Cisco UCS Manager

Cisco UCS™ Manager, Release 4.1 provides unified, embedded management of all software and hardware components of the Cisco Unified Computing System™ (Cisco UCS) across multiple chassis, Cisco UCS servers, and thousands of virtual machines. Cisco UCS Manager manages Cisco UCS as a single entity through an intuitive GUI, a command-line interface (CLI), or an XML API for comprehensive access to all Cisco UCS Manager functions. For more information on Cisco UCS Manager, see Cisco UCS Manager on Cisco.com.

This document contains information on new features, resolved caveats, open caveats, and workarounds for Cisco UCS Manager, Release 4.1. This document also includes the following:

  • Current information that became available after the technical documentation was published

  • Related firmware and BIOSes on blade and rack servers and other Cisco Unified Computing System (UCS) components associated with the release

Upgrading directly to Cisco UCS Manager 4.1(x) is supported from Release 2.2(8), Release 3.1(3), and Release 3.2(3) and later releases. For UCS Mini, upgrading directly to Cisco UCS Manager Release 4.1(x) is supported from Release 3.1(3), and Release 3.2(3) and later releases. See Cisco UCS Manager Firmware Management Guide, Release 4.1 for details.

Revision History

Release

Date

Description

4.1(1d)

July 10, 2020

Created release notes for Cisco UCS Manager Release 4.1(1d).

4.1(1c)

April 20, 2020

Created release notes for Cisco UCS Manager Release 4.1(1c).

May 27, 2020

Added CSCvu14656 to the list of Open Caveats.

June 12, 2020

Added CSCvu11155 to the list of Open Caveats.

4.1(1b) March 12, 2020

Created release notes for Cisco UCS Manager Release 4.1(1b).

4.1(1a)

February 20, 2020

Created release notes for Cisco UCS Manager Release 4.1(1a).

March 04, 2020

Added CSCvt23481 to the list of Open Caveats.

July 07, 2020

Added CSCvs73313 to the list of Resolved Caveats.

Top Reasons to Move to Cisco UCS Manager Release 4.1

Here are the top reasons to move to Cisco UCS Manager Release 4.1:

  • Support for UCS 64108 Fabric Interconnects.

  • Improved memory RAS features on M5 servers.

  • RDMA Over Converged Ethernet (RoCE) Version 2 Support for UCS VIC 1400 Series Adapters.


    Note

    Windows RDMA support is being enabled as a Tech Preview feature and is disabled by default.


  • Support for NVMe over Fabrics (NVMeoF) using RDMA for Converged Ethernet version 2 (RoCEv2) on Redhat Enterprise Linux 7.6 and 7.7 with Linux Z-Kernel 3.10.0-957.27.2, for Cisco UCS 14xx Series adapters.

  • Support for NVMe over Fibre Channel (FC-NVMe) on SLES 12 SP4, SLES 12 SP5, SLES 15, SLES 15 SP1 and RHEL 7.6.

  • Support for Intel® Virtual RAID on CPU (VRoC), which allows you to create and manage RAID volumes within the BIOS of VMD-enabled NVMe SSD drives.

  • Support for new peripherals and optics.

New Features in Release 4.1

Cisco UCS Manager, Release 4.1 is a unified software release for all supported UCS hardware platforms.

New Hardware Features

  • New Hardware in Release 4.1(1d) — None

  • New Hardware in Release 4.1(1c) — None

  • New Hardware in Release 4.1(1b) — None

  • New Hardware in Release 4.1(1a)

New Software Features

New Hardware in Release 4.1(1a)

High-Density Fourth Generation Fabric Interconnect

The Cisco UCS 64108 Fabric Interconnect is a core part of the Cisco Unified Computing System, providing both network connectivity and management capabilities for the system. The Cisco UCS 64108 offers line-rate, low-latency, lossless 10/25/40/100 Gigabit Ethernet, Fibre Channel over Ethernet (FCoE), and Fibre Channel functions.

The high-density Cisco UCS 64108 108-Port Fabric Interconnect is a two-rack-unit (2RU) 10/25/40/100 Gigabit Ethernet, FCoE and Fibre Channel switch. The switch has 96 10/25-Gbps fixed Ethernet (16 unified ports) and 12 40/100-Gbps Ethernet uplink ports. The 16 unified ports can support 10/25-Gbps Ethernet or 8/16/32G Fibre Channel ports. All Ethernet ports are capable of supporting FCoE.

Fabric Interconnect Migration

You can migrate from a UCS 6200 Series Fabric Interconnect to the following UCS 6400 Series Fabric Interconnects:

  • UCS 64108 Fabric Interconnect

  • UCS 6454 Fabric Interconnect

However, you cannot migrate back to a UCS 6200 Series Fabric Interconnect after you have migrated to a UCS 6400 Series Fabric Interconnect.

You can migrate from a UCS 6454 Fabric Interconnect to a UCS 64108 Fabric Interconnect. However, you cannot migrate back to a UCS 6454 Fabric Interconnect after you have migrated to a UCS 64108 Fabric Interconnect.

Peripherals

  • Support for the UCSC-PCIE-IQ10GF 4 Port 10Gb Network Interface Card on UCS C125 M5 servers

  • Support for the Intel XXV710-DA2OCP1 2 Port x 10/25Gb OCP 2.0 Network Interface Card on UCS C125 M5 servers

  • Support for the Intel X710-DA2 2 x 10GbE SFP+ PCIe Network Interface Card on UCS C125 M5 servers

  • Support for the Mellanox ConnectX-5 MCXM516A-CDAT 2 x 100GbE QSFP PCI Network Interface Card on C220 M5, C240 M5, C480 M5, C480 M5 ML servers

  • Support for the Mellanox ConnectX-5 MCX515A-CCAT 1 x 100GbE QSFP PCI Network Interface Card on C220 M5, C240 M5, C480 M5 servers

  • Support for the Mellanox ConnectX-5 MCX512A-ACAT 2 x 25Gb/10GbE SFP PCI Network Interface Card on C220 M5, C240 M5, C480 M5 servers

  • Support for the following NVME drives on UCS C125 M5 servers:

    NVMe Drive

    PID for UCS C125 M5

    Intel P4510 1TB (SSDPE2KX010T8K)

    UCSC-NVME2H-I1000

    Intel P4510 4TB (SSDPE2KX040T8K)

    UCSC-NVME2H-I4000

    Intel P4610 1.6TB (SSDPE2KE016T8K)

    UCSC-NVME2H-I1600

    Intel P4610 3.2TB (SSDPE2KE032T8K)

    UCSC-NVME2H-I3200

  • Support for NVIDIA T4 16GB GPU cards (UCSC-GPU-T4-16) on UCS C125 M5 servers and in the IO Expander on UCS S3260 M5 servers

  • Support for QLogic QLE 2692 - 2 x 16Gb Gen 6 Fibre Channel HBA on UCS C125 M5 servers

New Software Features in Release 4.1(1a)

Software Enablement for New Hardware (Listed in the New hardware section)

Cisco UCS 64108 Fabric Interconnect

This release introduces Cisco UCS 64108 Fabric Interconnects that support 96 10/25-Gbps ports (16 unified ports) and 12 40/100-Gbps uplink ports. The 16 unified ports can support 10/25-Gbps Ethernet or 8/16/32G Fibre Channel ports. The Cisco UCS Manager Getting Started Guide, Release 4.1 provides details about the specific ports.

Cisco UCS Manager Release 4.0(1) and 4.0(2) introduced support for various software features on Cisco UCS 6454 Fabric Interconnects. Cisco UCS Manager Release 4.1 extends support for these features on Cisco UCS 64108 Fabric Interconnects. These software features are:

  • Support for 10/25 Gigabit ports in the fabric with 40/100 Gigabit uplink ports

  • Support for VIC 1400 Series adapters

  • 128 additional VLANs reserved for internal usage

  • Forward Error Correction (FEC) configurations for ports

Legacy Features Not Supported

The following features are not supported on Cisco UCS 64108 Fabric Interconnects:

  • Chassis Discovery Policy in Non-Port Channel Mode

  • Chassis Connectivity Policy in Non-Port Channel Mode

  • Service profiles with dynamic vNICs

  • Multicast Optimize for QoS

  • Netflow

  • Port profiles and distributed virtual switches

  • VMFEX

RDMA Over Converged Ethernet Version 2 Support for UCS VIC Adapters

RDMA over Converged Ethernet (RoCE) v2 for Microsoft SMB Direct

RDMA over Converged Ethernet version 2 (RoCEv2) is an internet layer protocol, which means that RoCEv2 packets can be routed. RoCEv2 allows direct memory access over the network by encapsulating an Infiniband (IB) transport packet over Ethernet.

This release introduces support for RoCEv2 with Cisco UCS VIC 1400 Series adapters. It also adds support for Microsoft SMB Direct with RoCEv2 on Microsoft Windows 2019. Refer UCS Hardware and Software Compatibility for more details about support of Microsoft SMB Direct with RoCEv2 on Microsoft Windows 2019. RoCEv2 support is being enabled as a Tech Preview feature. Refer Cisco UCS Manager Configuration Guide for RDMA over Converged Ethernet (RoCE) v2 for more details on RoCEv2.


Note

RoCEv1 is not supported on Cisco UCS VIC 1400 Series adapters. RoCEv2 is not supported on UCS VIC 12xx Series and 13xx Series adapters.


NVMe over Fabric via Ethernet (NVMeoF) with Support for RDMA

NVMe over Fabric via Ethernet (NVMeoF) support on Redhat Enterprise Linux 7.6 z-kernels with version 3.10.0-957.27.2.el7 or later is added for Cisco UCS 14xx Series adapters. RDMA also supports NVMeoF.

Support for Fibre Channel and NVMe over Fibre Channel (FC-NVME)

Support for NVMe over Fibre Channel (FC-NVMe) on SLES 12 SP4, SLES 12 SP5, SLES 15, SLES 15 SP1 and RHEL 7.6. Unified driver support for Fibre Channel and NVMe over Fibre Channel (FC-NVME) on SLES 12 SP4, SLES 15, and RHEL 7.6. This support is available on UCS 6300 Series Fabric Interconnects and UCS 6454 Fabric Interconnects with Cisco UCS 14xx Series adapters. NVMe over Fibre Channel now supports up to 16 interfaces.

Memory RAS Enhancements

This release introduces the following Memory RAS enhancements:

Intel Post Package Repair (PPR) uses additional spare capacity within the DDR4 DRAM to remap and replace faulty cell areas detected during system boot time. Remapping is permanent and persists through power-down and reboot.

Partial DIMM Mirroring enables better Virtualization Host Resiliance by creating a mirror copy of specific regions of memory cells, instead of keeping the complete half of the mirror copy. Memory mirrors, using up to 50% of capacity, can be specified in gigabytes or percentage of total capacity, across up to 4 mirrors, and can be configured across multiple IMCs or sockets. Partial mirroring cannot be used in connection with standard mirroring or ADDDC sparing.

Address Range allows the memory presented to the user to be limited to a specified subset of actual memory.

Intel® VMD and Intel® Virtual RAID on CPU (VRoC)

Intel® Volume Management Device (VMD) provides storage management options for NVMe drives, including surprise hot-plug and LED status management. Virtual RAID on CPU (VRoC) enables creating and managing RAID volumes within the BIOS of VMD-enabled NVMe SSD drives by using hardware logic inside the Intel Xeon processor. The Cisco implementation of VRoC, supported only on Intel NVMe drives, supports RAID 0 (striping), RAID 1 (mirroring), RAID 5 (striping with parity) and RAID 10 (combined mirroring and striping).

Feature Enhancements

  • A per-chassis fan control policy for B-Series servers allows a single policy to control the speed of all server fans in an enclosure.

  • Support for configuring vMedia mount as writable when both the following conditions are met:

    • Device Type is HDD

    • Protocol is NFS or CIFS

  • Intel® Optane Data Center persistent memory module support is extended to C480 M5ML servers.

Deprecated Hardware and Software in Cisco UCS Manager Release 4.1

Beginning with Cisco UCS Manager Release 4.1(1), the KVM Console GUI is available only as an HTML5-based application. It is no longer available as a Java-based application.

Beginning with Cisco UCS Manager Release 4.1(1), VMware VM-FEX and Hyper-V VM-FEX are no longer supported. VM-FEX is supported only with Red Hat Enterprise Linux (RHEL) on KVM.

Beginning with Cisco UCS Manager Release 4.1(1), FDMI on Unified Linux fNIC drivers is no longer supported.

Deprecation in Future Releases

The following adapters are approaching end-of-life (EOL) and will not be supported in future releases of Cisco UCS Manager:

  • Emulex LPe12002 8G FC adapter (N2XX-AEPCI05)

  • Emulex LPe16002-M6 16G FC rack HBA (UCSC-PCIE-E16002)

  • AMD Firepro 7150 x2 PCIe x16 Graphics Card (UCSC-GPU-7150X2)

  • Cisco UCS Fusion ioDrive2 Adapter

Cisco UCS Manager and Cisco UCS C-Series Release Compatibility Matrix for C-Series Rack-Mount Servers

Cisco UCS C-Series Rack-Mount Servers are managed by built-in standalone software— Cisco Integrated Management Controller(Cisco IMC). However, when a C-Series Rack-Mount Server is integrated with Cisco UCS Manager, the Cisco IMC does not manage the server anymore.

Each Cisco UCS Manager release incorporates its corresponding C-Series Standalone release and some previous C-Series standalone releases. For example, Cisco UCS Manager Release 4.1(1) is integrated with C-Series Standalone Release 4.1(1) for the M5 servers, Release 4.0(2) for all the M4 servers, and Release 3.0(4) for all M3 servers. Hence, it supports all the M5, M4 and M3 servers supported by C-Series Standalone releases.

The following table lists the Cisco UCS Manager and C-Series software standalone releases for C-Series Rack-Mount Servers:

Table 1. Cisco UCS Manager and C-Series Software releases for C-Series Servers

Cisco UCS Manager Release

C-Series Standalone Releases Included

C-Series Servers Supported by the C-Series Standalone Releases

4.1(1)

4.1(1)

C220 M5, C240 M5, C480 M5, S3260 M5, C480 M5 ML only

4.0(2)

C220 M4, C240 M4, C460 M4, S3260 M4, C125 M5 only

3.0(4)

All M3

4.0(4)

4.0(4)

C220 M5, C240 M5, C480 M5, S3260 M5, C480 M5 ML only

4.0(2)

C220 M4, C240 M4, C460 M4, S3260 M4, C125 M5 only

3.0(4)

All M3

4.0(2)

4.0(2)

C220 M4, C240 M4, C460 M4, C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5, C480 M5 ML only

3.0(4)

All M3

4.0(1)

4.0(1)

C220 M4, C240 M4, C460 M4, C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5 only

3.0(4)

All M3

3.2(3)

3.1(3)

C220 M5, C240 M5, C480 M5, S3260 M5 only

3.0(4)

All M3/M4

3.2(2)

3.1(2)

C220 M5, C240 M5, C480 M5 only

3.0(3)

All M3/M4

3.2(1)

3.1(1)

C220 M5, C240 M5 only

3.0(3)

All M3/M4

3.1(3)

3.0(3)

All M3/M4

3.1(2)

2.0(13)

All M3/M4

3.1(1)

2.0(10)

C220 M4, C240 M4 only

2.0(9)

All other M3/M4

2.2(8)

2.0(12)

C460 M4 only

2.0(10)

C220 M4, C240 M4 only

1.5(9)

C420-M3, C260-M2, C460-M2 only

2.0(9)

For all other M3/M4

System Requirements

Cisco UCS Central Integration

Cisco UCS Manager Release 4.1 can only be registered with Cisco UCS Central, Release 2.0(1k) or higher.


Note

For the complete list of compatible versions of Cisco UCS Central and Cisco UCS Manager, refer Release Notes for Cisco UCS Central.


Supported Operating Systems

For detailed information about supported operating system, see the interactive UCS Hardware and Software Compatibility matrix.

Supported Web Browsers

Cisco UCS Manager GUI

Web Browsers

HTML5

Microsoft Internet Explorer 11 or higher

Mozilla Firefox 45 or higher

Google Chrome 45 or higher

Apple Safari version 9 or higher

Opera version 35 or higher

Network Requirements

For using the device connector feature, you must configure HTTPS proxy settings. The Cisco UCS Manager Administration Management Guide, Release 4.1 provides detailed information about configuring the device connector.

Cross-Version Firmware Support

The Cisco UCS Manager A bundle software (Cisco UCS Manager, Cisco NX-OS, IOM and FEX firmware) can be mixed with previous B or C bundle releases on the servers (host firmware [FW], BIOS, Cisco IMC, adapter FW and drivers).

The following table lists the mixed A, B, and C bundle versions that are supported on Cisco UCS 6200, 6300, and 6400 Series Fabric Interconnects:

Table 2. Mixed Cisco UCS Releases Supported on Cisco UCS 6200, 6300, 6400 Series Fabric Interconnects

Infrastructure Versions (A Bundles)

Host FW Versions (B or C Bundles)

2.2(8)

3.1(3)

3.2(3)

4.0(1)

4.0(2)

4.0(4)

4.1(1)

2.2(8)

6200

6200

6200

6200

6200

6200

6200

3.1(3)

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

3.2(3)

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

4.0(1)

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

4.0(2)

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

4.0(4)

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

4.1(1)

6200,6332, 6332-16UP, 6454, 64108

The following table lists the mixed A, B, and C bundle versions that are supported on Cisco UCS Mini fabric interconnects:

Table 3. Mixed Cisco UCS Releases Supported on Cisco UCS Mini Fabric Interconnects

Infrastructure Versions (A Bundles)

Host FW Versions (B or C Bundles)

3.1(3)

3.2(3)

4.0(1)

4.0(2)

4.0(4)

4.1(1)

3.1(3)

6324

6324

6324

6324

6324

6324

3.2(3)

6324

6324

6324

6324

6324

4.0(1)

6324

6324

6324

6324

4.0(2)

6324

6324

6324

6324

4.0(4)

6324

6324

6324

6324

4.1(1)

6324

The following table lists the mixed B, C bundles that are supported on all platforms with the 4.1(x)A bundle:

Table 4. Mixed B, C Bundles Supported on All Platforms with the 4.1(x)A Bundle

Infrastructure Versions (A Bundles)

Host FW Versions (B, C Bundles)

4.1(1)

6200

6300

6324

6400

ucs-k9-bundle-infra. 4.1.x.xxx.A.bin ucs-6300-k9-bundle-infra. 4.1.x.xxx.A.bin ucs-mini-k9-bundle-infra. 4.1.x.xxx.A.bin

ucs-6400-k9-bundle -infra.4.1.x.xxx.A.bin

2.2(8)

(B, C Bundles)

Yes

3.1(3)

(B, C Bundles)

Yes

Yes

Yes

3.2(3)

(B, C Bundles)

Yes

Yes

Yes

4.0(1), 4.0(2), 4.0(4)

(B, C Bundles)

Yes

Yes

Yes

Yes

4.1(1)

Yes

Yes

Yes

Yes


Important

If you implement cross-version firmware, you must ensure that the configurations for the Cisco UCS domain are supported by the firmware version on the server endpoints.


Internal Dependencies

The following sections provide information on the interdependencies between Cisco UCS hardware and versions of Cisco UCS Manager.

  • Version dependencies for Server FRU items such as DIMMs depend on the server type.

  • Chassis items such as fans and power supplies work with all versions of Cisco UCS Manager.

6200 Series, 6332 Series, and 6400 Series Fabric Interconnects and Components

Blade Servers


Note

In a mixed firmware configuration, we recommend that the minimum server bundle corresponds to the Minimum Software Version. The infrastructure must be at or above the Minimum Software Version.


Table 5. Minimum Host Firmware Versions for Blade Servers

Servers

Minimum Software Version

UCS 6200 Series FI

Minimum Software Version

UCS 6332, 6332-16UP FI

Minimum Software Version

UCS 6332, 6332-16UP FI

Minimum Software Version

UCS 6454 FI

Minimum Software Version

UCS 64108 FI

Recommended Software Version

UCS 6200 Series FI

UCS 6332, 6332-16UP FI

UCS 6400 Series FI

UCS-IOM- 2204

UCS-IOM- 2208

UCS-IOM- 2204

UCS-IOM- 2208

UCS-IOM- 2304

UCS-IOM- 2304V2

UCS-IOM- 2204

UCS-IOM- 2208

UCS-IOM- 2408*

UCS-IOM- 2204

UCS-IOM- 2208

UCS-IOM- 2408*

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2408*

* UCS-IOM-2408 supported on M4 and M5 only with UCS 6400 Series FI

B22 M3 E5-2400

B22 M3 E5-2400 v2

Note:

M3 servers do not support the 6454 FI and 2408 IOM combination. However, they do support the 6454 FI and 2208 IOM, and 6454 FI and 2204 IOM combinations.

2.2(8a)

2.2(8a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4i)

4.0(1a)

4.1(1a)

4.1(1d)

B200 M3 E5-2600

B200 M3 E5-2600 v2

Note:

M3 servers do not support the 6454 FI and 2408 IOM combination. However, they do support the 6454 FI and 2208 IOM, and 6454 FI and 2204 IOM combinations.

2.2(8a)

2.2(8a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4i)

4.0(1a)

4.1(1a)

4.1(1d)

B200 M4

2.2(8a)

3.1(3a)

3.1(3a)

4.0(4i)

4.0(1a)

4.1(1a)

4.1(1d)

B200 M5

3.2(1d)

3.2(1d)

3.2(1d)

4.0(4i)

4.0(1a)

4.1(1a)

4.1(1d)

B260 M4 E7-2800 v2

B260 M4 E7-4800 v2

B260 M4 E7-8800 v2

B260 M4 E7-4800 v3

B260 M4 E7-8800 v3

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4i)

4.0(1a)

4.1(1a)

4.1(1d)

B260 M4 E7-4800 v4

B260 M4 E7-8800 v4

2.2(8b)

2.2(8b)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4i)

4.0(1a)

4.1(1a)

4.1(1d)

B420 M3 E5-4600

B420 M3 E5-4600 v2

2.2(8a)

2.2(8a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4i)

4.0(1a)

4.1(1a)

4.1(1d)

B420 M4 E5-4600 v3

B420 M4 E5-4600 v4

2.2(8a)

2.2(8b)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4i)

4.0(1a)

4.1(1a)

4.1(1d)

B460 M4 E7-4800 v2

B460 M4 E7-8800 v2

B460 M4 E7-4800 v3

B460 M4 E7-8800 v3

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4i)

4.0(1a)

4.1(1a)

4.1(1d)

B460 M4 E7-4800 v4

B460 M4 E7-8800 v4

2.2(8b)

2.2(8b)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4i)

4.0(1a)

4.1(1a)

4.1(1d)

B480 M5

3.2(2b)

3.2(2b)

3.2(2b)

4.0(4i)

4.0(1a)

4.1(1a)

4.1(1d)

Rack Servers

Table 6. Minimum Host Firmware Versions for Rack Servers

Servers

Minimum Software Version

UCS 6200 Series FI

Minimum Software Version

UCS 6332, 6332-16UP

Minimum Software Version

UCS 6454

Minimum Software Version

UCS 64108

Recommended Software Version

UCS 6200 Series FI

UCS 6332, 6332-16UP FI

UCS 6400 Series FI

C22 M3 and M3L

2.2(8a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

C24 M3, M3L, and M3S2

2.2(8a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

C220 M3

2.2(8a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

C220 M4

2.2(8a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

C220 M5

3.2(1d)

3.2(1d)

4.0(1a)

4.1(1a)

4.1(1d)

C240 M3

2.2(8a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

C240 M4

2.2(8a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

C240 M5

3.2(1d)

3.2(1d)

4.0(1a)

4.1(1a)

4.1(1d)

C460 M4 E7-2800 v2

C460 M4 E7-4800 v2

C460 M4 E7-8800 v2

C460 M4 E7-4800 v3

C460 M4 E7-8800 v3

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

C460 M4 E7-8800 v4

2.2(8b)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

C480 M5

3.2(2b)

3.2(2b)

4.0(1a)

4.1(1a)

4.1(1d)

S3260 M4

3.1(2b)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

S3260 M5

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(1d)

C125 M5

NA

4.0(1a) 4.0(1a)

4.1(1a)

4.1(1d) (only on UCS 6332, UCS 6332-16UP FI, and UCS 6400 Series FI

C480 M5 ML

4.0(2a)

4.0(2a)

4.0(2a)

4.1(1a)

4.1(1d)

Adapters

Table 7. Minimum Software Versions for Adapters

Adapters

Minimum Software Version

UCS 6200 Series FI

Minimum Software Version

UCS 6332, 6332-16UP

Minimum Software Version

UCS 6332, 6332-16UP

Minimum Software Version

UCS 6454

Minimum Software Version

UCS 64108

Recommended Software Version

UCS 6200 Series FI

UCS 6332, 6332-16UP FI

UCS 6400 Series FI

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2304

UCS-IOM-2304V2

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2408*

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2408*

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2408*

* UCS-IOM-2408 supported on M4 and M5 only with UCS 6400 Series FI

UCSC-P-M5S100GF (Mellanox ConnectX-5 MCX515A-CCAT 1 x 100GbE QSFP PCI NIC)

4.1(1a)

4.1(1a)

4.1(1a)

4.1(1a)

4.1(1a)

Mellanox ConnectX-5 MCX512A-ACAT 2 x 25Gb/10GbE SFP PCI

UCSC-P-M5D25GF (Mellanox ConnectX-5 MCX512A-ACAT 2 x 25Gb/10GbE SFP PCI)

4.1(1a)

4.1(1a)

4.1(1a)

4.1(1a)

4.1(1a)

Mellanox ConnectX-5 MCX512A-ACAT 2 x 25Gb/10GbE SFP PCI

UCSC-O- M5S100GF (Mellanox ConnectX-5 MCXM516A-CDAT 2 x 100GbE QSFP PCI NIC)

4.1(1a)

4.1(1a)

4.1(1a)

4.1(1a)

4.1(1a)

Mellanox ConnectX-5 MCX512A-ACAT 2 x 25Gb/10GbE SFP PCI

UCSC-P -M4D25GF (Mellanox MCX4121A-ACAT Dual Port 10/25G SFP28 NIC)

4.0(4i)

4.0(4i)

4.0(4i)

4.0(4i)

4.1(1a)

4.1(1d)

UCSC-PCIE-QS100GF (QLogic QL45611HLCU 100GbE)

4.0(4i)

4.0(4i)

4.0(4i)

4.0(4i)

4.1(1a)

4.1(1d)

UCSC-PCIE-C100-04 (UCS VIC 1495)

NA

4.0(2a)

4.0(2a)

NA

4.1(1a)

4.1(1d)(only on UCS 6332, 6332-16UP FI)

UCSC-MLOM-C100-04 (UCS VIC 1497)

NA

4.0(2a)

4.0(2a)

NA

4.1(1a)

4.1(1d)(only on UCS 6332, 6332-16UP FI)

UCSB-MLOM-40G-04 (UCS VIC 1440)

4.0(1a)

4.0(1a)

4.0(1a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSB-VIC-M84-4P (UCS VIC 1480)

4.0(1a) 4.0(1a) 4.0(1a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-C25Q-04 (UCS VIC 1455)

4.0(1a) 4.0(1a) 4.0(1a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-MLOM-C25Q-04 (UCS VIC 1457)

4.0(1a) 4.0(1a) 4.0(1a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-BD16GF (Emulex LPe31002 Dual-Port 16G FC HBA)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-ID40GF (Intel XL710 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-IQ10GF (Intel X710-DA4 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-ID10GF (Intel X710-DA2 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(1d)

XXV710-DA2 (Intel XXV710-DA2 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-ID10GC (Intel X550-T2 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(1d)

N2XX-AIPCI01 (Intel X520 dual port adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-ID25GF (Intel X710 25Gb Dual-port BaseT)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-QD25GF (QLogic QL41212H 25GbE)

3.2(2b)

3.2(2b)

3.2(2b)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-QD40GF (QLogic QL45212H 40GbE)

3.2(2b)

3.2(2b)

3.2(2b)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-IQ10GC (Intel X710-T4)

3.2(2b)

3.2(2b)

3.2(2b)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-QD16GF (QLogic QLE2692-CSC)

3.2(1d)

3.2(1d)

3.2(1d)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-C40Q-03 (UCS VIC 1385)

UCSC-MLOM-C40Q-03 (UCS VIC 1387)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCS-VIC-M82-8P (UCS VIC 1280)

UCSB-MLOM-40G-01 (UCS VIC 1240)

UCSB-MLOM-PT-01 (Cisco Port Expander Card)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSB-MLOM-40G-03 (UCS VIC 1340)

UCSB-VIC-M83-8P (UCS VIC 1380)

UCSC-MLOM-CSC-02 (UCS VIC 1227)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-CSC-02 (UCS VIC 1225)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-F-FIO-1000MP (Cisco UCS Fusion ioMemory – PX600, 1.0TB)

UCSC-F-FIO-1300MP (Cisco UCS Fusion ioMemory – PX600, 1.3TB)

UCSC-F-FIO-2600MP (Cisco UCS Fusion ioMemory – PX600, 2.6TB)

UCSC-F-FIO-5200MP (Cisco UCS Fusion ioMemory – PX600, 5.2TB)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSB-FIO-1600MS (Cisco UCS Fusion ioMemory Mezzanine SX300, 1.6TB)

UCSB-FIO-1300MS (Cisco UCS Fusion ioMemory Mezzanine PX600, 1.3TB)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-INVADER-3108

UCSC-NYTRO-200GB (Cisco Nytro MegaRAID 200GB Controller)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-MLOM-C10T-02 (UCS VIC 1227T)

UCSC-PCIE-C10T-02 (UCS VIC 1225T)

UCSC-F-FIO-785M (Cisco UCS 785GB MLC Fusion ioDrive2 for C-Series Servers)

UCSC-F-FIO-365M (Cisco UCS 365GB MLC Fusion ioDrive2 for C-Series Servers)

UCSC-F-FIO-1205M (Cisco UCS 1205GB MLC Fusion ioDrive2 for C-Series Servers)

UCSC-F-FIO-3000M (Cisco UCS 3.0TB MLC Fusion ioDrive2 for C-Series Servers)

UCSC-F-FIO-1000PS (UCS 1000GB Fusion ioMemory3 PX Performance line for Rack M4)

UCSC-F-FIO-1300PS (UCSC-F-FIO-1300PS)

UCSC-F-FIO-2600PS (UCS 2600GB Fusion ioMemory3 PX Performance line for Rack M4)

UCSC-F-FIO-5200PS (UCS 5200GB Fusion ioMemory3 PX Performance line for Rack M4)

UCSC-F-FIO-6400SS (UCS 6400GB Fusion ioMemory3 SX Scale line for C-Series)

UCSC-F-FIO-3200SS (UCS 3200GB Fusion ioMemory3SX Scale line for C-Series)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-E14102B (Emulex OCe14102B-F)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-IQ10GF (Intel X710-DA4 adapter)

UCSC-PCIE-ID10GF (Intel X710-DA2 adapter)

UCSC-PCIE-ID40GF (Intel XL710 adapter)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-F-I80010 (Intel P3700 HHHL 800GB NVMe PCIe SSD)

UCSC-F-I12003 (Intel P3600 HHHL 1200GB NVMe PCIe SSD)

UCSC-F-I160010 (Intel P3700 HHHL 1600GB NVMe PCIe SSD)

UCSC-F-I20003 (Intel P3600 HHHL 2000GB NVMe PCIe SSD )

UCS-PCI25-40010 (Intel P3700 400GB NVMe PCIe SSD)

UCS-PCI25-8003 (Intel P3600 800GB NVMe PCIe SSD)

UCS-PCI25-80010 (Intel P3700 800GB NVMe PCIe SSD)

UCS-PCI25-16003 (Intel P3600 1600GB NVMe PCIe SSD)

UCSC-F-H19001 (UCS Rack PCIe/NVMe Storage 1900GB HGST SN150)

UCSC-F-H38001 (UCS Rack PCIe/NVMe Storage 3800GB HGST SN150)

UCS-PCI25-38001 (UCS PCIe/NVMe2.5"SFF Storage 3800GB HGST SN100)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-QD32GF (Qlogic QLE2742)

N2XX-AQPCI05 (Qlogic QLE2562)

UCSC-PCIE-Q2672 (Qlogic QLE2672-CSC)

UCSC-PCIE-BD32GF (Emulex LPe32002)

UCSC-PCIE-BS32GF (Emulex LPe32001)

N2XX-AEPCI05 (Emulex LPe12002)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-E16002 (Emulex LPe16002-M6 16G FC rack HBA)

3.2(1d)

3.2(1d)

4.0(1a)

4.1(1a)

4.1(1d)

UCSC-PCIE-ID10GC (Intel X550 Dual-port 10GBase-T NIC)

3.1(2b)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(1d)

Other Hardware

We recommend that you use the latest software version for all Chassis, Fabric Interconnects, Fabric Extenders, Expansion Modules and Power Supplies. To determine the minimum software version for your mixed environment, see Cross-Version Firmware Support. The following is the list of other supported hardware:

Table 8. Supported Hardware for UCS 6400 Series Fabric Interconnects

Type

Details

Chassis

UCSC-C4200-SFF

N20–C6508

UCSB-5108-DC

UCSB-5108-AC2

UCSB-5108-DC2

UCSB-5108-HVDC

Fabric Interconnects

UCS 64108

UCS 6454

Fabric Extenders

Cisco UCS 2204XP

Cisco UCS 2208XP

Cisco Nexus 2232PP

Cisco Nexus 2232TM-E

Cisco UCS 2408

Power Supplies

N9K-PUV-1200W

UCSB-PSU-2500HVDC

UCSB-PSU-2500DC48

UCSC-PSU-930WDC

UCSC-PSU2V2-930WDC

UCSC-PSUV2-1050DC

UCSC-PSU1-770W

UCSC-PSU1-1050W

UCSC-PSU2-1400

UCSC-PSU2V2-1400W

UCSC-PSU2V2-650W

UCSC-PSU2V2-1200W

UCSB-PSU-2500ACPL

UCSB-PSU-2500ACDV

N20-PAC5-2500W

Table 9. Supported Hardware for UCS 6332, UCS 6332-16UP Fabric Interconnects

Type

Details

Chassis

N20–C6508

UCSB-5108-DC

UCSB-5108-AC2

UCSB-5108-DC2

UCSB-5108-HVDC

Fabric Interconnects

UCS 6332UP

UCS 6332-16UP

Fabric Extenders

Cisco UCS 2208XP

Cisco UCS 2204XP

Cisco Nexus 2232PP

Cisco Nexus 2232TM-E

Cisco UCS 2304

Cisco UCS 2304V2

Cisco Nexus 2348UPQ

Power Supplies

UCSB-PSU-2500HVDC

UCSB-PSU-2500DC48

UCSC-PSU-930WDC

UCSC-PSU2V2-930WDC

UCSC-PSUV2-1050DC

UCSC-PSU1-770W

UCSC-PSU1-1050W

UCSC-PSU2-1400

UCSC-PSU2V2-1400W

UCSC-PSU2V2-650W

UCSC-PSU2V2-1200W

UCSB-PSU-2500ACPL

UCSB-PSU-2500ACDV

N20-PAC5-2500W

N9K-PUV-1200W


Note

The 40G backplane setting is not applicable for 22xx IOMs.


Table 10. Supported Hardware for UCS 6200 Fabric Interconnects

Type

Details

Chassis

N20–C6508

UCSB-5108-DC

UCSB-5108-AC2

UCSB-5108-DC2

UCSB-5108-HVDC

Fabric Interconnects

UCS 6248UP

UCS 6296UP

Fabric Extenders

UCS 2208XP

UCS 2204XP

Cisco Nexus 2232PP

Cisco Nexus 2232TM-E

Expansion Modules

UCS-FI-E16UP

Power Supplies

UCSB-PSU-2500HVDC

UCSB-PSU-25004DC48

UCSC-PSU-930WDC

UCSC-PSU2V2-930WDC

UCSC-PSUV2-1050DC

UCSC-PSU1-770W

UCSC-PSU1-1050W

UCSC-PSU2-1400

UCSC-PSU2V2-1400W

UCSC-PSU2V2-650W

UCSC-PSU2V2-1200W

UCSB-PSU-2500ACPL

UCSB-PSU-2500ACDV

N20-PAC5-2500W

GB Connector Modules, Transceiver Modules, and Cables

Following is the list of Gb connector modules, transceiver modules, and supported cables:


Note


Table 11. Supported Transceiver Modules and Cables for GB Connector Modules

Gb Connector Modules

Transceiver Modules and Cables

FC for UCS 6400 Series Fabric Interconnects

DS-SFP-FC8G-SW

DS-SFP-FC8G-LW

DS-SFP-FC16G-SW

DS-SFP-FC16G-LW

DS-SFP-FC32G-SW

DS-SFP-FC32G-LW

100-Gb for UCS 6400 Series Fabric Interconnects

QSFP-40/100G-SRBD

QSFP-100G-SR4-S

QSFP-100G-LR4-S

QSFP-100G-SM-SR

QSFP-100G-CU1M

QSFP-100G-CU2M

QSFP-100G-CU3M

QSFP-100G-AOC1M

QSFP-100G-AOC2M

QSFP-100G-AOC3M

QSFP-100G-AOC5M

QSFP-100G-AOC7M

QSFP-100G-AOC10M

QSFP-100G-AOC15M

QSFP-100G-AOC20M

QSFP-100G-AOC25M

QSFP-100G-AOC30M

40-Gb for UCS 6400 Series Fabric Interconnects

QSFP-40G-SR4

QSFP-40G-SR4-S

QSFP-40G-SR-BD

QSFP-40G-LR4

QSFP-40G-LR4-S

QSFP-40G-ER4

WSP-Q40GLR4L

QSFP-H40G-CU1M

QSFP-H40G-CU3M

QSFP-H40G-CU5M

QSFP-H40G-ACU7M

QSFP-H40G-ACU10M

QSFP-H40G-AOC1M

QSFP-H40G-AOC2M

QSFP-H40G-AOC3M

QSFP-H40G-AOC5M

QSFP-H40G-AOC10M

QSFP-H40G-AOC15M

40-Gb for UCS 6300 Series Fabric Interconnects

QSFP-40G-SR4 in 4x10G mode with external 4x10G splitter cable to SFP-10G-SR

QSFP-40G-CSR4

QSFP-40G-LR4

QSFP-40G-LR4-S

QSFP-40G-SR-BD

QSFP-40G-SR4

QSFP-40G-SR4-S

FET-40G

QSFP-4SFP10G-CU1M

QSFP-4SFP10G-CU3M

QSFP-4SFP10G-CU5M

QSFP-4X10G-AC7M

QSFP-4X10G-AC10M

QSFP-4X10G-AOC1M

QSFP-4X10G-AOC2M

QSFP-4X10G-AOC3M

QSFP-4X10G-AOC5M

QSFP-4X10G-AOC7M

QSFP-4X10G-AOC10M

QSFP-H40G-ACU7M

QSFP-H40G-ACU10M

QSFP-H40G-AOC1M

QSFP-H40G-AOC2M

QSFP-H40G-AOC3M

QSFP-H40G-AOC5M

QSFP-H40G-AOC7M

QSFP-H40G-AOC10M

QSFP-H40G-AOC15M

QSFP-H40G-CU1M

QSFP-H40G-CU3M

QSFP-H40G-CU5M

32-Gb FC for UCS 6454 Fabric Interconnects

DS-SFP-FC32G-SW

DS-SFP-FC32G-LW

25-Gb for UCS 6400 Series Fabric Interconnects

SFP-25G-SR-S

SFP-H25G-CU1M

SFP-H25G-CU2M

SFP-H25G-CU3M

SFP-H25G-CU5M

SFP-H25G-AOC1M

SFP-H25G-AOC2M

SFP-H25G-AOC3M

SFP-H25G-AOC5M

SFP-H25G-AOC7M

SFP-H25G-AOC10M

16-Gb for UCS 6454 and UCS 6332UP Fabric Interconnects

DS-SFP-FC16G-LW

DS-SFP-FC16G-SW

10-Gb for UCS 6400 Series Fabric Interconnects

SFP-10G-SR

SFP-10G-SR-S

SFP-10G-LR

SFP-10G-LR-S

SFP-10G-ER

SFP-10G-ER-S

SFP-10G-ZR

SFP-10G-ZR-S

FET-10G

Note 

FET-10G is only supported between Fabric Interconnects and IOMs/FEXs.

SFP-10G-LRM

SFP-H10GB-CU1M

SFP-H10GB-CU2M

SFP-H10GB-CU3M

SFP-H10GB-CU5M

SFP-H10GB-ACU7M

SFP-H10GB-ACU10M

SFP-10G-AOC1M

SFP-10G-AOC2M

SFP-10G-AOC3M

SFP-10G-AOC5M

SFP-10G-AOC7M

SFP-10G-AOC10M

10-Gb for UCS 6300 and 6200 Series Fabric Interconnects

SFP-10G-SR

SFP-10G-SR-S

SFP-10G-LR

SFP-10G-LR-S

SFP-H10GB-CU1M

SFP-H10GB-CU2M

SFP-H10GB-CU3M

SFP-H10GB-CU5M

SFP-H10GB-ACU7M

SFP-H10GB-ACU10M

FET-10G

1SFP-10G-AOC1M

SFP-10G-AOC2M

SFP-10G-AOC3M

SFP-10G-AOC5M

SFP-10G-AOC7M

SFP-10G-AOC10M

8-Gb FC for UCS 6400 Series and UCS 6332UP Fabric Interconnects

DS-SFP-FC8G-SW

DS-SFP-FC8G-LW

4-Gb FC for UCS 6300 and 6200 Series Fabric Interconnects

DS-SFP-FC4G-SW

DS-SFP-FC4G-LW

1-Gb for UCS 6400 Series Fabric Interconnects

GLC-TE

GLC-SX-MMD

SFP-GE-T

1-Gb for UCS 6300 and 6200 Series Fabric Interconnects

GLC-TE

GLC-SX-MM

GLC-LH-SM

1 SFP-10G-AOC cables are only supported for Cisco 1455 and 1457 VIC cards.

Note

The maximum length of fiber optic runs is limited to 300 meters. This is imposed by our use of 802.3X/802.1Qbb Priority Pauses. SFP-10G-LR is supported between fabric interconnect and FEX, but the 300 m limit still applies.


Cisco UCS Mini and Components

UCS Mini Supported Chassis

Table 12. Minimum Software Versions for UCS Mini Chassis

Chassis

Minimum Software Version

Recommended Software Version

UCSB-5108-AC2

3.0(1e)

4.1(1d)

UCSB-5108-DC2

3.0(2c)

4.1(1d)

UCS Mini Supported Blade and Rack Servers

Table 13. Minimum Host Firmware Versions for Blade and Rack Servers on UCS Mini

Servers

Minimum Software Version

Recommended Software Version

B200 M5

3.2(1d)

4.1(1d)

B200 M3

3.1(3a)

4.1(1d)

B200 M4

3.1(3a)

4.1(1d)

B260 M4

3.1(3a)

4.1(1d)

B420 M3

3.1(3a)

4.1(1d)

B420 M4

3.1(3a)

4.1(1d)

B460 M4

3.1(3a)

4.1(1d)

B480 M5

3.1(3a)

4.1(1d)

B22 M3

3.1(3a)

4.1(1d)

C220 M3

3.1(3a)

4.1(1d)

C240 M3

3.1(3a)

4.1(1d)

C220 M4

3.1(3a)

4.1(1d)

C240 M4

3.1(3a)

4.1(1d)

C460 M4

3.1(3a)

4.1(1d)

C220 M5

3.2(1d)

4.1(1d)

C240 M5

3.2(1d)

4.1(1d)

C480 M5

3.2(2b)

4.1(1d)

UCS Mini Supported Adapters

Adapters

Minimum Software Version

Recommended Software Version

UCSB-MLOM-40G-04 (UCS VIC 1440)

UCSB-VIC-M84-4P (UCS VIC 1480)

4.0(2a)

4.1(1d)

UCSC-PCIE-IQ10GC (Intel X710-T4)

UCSC-PCIE-QD25GF (QLogic QL41212H 25GbE)

UCSC-PCIE-QD40GF (QLogic QL45212H 40GbE)

3.2(2b)

4.1(1d)

UCSC-PCIE-C40Q-03 (UCS VIC 1385)

UCSC-MLOM-C40Q-03 (UCS VIC 1387)

3.1(3a)

4.1(1d)

UCS-VIC-M82-8P (UCS VIC 1280)

UCSB-MLOM-40G-01 (UCS VIC 1240)

UCSB-MLOM-PT-01 (Cisco Port Expander Card)

3.1(3a)

4.1(1d)

UCSB-MLOM-40G-03 (UCS VIC 1340)

UCSB-VIC-M83-8P (UCS VIC 1380)

UCSC-MLOM-CSC-02 (UCS VIC 1227)

3.1(3a)

4.1(1d)

UCSC-PCIE-CSC-02 (UCS VIC 1225)

3.1(3a)

4.1(1d)

UCS Mini Supported Fabric Interconnects

Fabric Interconnects

Minimum Software Version

Recommended Software Version

Cisco UCS 6324

3.1(3a)

4.1(1d)

UCS Mini Supported Fabric Extenders for Secondary Chassis

Fabric Extenders

Minimum Software Version

Recommended Software Version

UCS 2204 XP

3.1(3a)

4.1(1d)

UCS 2208 XP

3.1(3a)

4.1(1d)

UCS Mini Supported Power Supplies

Power Supplies

Minimum Software Version

Recommended Software Version

UCSB-PSU-2500ACDV

UCSB-PSU-2500DC48

UCSC-PSU-930WDC

UCSC-PSU2V2-930WDC

UCSC-PSUV2-1050DC

UCSC-PSU1-770W

UCSC-PSU2-1400

UCSC-PSU2V2-1400W

UCSC-PSU2V2-650W

UCSC-PSU2V2-1200W

3.1(3a)

4.1(1d)

UCS Mini Supported Gb Connector Modules

We recommend that you use the current software version for Gb port speed connections. Following is the list of Gb connector modules and supported cables:


Note

Transceiver modules and cables that are supported on a specific Fabric Interconnect are not always supported on all VIC adapters, IOMs, or FEXes that are compatible with that Fabric Interconnect. Detailed compatibility matrices for the transceiver modules are available here:https://www.cisco.com/c/en/us/support/interfaces-modules/transceiver-modules/products-device-support-tables-list.html


Gb Connector Modules

Transceivers Modules and Cables

40-Gb

QSFP-40G-SR4 in 4x10G mode with external 4x10G splitter cable to SFP-10G-SR

QSFP-4SFP10G-CU1M

QSFP-4SFP10G-CU3M

QSFP-4SFP10G-CU5M

QSFP-4X10G-AC7M

QSFP-4X10G-AC10M

QSFP-4X10G-AOC1M

QSFP-4X10G-AOC2M

QSFP-4X10G-AOC3M

QSFP-4X10G-AOC5M

QSFP-4X10G-AOC7M

QSFP-4X10G-AOC10M

10-Gb

SFP-10G-LR

SFP-10G-LR-S

SFP-10G-LR-X

SFP-10G-SR

SFP-10G-SR-S

SFP-10G-SR-X

SFP-H10GB-CU1M

SFP-H10GB-CU2M

SFP-H10GB-CU3M

SFP-H10GB-CU5M

SFP-H10GB-ACU7M

SFP-H10GB-ACU10M

SFP-10G-AOC1M

SFP-10G-AOC2M

SFP-10G-AOC3M

SFP-10G-AOC5M

SFP-10G-AOC7M

SFP-10G-AOC10M

8-Gb

DS-SFP-FC8G-SW

DS-SFP-FC8G-LW

4-Gb

DS-SFP-FC4G-SW

DS-SFP-FC4G-LW

1-Gb

GLC-TE

GLC-LH-SM

GLC-SX-MM

Upgrade and Downgrade Guidelines

  • In a system with Cisco UCS 64108 Fabric Interconnects, you cannot downgrade from Cisco UCS Manager Release 4.1.

    See the Cisco UCS Manager Firmware Management Guide, Release 4.1 section Firmware Upgrade to Cisco UCS Manager Release 4.1 for detailed upgrade paths.

  • When upgrading or downgrading systems using Intel Volume Management Device (VMD) for NVMe, the system will fail to boot if VMD is enabled or disabled in the BIOS after OS installation. Do not change the BIOS setting after OS installation.

  • Upgrading to the latest Intel firmware images in Release 4.1(1a), requires Cisco UCS Manager to be updated to Release 4.1(1a) as well.

  • RDMA upgrade/downgrade: if downgrading from RDMA-supported releases to non-RDMA-supported releases, you must manually remove all RDMA-related configurations before downgrade. If upgrading eNIC and eNIC RDMA drivers, upgrade all drivers to the same version at the same time; otherwise, functionality could be lost.

Capability Catalog

The Cisco UCS Manager Capability Catalog is a set of tunable parameters, strings, and rules. Cisco UCS uses the catalog to update the display and configurability of components such as newly qualified DIMMs and disk drives for servers.

The Capability Catalog is embedded in Cisco UCS Manager, but at times it is also released as a single image file to make updates easier.

The following table lists the PIDs added in this release and maps UCS software releases to the corresponding Capability Catalog file.

Table 14. Version Mapping

UCS Release

Catalog File Name

Additional PIDs In This Release

4.1(1d)

ucs-catalog.4.1.1d.T.bin

CPUs for C240 M5 servers:

  • UCS-CPU-I6256

  • UCS-CPU-I6250

Drives for C220 M5 and C240 M5 servers:

  • UCS-HD16T7KL4KN

  • UCS-HD14TT7KL4KN

Drives for UCS S3260 M5 servers:

  • UCS-S3260-HDT14T

  • UCS-S3260-HDT14TR

  • UCS-S3260-HD16T

  • UCS-S3260-HD16TR

4.1(1c)

ucs-catalog.4.1.1c.T.bin

4.1(1b)

ucs-catalog.4.1.1b.T.bin

CPUs for UCS B200 M5, C220 M5, and C240 M5 servers:

  • UCS-CPU-I6258R

  • UCS-CPU-I6248R

  • UCS-CPU-I6242R

  • UCS-CPU-I6246R

Drives:

  • UCS-HD10T7K4KAN

  • UCS-S3260-HD10TA

  • UCS-S3260-10TARR

  • UCS-HD10T7K4KAN

  • UCS-SD960GBM2NK9

  • UCS-SD38TBEM2NK9

  • UCS-SD76TBEM2NK9

4.1(1a)

ucs-catalog.4.1.1a.T.bin

Cisco UCS 64108 Fabric Interconnect:

  • UCS-FI-6454

NICs for UCSC-C125 M5:

  • UCSC-PCIE-IQ10GF

  • UCSC-PCIE-ID25GF

  • UCSC-PCIE-ID10GF

GPU for UCSC-C125 M5:

  • UCSC-GPU-T4-16

NVME Drives for UCSC-C125:

  • UCSC-NVME2H-I1000

  • UCSC-NVME2H-I4000

  • UCSC-NVME2H-I1600

  • UCSC-NVME2H-I3200

HBA for UCSC-C125 M5:

  • UCSC-PCIE-QD16GF

Mellanox NICs for UCS C220 M5, C240 M5, C480 M5:

  • UCSC-P-M5S100GF

  • UCSC-P-M5D25GF

Mellanox NICs for UCS C220 M5, C240 M5, C480 M5, C480 M5 ML:

  • UCSC-O-M5S100GF

GPU in the IO Expander for UCSC-S3260 M5:

  • UCSC-GPU-T4-16

Default Open Ports

The following table lists the default open ports used in Cisco UCS Manager Release 4.1.

Port

Interface

Protocol

Traffic Type

Fabric Interconnect

Usage

22

CLI

SSH

TCP

UCS 6200 Series

UCS 6300 Series

UCS 6400 Series

Cisco UCS Manager CLI access

80

XML

HTTP

TCP

UCS 6200 Series

UCS 6300 Series

UCS 6400 Series

Cisco UCS Manager GUI and third party management stations.

Client download

443

XML

HTTP

TCP

UCS 6200 Series

UCS 6300 Series

UCS 6400 Series

Cisco UCS Manager login page access

Cisco UCS Manager XML API access

743

KVM

HTTP

TCP

UCS 6200 Series

UCS 6300 Series

UCS 6400 Series

CIMC Web Service / Direct KVM

843

xmlPolicy

Adobe Flash

TCP

UCS 6200 Series

UCS 6300 Series

Adobe Flash port used by KVM launcher

7546

CFS

CFSD

TCP

UCS 6400 Series

Cisco Fabric Service

Cisco UCS Manager Network Management Guide, Release 4.1 provides a complete list of open TCP and UDP ports.

Security Fixes

The following security issues are resolved:

Release

Defect ID

CVE

Description

4.1(1d)

CSCvt86093

  • CVE-2020-0548

  • CVE-2020-0549

Cisco UCS M5 servers that are based on Intel® processors are affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID(s):

  • CVE-2020-0548: Clean-up errors in some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2020-0549: Clean-up errors in some data cache evictions for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.

This release includes BIOS revisions for Cisco UCS M5 servers. These BIOS revisions include Microcode update for Cisco UCS M5 servers, which is a required part of the mitigation for these vulnerabilities.

4.1(1c)

CSCvs81686

CSCvs81690

  • CVE-2020-0548

  • CVE-2020-0549

Cisco UCS M5 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2020-0548 Cleanup errors in some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2020-0549 Cleanup errors in some data cache evictions for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.

This release includes BIOS revisions for Cisco UCS M5 servers. These BIOS revisions include the updated SINIT ACM for Cisco UCS M5 servers, which is a required part of the mitigation for these vulnerabilities.

4.1(1a)

CSCvr15082

CVE-2020-3120

A vulnerability in the Cisco Discovery Protocol implementation for Cisco FXOS Software, Cisco IOS XR Software, and Cisco NX-OS Software could have allowed an unauthenticated, local attacker to reload an affected device, resulting in a denial of service (DoS) condition.

The vulnerability is due to a missing check when the affected software processes Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to exhaust system memory, causing the device to reload.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

4.1(1a)

CSCvp27917

CVE-2018-12126

CVE-2018-12127

CVE-2018-12130

CVE-2019-11091

Cisco UCS B-Series M3 Blade Servers are based on Intel® Xeon®Sandy Bridge E5-2600 and Ivy Bridge E5 2600 v2 Product Family processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.

  • CVE-2018-12126 (Microarchitectural Store Buffer Data Sampling) affects store buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12127 (Microarchitectural Load Port Data Sampling) affects load buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12130 (Microarchitectural Fill Buffer Data Sampling) affects line fill buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2019-11091 (Microarchitectural Data Sampling Uncacheable Memory) affects uncacheable memory in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M3 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities.

Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html

4.1(1a)

CSCvr54409

CSCvr54415

  • CVE-2019-11135

  • CVE-2019-0151

  • CVE-2019-0152

  • CVE-2019-11136

  • CVE-2019-11137

  • CVE-2019-11139

  • CVE-2019-11109

Cisco UCS B-Series and C-Series M5 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2019-11135 (TSX Asynchronous Abort Advisory) condition affects certain 2nd Generation Intel® Xeon® Scalable Processors, 8th Generation Intel® CoreTM Processor Family, 9th Generation Intel® CoreTM Processor Family, and 10th Generation Intel® CoreTM Processor Family that utilize speculative execution, and may allow an authenticated user to potentially enable information disclosure through a side-channel with local access.

  • CVE-2019-0151 (CPU Local Privilege Escalation Advisory) affects certain Intel® 4th Generation Intel® CoreTM Processors, 5th Generation Intel® CoreTM Processors, 6th Generation Intel® Cores Processors, 7th Generation Intel® CoreTM Processors, 8th Generation Intel® CoreTM Processors, Intel® Xeon® Processors E3 v2/v3/v4/v5/v6 Family, Intel® Xeon® Processors E5 v3/v4 Family, Intel® Xeon® Processors E7 v3/v4 Family, Intel® Xeon® Scalable Processors 2nd Generation, Intel® Xeon® Scalable Processors, Intel® Xeon® Processors D-1500/D-2100), Intel® Xeon® Processors E-2100/E3100, and, Intel® Xeon® Processors W-2100/W-3100 when insufficient memory protection in Intel® TXT may allow a privileged user to potentially enable escalation of privilege through local access. This could result in bypassing Intel® TXT protections.

  • CVE-2019-0152 (CPU Local Privilege Escalation Advisory) affects certain Intel® Xeon® Scalable Processors, Intel® Xeon® Processor D-2100, D-3100, Intel® Xeon® Processor W-2100, W-3100 when insufficient memory protection may allow a privileged user to potentially enable an escalation of privilege through local access. This could result in bypassing System Management Mode (SMM) and Intel® TXT protections.

  • CVE-2019-11136 (BIOS 2019.2 IPU Advisory) affects 2nd Generation Intel® Xeon® Scalable Processors, Intel® Xeon® Scalable Processors, Intel® Xeon® Processor D Family when insufficient access control in the system firmware may allow a privileged user to potentially enable an escalation of privilege, denial of service, or information disclosure through local access.

  • CVE-2019-11137 (BIOS 2019.2 IPU Advisory) affects 2nd Generation Intel® Xeon® Scalable Processors, Intel® Xeon® Scalable Processors, Intel® Xeon® Processor D Family, Intel® Xeon® Processor E5 v4 Family, Intel® Xeon® Processor E7 v4 Family, Intel® Atom® Processor C Series when insufficient input validation in the system firmware may allow a privileged user to potentially enable an escalation of privilege, denial of service, or information disclosure through local access.

  • CVE-2019-11139 (Voltage Modulation Technical Advisory) vulnerability in voltage modulation of certain Intel® Xeon® Scalable Processors may allow a privileged user to potentially enable denial of service through local access.

  • CVE-2019-11109: Logic issue in subsystem in Intel® Server Platform Services before versions SPS_E5_04.01.04.297.0, SPS_SoC-X_04.00.04.101.0, and SPS_SoC-A_04.00.04.193.0 may allow a privileged user to potentially enable Denial of Service through local.

This release includes BIOS revisions for Cisco UCS B-Series and C-Series M5 servers. These BIOS revisions include the updated microcode and Secure Initialization (SINIT) Authenticated Code Modules (ACM), which are required parts of the mitigation for these vulnerabilities.

4.1(1a)

CSCvr54411

CVE-2019-0151

Cisco UCS B-Series and C-Series M3 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:

  • CVE-2019-0151 (CPU Local Privilege Escalation Advisory) affects certain Intel® 4th Generation Intel® CoreTM Processors, 5th Generation Intel® CoreTM Processors, 6th Generation Intel® Cores Processors, 7th Generation Intel® CoreTM Processors, 8th Generation Intel® CoreTM Processors, Intel® Xeon® Processors E3 v2/v3/v4/v5/v6 Family, Intel® Xeon® Processors E5 v3/v4 Family, Intel® Xeon® Processors E7 v3/v4 Family, Intel® Xeon® Scalable Processors 2nd Generation, Intel® Xeon® Scalable Processors, Intel® Xeon® Processors D-1500/D-2100), Intel® Xeon® Processors E-2100/E3100, and, Intel® Xeon® Processors W-2100/W-3100 when insufficient memory protection in Intel® TXT may allow a privileged user to potentially enable escalation of privilege through local access. This could result in bypassing Intel® TXT protections.

This release includes BIOS revisions for Cisco UCS B-Series and C-Series M3 servers. These BIOS revisions include the updated SINIT ACM for Cisco UCS M3 servers, which is a required part of the mitigation for these vulnerabilities.

4.1(1a)

CSCvr54413

CSCvr54414

  • CVE-2019-0151

  • CVE-2019-11137

Cisco UCS B-Series and C-Series M4 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2019-0151 (CPU Local Privilege Escalation Advisory) affects certain Intel® 4th Generation Intel® CoreTM Processors, 5th Generation Intel® CoreTM Processors, 6th Generation Intel® Cores Processors, 7th Generation Intel® CoreTM Processors, 8th Generation Intel® CoreTM Processors, Intel® Xeon® Processors E3 v2/v3/v4/v5/v6 Family, Intel® Xeon® Processors E5 v3/v4 Family, Intel® Xeon® Processors E7 v3/v4 Family, Intel® Xeon® Scalable Processors 2nd Generation, Intel® Xeon® Scalable Processors, Intel® Xeon® Processors D-1500/D-2100), Intel® Xeon® Processors E-2100/E3100, and, Intel® Xeon® Processors W-2100/W-3100 when insufficient memory protection in Intel® TXT may allow a privileged user to potentially enable escalation of privilege through local access. This could result in bypassing Intel® TXT protections.

  • CVE-2019-11137 (BIOS 2019.2 IPU Advisory) affects 2nd Generation Intel® Xeon® Scalable Processors, Intel® Xeon® Scalable Processors, Intel® Xeon® Processor D Family, Intel® Xeon® Processor E5 v4 Family, Intel® Xeon® Processor E7 v4 Family, Intel® Atom® Processor C Series when insufficient input validation in the system firmware may allow a privileged user to potentially enable an escalation of privilege, denial of service, or information disclosure through local access.

This release includes BIOS revisions for Cisco UCS B-Series and C-Series M4 servers. These BIOS revisions include the updated microcode and SINIT ACM for Cisco UCS M4 servers, which are required parts of the mitigation for these vulnerabilities.

4.1(1a)

CSCvp30013

CVE-2018-12126

CVE-2018-12127

CVE-2018-12130

CVE-2019-11091

Cisco UCS M4 servers and Hyperflex M4 servers are based on Intel® Xeon® Processor E7 v2, v3, and v4 Product Family processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.

  • CVE-2018-12126 (Microarchitectural Store Buffer Data Sampling) affects store buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12127 (Microarchitectural Load Port Data Sampling) affects load buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12130 (Microarchitectural Fill Buffer Data Sampling) affects line fill buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2019-11091 (Microarchitectural Data Sampling Uncacheable Memory) affects uncacheable memory in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M4 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities.

4.1(1a)

CSCvp27917

CVE-2018-12126

CVE-2018-12127

CVE-2018-12130

CVE-2019-11091

Cisco UCS B-Series M3 Blade Servers are based on Intel® Xeon®Sandy Bridge E5-2600 and Ivy Bridge E5 2600 v2 Product Family processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.

  • CVE-2018-12126 (Microarchitectural Store Buffer Data Sampling) affects store buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12127 (Microarchitectural Load Port Data Sampling) affects load buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12130 (Microarchitectural Fill Buffer Data Sampling) affects line fill buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2019-11091 (Microarchitectural Data Sampling Uncacheable Memory) affects uncacheable memory in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M3 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities.

Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html

Resolved Caveats

The resolved bugs for a release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains up-to-date information about bugs and vulnerabilities in this product and other Cisco hardware and software products.


Note

You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, you can register for an account.


For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.

Resolved Caveats in Release 4.1(1d)

The following caveats are resolved in Release 4.1(1d):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvq53066

During auto-upgrade of firmware from Cisco UCS Manager 4.0(2d) to Cisco UCS Manager 4.0(4b), the SAS controller firmware is not activated on an integrated rack server.

This issue is resolved.

4.0(4b)A and C

4.1(1d)A and C

CSCvt27869

In rare situations, on UCS 6200 Series Fabric Interconnect, the data sent from IOM are corrupted due to the corrupted parameter going out of bounds.

This issue is resolved.

2.2(8)A

4.1(1d)A

CSCvs97236

On detecting an uncorrectable ECC error, the CPU Integrated Memory Controller (iMC) patrol scrubber logs a truncated system address (4KB page boundary) to the machine check banks. Cisco UCS C460 M4 Rack Server translates the truncated memory address to a physical DIMM address. Depending on system population and configuration, the system event log (SEL) message logging the uncorrectable ECC error may point to a wrong DIMM.

This issue is resolved.

4.0(4g)B, 4.1(1c)B

4.1(1d)B

CSCvt08435

On the 6300 Series Fabric Interconnect, while monitoring SNMP on IOM 2304, HIF ports counts intermittently dropped to zero, causing high traffic indications on the third party monitoring applications.

This issue is resolved.

4.0(4b)A

4.1(1d)A

CSCvu16418

On Cisco UCS 6400 Series Fabric Interconnect running with Cisco UCS Manager 4.0(4g) firmware, UCS fibre channel (FC) ports can stay online when upstream MDS experiences a Kernel panic. Depending on configuration, this situation can cause UCS FC uplinks to stay online even though MDS is inoperable. Thereby, causing pinned vHBAs to stay up which leads to the OS being unaware that FC interfaces are not functioning properly.

This issue is resolved.

4.0(4g)A, 4.1(1a)A

4.1(1d)A

CSCvt29474

On Cisco UCS 6332-16UP Fabric Interconnect (FI) in switched mode direct attached to a Fibre Channel (FC) storage unit, a large number of link reset (LR) or link reset response (LRR) in FC interface can make any FI link to become unusable.

This issue is resolved.

4.0(2a)A

4.1(1d)A

CSCvt44506

Cisco UCS Manager receives multiple delta events for Graphics Processing Units (GPU) card.

This issue is resolved.

4.0(4h)C

4.1(1d)C

CSCvs35747

In rare situations, during loss of FC Uplink connectivity and credit on 6300 series Fabric Interconnect, the key information such as port/link/speed FSM information needed for troubleshooting in the FC Port may be lost.

The logging of FC port issues is enhanced to display the port/Link/Speed FSM information in the fc-mac output.

4.0(1b)A

4.1(1d)A

Resolved Caveats in Release 4.1(1c)

The following caveats are resolved in Release 4.1(1c):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvr79388

Cisco UCS servers stop responding and reboot after ADDDC virtual lockstep is activated. This results in #IERR and M2M timeout in the memory system.

This issue is resolved.

4.0(4e)B

4.1(1c)B

CSCvr79396

On Cisco UCS M5 servers, the Virtual lock step (VLS) sparing copy finishes early, leading to incorrect values in the lock step region.

This issue is resolved.

4.0(4e)B

4.1(1c)B

CSCvr83759

After upgrading from UCS Manager 3.2(3c) to 4.0(4c), blade server access to UCS Manager Fabric Interconnects fails when using openSSH or SecureCRT with "password" authentication.

This issue is resolved.

4.0(1a)A

4.1(1c)A

CSCvs40873

FDMI rejection messages are generated when Fibre Channel HBA storage array attempts to register with the FDMI service on Cisco 6454 Fabric Interconnect, as the FDMI service is not enabled on Fabric Interconnect.

FDMI service is now enabled.

4.0(4g)A

4.1(1c)A

CSCvt48568

On Cisco UCS M5 Servers, soft UUID configured through Service Profile gets reset to hardware based UUID.

This issue is resolved.

4.1(1a)C

4.1(1c)C

CSCvt37895

Cisco C-series integrated server that is connected to Fabric Interconnect through Fabric extender, encounters fabric ports link flaps during cluster failover or shallow discovery.

This issue is resolved.

4.0(4e)A

4.1(1c)A

CSCvt55829

SanDisk Lightning II Solid State Drives (SSDs) LT0400MO and LT1600MO with respect to PIDS listed below, report 0 GB of available storage space remaining under normal operation at 40,000 power on hours. SSDs go offline and become unusable after power cycle event resulting in data loss, potentially on multiple drives if they are placed in service at the same time.

The PIDs of affected SSDs are:

  • (400GB) UCS-SD400G1KHY-EP, UCS-SD400G12S4-EP, UCS-C3X60-12G240

  • (1.6TB) UCS-SD16TG1KHY-EP, UCS-SD16TB12S4-EP, UCS-C3X60-12G2160

This issue is resolved.

3.2(1d)C

4.1(1c)C

Resolved Caveats in Release 4.1(1b)

The following caveats are resolved in Release 4.1(1b):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvt23481

After upgrading Cisco UCS C220 M5 or C125 M5 servers, which are equipped with a RAID controller to release 4.1(1a), Thermal Threshold drops to zero. As a result, the fans start running at maximum speed.

4.1(1a)C

4.1(1b)C

Resolved Caveats in Release 4.1(1a)

The following caveats are resolved in Release 4.1(1a):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvr98210

When upgrading from Cisco UCS Manager Release 3.2 to Release 4.0 or later releases on a system with appliance ports or FCoE storage ports, LLDP becomes disabled by default. FCoE or any connectivity that requires LLDP may stop working.

4.0(1a)A

4.1(1a)A

CSCvr91399

The following BIOS tokens are reset to Platform Default when they are pushed from Cisco UCS Central to UCS Manager.

  • SelectMemoryRASConfiguration

  • LocalX2Apic

  • BMEDMAMitigation

3.2(3)A

4.1(1a)A

CSCvp71363

In a system where a UCS C240 M5 server with a VIC 1457 adapter is managed by Cisco UCS Manager through a direct connect integration with UCS Fabric Interconnects, the following fault is displayed on unused or unconnected ports:

Adapter uplink interface x/y/z link state: unavailable. Please verify connectivity to Fabric Interconnect. Acknowledging FEX might be required.

4.0(2d)A

4.1(1a)A

CSCvo48003

On M4 servers, an uncorrectable ECC error was detected during Patrol Scrub. When the CPU IMC (Integrated Memory Controller) Patrol Scrubber detects an uncorrectable ECC error, it logs a truncated DIMM address (4KB page boundary) to the Machine Check Banks

This issue is resolved.

4.0(4a) B

4.0(4c)B and 4.1(1a)

CSCvr35735

UCS 6454 Fabric Interconnects were not able to switch traffic between a pair of UCS rack servers when vNICs were pinned to the Fabric Interconnect.

This issue is resolved.

4.0(4b)A

4.0(4f)A and 4.1(1a)A

CSCvr47266

UCS 2208 IOMs will not come online after migration from a UCS 6248 Fabric Interconnect to a UCS 6454 Fabric Interconnect, if the burst size in QoS policy is set to invalid range (0-511) for UCS 6454 Fabric Interconnect.

This issue is resolved.

4.0(4b)A

4.0(4f)A and 4.1(1a)A

CSCvr67352

The management instance on blade and rack servers with UCS 6454 Fabric Interconnects lost access to the OOB KVM connection under specific conditions, such as if the IO Module or FEX was rebooted or one of the Fabric Interconnects became unreachable.

This issue is resolved.

4.0(4e)A

4.0(4f)A and 4.1(1a)A

CSCvr78701

Cisco UCS Manager integrated C220 M5 rack servers experienced a Cisco IMC kernel panic during Cisco UCS Manager activation.

This issue is resolved.

4.0(4c)C

4.0(4g)C and 4.1(1a)C

CSCvr95365

After firmware upgrade from Cisco UCS Manager Release 4.0(1a) to Release 4.0(4b), discovery of a Cisco UCS C240 M5 server that is equipped with a Cisco 12G Modular SAS HBA controller, fails with the following error:

mc_attrib_set_suboem_id failed to set the SubOEM ID

4.0(4b)C

4.1(1a)C

CSCvr23136

On firmware upgrade of UCS C-series server from Cisco UCS Manager Release 4.0(1a) release to Cisco UCS Manager Release 4.0(1b) release, the server discovery fails with the subOEMID failure message or CIMC is unable to detect any drives.

The issue is resolved.

4.0(4a)C, 4.0(4c)C, 4.0(4e)C

4.1(1a)C

CSCvs35789

When there is a failover in UCS 6454 Fabric Interconnect, the HIF ports are down causing the traffic to disrupt for more than 40 seconds. Hence, fabric interconnect reboot takes more than 40 secs to regain connectivity.

This issue is resolved.

4.0(4c)A

4.1(1a)A

CSCvp65587

Call home XML <ch:Series> field value is incorrect for 6400 series Fabric Interconnects.

This issue is resolved.

4.0(4a)A

4.1(1a)A

CSCvs41531

Cisco IMC no longer executes the watchdog timeout configured action under the following conditions:

  1. When IPMI restarts for any reason.

  2. If the watchdog set timer command is sent from the host OS within 100ms after IPMI restarts.

This issue is resolved.

4.0(2d)

4.1(1a)

CSCvr74792

UCS 6454 Fabric Interconnect running with Cisco UCS Manager Release 4.0(2d), is rebooted due to kernel panic.

This issue is resolved.

4.0(2d)A

4.1(1a)A

CSCvr16359

When UCS Fabric Interconnect in Ethernet switching mode is restored from full state backup, Fabric Interconnect is restored with incorrect Ethernet end-host mode instead of Ethernet switching mode.

This issue is resolved.

4.0(4b)A

4.1(1a)A

CSCvp87622

When SNMP is utilized to query Cisco UCS manager running with firmware version 3.2(3g), the system manager service is crashed and the following message is logged.

FI-B %SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID #) hasn't caught signal 11 (core will be saved).

This issue is resolved.

3.2(3g)A

4.1(1a)A

CSCvs73313

On a prolonged usage of Cisco UCS M5 servers, the bladeAG process could crash and customer may observe a shallow discovery triggered on the servers.This condition is seen due to the internal memory leakage.

This issue is resolved.

4.0(4a)A

4.1(1a)A

Open Caveats

The open bugs for a release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains up-to-date information about bugs and vulnerabilities in this product and other Cisco hardware and software products.


Note

You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, you can register for an account.


For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.

Open Caveats for Release 4.1(1d)

The following caveats are open in Release 4.1(1d):

Defect ID

Symptom

Workaround

First Bundle Affected

CSCvs93286

After performing server Firmware upgrade with Host Firmware Pack (auto-install servers) on an adapter, the adapter activation gets stuck at the pending-next-boot state. This condition occurs when the adapter activation is triggered immediately after BIOS update followed by host power ON and when both the server BIOS and adapter are updated.

Log into Cisco UCS Manager and reset the adapter.

If resetting the adapter fails, re-acknowledge the server.

4.1(1b)C

CSCvs06864

During installation of Windows 2019 on Cisco UCS fNIC LUN with service profile configured with 2 or more vHBAs on a Cisco UCS VIC 14xx series adapter, blue screen of death (BSoD) is observed.

On each Cisco UCS VIC 14xx series adapters, limit the number of vHBAs to one during Windows 2019 installation on SAN LUN. Add the remaining vHBAs after installation.

4.0(4a)

Open Caveats for Release 4.1(1c)

The following caveats are open in Release 4.1(1c):

Defect ID

Symptom

Workaround

First Bundle Affected

CSCvt64871

In rare situations, Cisco UCS C480 M5 servers and Cisco UCS 480 M5 ML servers stop responding and reboot after ADDDC virtual lockstep is activated. This results in #IERR and M2M timeout in the memory system.

For more information, see:

If the server crashes many times after activating ADDDC virtual lockstep, disable ADDDC.

For more information, see the Cisco Software Advisory at https://www.cisco.com/c/en/us/ support/docs/ field-notices/704/fn70432.html

4.0(4h)C

Resolved in 4.1(1d).

CSCvu14656

On upgrade of BIOS to one of the following versions, the booting of M5 servers get stuck at the memory testing step:

  • C220M5.4.1.1c.0.0404202345

  • C240M5.4.1.1c.0.0405200025

  • B200M5.4.1.1c.0.0404202345

  • B480M5.4.1.1c.0.0405200025

  • S3X60M5.4.1.1c.0.0405200025

To boot the server, perform the following:

  1. Revert BIOS to prior working version and boot the system to OS.

  2. Review logs to determine DIMMs with correctable or uncorrectable ECC errors and replace or remove faulty DIMMs.

  3. Upgrade to BIOS version included in 4.1(1c) bundle and make sure that the system boots as expected.

4.1(1c)C

Resolved in 4.1(1d).

CSCvu11155

On upgrade of BIOS to one of the following versions, you might experience performance degradation on Cisco UCS B-Series, C-series, and S- series M5 servers running with second Generation Intel® Xeon® Scalable Processors:

  • C220M5.4.1.1c.0.0404202345

  • C240M5.4.1.1c.0.0405200025

  • B200M5.4.1.1c.0.0404202345

  • B480M5.4.1.1c.0.0405200025

  • S3X60M5.4.1.1c.0.0405200025

There is no known workaround.

4.1(1c)B and C

Open Caveats for Release 4.1(1a)

The following caveats are open in Release 4.1(1a):

Defect ID

Symptom

Workaround

First Bundle Affected

CSCvt23481

After upgrading Cisco UCS C220 M5 or C125 M5 servers, which are equipped with a RAID controller to release 4.1(1a), Thermal Threshold drops to zero. As a result, the fans start running at maximum speed.

Downgrade Cisco UCS Manager to release 4.0(4g).

4.1(1a)

CSCvs51433

During an upgrade of the infrastructure bundle of a UCS 6200 Series secondary Fabric Interconnect, the Appliance port channel 2 goes down unexpectedly.

Reconfigure the Appliance port channel 2.

3.2(1d)A

CSCvr95393

A TACACS user is able to login to the Fabric Interconnect even when the NOLOGIN policy has been set.

There is no known workaround.

4.0(1a)

A

CSCvr54853

HTML KVM displays unrecognized character error message while pasting special characters like = and >.

There is no known workaround.

4.1(1a)

CSCvs29252

Cisco IMC Scriptable Vmedia does not support vers option with NFS and CIFS mount options in Cisco UCS M4 servers.

There is no known workaround.

4.1(1a)

CSCvs34262

In UCS S3260 M5 server, BMC displays that IPMI is enabled even in non-IPMI user mode, and IPMI over LAN communication fails.

There is no known workaround. You can ignore the message because Cisco IMC is set to non-IPMI mode.

4.1(1a)

CSCvh06851

When an adaptor that is sending both Drop and No-Drop QoS class traffic encounters conjestion, the IOM sends the incomplete value of the user-configured PFC priority map to the adaptor. Because of this, all QoS classes are treated as No-Drop, and the adaptor slows down both Drop and No-Drop traffic to the IOM.

There is no known workaround.

3.2(2b)A

CSCvs72258

After changing the Best Effort or MTU value in the QOS configuration on Cisco UCS 6332 Fabric Interconnect of Cisco UCS Manager, an unexpected outage was experienced. The system displays following the message in the event log: "Waiting for User Acknowledgment".

There is no known workaround.

4.0(4c)A

CSCvs19402

When the Cisco UCS Manager A-bundle software is downgraded from Cisco UCS Manager Release 4.1(1a) to Cisco UCS Manager Release 4.0(x) and B-bundle software is not downgraded from Cisco UCS Manager Release 4.1(1a), the discovery of Cisco UCS M4 Blade Server fails during decommission or recommission of a B-Series blade server and C-Series rack server.

Reset Cisco IMC.

4.0(4i)A

CSCvs07801

After upgrading a Fabric Interconnect using the auto-install option with fabric evacuation mode enabled, link failure faults existed in Cisco UCS Manager which were cleared on the Fabric Interconnect after upgrade. This might be seen in rare conditions with specific combinations of firmware.

There is no known workaround.

4.1(1a)

CSCvs94504

BIOS Parameters (HyperThreading and NUMA Optimized) change are not updated in the Server BIOS even after performing re-acknowledgement of the B-Series servers.

Create a new BIOS policy and apply it to Service Profile > Re-acknowledge server.

4.0(4c)A

CSCvt09966

On UCS 6454 Fabric Interconnect, local-mgmt commands including reboot are missing from the subordinate Fabric Interconnect.

Reboot can be done from the primary Fabric Interconnect local-mgmt prompt.

4.0(2d)A and 4.0(4i)A

CSCvq74492

System becomes unresponsive during BIOS post when the Intel X520 PCIe adapter is present on the system and iSCSI mode is enabled for Intel X550 LOMs. This happens only when boot mode is set to legacy.

If this issue occurs, do one of the following:

  • Switch to UEFI boot mode.

Or

  1. When system is hung, set the LOM Option to disable using the CIMC feature to set the BIOS tokens.

  2. Reboot the server to the UEFI shell.

  3. Use the Intel bootutil and enable iSCSI for X520 adapter and reboot the server (Intel bootutil along with its userguide is part of the driver iso).

  4. On next boot, during BIOS post enter into Intel OPROM Utility(Ctrl +D), enable the ISCSI mode for X550 LOM. Save and restart.

  5. LOM ISCSI LUN will boot without any issue.

4.0(4c)C

CSCvo39645

CATERR/IERR occurs on multiple reboots and the system becomes unresponsive during POST. This issue occurs on servers with NVMe drives on mSwitch connected configuration.

When this issue occurs, perform a warm reboot.

4.0(4a)C

Behavior Changes and Known Limitations

Failure of Secure LDAP after upgrade of UCS Infrastructure to Cisco UCS Manager Release 4.1(1a)

CSCvt31344—Cisco UCS 6200 and 6300 series Fabric Interconnects (FIs): After upgrade of UCS Infrastructure A-bundle to Cisco UCS Manager Release 4.1(1a) from any previous release, the user authentication fails when logging into Cisco UCS Manager through secure LDAP. This behaviour is expected after infrastructure upgrade, as OpenLDAP security has strengthened security for Cisco UCS 6200 and 6300 series FIs.

To ensure successful login to Cisco UCS manager through secure LDAP, do one of the following:

  • LDAP server needs a new multiple domain certificate. This new certificate must include all possible names of the LDAP server configured in Cisco UCS manager, like Fully Qualified Domain Name(FQDN), hostname, and IP address in Subject Alternative Name (SAN) extension field of the certificate.

  • Obtain the SANs of the current LDAP server certificate using the following command:

    openssl s_client -connect <LDAP Provider ip/hostname>:636 | openssl x509 -noout -text | grep -b1 DNS

    In Cisco UCS manager, update one of the SANs as the LDAP provider to LDAP group that is being used in the LDAP authentication.

Cisco UCS Manager Shows Complete Reboot Impact for Multiple Users

CSCvp45607—In releases prior to Cisco UCS Manager Release 4.1(1),when you clicked on Show Current User's Activities and then on the Acknowledge All checkbox, you could reboot all servers that had a pending reboot from all users without understanding the full impact.

Selecting the Acknowledge All checkbox in Cisco UCS Manager Release 4.1(1) and later releases automatically deactivates Show Current User's Activities to ensure full visibility of the reboot impacts.

Cisco UCS Manager GUI Displays the Correct PSU Order

CSCvq93295—When using UCS 6332-16UP Fabric Interconnect integrated with UCS C240 M5SX servers, there is a mismatch between the power supply unit (PSU) positions displayed by the Cisco UCS Manager GUI and mentioned in the server specification document.

The Cisco UCS Manager GUI displays the power supply unit (PSU) positions incorrectly as:

  • PSU 1 — Upper

  • PSU 2 — Lower

The server specification sheet displays the correct information:

  • PSU 01 — Lower

  • PSU 02 — Upper

In Cisco UCS Manager Release 4.1(1) and later releases, the GUI displays the PSU position correctly.

Cisco UCS Manager GUI Displays Chassis Statistics Incorrectly

After a UCS 5108 chassis is powered off, Cisco UCS Manager displays the chassis status as Inaccessible. However, all chassis status statistics and chassis PSU statistics are incorrectly either displayed as OK or based on previous known statistics.

Algorithm Support in OpenSSH to Log into Servers through the SSH

Starting with Cisco UCS Manager Release 4.1(1c), certain insecure ciphers are blocked by UCS Fabric Interconnects. To log into servers through the SSH protocol, you must use a version of OpenSSH that supports at least one algorithm in the following categories:

  • Key exchange algorithms

    • For Cisco Fabric Interconnect 6454

      • diffie-hellman-group-exchange-sha256

      • diffie-hellman-group16-sha512

    • For Cisco Fabric Interconnect 6248, 6324 and 63xx

      • diffie-hellman-group-exchange-sha256

      • diffie-hellman-group16-sha512

  • Encryption algorithms

    • aes128-ctr

    • aes192-ctr

    • aes256-ctr

  • MAC algorithms

    • hmac-sha2-256

    • hmac-sha2-512

Libfabric and Open MPI

Cisco usNIC support in the Libfabric and Open MPI open source packages is readily available from their community web sites (http://libfabric.org/ and http://www.open-mpi.org/, respectively).

Cisco UCS Manager Release 3.1(3) and later releases no longer include Open MPI binary packages. Future UCS software driver bundles distributed through the usual Cisco software channels may not include binaries for the libfabric packages. Cisco engineers continue to be active, core contributors in both the Libfabric and Open MPI communities, and will actively develop and support users through the usual community or commercial ISV support mechanisms (e.g., IBM Spectrum MPI).