release

C-Series Standalone Releases Included

C-Series Servers Supported by the C-Series Standalone Releases

4.0(2)

4.0(2)

C220 M4, C240 M4, C460 M4, C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5, C480 M5 ML only

3.0(4)

All M3

4.0(1)

4.0(1)

C220 M4, C240 M4, C460 M4, C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5 only

3.0(4)

All M3

3.2(3)

3.1(3)

C220 M5, C240 M5, C480 M5, S3260 M5 only

3.0(4)

All M3/M4

3.2(2)

3.1(2)

C220 M5, C240 M5, C480 M5 only

3.0(3)

All M3/M4

3.2(1)

3.1(1)

C220 M5, C240 M5 only

3.0(3)

All M3/M4

3.1(3)

3.0(3)

All M3/M4

3.1(2)

2.0(13)

All M3/M4

3.1(1)

2.0(10)

C220 M4, C240 M4 only

2.0(9)

All other M3/M4

2.2(8)

2.0(12)

C460 M4 only

2.0(10)

C220 M4, C240 M4 only

1.5(9)

C420-M3, C260-M2, C460-M2 only

2.0(9)

For all other M3/M4

System Requirements

Cisco UCS Central Integration

Cisco UCS Manager Release 4.0 can only be registered with Cisco UCS Central, Release 2.0(1f) or higher.

Supported Operating Systems

For detailed information about supported operating system, see the interactive UCS Hardware and Software Compatibility matrix.

Supported Web Browsers

Cisco UCS Manager GUI

Web Browsers

HTML5

Microsoft Internet Explorer 11 or higher

Mozilla Firefox 45 or higher

Google Chrome 45 or higher

Apple Safari version 9 or higher

Opera version 35 or higher

Network Requirements

For using the device connector feature, you must configure HTTPS proxy settings. The Cisco UCS Manager Administration Management Guide, Release 4.0 provides detailed information about configuring the device connector.

Cross-Version Firmware Support

The Cisco UCS Manager A bundle software (Cisco UCS Manager, Cisco NX-OS, IOM and FEX firmware) can be mixed with previous B or C bundle releases on the servers (host firmware [FW], BIOS, Cisco IMC, adapter FW and drivers).

The following table lists the mixed A, B, and C bundle versions that are supported on Cisco UCS 6200, 6300, and 6454 fabric interconnects:

Table 4. Mixed Cisco UCS Releases Supported on Cisco UCS 6200, 6300, 6454 Fabric Interconnects

Infrastructure Versions (A Bundles)

Host FW Versions (B or C Bundles)

2.2(8)

3.1(3)

3.2(1)

3.2(2)

3.2(3)

4.0(1)

4.0(2)

2.2(8)

6200

6200

6200

6200

6200

6200

6200

3.1(3)

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

3.2(1)

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

3.2(2)

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

3.2(3)

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

4.0(1)

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

4.0(2)

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

The following table lists the mixed A, B, and C bundle versions that are supported on Cisco UCS Mini fabric interconnects:

Table 5. Mixed Cisco UCS Releases Supported on Cisco UCS Mini Fabric Interconnects

Infrastructure Versions (A Bundles)

Host FW Versions (B or C Bundles)

3.1(3)

3.2(1)

3.2(2)

3.2(3)

4.0(1)

4.0(2)

3.1(3)

6324

6324

6324

6324

6324

6324

3.2(1)

6324

6324

6324

6324

6324

3.2(2)

6324

6324

6324

6324

6324

3.2(3)

6324

6324

6324

6324

6324

4.0(1)

6324

6324

4.0(2)

6324

6324

The following table lists the mixed B, C bundles that are supported on all platforms with the 4.0(2)A bundle:

Table 6. Mixed B, C Bundles Supported on All Platforms with the 4.0(2)A Bundle

Infrastructure Versions (A Bundles)

Host FW Versions (B, C Bundles)

4.0(2)

6200

6300

6324

6454

ucs-k9-bundle-infra. 4.0.x.xxx.A.bin ucs-6300-k9-bundle-infra. 4.0.x.xxx.A.bin ucs-mini-k9-bundle-infra. 4.0.x.xxx.A.bin

ucs-6400-k9-bundle-infra. 4.0.x.xxx.A.bin

2.2(8)

(B, C Bundles)

Yes

3.1(3)

(B, C Bundles)

Yes

Yes

Yes

3.2(1), 3.2(2), 3.2(3)

(B, C Bundles)

Yes

Yes

Yes

4.0(1), 4.0(2)

(B, C Bundles)

Yes

Yes

Yes

Yes

The following table lists the mixed B, C bundles that are supported on all platforms with the 4.0(1)A bundle:

Table 7. Mixed B, C Bundles Supported on All Platforms with the 4.0(1)A Bundle

Infrastructure Versions (A Bundles)

Host FW Versions (B, C Bundles)

4.0(1)

6200

6300

6324

6454

ucs-k9-bundle-infra. 4.0.x.xxx.A.bin ucs-6300-k9-bundle-infra. 4.0.x.xxx.A.bin ucs-mini-k9-bundle-infra. 4.0.x.xxx.A.bin

ucs-6400-k9-bundle-infra. 4.0.x.xxx.A.bin

2.2(8)

(B, C Bundles)

Yes

3.1(3)

(B, C Bundles)

Yes

Yes

Yes

3.2(1), 3.2(2), 3.2(3)

(B, C Bundles)

Yes

Yes

Yes

4.0(1)

(B, C Bundles)

Yes

Yes

Yes

Yes


Important

If you implement cross-version firmware, you must ensure that the configurations for the Cisco UCS domain are supported by the firmware version on the server endpoints.


Internal Dependencies

The following sections provide information on the interdependencies between Cisco UCS hardware and versions of Cisco UCS Manager.

  • Version dependencies for Server FRU items such as DIMMs depend on the server type.

  • Chassis items such as fans and power supplies work with all versions of Cisco UCS Manager.

6200 Series, 6332 Series, and 6454 Fabric Interconnects and Components

Blade Servers


Note

In a mixed firmware configuration, we recommend that the minimum server bundle corresponds to the Minimum Software Version. The infrastructure must be at or above the Minimum Software Version.


Table 8. Minimum Host Firmware Versions for Blade Servers

Servers

Minimum Software Version

UCS 6200 Series FI

Minimum Software Version

UCS 6332, 6332-16UP FI

Minimum Software Version

UCS 6332, 6332-16UP FI

Minimum Software Version

UCS 6454 FI

Recommended Software Version

UCS 6200 Series FI

UCS 6332, 6332-16UP FI

UCS 6454 FI

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2304

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2304

B22 M3 E5-2400

B22 M3 E5-2400 v2

2.2(8a)

2.2(8a)

3.1(1e)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

B200 M3 E5-2600

B200 M3 E5-2600 v2

2.2(8a)

2.2(8a)

3.1(1e)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

B200 M4

2.2(8a)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

B200 M5

3.2(1d)

3.2(1d)

3.2(1d)

4.0(1a)

4.0(2d)

B260 M4 E7-2800 v2

B260 M4 E7-4800 v2

B260 M4 E7-8800 v2

B260 M4 E7-4800 v3

B260 M4 E7-8800 v3

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

3.1(1e)

3.1(1e)

3.1(1e)

3.1(1e)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

B260 M4 E7-4800 v4

B260 M4 E7-8800 v4

2.2(8b)

2.2(8b)

3.1(1e)

3.1(1e)

3.1(2b)

3.1(2b)

4.0(1a)

4.0(2d)

B420 M3 E5-4600

B420 M3 E5-4600 v2

2.2(8a)

2.2(8a)

3.1(1e)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

B420 M4 E5-4600 v3

B420 M4 E5-4600 v4

2.2(8a)

2.2(8b)

3.1(1e)

3.1(1e)

3.1(1e)

3.1(2b)

4.0(1a)

4.0(2d)

B460 M4 E7-4800 v2

B460 M4 E7-8800 v2

B460 M4 E7-4800 v3

B460 M4 E7-8800 v3

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

3.1(1e)

3.1(1e)

3.1(1e)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

B460 M4 E7-4800 v4

B460 M4 E7-8800 v4

2.2(8b)

2.2(8b)

3.1(1e)

3.1(1e)

3.1(2b)

4.0(1a)

4.0(2d)

B480 M5

3.2(2b)

3.2(2b)

3.2(2b)

4.0(1a)

4.0(2d)

Rack Servers

Table 9. Minimum Host Firmware Versions for Rack Servers

Servers

Minimum Software Version

UCS 6200 Series FI

Minimum Software Version

UCS 6332, 6332-16UP

Minimum Software Version

UCS 6454

Recommended Software Version

UCS 6200 Series FI

UCS 6332, 6332-16UP FI

UCS 6454

C22 M3 and M3L

2.2(8a)

3.1(1e)

4.0(1a)

4.0(2d)

C24 M3, M3L, and M3S2

2.2(8a)

3.1(1e)

4.0(1a)

4.0(2d)

C220 M3

2.2(8a)

3.1(1e)

4.0(1a)

4.0(2d)

C220 M4

2.2(8a)

3.1(1e)

4.0(1a)

4.0(2d)

C220 M5

3.2(1d)

3.2(1d)

4.0(1a)

4.0(2d)

C240 M3

2.2(8a)

3.1(1e)

4.0(1a)

4.0(2d)

C240 M4

2.2(8a)

3.1(1e)

4.0(1a)

4.0(2d)

C240 M5

3.2(1d)

3.2(1d)

4.0(1a)

4.0(2d)

C460 M4 E7-2800 v2

C460 M4 E7-4800 v2

C460 M4 E7-8800 v2

C460 M4 E7-4800 v3

C460 M4 E7-8800 v3

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

3.1(1e)

3.1(1e)

3.1(1e)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

C460 M4 E7-8800 v4

2.2(8b)

3.1(1e)

4.0(1a)

4.0(2d)

C480 M5

3.2(2b)

3.2(2b)

4.0(1a)

4.0(2d)

S3260 M4

3.1(2b)

3.1(2b)

4.0(1a)

4.0(2d)

S3260 M5

3.2(3a)

3.2(3a)

4.0(1a)

4.0(2d)

C125 M5

NA

4.0(1a) 4.0(1a)

4.0(2d) (only on UCS 6332, UCS 6332-16UP FI, and UCS 6454

C480 M5 ML

4.0(2a)

4.0(2a)

4.0(2a)

4.0(2d)

Adapters

Table 10. Minimum Software Versions for Adapters

Adapters

Minimum Software Version

UCS 6200 Series FI

Minimum Software Version

UCS 6332, 6332-16UP

Minimum Software Version

UCS 6332, 6332-16UP

Minimum Software Version

UCS 6454

Recommended Software Version

UCS 6200 Series FI

UCS 6332, 6332-16UP FI

UCS 6454

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2304

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2304

UCSC-PCIE-C100-04 (UCS VIC 1495)

NA

4.0(2a)

4.0(2a)

NA

4.0(2d)(only on UCS 6332, 6332-16UP FI)

UCSC-MLOM-C100-04 (UCS VIC 1497)

NA

4.0(2a)

4.0(2a)

NA

4.0(2d)(only on UCS 6332, 6332-16UP FI)

UCSB-MLOM-40G-04 (UCS VIC 1440)

4.0(1a)

4.0(1a)

4.0(1a)

4.0(1a)

4.0(2d)

UCSB-VIC-M84-4P (UCS VIC 1480)

4.0(1a) 4.0(1a) 4.0(1a)

4.0(1a)

4.0(2d)

UCSC-PCIE-C25Q-04 (UCS VIC 1455)

4.0(1a) 4.0(1a) 4.0(1a)

4.0(1a)

4.0(2d)

UCSC-MLOM-C25Q-04 (UCS VIC 1457)

4.0(1a) 4.0(1a) 4.0(1a)

4.0(1a)

4.0(2d)

UCSC-PCIE-BD16GF (Emulex LPe31002 Dual-Port 16G FC HBA)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.0(2d)

UCSC-PCIE-ID40GF (Intel XL710 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.0(2d)

UCSC-PCIE-IQ10GF (Intel X710-DA4 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.0(2d)

UCSC-PCIE-ID10GF (Intel X710-DA2 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.0(2d)

XXV710-DA2 (Intel XXV710-DA2 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.0(2d)

UCSC-PCIE-ID10GC (Intel X550-T2 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.0(2d)

N2XX-AIPCI01 (Intel X520 dual port adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.0(2d)

UCSC-PCIE-ID25GF (Intel X710 25Gb Dual-port BaseT)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.0(2d)

UCSC-PCIE-QD25GF (QLogic QL41212H 25GbE)

3.2(2b)

3.2(2b)

3.2(2b)

4.0(1a)

4.0(2d)

UCSC-PCIE-QD40GF (QLogic QL45212H 40GbE)

3.2(2b)

3.2(2b)

3.2(2b)

4.0(1a)

4.0(2d)

UCSC-PCIE-IQ10GC (Intel X710-T4)

3.2(2b)

3.2(2b)

3.2(2b)

4.0(1a)

4.0(2d)

UCSC-PCIE-QD16GF (QLogic QLE2692-CSC)

3.2(1d)

3.2(1d)

3.2(1d)

4.0(1a)

4.0(2d)

UCSC-PCIE-C40Q-03 (UCS VIC 1385)

UCSC-MLOM-C40Q-03 (UCS VIC 1387)

2.2(8a)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

UCS-VIC-M82-8P (UCS VIC 1280)

UCSB-MLOM-40G-01 (UCS VIC 1240)

UCSB-MLOM-PT-01 (Cisco Port Expander Card)

2.2(8a)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

UCSB-MLOM-40G-03 (UCS VIC 1340)

UCSB-VIC-M83-8P (UCS VIC 1380)

UCSC-MLOM-CSC-02 (UCS VIC 1227)

2.2(8a)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

UCSC-PCIE-CSC-02 (UCS VIC 1225)

2.2(8a)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

UCSC-F-FIO-1000MP (Cisco UCS Fusion ioMemory – PX600, 1.0TB)

UCSC-F-FIO-1300MP (Cisco UCS Fusion ioMemory – PX600, 1.3TB)

UCSC-F-FIO-2600MP (Cisco UCS Fusion ioMemory – PX600, 2.6TB)

UCSC-F-FIO-5200MP (Cisco UCS Fusion ioMemory – PX600, 5.2TB)

2.2(8a)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

UCSB-FIO-1600MS (Cisco UCS Fusion ioMemory Mezzanine SX300, 1.6TB)

UCSB-FIO-1300MS (Cisco UCS Fusion ioMemory Mezzanine PX600, 1.3TB)

2.2(8a)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

UCSC-INVADER-3108

UCSC-NYTRO-200GB (Cisco Nytro MegaRAID 200GB Controller)

2.2(8a)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

UCSC-MLOM-C10T-02 (UCS VIC 1227T)

UCSC-PCIE-C10T-02 (UCS VIC 1225T)

UCSC-F-FIO-785M (Cisco UCS 785GB MLC Fusion ioDrive2 for C-Series Servers)

UCSC-F-FIO-365M (Cisco UCS 365GB MLC Fusion ioDrive2 for C-Series Servers)

UCSC-F-FIO-1205M (Cisco UCS 1205GB MLC Fusion ioDrive2 for C-Series Servers)

UCSC-F-FIO-3000M (Cisco UCS 3.0TB MLC Fusion ioDrive2 for C-Series Servers)

UCSC-F-FIO-1000PS (UCS 1000GB Fusion ioMemory3 PX Performance line for Rack M4)

UCSC-F-FIO-1300PS (UCSC-F-FIO-1300PS)

UCSC-F-FIO-2600PS (UCS 2600GB Fusion ioMemory3 PX Performance line for Rack M4)

UCSC-F-FIO-5200PS (UCS 5200GB Fusion ioMemory3 PX Performance line for Rack M4)

UCSC-F-FIO-6400SS (UCS 6400GB Fusion ioMemory3 SX Scale line for C-Series)

UCSC-F-FIO-3200SS (UCS 3200GB Fusion ioMemory3SX Scale line for C-Series)

2.2(8a)

3.1(1e)

3.1(1e)

4.0(1a)

4.0(2d)

UCSC-PCIE-E14102B (Emulex OCe14102B-F)

2.2(8a)

3.1(1g)

3.1(1g)

4.0(1a)

4.0(2d)

UCSC-PCIE-IQ10GF (Intel X710-DA4 adapter)

UCSC-PCIE-ID10GF (Intel X710-DA2 adapter)

UCSC-PCIE-ID40GF (Intel XL710 adapter)

3.1(2b)

4.0(1a)

4.0(2d)

UCSC-F-I80010 (Intel P3700 HHHL 800GB NVMe PCIe SSD)

UCSC-F-I12003 (Intel P3600 HHHL 1200GB NVMe PCIe SSD)

UCSC-F-I160010 (Intel P3700 HHHL 1600GB NVMe PCIe SSD)

UCSC-F-I20003 (Intel P3600 HHHL 2000GB NVMe PCIe SSD )

UCS-PCI25-40010 (Intel P3700 400GB NVMe PCIe SSD)

UCS-PCI25-8003 (Intel P3600 800GB NVMe PCIe SSD)

UCS-PCI25-80010 (Intel P3700 800GB NVMe PCIe SSD)

UCS-PCI25-16003 (Intel P3600 1600GB NVMe PCIe SSD)

UCSC-F-H19001 (UCS Rack PCIe/NVMe Storage 1900GB HGST SN150)

UCSC-F-H38001 (UCS Rack PCIe/NVMe Storage 3800GB HGST SN150)

UCS-PCI25-38001 (UCS PCIe/NVMe2.5"SFF Storage 3800GB HGST SN100)

3.1(2b)

3.1(2b)

4.0(1a)

4.0(2d)

UCSC-PCIE-QD32GF (Qlogic QLE2742)

N2XX-AQPCI05 (Qlogic QLE2562)

UCSC-PCIE-Q2672 (Qlogic QLE2672-CSC)

UCSC-PCIE-BD32GF (Emulex LPe32002)

UCSC-PCIE-BS32GF (Emulex LPe32001)

N2XX-AEPCI05 (Emulex LPe12002)

3.1(3a)

3.1(3a)

4.0(1a)

4.0(2d)

UCSC-PCIE-E16002 (Emulex LPe16002-M6 16G FC rack HBA)

3.2(1d)

3.2(1d)

4.0(1a)

4.0(2d)

UCSC-PCIE-ID10GC (Intel X550 Dual-port 10GBase-T NIC)

3.1(2b)

3.1(2b)

3.1(2b)

4.0(1a)

4.0(2d)

Other Hardware

We recommend that you use the latest software version for all Chassis, Fabric Interconnects, Fabric Extenders, Expansion Modules and Power Supplies. To determine the minimum software version for your mixed environment, see Cross-Version Firmware Support. The following is the list of other supported hardware:

Table 11. Supported Hardware for UCS 6454 Fabric Interconnects

Type

Details

Chassis

UCSC-C4200-SFF

N20–C6508

UCSB-5108-DC

UCSB-5108-AC2

UCSB-5108-DC2

UCSB-5108-HVDC

Fabric Interconnects

UCS 6454

Fabric Extenders

Cisco UCS 2204XP

Cisco UCS 2208XP

Cisco Nexus 2232PP

Cisco Nexus 2232TM-E

Power Supplies

N9K-PUV-1200W

UCSB-PSU-2500HVDC

UCSB-PSU-2500DC48

UCSC-PSU-930WDC

UCSC-PSU2V2-930WDC

UCSC-PSUV2-1050DC

UCSC-PSU1-770W

UCSC-PSU1-1050W

UCSC-PSU2-1400

UCSC-PSU2V2-1400W

UCSC-PSU2V2-650W

UCSC-PSU2V2-1200W

UCSB-PSU-2500ACPL

UCSB-PSU-2500ACDV

N20-PAC5-2500W

Table 12. Supported Hardware for UCS 6332, UCS 6332-16UP Fabric Interconnects

Type

Details

Chassis

N20–C6508

UCSB-5108-DC

UCSB-5108-AC2

UCSB-5108-DC2

UCSB-5108-HVDC

Fabric Interconnects

UCS 6332UP

UCS 6332-16UP

Fabric Extenders

Cisco UCS 2208XP

Cisco UCS 2204XP

Cisco Nexus 2232PP

Cisco Nexus 2232TM-E

Cisco UCS 2304

Cisco Nexus 2348UPQ

Power Supplies

UCSB-PSU-2500HVDC

UCSB-PSU-2500DC48

UCSC-PSU-930WDC

UCSC-PSU2V2-930WDC

UCSC-PSUV2-1050DC

UCSC-PSU1-770W

UCSC-PSU1-1050W

UCSC-PSU2-1400

UCSC-PSU2V2-1400W

UCSC-PSU2V2-650W

UCSC-PSU2V2-1200W

UCSB-PSU-2500ACPL

UCSB-PSU-2500ACDV

N20-PAC5-2500W

N9K-PUV-1200W


Note

The 40G backplane setting is not applicable for 22xx IOMs.


Table 13. Supported Hardware for UCS 6200 Fabric Interconnects

Type

Details

Chassis

N20–C6508

UCSB-5108-DC

UCSB-5108-AC2

UCSB-5108-DC2

UCSB-5108-HVDC

Fabric Interconnects

UCS 6248UP

UCS 6296UP

Fabric Extenders

UCS 2208XP

UCS 2204XP

Cisco Nexus 2232PP

Cisco Nexus 2232TM-E

Expansion Modules

UCS-FI-E16UP

Power Supplies

UCSB-PSU-2500HVDC

UCSB-PSU-25004DC48

UCSC-PSU-930WDC

UCSC-PSU2V2-930WDC

UCSC-PSUV2-1050DC

UCSC-PSU1-770W

UCSC-PSU1-1050W

UCSC-PSU2-1400

UCSC-PSU2V2-1400W

UCSC-PSU2V2-650W

UCSC-PSU2V2-1200W

UCSB-PSU-2500ACPL

UCSB-PSU-2500ACDV

N20-PAC5-2500W

GB Connector Modules, Transceiver Modules, and Cables

Following is the list of Gb connector modules, transceiver modules, and supported cables:


Note


Table 14. Supported Transceiver Modules and Cables for GB Connector Modules

Gb Connector Modules

Transceiver Modules and Cables

FC for UCS 6454 Fabric Interconnects

DS-SFP-FC8G-SW

DS-SFP-FC8G-LW

DS-SFP-FC16G-SW

DS-SFP-FC16G-LW

DS-SFP-FC32G-SW

DS-SFP-FC32G-LW

100-Gb for UCS 6454 Fabric Interconnects

QSFP-100G-SR4-S

QSFP-100G-LR4-S

QSFP-100G-SM-SR

QSFP-100G-CU1M

QSFP-100G-CU2M

QSFP-100G-CU3M

QSFP-100G-AOC1M

QSFP-100G-AOC2M

QSFP-100G-AOC3M

QSFP-100G-AOC5M

QSFP-100G-AOC7M

QSFP-100G-AOC10M

QSFP-100G-AOC15M

QSFP-100G-AOC20M

QSFP-100G-AOC25M

QSFP-100G-AOC30M

40-Gb for UCS 6454 Fabric Interconnects

QSFP-40G-SR4

QSFP-40G-SR4-S

QSFP-40G-SR-BD

QSFP-40G-LR4

QSFP-40G-LR4-S

QSFP-40G-ER4

WSP-Q40GLR4L

QSFP-H40G-CU1M

QSFP-H40G-CU3M

QSFP-H40G-CU5M

QSFP-H40G-ACU7M

QSFP-H40G-ACU10M

QSFP-H40G-AOC1M

QSFP-H40G-AOC2M

QSFP-H40G-AOC3M

QSFP-H40G-AOC5M

QSFP-H40G-AOC10M

QSFP-H40G-AOC15M

40-Gb for UCS 6300 Series Fabric Interconnects

QSFP-40G-SR4 in 4x10G mode with external 4x10G splitter cable to SFP-10G-SR

QSFP-40G-CSR4

QSFP-40G-LR4

QSFP-40G-LR4-S

QSFP-40G-SR-BD

QSFP-40G-SR4

QSFP-40G-SR4-S

FET-40G

QSFP-4SFP10G-CU1M

QSFP-4SFP10G-CU3M

QSFP-4SFP10G-CU5M

QSFP-4X10G-AC7M

QSFP-4X10G-AC10M

QSFP-4X10G-AOC1M

QSFP-4X10G-AOC2M

QSFP-4X10G-AOC3M

QSFP-4X10G-AOC5M

QSFP-4X10G-AOC7M

QSFP-4X10G-AOC10M

QSFP-H40G-ACU7M

QSFP-H40G-ACU10M

QSFP-H40G-AOC1M

QSFP-H40G-AOC2M

QSFP-H40G-AOC3M

QSFP-H40G-AOC5M

QSFP-H40G-AOC7M

QSFP-H40G-AOC10M

QSFP-H40G-AOC15M

QSFP-H40G-CU1M

QSFP-H40G-CU3M

QSFP-H40G-CU5M

32-Gb FC for UCS 6454 Fabric Interconnects

DS-SFP-FC32G-SW

DS-SFP-FC32G-LW

25-Gb for UCS 6454 Fabric Interconnects

SFP-25G-SR-S

SFP-H25G-CU1M

SFP-H25G-CU2M

SFP-H25G-CU3M

SFP-H25G-CU5M

SFP-H25G-AOC1M

SFP-H25G-AOC2M

SFP-H25G-AOC3M

SFP-H25G-AOC5M

SFP-H25G-AOC7M

SFP-H25G-AOC10M

16-Gb for UCS 6454 and UCS 6332UP Fabric Interconnects

DS-SFP-FC16G-LW

DS-SFP-FC16G-SW

10-Gb for UCS 6454 Fabric Interconnects

SFP-10G-SR

SFP-10G-SR-S

SFP-10G-LR

SFP-10G-LR-S

SFP-10G-ER

SFP-10G-ER-S

SFP-10G-ZR

SFP-10G-ZR-S

FET-10G

Note 

FET-10G is only supported between Fabric Interconnects and IOMs/FEXs.

SFP-10G-LRM

SFP-H10GB-CU1M

SFP-H10GB-CU2M

SFP-H10GB-CU3M

SFP-H10GB-CU5M

SFP-H10GB-ACU7M

SFP-H10GB-ACU10M

SFP-10G-AOC1M

SFP-10G-AOC2M

SFP-10G-AOC3M

SFP-10G-AOC5M

SFP-10G-AOC7M

SFP-10G-AOC10M

10-Gb for UCS 6300 and 6200 Series Fabric Interconnects

SFP-10G-SR

SFP-10G-SR-S

SFP-10G-LR

SFP-10G-LR-S

SFP-H10GB-CU1M

SFP-H10GB-CU2M

SFP-H10GB-CU3M

SFP-H10GB-CU5M

SFP-H10GB-ACU7M

SFP-H10GB-ACU10M

FET-10G

1SFP-10G-AOC1M

SFP-10G-AOC2M

SFP-10G-AOC3M

SFP-10G-AOC5M

SFP-10G-AOC7M

SFP-10G-AOC10M

8-Gb FC for UCS 6454 and UCS 6332UP Fabric Interconnects

DS-SFP-FC8G-SW

DS-SFP-FC8G-LW

4-Gb FC for UCS 6300 and 6200 Series Fabric Interconnects

DS-SFP-FC4G-SW

DS-SFP-FC4G-LW

1-Gb for UCS 6454 Fabric Interconnects

GLC-TE

GLC-SX-MMD

SFP-GE-T

1-Gb for UCS 6300 and 6200 Series Fabric Interconnects

GLC-TE

GLC-SX-MM

GLC-LH-SM

1 SFP-10G-AOC cables are only supported for Cisco 1455 and 1457 VIC cards.

Note

The maximum length of fiber optic runs is limited to 300 meters. This is imposed by our use of 802.3X/802.1Qbb Priority Pauses. SFP-10G-LR is supported between fabric interconnect and FEX, but the 300 m limit still applies.


Cisco UCS Mini and Components

UCS Mini Supported Chassis

Table 15. Minimum Software Versions for UCS Mini Chassis

Chassis

Minimum Software Version

Recommended Software Version

UCSB-5108-AC2

3.0(1e)

4.0(2d)

UCSB-5108-DC2

3.0(2c)

4.0(2d)

UCS Mini Supported Blade and Rack Servers

Table 16. Minimum Host Firmware Versions for Blade and Rack Servers on UCS Mini

Servers

Minimum Software Version

Recommended Software Version

B200 M5

3.2(1d)

4.0(2d)

B200 M3

3.1(1e)

4.0(2d)

B200 M4

3.1(1e)

4.0(2d)

B260 M4

3.1(2b)

4.0(2d)

B420 M3

3.1(1e)

4.0(2d)

B420 M4

3.1(1e)

4.0(2d)

B460 M4

3.1(2b)

4.0(2d)

B480 M5

3.2(2b)

4.0(2d)

B22 M3

3.1(1e)

4.0(2d)

C220 M3

3.1(1e)

4.0(2d)

C240 M3

3.1(1e)

4.0(2d)

C220 M4

3.1(1e)

4.0(2d)

C240 M4

3.1(1e)

4.0(2d)

C460 M4

3.1(1e)

4.0(2d)

C220 M5

3.2(1d)

4.0(2d)

C240 M5

3.2(1d)

4.0(2d)

C480 M5

3.2(2b)

4.0(2d)

UCS Mini Supported Adapters

Adapters

Minimum Software Version

Recommended Software Version

UCSB-MLOM-40G-04 (UCS VIC 1440)

UCSB-VIC-M84-4P (UCS VIC 1480)

4.0(2a)

4.0(2d)

UCSC-PCIE-IQ10GC (Intel X710-T4)

UCSC-PCIE-QD25GF (QLogic QL41212H 25GbE)

UCSC-PCIE-QD40GF (QLogic QL45212H 40GbE)

3.2(2b)

4.0(2d)

UCSC-PCIE-C40Q-03 (UCS VIC 1385)

UCSC-MLOM-C40Q-03 (UCS VIC 1387)

3.1(1e)

4.0(2d)

UCS-VIC-M82-8P (UCS VIC 1280)

UCSB-MLOM-40G-01 (UCS VIC 1240)

UCSB-MLOM-PT-01 (Cisco Port Expander Card)

3.1(1e)

4.0(2d)

UCSB-MLOM-40G-03 (UCS VIC 1340)

UCSB-VIC-M83-8P (UCS VIC 1380)

UCSC-MLOM-CSC-02 (UCS VIC 1227)

3.1(1e)

4.0(2d)

UCSC-PCIE-CSC-02 (UCS VIC 1225)

3.1(1e)

4.0(2d)

UCS Mini Supported Fabric Interconnects

Fabric Interconnects

Minimum Software Version

Recommended Software Version

Cisco UCS 6324

3.1(1e)

4.0(2d)

UCS Mini Supported Fabric Extenders for Secondary Chassis

Fabric Extenders

Minimum Software Version

Recommended Software Version

UCS 2204 XP

3.1(1e)

4.0(2d)

UCS 2208 XP

3.1(1e)

4.0(2d)

UCS Mini Supported Power Supplies

Power Supplies

Minimum Software Version

Recommended Software Version

UCSB-PSU-2500ACDV

UCSB-PSU-2500DC48

UCSC-PSU-930WDC

UCSC-PSU2V2-930WDC

UCSC-PSUV2-1050DC

UCSC-PSU1-770W

UCSC-PSU2-1400

UCSC-PSU2V2-1400W

UCSC-PSU2V2-650W

UCSC-PSU2V2-1200W

3.1(1e)

4.0(2d)

UCS Mini Supported Gb Connector Modules

We recommend that you use the current software version for Gb port speed connections. Following is the list of Gb connector modules and supported cables:


Note

Transceiver modules and cables that are supported on a specific Fabric Interconnect are not always supported on all VIC adapters, IOMs, or FEXes that are compatible with that Fabric Interconnect. Detailed compatibility matrices for the transceiver modules are available here:https://www.cisco.com/c/en/us/support/interfaces-modules/transceiver-modules/products-device-support-tables-list.html


Gb Connector Modules

Transceivers Modules and Cables

40-Gb

QSFP-40G-SR4 in 4x10G mode with external 4x10G splitter cable to SFP-10G-SR

QSFP-4SFP10G-CU1M

QSFP-4SFP10G-CU3M

QSFP-4SFP10G-CU5M

QSFP-4X10G-AC7M

QSFP-4X10G-AC10M

QSFP-4X10G-AOC1M

QSFP-4X10G-AOC2M

QSFP-4X10G-AOC3M

QSFP-4X10G-AOC5M

QSFP-4X10G-AOC7M

QSFP-4X10G-AOC10M

10-Gb

SFP-10G-LR

SFP-10G-LR-S

SFP-10G-LR-X

SFP-10G-SR

SFP-10G-SR-S

SFP-10G-SR-X

SFP-H10GB-CU1M

SFP-H10GB-CU2M

SFP-H10GB-CU3M

SFP-H10GB-CU5M

SFP-H10GB-ACU7M

SFP-H10GB-ACU10M

SFP-10G-AOC1M

SFP-10G-AOC2M

SFP-10G-AOC3M

SFP-10G-AOC5M

SFP-10G-AOC7M

SFP-10G-AOC10M

8-Gb

DS-SFP-FC8G-SW

DS-SFP-FC8G-LW

4-Gb

DS-SFP-FC4G-SW

DS-SFP-FC4G-LW

1-Gb

GLC-TE

GLC-LH-SM

GLC-SX-MM

Upgrade and Downgrade Guidelines

  • In a system with Cisco UCS 6454 Fabric Interconnects, you cannot downgrade from Cisco UCS Manager Release 4.0.

    See the Cisco UCS Manager Firmware Management Guide, Release 4.0 section Firmware Upgrade to Cisco UCS Manager Release 4.0 for detailed upgrade paths.

  • Do not downgrade systems equipped with LITE-ON 1050W PSUs to a Cisco UCS Manager release earlier than Release 4.0(2). Board controller activation for UCS C240 M5 servers with LITE-ON 1050W PSU may fail during the discovery process when it is downgraded from Cisco UCS Manager Release 4.0(2).

  • In a system with Cisco UCS 6454 Fabric Interconnects, you cannot downgrade from Cisco UCS Manager Release 4.0(2) when Ethernet or FC switch mode is enabled on the Fabric Interconnect because this mode is not supported in versions earlier than 4.0(2).

    Also, if port-security is enabled in the network control policy, it is disabled during downgrade from Cisco UCS Manager Release 4.0(2) because it is not supported in versions earlier than 4.0(2).

Capability Catalog

The Cisco UCS Manager Capability Catalog is a set of tunable parameters, strings, and rules. Cisco UCS uses the catalog to update the display and configurability of components such as newly qualified DIMMs and disk drives for servers.

The Capability Catalog is embedded in Cisco UCS Manager, but at times it is also released as a single image file to make updates easier.

The following table lists the PIDs added in this release and maps UCS software releases to the corresponding Capability Catalog file.

Table 17. Version Mapping

UCS Release

Catalog File Name

Additional PIDs In This Release

4.0(2d)

ucs-catalog.4.0.2d.T.bin

4.0(2b)

ucs-catalog.4.0.2a.T.bin

4.0(2a)

ucs-catalog.4.0.2a.T.bin

Cisco UCS Rack-Mount Servers:

  • UCSC-C480-M5ML

CPUs for UCSC-C480-M5ML:

  • UCS-CPU-8180

  • UCS-CPU-8176

  • UCS-CPU-8170

  • UCS-CPU-8164

  • UCS-CPU-8160

  • UCS-CPU-8153

  • UCS-CPU-6152

  • UCS-CPU-6148

  • UCS-CPU-6138

  • UCS-CPU-6140

  • UCS-CPU-6130

  • UCS-CPU-8168

  • UCS-CPU-8158

  • UCS-CPU-8156

  • UCS-CPU-6154

  • UCS-CPU-6150

  • UCS-CPU-6142

  • UCS-CPU-6132

  • UCS-CPU-6144

  • UCS-CPU-6136

  • UCS-CPU-6126

  • UCS-CPU-6146

  • UCS-CPU-6134

  • UCS-CPU-6128

  • UCS-CPU-5122

  • UCS-CPU-4116

  • UCS-CPU-6142M

  • UCS-CPU-8180M

Memory for UCSC-C480-M5ML:

  • UCS-MR-128G8RS-H

  • UCS-MR-X64G4RS-H

  • UCS-ML-X64G4RS-H

  • UCS-MR-X32G2RS-H

  • UCS-ML-X32G2RS-H

  • UCS-MR-X16G1RS-H

  • UCS-MR-X16G2RS-H

PSU for UCSC-C480-M5ML:

  • UCSC-PSU1-1600W

Fan module for UCSC-C480-M5ML:

  • UCSC-FAN-C480M5

Cisco VICs for UCSC-C480-M5ML:

  • VIC 1455 10/25G PCIe for C-Series and S-Series (UCSC-PCIE-C25Q-04)

  • VIC 1495 40/100G PCIe for C-Series (UCSC-PCIE-C100-04)

NIC for UCSC-C480-M5ML:

  • Qlogic QLE45611HLCU single port 100G NIC (UCSC-PCIE-QS100GF)

HDDs for UCSC-C480-M5ML:

  • UCS-HD900G15K12N

  • UCS-HD12TB10K12N

  • UCS-HD18TB10K4KN

  • UCS-HD2T7K12N

SSDs for UCSC-C480-M5ML:

  • UCS-SD16T123X-EP

  • UCS-SD32T123X-EP

  • UCS-SD120GM1X-EV

  • UCS-SD240GM1X-EV

  • UCS-SD480GM1X-EV

  • UCS-SD960GM1X-EV

  • UCS-SD16TM1X-EV

  • UCS-SD19TM1X-EV

  • UCS-SD38TM1X-EV

  • UCS-SD76TM1X-EV

Flash drive for UCSC-C480-M5ML:

  • UCS-USBFLSHB-16GB

GPU for UCSC-C480-M5ML:

  • Nvidia SXM2 V100 32GB Nvlink Modules (UCSC-GPUV100SXM32)

NVMe drives for UCSC-C480-M5ML:

  • UCSC-NVMEHW-H3200

Mini Storage Carriers for UCSC-C480-M5ML:

  • UCS-MSTOR-SD

  • UCS-MSTOR-M2

SD Cards for UCSC-C480-M5ML:

  • UCS-SD-64G-S

  • UCS-SD-128G

Micro SD Card for UCSC-C480-M5ML:

  • UCS-MSD-32G

M.2 SATA SSD for UCSC-C480-M5ML:

  • UCS-M2-240GB

  • UCS-M2-960GB

RAID Controller for UCSC-C480-M5ML:

  • UCSC-RAID-M5HD

Cisco VIC Adapters:

  • VIC 1495 40/100G PCIe for C-Series (UCSC-PCIE-C100-04)

  • VIC 1497 40/100G mLOM for C-Series (UCSC-MLOM-C100-04)

TPM2 for all UCS servers:

  • UCSX-TPM2-002-C

High Voltage DC 1200 Watt Power Supply on UCS 6454 Fabric Interconnects:

  • N9K-PUV-1200W

Intel Optane NVMe Extreme Performance Drive for M5 servers:

  • UCSC-NVMEXP-I750

GPU for C240 M5 servers:

  • UCSC-GPU-V100-32G—NVIDIA V100 PCIe PG500-200 250W 32GB GPU

QLogic Network Adapter cards for UCSC-C125:

  • UCSC-PCIE-QD10GC—10G Network Adapter card

  • UCSC-PCIE-QD25GF—25G Network Adapter card

4.0(1d)

ucs-catalog.4.0.1c.T.bin

Drives:

  • UCS-SD480GBHBNK9

  • UCS-SD960GBHBNK9

  • UCS-SD38TBHBNK9

  • UCS-SD480GBHTNK9

  • UCS-SD960GBHTNK9

  • UCS-SD38TBHTNK9

4.0(1c)

ucs-catalog.4.0.1a.T.bin

4.0(1b)

ucs-catalog.4.0.1a.T.bin

4.0(1a)

ucs-catalog.4.0.1a.T.bin

Cisco UCS 6454 Fabric Interconnect:

  • UCS-FI-6454

Cisco UCS Rack-Mount Servers:

  • UCSC-C125

Chassis for C125 M5:

  • UCSC-C4200-SFF

CPUs for UCSC-C125:

  • UCS-CPU-7601

  • UCS-CPU-7551

  • UCS-CPU-7501

  • UCS-CPU-7451

  • UCS-CPU-7401

  • UCS-CPU-7351

  • UCS-CPU-7301

  • UCS-CPU-7281

  • UCS-CPU-7261

  • UCS-CPU-7251

  • UCS-CPU-7551P

  • UCS-CPU-7401P

  • UCS-CPU-7351P

Memory for UCSC-C125:

  • UCS-MR-128G8RS-H

  • UCS-MR-X64G4RS-H

  • UCS-ML-X64G4RS-H

  • UCS-MR-X32G2RS-H

  • UCS-MR-X16G1RS-H

  • UCS-MR-X16G2RS-H

  • UCS-MR-X8G1RS-H

OCP NICs for UCSC-C125:

  • UCSC-OCP-QD10GC

  • UCSC-OCP-QD25GF

Storage Controller for UCSC-C125:

  • UCSC-SAS9460-8i

SD Cards for UCSC-C125:

  • UCS-SD-32G-S

  • UCS-SD-64G-S

  • UCS-SD-128G

Micro SD Card for UCSC-C125:

  • UCS-MSD-32G

M.2 SATA SSD for UCSC-C125:

  • UCS-M2-240GB

  • UCS-M2-960GB

Flash USB Drive for UCSC-C125:

  • UCS-USBFLSHB-16GB

Mini Storage Carriers for UCSC-C125:

  • UCS-MSTOR-SD

  • UCS-MSTOR-M2

Cisco VIC Adapters:

  • VIC 1440 10/40G mLOM for B-Series (UCSB-MLOM-40G-04)

  • VIC 1480 10/40G PCIe for B-Series (UCSB-VIC-M84-4P)

  • VIC 1455 10/25G PCIe for C-Series and S-Series (UCSC-PCIE-C25Q-04)

  • VIC 1457 10/25G mLOM for C-Series (UCSC-MLOM-C25Q-04)

HX NVMe Server:

  • HXAF220C-M5SN

PCIe compression and cryptographic CPU offload card with C240HX M5 servers

  • HX-PCIE-OFFLOAD-1

Intel Optane NVMe Med. Performance Drives for M5 servers:

  • UCSC-NVMEXP-I375

  • UCSB-NVMEXP-I375

  • UCSC-NVMEXP-I750

  • UCSB-NVMEXP-I750

Security Fixes

The following security issues are resolved:

Release

Defect ID

CVE

Description

4.0(2a)

CSCvm35067

CVE-2018-3655

Cisco UCS C-Series servers include a version of the Intel® Converged Security Management Engine (CSME) that maybe affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:

  • CVE-2018-3655

An attacker with physical access could use these vulnerabilities to do the following:

  • Bypass Intel® CSME anti-replay protection, thus allowing potential brute force attacks on secrets stored inside the Intel CSME

  • Gain unauthorized access to the Intel® MEBX password

  • Tamper with the integrity of the Intel® CSME file system directories or the Server Platform Services and Trusted Execution Environment (Intel® TXE) data files

This release includes BIOS revisions for Cisco UCS M5 generation C-Series servers.

4.0(1d)

CSCvm19864

CVE-2016-3115

Cisco UCS Manager and UCS 6200 Series Fabric Interconnects include a version of the OpenSSH Protocol that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2016-3115

Cisco has released software updates that address this vulnerability.

4.0(1c)

CSCvk20775

CVE-2018-3655

Cisco UCS B-Series servers include a version of the Intel® Converged Security Management Engine (CSME) that maybe affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:

  • CVE-2018-3655

An attacker with physical access could use these vulnerabilities to do the following:

  • Bypass Intel® CSME anti-replay protection, thus allowing potential brute force attacks on secrets stored inside the Intel CSME

  • Gain unauthorized access to the Intel® MEBX password

  • Tamper with the integrity of the Intel® CSME file system directories or the Server Platform Services and Trusted Execution Environment (Intel® TXE) data files

This release includes BIOS revisions for Cisco UCS M5 generation B-Series servers.

4.0(1a)

CSCvm03356

CVE-2018-3615

CVE-2018-3620

CVE-2018-3646

Cisco UCS B-Series M3 servers and C-Series M3 servers are based on Intel® processors that are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).

  • CVE-2018-3615 (affecting SGX), also known as Foreshadow, is not known to affect any existing Cisco UCS servers because Cisco UCS M5 and earlier generation servers, and HyperFlex M5 and earlier generation servers do not use Intel® SGX technology.

  • CVE-2018-3620 (affecting OS/System Management Mode) and CVE-2018-3646 (affecting Virtual Machine Monitors) are referred to as L1 Terminal Fault attacks by Intel®. These vulnerabilities are mitigated by applying the updated processor microcode from Intel® included in the server firmware bundle, and the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M3 generation servers. These BIOS revisions include the updated processor microcode that is a required part of the mitigation for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM). Operating System and Hypervisor patches from the appropriate vendors may also be required to mitigate these vulnerabilities.

For more information, please see the Cisco Security Advisory available here:

CPU Side-Channel Information Disclosure Vulnerabilities: August 2018

4.0(1a)

CSCvm03351

CVE-2018-3615

CVE-2018-3620

CVE-2018-3646

Cisco UCS B-Series M4 servers, C-Series M4 servers, S3260 M4 storage servers, and HyperFlex M4 servers are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).

  • CVE-2018-3615 (affecting SGX), also known as Foreshadow, is not known to affect any existing Cisco UCS servers because Cisco UCS M5 and earlier generation servers, and HyperFlex M5 and earlier generation servers do not use Intel® SGX technology.

  • CVE-2018-3620 (affecting OS/System Management Mode) and CVE-2018-3646 (affecting Virtual Machine Monitors) are referred to as L1 Terminal Fault attacks by Intel®. These vulnerabilities are mitigated by applying the updated processor microcode from Intel® included in the server firmware bundle, and the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M4 generation servers. These BIOS revisions include the updated processor microcode that is a required part of the mitigation for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM). Operating System and Hypervisor patches from the appropriate vendors may also be required to mitigate these vulnerabilities.

For more information, please see the Cisco Security Advisory available here:

CPU Side-Channel Information Disclosure Vulnerabilities: August 2018

4.0(1a)

CSCvm03339

CVE-2018-3615

CVE-2018-3620

CVE-2018-3646

Cisco UCS B-Series M5 servers, C-Series M5 servers, and HyperFlex M5 servers are based on Intel® processors that are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).

  • CVE-2018-3615 (affecting SGX), also known as Foreshadow, is not known to affect any existing Cisco UCS servers because Cisco UCS M5 and earlier generation servers, and HyperFlex M5 and earlier generation servers do not use Intel® SGX technology.

  • CVE-2018-3620 (affecting OS/System Management Mode) and CVE-2018-3646 (affecting Virtual Machine Monitors) are referred to as L1 Terminal Fault attacks by Intel®. These vulnerabilities are mitigated by applying the updated processor microcode from Intel® included in the server firmware bundle, and the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M5 generation servers. These BIOS revisions include the updated processor microcode that is a required part of the mitigation for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM). Operating System and Hypervisor patches from the appropriate vendors may also be required to mitigate these vulnerabilities.

For more information, please see the Cisco Security Advisory available here:

CPU Side-Channel Information Disclosure Vulnerabilities: August 2018

4.0(1a)

CSCvg58650

  • CVE-2017-5718

Cisco UCS 6200 Series and 6300 Series Fabric Interconnects include a version of Intel system firmware for Intel Core Processors that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:

  • CVE-2017-5718 is addressed by applying the updated processor microcode from Intel included in the server firmware bundle, and the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M5 and Hyperflex M5 generation servers.

4.0(1a)

CSCvh25150

CVE-2017-3883

A vulnerability in the authentication, authorization, and accounting (AAA) implementation of Cisco Firepower Extensible Operating System (FXOS) and NX-OS System Software could allow an unauthenticated, remote attacker to cause an affected device to reload.

The vulnerability occurs because AAA processes prevent the NX-OS System Manager from receiving keepalive messages when an affected device receives a high rate of login attempts, such as in a brute-force login attack. System memory can run low on the FXOS devices under the same conditions, which could cause the AAA process to unexpectedly restart or cause the device to reload.

An attacker could exploit this vulnerability by performing a brute-force login attack against a device that is configured with AAA security services. A successful exploit could allow the attacker to cause the affected device to reload.

Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.

For more information, see the Cisco Security Advisory available here:

Cisco FXOS and NX-OS System Software Authentication, Authorization, and Accounting Denial of Service Vulnerability

4.0(1a)

CSCva61699

Common Weakness Enumeration (CWE) IDs:

  • 525

  • 933

  • 16

  • 311

  • 200

The following security vulnerabilities were identified for HTTP response and affected Cisco UCS Manager:

  • Incomplete or no cache-control and Pragma HTTP header set

  • Web browser XSS protection not enabled

  • X-Content-Type-Options header missing

  • Secure pages include mixed content

  • Private IP disclosure

Of these security vulnerabilities, Cisco has addressed the following in this release:

  • Web browser XSS protection not enabled

  • X-Content-Type-Options header missing

The Incomplete or no cache-control and Pragma HTTP header set vulnerability vulnerability will not be fixed because of the following:

  • Disabling of caching results in a sluggish GUI experience

  • KVM launch is impacted if we disable caching

4.0(1a)

CSCvi95784

  • CVE-2017-15715

  • CVE-2018-1303

  • CVE-2018-1301

  • CVE-2018-1302

  • CVE-2018-1283

  • CVE-2018-1312

  • CVE-2017-15710

The Apache version used with previous Cisco UCS Manager releases was affected by the Common Vulnerability and Exposures (CVE) IDs listed. Most of these CVE IDs are low risk, or not applicable to Cisco UCS Manager.

Cisco UCS Manager now uses the latest Apache version, where these issues are fixed.

Libfabric and Open MPI

Cisco usNIC support in the Libfabric and Open MPI open source packages is readily available from their community web sites (http://libfabric.org/ and http://www.open-mpi.org/, respectively).

Cisco UCS Manager Release 3.1(3) and later releases no longer include Open MPI binary packages. Future UCS software driver bundles distributed through the usual Cisco software channels may not include binaries for the libfabric packages. Cisco engineers continue to be active, core contributors in both the Libfabric and Open MPI communities, and will actively develop and support users through the usual community or commercial ISV support mechanisms (e.g., IBM Spectrum MPI).

Resolved Caveats

The resolved bugs for a release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains up-to-date information about bugs and vulnerabilities in this product and other Cisco hardware and software products.


Note

You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, you can register for an account.


For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.

Resolved Caveats in Release 4.0(2d)

The following caveats are resolved in Release 4.0(2d):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvn22595

When using Cisco UCS B200 M5 servers with VIC 1340 and VIC 1380 adapters on a system running Cisco UCS Manager 3.2(3d) firmware and Red Hat Linux as the OS, vNICs that share the same bus ID but have different function numbers are no longer assigned to the same Input-Output Memory Management Unit (IOMMU) group.

3.2(3d)B

4.0(2d)B

CSCvn60002

Cisco VNICs and VHBAs no longer experience degraded response time in accessing physical links after power-on or link-flap. Servers configured for sanboot now boot correctly.

4.0(2b)A

4.0(2d)A

CSCvo13678

Cisco UCS M5 rack servers with multiple Nvidia GPUs no longer fail discovery and produce a core file during firmware install of Cisco UCS Manager Release 4.0(2a) on the rack server.

4.0(2a)A

4.0(2d)A

CSCvn81327

The Cisco UCS-IOM-2304 IO Module no longer crashes and produces a kernel core dump pointing to pick_next_task_rt in certain situations. Traffic forwarding is no longer affected.

3.2(2d)A

4.0(2d)A

CSCvm66499

The launch KVM feature is now functional when inband KVM VLAN is configured, and the server management is connected through FEX.

4.0(1a)C

4.0(2d)C

CSCvh18287

Cisco UCS C240 M5 servers no longer display error code F0776 and a fault message stating that non-existent disks are inoperable.

3.2(1d)C

4.0(2d)C

CSCvm66118

When a PSU with serial number LITxxxxxx is inserted or reseated in a chassis connected to a Cisco UCS Manager managed 6300 Series Fabric Interconnect, it no longer causes the Fabric Interconnect to report PSU fan faults.

3.2(2f)B

4.0(2d)B

3.2(3j)B

CSCvm89871

Cisco UCS Manager managed C240 M4 rack servers no longer fail discovery on UCS 6332 and 6332-16UP Fabric Interconnects after the following configuration sequence:

  1. Disable the port that is part of the uplink Ethernet port-channel.

  2. 2. Delete the interface from the port-channel.

  3. Re-configure the port type as Server .

  4. Connect the server to the re-configured port.

3.1(2c)C

4.0(2d)C

CSCvo22832

Cisco UCS Manager C-Series servers direct-attached to UCS 6454 Fabric Interconnects using VIC 14xx Series adapters now capture CDP/LLDP packets correctly.

4.0(2a)A

4.0(2d)A

CSCvo04128

Fibre Channel ports configured in E mode and supported on the UCS 6454 Fabric Interconnect no longer experience delays in coming online after boot or link-flap.

4.0(2a)A

4.0(2d)A

Resolved Caveats in Release 4.0(2b)

The following caveats are resolved in Release 4.0(2b):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvk63036

Unable to form a SAN port-channel between a Cisco UCS Fabric Interconnect pair and a Cisco Fibre Channel switch, where the Organizationally Unique ID (OUI) of the switch is one of the following:

  • 003a9c

  • 000831

  • d0a5a6

This issue has been resolved.

4.0(2a)A

4.0(2b)A

CSCvn91826

In a setup with Cisco VIC 14xx adapters, server discovery no longer fails due to server ID range limitation. The server ID range is now 1 to 254.

4.0(2a)A

4.0(2b)A

CSCvk26441

When running Cisco UCS Manager Release 4.0(2a) on UCS 6454 Fabric Interconnects, LDAP user login no longer fails if the group map rule has a role other than aaa and read-only .

4.0(2a)A

4.0(2b)A

CSCvk53356

When running Cisco UCS Manager Release 4.0(2a) on UCS 6454 Fabric Interconnects, an admin password could not be recovered using the password recovery procedure.

This issue has been resolved.

4.0(2a)A

4.0(2b)A

Resolved Caveats in Release 4.0(2a)

The following caveats are resolved in Release 4.0(2a):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvk62258

CSCvm04161

Making LLDP configuration changes on one node of a UCS S3260 server was causing the second server node to crash. This issue was observed predominantly on Windows Operating Systems.

This issue has been resolved.

3.1(3a)C

4.0(2a)C

CSCvn10940

VLAN 4093 has been removed from the list of reserved VLANs and is available for configuration.

4.0(1a)A

4.0(2a)A

CSCvh97755

Cisco UCS 6200 Series Fabric Interconnect does not pass EAPOL-Start frames from the vEthernet interface to the upstream uplink port in the switch.

This issue is now resolved.

3.1(2c)A

4.0(2a)A

CSCvm08604

During chassis firmware upgrade on Cisco S3260 chassis, the security keys for the Self-Encrypting Drives (SEDs) were mismatched between the controller and the drives.

This issue is resolved.

3.2(3b)A

3.2(3i)A

4.0(2a)A

CSCvk38240

When using UCS VIC 1340 with adapter firmware version 4.2(3b), which is contained in the 3.2(3d) blade server firmware bundle, UEFI Boot from SAN would fail.

This failure no longer occurs.

3.2(3d)B

4.0(2a)B

CSCvj78742

The active IOM no longer reboots unexpectedly due to satsyslog hap reset while failing over from the peer IOM that was rebooted.

3.2(3d)A

3.2(3h)A

4.0(2a)A

CSCvi66859

In a system configured with VLAN groups and mapped with FI uplink interfaces, an unexpected outage was experienced when a VLAN is removed from a vNIC template or from a VLAN group.

This issue has been resolved.

3.2(2b)A

4.0(2a)A

CSCvm23975

In a system with a Cisco UCS Manager-managed C-Series rack server and any V-Series GPU adapter, the GPU mode can be changed through the Graphics Policy in Cisco UCS Manager even if the C-Series rack server has one or more of the following GPU adapters:

  • UCSC-GPU-V100-16G

  • UCSC-GPU-V100-32G

4.0(1a)A

4.0(2a)A

Resolved Caveats in Release 4.0(1d)

The following caveats are resolved in Release 4.0(1d):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvm57553

On a very small number of UCS-IOM-2304, the boot and run time may become degraded due to JFFS2 Clearmarker filesystem errors. This is caused by a limitation in a vendor-specific kernel filesystem patch, and affects IOMs that are built with 16-3743-01 NOR flash chips.

This issue is resolved, and no longer affects any UCS IOM.

4.0(1a)A

4.0(1d)A and 3.2(3i)A

CSCvm08604

During chassis firmware upgrade on Cisco S3260 chassis, the security keys for the Self-Encrypting Drives (SEDs) are no longer mismatched between the controller and the drives.

3.2(3b)A

4.0(1d)A and 3.2(3i)A

CSCvj98360

BMC did not detect the DIMM, and blade server discovery was stuck with the following message:

Mismatched DIMM configuration

This issue has been resolved.

4.0(1a)B

4.0(1d)B

CSCvm09239

In a setup where a UCS 2304 IOM is connected to a UCS 6300 Series FI through a single link with a 40G QSFP cable, the IOMs no longer disconnect and reconnect while gathering chassis log files from UCS Central.

3.2(3d)A

4.0(1d)A and 3.2(3i)A

CSCvk36317

After upgrading Cisco UCS Manager from Release 3.1(1l) to 3.2(3b), the existing PVLAN configuration no longer fails. The upstream server in the primary VLAN is now able to reach the VM/Host in the isolated VLAN in the UCS domain.

3.2(3a)A

4.0(1d)A and 3.2(3h)A

CSCvm50159

In UCS-FI-6248UP, fans do not get detected by the switch. As a result, the switches shut down with a series of error messages:

System minor alarm on fans: One fan missing or failed
Fan module 1 xxxx-FAN removed
System shutdown in 60 seconds due to fan removal
System major alarm on fans: Multiple fans missing or failed
System shutdown in 55 seconds due to fan removal
System shutdown in 50 seconds due to fan removal
This issue is resolved.

2.2(8l)A

4.0(1d)A and 3.2(3i)A

CSCvk63025

UCS 6332-16UP port 33/34 no longer has connectivity issues with C93180YC-FX port 49/50 when using a CU1M passive cable.

3.2(3b)A

4.0(1d)A and 3.2(3i)A

CSCvm44391

The vNIC template lists duplicate vLAN entries from LAN Cloud and Appliance options.

This issue is resolved. The vNIC template now filters vLAN entries and lists only unique vLAN names.

3.2(3g)A

4.0(1d)A and 3.2(3i)A

CSCvm91294

In a UCS FI setup connected to S3260 chassis with the following conditions, the DME process crashes after upgrading the chassis firmware:

  • servers having UCS-C3K-M4 RAID storage controllers and rear boot SSDs

  • disk zoned to both the controllers, and VDs created on top loading disks and rear boot SSDs

This issue is resolved.

3.2(3g)A

4.0(1d)A and 3.2(3i)A

CSCvm68038

After the tech support logs are downloaded, samdme user sessions do not get cleared from the subordinate FI. This leads to multiple unresponsive sessions, and after the session count on the subordinate FI reaches 64 (maximum allowed), remote access to the FI is lost.

This issue has been resolved. The samdme user sessions are automatically cleared from the subordinate FI after the techsuport logs are downloaded.

3.2(2d)A

4.0(1d)A and 3.2(3i)A

CSCvm21299

Primary FI upgrade no longer becomes unresponsive when logs are continuously written to the pa_setup.log file.

3.2(3a)A

4.0(1d)A and 3.2(3i)A

CSCvm54628

On UCS 6200 Series, FI management IP address changes do not get updated in the IOM or FEX. Hence, the devices connected to the host interfaces continue to receive the old management IP address through the CDP process.

This issue is resolved. The devices connected to the host interfaces now receive the updated management IP address through the CDP process.

3.2(3b)A

4.0(1d)A and 3.2(3i)A

CSCvm95801

CSCvn01215

On UCS 6300 Series and UCS 6324, FI management IP address changes do not get updated in the IOM or FEX. Hence, the devices connected to the host interfaces continue to receive the old management IP address through the CDP process.

This issue is resolved. The devices connected to the host interfaces now receive the updated management IP address through the CDP process.

3.2(3b)A

4.0(1d)A and 3.2(3j)A

CSCvn10940

VLAN 4093 has been removed from the list of reserved VLANs and is available for configuration.

4.0(1a)A

4.0(1d)A and 4.0(2a)A

CSCvn09080

On UCS 6454, FI management IP address changes do not get updated in the IOM or FEX. Hence, the devices connected to the host interfaces continue to receive the old management IP address through the CDP process.

This issue is resolved. The devices connected to the host interfaces now receive the updated management IP address through the CDP process.

4.0(1a)A

4.0(1d)A

CSCvn25087

In scenarios with very specific write/read patterns, there could be potential data loss for 3.8 TB and 7.6 TB Micron 5100 SSD SATA drives. UECC read errors and reallocated sector counts are displayed in SMART log.

This issue is now resolved.

4.0(1c)B and 4.0(1c)C

4.0(1d)B and 4.0(1d)C

Resolved Caveats in Release 4.0(1c)

The following caveats are resolved in Release 4.0(1c):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvh04307

On Cisco HyperFlex nodes with SED drives, installing software packages on the storage controller VM failed with the following error:

There are locked drives on the system, unlock them and retry deployment.

The drives could become locked on hosts that were rebooted. The fix for this issue was integrated in Release 4.0(1a).

Additionally, there was a scenario in which the drives could become locked on hosts that were cold powered down for a prolonged period and then rebooted. The fix for this scenario was integrated in Release 4.0(1c).

3.1(3c)C

4.0(1c)C

CSCvm14726

Cisco UCS-FI-M6324 with the new SPI Flash device cannot boot with previous software releases. This is because the original SPI Flash device used on UCS-FI-M6324 is no longer being produced; hence a pin-compatible replacement part is being used going forward. However, due to the vendor and part ID changing, UCS-FI-M6324 equipped with the new part can only operate with OS versions that have support for the new part built in.

This issue is now resolved.

4.0(1a)A

4.0(1c)A

CSCvk30528

In UEFI boot mode, Cisco UCS Managed C-Series servers failed to boot to the RHEL or ESXi OS installed on an iSCSI LUN configured on an EMC storage device. Instead, the server entered into the UEFI shell prompt after every reboot.

This issue has been resolved. The server now boots to the OS correctly.

4.0(1a)C

4.0(1c)C

Resolved Caveats in Release 4.0(1b)

The following caveats are resolved in Release 4.0(1b):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvm17259

In a system with a Cisco UCS Manager-managed C-Series rack server, the firmware for the UCSC-GPU-V100-32G GPU was not seen in the Host Firmware Pack (HFP) of the Firmware Policy after configuring the service profile for the server. This issue is now resolved, and the firmware is visible in the HFP.

4.0(1a)A

4.0(1b)A

CSCvm10391

The Cisco UCS 6454 Fabric Interconnect was not sending any Call Home messages to the configured SMTP server.

This issue has now been resolved. Call Home messages are now being sent by the Cisco UCS 6454 Fabric Interconnect and received as emails at the configured SMTP server.

4.0(1a)A

4.0(1b)A

Resolved Caveats in Release 4.0(1a)

The following caveats are resolved in Release 4.0(1a):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvh04307

On Cisco HyperFlex nodes with SED drives, installing software packages on the storage controller VM failed with the following error:

There are locked drives on the system, unlock them and retry deployment.

Additionally, the drives could become locked on hosts that were rebooted.

This issue is now resolved.

3.1(3c)C

4.0(1a)C

CSCva17452

Packets are no longer dropped at the UP ports of the Cisco UCS 6332-16IUP Fabric Interconnect Series when two no-drop classes (one Ethernet and one FCoE) are configured on the system.

3.1(1e)A

4.0(1a)A

CSCve53858

After enabling/disabling breakout ports and creating/deleting port channels, FI QoS queues are no longer stuck.

3.2(2b)A

4.0(1a)A

CSCvh79589

The timer group library no longer causes the bcm_usd process to crash and reboot UCS 6332 Series Fabric Interconnects during normal operational state.

3.2(2b)A

4.0(1a)A

CSCvi16121

The server reboots unexpectedly and the service profile is re-associated when there is a configuration change for a service profile bound to an updating service profile template with a server pool assigned. This happens when the server assigned to the service profile is not part of the server pool.

This issue is now resolved. Unexpected server reboots and service profile re-association no longer happen after the configuration change.

3.2(1d)A

4.0(1a)A

Open Caveats

The open bugs for a release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains up-to-date information about bugs and vulnerabilities in this product and other Cisco hardware and software products.


Note

You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, you can register for an account.


For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.

Open Caveats for Release 4.0(2a)

The following caveats are open in Release 4.0(2a):

Defect ID

Symptom

Workaround

First Bundle Affected

CSCvo13678

UCS M5 rack servers with GPUs fail discovery during Cisco UCS Manager Release 4.0(2) rack server firmware install. This is caused by the svc_sam_bladeAG process crashing and producing a core file.

If this issue occurs, downgrade to a release earlier than Cisco UCS Manager Release 4.0(2).

4.0(2a)A

Resolved in 4.0(2d)A

CSCvh18287

Cisco C240 M5 servers are displaying error code F0776 and a fault message stating that non-existent disks are inoperable.

Not an issue, as the fault message is only displayed for non-existent disks.

4.0(1a)C

4.0(2a)C

CSCvk63036

Unable to form a SAN port-channel or trunking between a Cisco UCS Fabric Interconnect pair and a Cisco Fibre Channel switch when the Organizationally Unique ID (OUI) of the switch is one of the following:

  • 003a9c

  • 000831

  • d0a5a6

Use single F-Port links without a port-channel. Trunk mode should be OFF for UCS FI and MDS.

4.0(2a)A

Resolved in 4.0(2b)A

CSCvn38097

When a cable is pulled and plugged back in, or when other similar operations that result in link down and link up are performed, an SLES 12 SP3 host with FC-NVMe storage may crash with the following stack trace:

[  809.738358] Call Trace:
[  809.739728]  [<ffffffff81302b58>] blk_mq_run_hw_queues+0x48/0x90
[  809.741102]  [<ffffffff8130441c>] blk_mq_requeue_work+0x10c/0x120
[  809.742454]  [<ffffffff810989e4>] process_one_work+0x154/0x410
[  809.743803]  [<ffffffff810995c6>] worker_thread+0x116/0x4a0
[  809.745145]  [<ffffffff8109ead9>] kthread+0xc9/0xe0
[  809.746463]  [<ffffffff81616505>] ret_from_fork+0x55/0x80
[  809.752620] DWARF2 unwinder stuck at ret_from_fork+0x55/0x80
[  809.753954]

There is no known workaround. To resolve this issue, an NVMe core with the fix is required.

4.0(2a)B and C

CSCvn50292

UCS 6454 Fabric Interconnect reboots with IGMP hap reset in slab allocations without any triggers. This issue was observed on a Cisco UCS Manager container restart, but was never observed again with the same or different triggers.

There are no known workarounds.The Fabric Interconnect will reboot in these conditions.

4.0(2a)A

CSCvm66006

After reconfiguring and reassociating service profiles, traffic hashed to one of the hif-pc members gets dropped. This happens when DCBX has not converged properly on the impacted interface of the blade server.

Re-acknowledge the server to recover from this issue.

To avoid this issue, do not perform continuous or simultaneous association and reassociation of blade servers.

4.0(1a)A

CSCvn66725

Service Profile association fails with "Failed to create session-requested operation timed out" error message when trying to enable drive security for Self Encrypted Drives (SEDs) using remote Key Management Interoperability Protocol (KMIP) server on a UCS M4 server connected to a UCS 6454 Fabric Interconnect.

There is no known workaround.

4.0(1c)B

CSCvn57345

After restoring the Cisco UCS Manager full state backup file of a UCS device which was configured, registered, claimed and connected with Cisco Intersight, the device shows up as disconnected in Cisco Intersight.

If this issue occurs, do the following:

  1. Reconfigure the device connector and register it to the cloud.

  2. Delete the device from the cloud inventory.

  3. Claim the device again with Device ID and new claim code (Device MO ID will be new).

4.0(2a)A

CSCvn91826

In a setup with Cisco VIC 14xx adapters, server discovery may fail when the rack server IDs have exceeded the rack server ID range, which is 1 to 99.

The following error message may appear:

ID: 101
Server: sys/rack-unit-101

    FSM 1:
        Remote Result: Service Unavailable
        Remote Error Code: 1002
        Remote Error Description: command chassis associate 101 chassis-serial xxxxx 
module-serial xxxxx port-profile ucsm_internal_rackserver_portprofile module-side left 
may need to break down at 8
        Status: Discover Sw Configure Port Channel Local
        Previous Status: Discover Sw Configure Port Channel Local
        Timestamp: 2019-01-12T23:00:39.348
        Try: 2
        Flags: 0
        Progress (%): 3
        Current Task: Configuring port channel for server 101(FSM-STAGE:sam:dme:

Decommission the affected server and recommission the same server with a server ID less than 99.

4.0(2a)A

Resolved in 4.0(2b)A

CSCvk26441

When running Cisco UCS Manager Release 4.0(2a) on UCS 6454 Fabric Interconnects, LDAP user login fails if the group map rule has a role other than aaa and read-only .

There is no known workaround.

If this issue occurs, upgrade Cisco UCS Manager to Release 4.0(2b) or later releases.

4.0(2a)A

Resolved in 4.0(2b)A

CSCvk53356

When running Cisco UCS Manager Release 4.0(2a) on UCS 6454 Fabric Interconnects, an admin password cannot be recovered using the password recovery procedure.

There is no known workaround.

If this issue occurs, upgrade Cisco UCS Manager to Release 4.0(2b) or later releases.

4.0(2a)A

Resolved in 4.0(2b)A

CSCvn60002

VNICs and VHBAs experience degraded response time in bringing up physical links after power-on or link-flap. Servers configured for sanboot sometime fail to boot. This can occur on initial server bringup, on physical link-flap, or on IOM reboot.

If sanboot fails, reboot the server.

4.0(2a)A

Resolved in 4.0(2d)A

CSCvo13678

Cisco UCS Manager M5 rack servers with multiple Nvidia GPUs failed discovery during Cisco UCS Manager Release 4.0(2a) rack server firmware install. This is caused by the svc_sam_bladeAG process crashing and producing a core file.

Physically remove the GPUs from the server or downgrade to a release earlier than Cisco UCS Manager Release 4.0(2a).

4.0(2a)C

Resolved in 4.0(2d)C

CSCvo04128

Fibre Channel ports configured in E mode and supported on the UCS 6454 Fabric Interconnect can take an arbitrary amount of time to come online after boot or link-flap.

No workaround.

4.0(2a)A

Resolved in 4.0(2d)A

CSCvo22832

Cisco UCS Manager C-Series servers direct-attached to UCS 6454 Fabric Interconnects using VIC 14xx Series adapters cannot capture CDP/LLDP packets. This is caused by the Fabric Interconnect incorrectly creating the platform header,so that it does not populate the physical interface for transmitting the packets.

No workaround.

4.0(2a)A

Resolved in 4.0(2d)A

Open Caveats for Release 4.0(1a)

The following caveats are open in Release 4.0(1a):

Defect ID

Symptom

Workaround

First Bundle Affected

CSCvm23975

In a system with a Cisco UCS Manager-managed C-Series rack server and any V-Series GPU adapter, the GPU mode cannot be changed through the Graphics Policy in Cisco UCS Manager.

This happens when the C-Series rack server has one or more of the following GPU adapters:

  • UCSC-GPU-V100-16G

  • UCSC-GPU-V100-32G

If this occurs, configure the graphics mode by using the native NVIDIA 'nvidia-smi' utility tool on any supported OS.

4.0(1a)A

Resolved in 4.0(2a)A

CSCvm14726

Cisco UCS-FI-M6324 with the new SPI Flash device cannot boot with previous software releases. This is because the original SPI Flash device used on UCS-FI-M6324 is no longer being produced; hence a pin-compatible replacement part is being used going forward. However, due to the vendor and part ID changing, UCS-FI-M6324 equipped with the new part can only operate with OS versions that have support for the new part built in.

When using Cisco UCS-FI-M6324 with the new SPI Flash device, use only those releases that came out after the hardware change on UCS-FI-6324M was introduced.

4.0(1a)A

Resolved in 4.0(1c)A

CSCvk30528

In UEFI boot mode, Cisco UCS Managed C-Series servers fail to boot to the RHEL or ESXi OS installed on an iSCSI LUN configured on an EMC storage device. Instead, the server enters into the UEFI shell prompt after every reboot.

The server boots to the OS as expected if the LUN is from any other storage device than EMC.

After the server enters into UEFI shell prompt, exiting the shell prompt boots the server to the OS.

4.0(1a)C

Resolved in 4.0(1c)C

CSCvm17259

In a system with a Cisco UCS Manager-managed C-Series rack server, the firmware for the UCSC-GPU-V100-32G GPU is not seen in the Host Firmware Pack (HFP) of the Firmware Policy after configuring the service profile for the server.

If this issue occurs, do the following:

  • Move the server to Standalone mode from Cisco UCS Manager-managed mode.

  • Update the server through the Host Update Utility (HUU) iso.

  • After the update is complete, bring the server back up in Cisco UCS Manager-managed mode.

4.0(1a)A

Resolved in 4.0(1b)A

CSCvm10391

The Cisco UCS 6454 Fabric Interconnect does not send any Call Home messages to the configured SMTP server.

No known workaround.

4.0(1a)A

Resolved in 4.0(1b)A

CSCvm03356

Cisco UCS B-Series M3 servers and C-Series M3 servers are based on Intel® processors that are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).

  • CVE-2018-3615 (affecting SGX), also known as Foreshadow, is not known to affect any existing Cisco UCS servers because Cisco UCS M5 and earlier generation servers, and HyperFlex M5 and earlier generation servers do not use Intel® SGX technology.

  • CVE-2018-3620 (affecting OS/System Management Mode) and CVE-2018-3646 (affecting Virtual Machine Monitors) are referred to as L1 Terminal Fault attacks by Intel®. These vulnerabilities are mitigated by applying the updated processor microcode from Intel included in the server firmware bundle, and the relevant Operating System and Hypervisor patches from the appropriate vendors.

The fix for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM) requires applying the updated processor microcode from Intel® as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

For more information, please see the Cisco Security Advisory available here:

CPU Side-Channel Information Disclosure Vulnerabilities: August 2018

4.0(1a)B, 4.0(1a)C

3.2(1d)B, 3.2(1d)C

3.1(1e)B, 3.1(1e)C

2.2(1b)B, 2.2(1b)C

CSCvm03356 is resolved in 4.0(1a)B, 4.0(1a)C

CSCvm03351

Cisco UCS B-Series M4 servers, C-Series M4 servers, S3260 M4 storage servers, and HyperFlex M4 servers are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).

  • CVE-2018-3615 (affecting SGX), also known as Foreshadow, is not known to affect any existing Cisco UCS servers because Cisco UCS M5 and earlier generation servers, and HyperFlex M5 and earlier generation servers do not use Intel® SGX technology.

  • CVE-2018-3620 (affecting OS/System Management Mode) and CVE-2018-3646 (affecting Virtual Machine Monitors) are referred to as L1 Terminal Fault attacks by Intel®. These vulnerabilities are mitigated by applying the updated processor microcode from Intel included in the server firmware bundle, and the relevant Operating System and Hypervisor patches from the appropriate vendors.

The fix for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM) requires applying the updated processor microcode from Intel® as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

For more information, please see the Cisco Security Advisory available here:

CPU Side-Channel Information Disclosure Vulnerabilities: August 2018

4.0(1a)B, 4.0(1a)C

3.2(1d)B, 3.2(1d)C

3.1(1e)B, 3.1(1e)C

2.2(1b)B, 2.2(1b)C

CSCvm03351 is resolved in 4.0(1a)B, 4.0(1a)C

CSCvm03339

Cisco UCS B-Series M5 servers, C-Series M5 servers, and HyperFlex M5 servers are based on Intel® processors that are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).

  • CVE-2018-3615 (affecting SGX), also known as Foreshadow, is not known to affect any existing Cisco UCS servers because Cisco UCS M5 and earlier generation servers, and HyperFlex M5 and earlier generation servers do not use Intel® SGX technology.

  • CVE-2018-3620 (affecting OS/System Management Mode) and CVE-2018-3646 (affecting Virtual Machine Monitors) are referred to as L1 Terminal Fault attacks by Intel®. These vulnerabilities are mitigated by applying the updated processor microcode from Intel included in the server firmware bundle, and the relevant Operating System and Hypervisor patches from the appropriate vendors.

The fix for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM) requires applying the updated processor microcode from Intel® as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

For more information, please see the Cisco Security Advisory available here:

CPU Side-Channel Information Disclosure Vulnerabilities: August 2018

4.0(1a)B, 4.0(1a)C

3.2(1d)B, 3.2(1d)C

3.1(1e)B, 3.1(1e)C

2.2(1b)B, 2.2(1b)C

CSCvm03339 is resolved in 4.0(1a)B, 4.0(1a)C

CSCvh06851

When an adaptor that is sending both Drop and No-Drop QoS class traffic encounters conjestion, the IOM sends the incomplete value of the user-configured PFC priority map to the adaptor. Because of this, all QoS classes are treated as No-Drop, and the adaptor slows down both Drop and No-Drop traffic to the IOM.

There is no known workaround.

3.2 (2b)A

CSCvi66859

In a system configured with VLAN groups and mapped with FI uplink interfaces, an unexpected outage is experienced when a VLAN is removed from a vNIC template or from a VLAN group.

When a VLAN group is used by both uplinks and vNICs, do the following before a VLAN is removed from the VLAN group:

  1. Add the VLAN to the uplink explicitly.

  2. Remove the VLAN from the VLAN group.

  3. Wait until the VLAN is removed from all vNICs and then remove the VLAN from the uplink.

3.2(2b)A

Resolved in 4.0(2a)A

CSCvj17303

A httpd core is observed during upgrade and downgrade of Cisco UCS Manager between Releases 3.2(3a) and 4.0(1a).

There is no known workaround. httpd restarts automatically.

4.0(1a)A

CSCux48594

When upgrading Cisco UCS Manager from Release 2.5(2a) to Release 3.1 and later releases, a DME core occurs.

Do not take any action when the DME core occurs. The upgrade process will continue and complete successfully.

3.1(1e)A

CSCvh69831

In a setup with Cisco UCS B260 or B460 M4 servers with eight vNICs, after installing ESXi 6.0/6.5, the second half of the vNICs on host port 2 are ordered first in ESXi. Thus, the VMNICs are out of order during initial install.

Manually configure the NIC placement policy so that the second half of the vNICs are ordered first.

OR

Manually assign the second half of the vNICs to host port 1.

3.1(3b)B

CSCvj98360

BMC does not detect the DIMM and blade server discovery is stuck with the following message:

Mismatched DIMM configuration

Power down the host and reboot the BMC to recover from this state.

4.0(1a)B

Resolved in 4.0(1d)B

CSCvn49417

While setting up a new UCS 6454 Fabric Interconnect, when you boot to the initial configuration, the network uplinks come online before the Fabric Interconnect is configured.

Further, CDP neighbor information is displayed and MAC addresses of UCS 6454 from earlier deployments are being learnt at this stage.

To avoid this scenario, ensure that your network uplinks are down until initial configuration is complete.

If this issue occurs, shut down upstream switch connections.

4.0(1a)A

CSCvn22595

When using UCS B200 M5 servers with VIC 1340 and VIC 1380 adapters on a system running Cisco UCS Manager 3.2(3d) firmware and Red Hat Linux as the OS, vNICs that share the same bus ID are assigned to the same Input-Output Memory Management Unit (IOMMU) group, despite having different function numbers.

No workaround.

3.2(3d)B

Resolved in 4.0(2d)B

CSCvn81327

The Cisco UCS-IOM-2304 IO Module crashes and produces a kernel core dump that points to pick_next_task_rt. If this condition is encountered, traffic forwarding ceases until a watchdog timer triggers a reboot. However, prior to the reboot, ports still appear as up even though the traffic to the affected module is lost.

No workaround.

3.2(2d)C

Resolved in 4.0(2d)C

CSCvm66499

The launch KVM feature is not functional after Fabric Interconnect cluster failover when in-band KVM VLAN is configured and the server management is connected through FEX.

Perform a re-acknowledge to the server.

4.0(1a)C

Resolved in 4.0(2d)C

CSCvh18287

Cisco UCS C240 M5 servers display error code F0776 and a fault message stating that non-existent disks are inoperable.

N/A. Message is for drives that do not exist.

4.0(1a)A

3.2(1d)A

Resolved in 4.0(2d)A

CSCvm66118

When a PSU with serial number LITxxxxxx is inserted or reseated in a chassis connected to a UCS 6300 Series Fabric Interconnect, it may cause the Fabric Interconnect to report PSU fan faults. However, the PSU LED remains green and the PSU and the fans continue to work.

Do not reseat the PSU if it is not necessary.

If reseating or moving this PSU is required, reboot the Fabric Interconnect after the PSU is inserted.

3.2(2f)B

Resolved in 4.0(2d)A

CSCvm89871

Cisco UCS Manager-managed C-Series rack servers on UCS 6332 or 6332-16UP Fabric Interconnects fail discovery when the following sequence of actions occurs:

  1. Disable the port that is part of the uplink Ethernet port-channel.

  2. 2. Delete the interface from the port-channel.

  3. Re-configure the port type as Server .

  4. Connect the server to the re-configured port.

  1. With the Fabric Interconnect and rack server powered on, connect the cables between them.

  2. Configure the FI port type as Uplink.

  3. Configure the port type as Server.

3.1(2c)A

Resolved in 4.0(2d)A

Behavior Changes and Known Limitations

Algorithm Support in OpenSSH to Log into Servers through the SSH

Starting with Cisco UCS Manager Release 4.0(2a), certain insecure ciphers are blocked by UCS Fabric Interconnects. To log into servers through the SSH protocol, you must use a version of OpenSSH that supports at least one algorithm in the following categories:

  • Key exchange algorithms

    • diffie-hellman-group-exchange-sha256

    • diffie-hellman-group16-sha512

    • diffie-hellman-group18-sha512

  • Encryption algorithms

    • aes128-ctr

    • aes192-ctr

    • aes256-ctr

  • MAC algorithms

    • hmac-sha2-256

    • hmac-sha2-512

Priority Flow Control and Link-Level Flow Control on UCS 6454 Fabric Interconnects

When an interface on a UCS 6454 Fabric Interconnect has Priority Flow Control (PFC) admin configured as auto and Link-Level Flow Control (LLFC) admin configured as on, the PFC operation mode will be off and the LLFC operation mode will be on.

On UCS 6300 Series and earlier Fabric Interconnects, the same configuration will result in the PFC operation mode being on and the LLFC operation mode being off.

UCS M5 BIOS Tokens for Fast Boot

Cisco UCS Manager Release 4.0(2) introduces the following BIOS tokens to improve boot time for UCS M5 servers:

  • Adaptive Memory Training Control

  • OptionROM Launch Optimization Control

  • BIOS Tech Message Level Control

The default value for all three tokens is Enabled.

When the server bundle is upgraded to Cisco UCS Manager Release 4.0(2), but the infrastructure bundle is not upgraded to Release 4.0(2), the servers will use these tokens with their default value, which is Enabled. In this scenario, these tokens cannot be managed through Cisco UCS Manager.

To obtain policy level control for these tokens, while continuing with an older Infrastructure bundle, upgrade the Cisco UCS Manager catalog to Release 4.0(2).

Board Controller Activation for UCS C240 M5 Servers with LITE-ON 1050W PSU May Fail During Downgrade from Cisco UCS Manager Release 4.0(2)

CSCvm08504—Board controller activation for UCS C240 M5 servers with LITE-ON 1050W PSU may fail during the discovery process when it is downgraded from Cisco UCS Manager Release 4.0(2). The following error message is displayed:

Error: PSU2 update failed

If this error occurs, retry downgrade.

To avoid this error, do not downgrade systems equipped with LITE-ON 1050W PSUs.

Physical Displays for Servers Introduced in Cisco UCS Manager Release 3.2(3) and Later Releases Appear Incorrectly in the Java KVM Console

CSCvk24995—In the Java KVM console, the physical displays for Cisco UCS Manager-managed UCS servers introduced in Cisco UCS Manager Release 3.2(3) and later releases appear incorrectly. For example, the C125 M5 Server appears incorrectly as C240-M4L.

In the HTML KVM console, the physical displays appear correctly for all Cisco UCS Manager-managed UCS servers.

System Restore with Unsupported Features

CSCvk21286—In Cisco UCS Manager Release 4.0(1), if a full state backup is collected on a UCS 6200 Series Fabric Interconnect with the following unsupported features, then full state restore cannot be used to restore this file on a UCS 6454 Fabric Interconnect:

  • Chassis Discovery Policy and Chassis Connectivity Policy are in non port channel mode

  • Switching mode is either Ethernet or FC

  • Virtual Machine Management is enabled - VMware, Linux KVM, or Microsoft Hypervisor

Port Auto-Discovery Policy with 25G Cables and UCS 6454 Fabric Interconnects

CSCvk00796—Port Auto-Discovery policy does not work when a rack server with UCS VIC 1455 is connected to a UCS 6454 Fabric Interconnect through a 25G cable. In such scenarios, manually configure the server port.

Single Link Port Channel for FC/FCoE between VIC 1455 or VIC 1457 Adapters and UCS 6300 Fabric Interconnects

Cisco UCS Manager Release 4.0(1) supports only single link port channel for FC/FCoE between VIC 1455 or 1457 adapters that are on direct-connect rack-servers, and UCS 6300 Series Fabric Interconnects.


Note

Do not add a second port channel link between VIC 1455 or 1457 adapters that are on direct-connect rack-servers, and UCS 6300 Series Fabric Interconnects.


Exceeding Maximum CQ Value Results in Configuration Failure

Modifying the VMMQ adapter policy through the VMQ connection policy results in exceeding the maximum Completion Queue (CQ) value. Each VIC 1400 Series adapter supports a maximum of 1984 user-configurable hardware CQ resources. If this number is exceeded, the Out of CQ Resources error appears in the Cisco UCS Manager GUI, and vNIC creation fails with a configuration failure at service profile association.

FC Uplink Port at 8 Gbps Must Use IDLE as Fill Pattern

CSCvj31676—For Cisco UCS 6454 fabric interconnect, if the FC uplink speed is 8 Gbps, set the fill pattern as IDLE on the uplink switch. If the fill pattern is not set as IDLE, FC uplinks operating at 8 Gbps might go to an errDisabled state, lose SYNC intermittently, or notice errors or bad packets.

FI Port Does Not Auto-Detect Change in Port Speed

CSCvi45111—On a UCS rack-mount server with a UCS 14xx VIC ASIC, when you replace a 25G cable with a 10G cable, the corresponding FI port goes down and stays in a suspended state. Ports do not auto-detect the change in port speed from 25G to 10G. To recover from this state, decommission and then recommission the rack-mount server.

C125 M5 Server Boot Mode

CSCvj41626—C125 M5 Server supports only UEFI boot mode.

Cisco VIC 1455 and 1457 Connectivity

The FEX to FI uplink should be configured in port channel.

Chassis Discovery Policy and Chassis Connection Policy

Chassis Discovery Policy and Chassis Connection Policy are not supported for new generation SIOC for M5 servers. Cisco UCS Manager shows an error if you try to configure a chassis discovery policy or chassis connection policy.