Cisco UCS Manager

Cisco UCS™ Manager, Release 4.1 provides unified, embedded management of all software and hardware components of the Cisco Unified Computing System™ (Cisco UCS) across multiple chassis, Cisco UCS servers, and thousands of virtual machines. Cisco UCS Manager manages Cisco UCS as a single entity through an intuitive GUI, a command-line interface (CLI), or an XML API for comprehensive access to all Cisco UCS Manager functions. For more information on Cisco UCS Manager, see Cisco UCS Manager on Cisco.com.

This document contains information on new features, resolved caveats, open caveats, and workarounds for Cisco UCS Manager, Release 4.1. This document also includes the following:

  • Current information that became available after the technical documentation was published

  • Related firmware and BIOSes on blade and rack servers and other Cisco Unified Computing System (UCS) components associated with the release

Upgrading directly to Cisco UCS Manager 4.1(x) is supported from Release 3.1(3), Release 3.2(3), and later releases. For UCS Mini and UCS-FI-63xx series Fabric Interconnects, upgrading directly to Cisco UCS Manager Release 4.1(x) is supported from Release 3.1(3), and Release 3.2(3) and later releases. See Cisco UCS Manager Firmware Management Guide, Release 4.1 for details.

Deprecation Notice

Deprecated Release 4.1(3a)

Release 4.1(3a) is deprecated and firmware files are no longer available.

Cisco recommends that you upgrade to release 4.1(3b) or later. For more information, refer to the Deferral Notice: https://www.cisco.com/web/software/DefTracker/downloads/1311/CSCvx11527.html.

Deprecated Release 4.1(1c)

Release 4.1(1c) is deprecated and firmware files are no longer available. For more information, refer Field Notice: FN - 70595.

Cisco recommends that you upgrade to release 4.1(1d) or later.

Deprecation of Older Release Bundles

As of release 4.1(3d), the following bundles are deprecated and no longer available.

  • ucs-c-fusion-io-pfio365m.7.1.17.gbin

  • ucs-c-fusion-io-pfio785m.7.1.17.gbin

  • ucs-c-fusion-io-pfio1205m.7.1.17.gbin

  • ucs-c-fusion-io-pfio3000m.7.1.17.gbin

Deprecation of DES Privacy Protocol

For the SNMP security encryption, 128-bit AES encryption is the default privacy password option. Starting with Cisco UCS Manager Release 4.2. DES functionality will be completely deprecated. While still configurable, use of DES will result in the fault message: ERROR: AES is not enabled. As DES is a weak encryption algorithm, Cisco strongly recommends using the AES encryption default for security purposes.

Revision History

Release

Date

Description

4.1(3f)

August 31, 2021

Created release notes for Cisco UCS Manager Release 4.1(3f).

4.1(3e)

July 29, 2021

Created release notes for Cisco UCS Manager Release 4.1(3e).

4.1(3d)

May 31, 2021

Created release notes for Cisco UCS Manager Release 4.1(3d).

4.1(3c)

April 05, 2021

Created release notes for Cisco UCS Manager Release 4.1(3c).

4.1(3b)

January 26, 2021

Created release notes for Cisco UCS Manager Release 4.1(3b).

March 31, 2021

Added CSCvw49192 to the list of Resolved Caveats.

4.1(3a)

January 13, 2021

Created release notes for Cisco UCS Manager Release 4.1(3a).

January 25, 2021

Added CSCvx11527 to the list of Open Caveats.

February 10, 2021

Added CSCvw47746 to the list of Resolved Caveats.

April 07, 2021

Added CSCvw45654, CSCvw38983, CSCvv96107, and CSCvw38995 to the list of Security Fixes.

June 1, 2021

Added CSCvy46626 to the liest of Open Caveats.

4.1(2c)

February 17, 2021

Created release notes for Cisco UCS Manager Release 4.1(2c).

March 31, 2021

Added CSCvw49192 to the list of Resolved Caveats.

4.1(2b)

October 20, 2020

Created release notes for Cisco UCS Manager Release 4.1(2b).

December 9, 2020

Added CSCvw49192 to the list of Open Caveats.

4.1(2a)

July 30, 2020

Created release notes for Cisco UCS Manager Release 4.1(2a).

August 10, 2020

Added CSCvt35661 to the list of Resolved Caveats.

December 22, 2020

Added CSCvq17291 to the list of Resolved Caveats.

4.1(1e)

September 02, 2020

Created release notes for Cisco UCS Manager Release 4.1(1e).

4.1(1d)

July 10, 2020

Created release notes for Cisco UCS Manager Release 4.1(1d).

July 23, 2020

Added CSCvu11155 to the list of Resolved Caveats.

4.1(1c)

April 20, 2020

Created release notes for Cisco UCS Manager Release 4.1(1c).

May 27, 2020

Added CSCvu14656 to the list of Open Caveats.

June 12, 2020

Added CSCvu11155 to the list of Open Caveats.

4.1(1b) March 12, 2020

Created release notes for Cisco UCS Manager Release 4.1(1b).

4.1(1a)

February 20, 2020

Created release notes for Cisco UCS Manager Release 4.1(1a).

March 04, 2020

Added CSCvt23481 to the list of Open Caveats.

July 07, 2020

Added CSCvs73313 to the list of Resolved Caveats.

Top Reasons to Move to Cisco UCS Manager Release 4.1

Here are the top reasons to move to Cisco UCS Manager Release 4.1:

  • Support for UCS 64108 Fabric Interconnects.

  • Improved memory RAS features on M5 servers.

  • RDMA Over Converged Ethernet (RoCE) Version 2 Support for UCS VIC 1400 Series Adapters.


    Note

    In Cisco UCS Manager Release 4.1(1a), Windows RDMA support is being enabled as a Tech Preview feature and is disabled by default.

    From Cisco UCS Manager Release 4.1(2a), RoCEv2 protocol for Windows 2019 NDKPI mode 1 and mode 2, is supported with both IPV4 and IPV6.


  • Support for NVMe over Fabrics (NVMeoF) using RDMA for Converged Ethernet version 2 (RoCEv2) on Redhat Enterprise Linux 7.6 and 7.7 with Linux Z-Kernel 3.10.0-957.27.2, for Cisco UCS 14xx Series adapters.

  • Support for NVMe over Fibre Channel (FC-NVMe) on SLES 12 SP4, SLES 12 SP5, SLES 15, SLES 15 SP1 and RHEL 7.6.

  • Support for Intel® Virtual RAID on CPU (VRoC), which allows you to create and manage RAID volumes within the BIOS of VMD-enabled NVMe SSD drives.

  • Support for new peripherals and optics.

New Features in Release 4.1

Cisco UCS Manager, Release 4.1 is a unified software release for all supported UCS hardware platforms.

New Hardware Features

New Software Features

New Hardware in Release 4.1(3e)

Peripherals

  • Support for NVIDIA A40 GPU in Cisco UCS C480 M5 rack servers.

New Hardware in Release 4.1(3a)

Peripherals

  • Support for NVIDIA A-100 GPU cards (UCSC-GPU-A100) on UCS C240 M5 servers and UCS C480 M5 servers.

  • Support for NVIDIA GPU Cloud (NGC) on NVIDIA v100 on Cisco UCS C240 M5 servers and HyperFlex HX240C M5 servers.

  • Support for AMD platform secure boot is enabled in Cisco UCS C125 M5 server.

  • Support for FPGA upgrade in Cisco UCS 6454 Fabric Interconnect and Cisco UCS 64108 Fabric Interconnect:

    • On upgrading Infrastructure to Cisco UCS Manager release 4.1(3a) or later releases, the version of IOFPGA gets upgraded to v22 on Cisco UCS 6454 Fabric Interconnect.

    • Starting with Cisco UCS Manager release 4.1(3a), the secure FPGA upgrade feature is enabled for Cisco UCS 64108 Fabric Interconnect, by default. The FPGA will get upgraded when Infrastructure is upgraded from 4.1(3) to later releases.

    Post the IOFPGA version upgrade, upgrade golden regions of FPGA on Fabric Interconnect to address Secure Boot vulnerability. To upgrade golden regions of FPGA, install secure FPGA in fabric interconnect. For more information on secure FPGA installation procedure, see Cisco UCS Manager Network Management Guide and Cisco UCS Manager Network Management Guide using the CLI.

  • Support for QSFP-40/100-SRBD at 40G with Cisco UCS 6300 and 6400 Series Fabric Interconnects on uplink port connection, and Cisco UCS-IOM-2304 and Cisco UCS-IOM-2304V2 I/O modules.

  • Support for SFP-25G-AOC4M 4 meter AOC cable connection from VIC 1455/57 adapters at 25G to 6454/64108 Fabric Interconnects with Nexus N9K-C93240YC-FX2 switch in Standalone mode.

  • Support for UCS-S3260-NVMW19T 1.9TB 2.5in U.2 WD SN640 NVMe Medium Performance Value Endurance drive and UCS-S3260-NVMW64T 6.4TB 2.5in U.2 WD SN640 NVMe Medium Performance High Endurance drive on Cisco UCS S3260 servers.

New Hardware in Release 4.1(2b)

Peripherals

  • Support for RAID controller on Cisco UCS C240 SD M5 Server.

New Hardware in Release 4.1(2a)

Server

  • Support for Cisco UCS C240 SD M5 Server.

  • Support for Cisco UCS C125 M5 Rack Server Node based on AMD EPYC 2 7002 (ROME) Processors.

Peripherals

  • Support for Broadcom HBA 9400-8I HBA Storage Adapter (UCSC-SAS9400-8i) on C125 M5 servers.

  • Support for PCI Express passthrough with ESX 6.5 on LSI 9400-8i storage controller.

  • Support for Broadcom HBA 9400-8I Tri-Mode Storage Adapter to enable design flexibility to operate NVMe, SAS, or SATA storage devices in a single drive bay.

  • Support for usNIC on UCS C125 M5 servers.

  • Support for IOM 2408 with VIC 1440 adapters with PE with 25G and 40G Ethernet connections.

  • Support for Mellanox ConnectX-5 MCX516A-CDAT dual port 100GbE QSFP28 NIC (UCSC-P-M5D100GF) on Cisco UCS C220 M5, C240 M5 and S3260 Storage servers.

  • Support for UCSC-GPU-RTX6000 and UCSC-GPU-RTX8000 on Cisco UCS C240 M5 servers.

  • Support for the following NVMe drives on Cisco UCS S3260 Storage servers:

    NVMe Drive

    PID for UCS S3260

    Product Description

    SN640 1.9TB

    UCS-S3260-NVMW19T

    1.9TB 2.5 in U.2 WD SN640 NVMe Med. Perf. Value Endurance

    SN640 6.4TB

    UCS-S3260-NVMW64T

    6.4TB 2.5 in U.2 WD SN640 NVMe Med. Perf. ValueEndurance

New Hardware in Release 4.1(1a)

High-Density Fourth Generation Fabric Interconnect

The Cisco UCS 64108 Fabric Interconnect is a core part of the Cisco Unified Computing System, providing both network connectivity and management capabilities for the system. The Cisco UCS 64108 offers line-rate, low-latency, lossless 10/25/40/100 Gigabit Ethernet, Fibre Channel over Ethernet (FCoE), and Fibre Channel functions.

The high-density Cisco UCS 64108 108-Port Fabric Interconnect is a two-rack-unit (2RU) 10/25/40/100 Gigabit Ethernet, FCoE and Fibre Channel switch. The switch has 96 10/25-Gbps fixed Ethernet (16 unified ports) and 12 40/100-Gbps Ethernet uplink ports. The 16 unified ports can support 10/25-Gbps Ethernet or 8/16/32G Fibre Channel ports. All Ethernet ports are capable of supporting FCoE.

Fabric Interconnect Migration

You can migrate from a UCS 6200 Series Fabric Interconnect to the following UCS 6400 Series Fabric Interconnects:

  • UCS 64108 Fabric Interconnect

  • UCS 6454 Fabric Interconnect

However, you cannot migrate back to a UCS 6200 Series Fabric Interconnect after you have migrated to a UCS 6400 Series Fabric Interconnect.

You can migrate from a UCS 6454 Fabric Interconnect to a UCS 64108 Fabric Interconnect. However, you cannot migrate back to a UCS 6454 Fabric Interconnect after you have migrated to a UCS 64108 Fabric Interconnect.

Peripherals

  • Support for the UCSC-PCIE-IQ10GF 4 Port 10Gb Network Interface Card on UCS C125 M5 servers

  • Support for the Intel XXV710-DA2OCP1 2 Port x 10/25Gb OCP 2.0 Network Interface Card on UCS C125 M5 servers

  • Support for the Intel X710-DA2 2 x 10GbE SFP+ PCIe Network Interface Card on UCS C125 M5 servers

  • Support for the Mellanox ConnectX-5 MCXM516A-CDAT 2 x 100GbE QSFP PCI Network Interface Card on C220 M5, C240 M5, C480 M5, C480 M5 ML servers

  • Support for the Mellanox ConnectX-5 MCX515A-CCAT 1 x 100GbE QSFP PCI Network Interface Card on C220 M5, C240 M5, C480 M5 servers

  • Support for the Mellanox ConnectX-5 MCX512A-ACAT 2 x 25Gb/10GbE SFP PCI Network Interface Card on C220 M5, C240 M5, C480 M5 servers

  • Support for the following NVME drives on UCS C125 M5 servers:

    NVMe Drive

    PID for UCS C125 M5

    Intel P4510 1TB (SSDPE2KX010T8K)

    UCSC-NVME2H-I1000

    Intel P4510 4TB (SSDPE2KX040T8K)

    UCSC-NVME2H-I4000

    Intel P4610 1.6TB (SSDPE2KE016T8K)

    UCSC-NVME2H-I1600

    Intel P4610 3.2TB (SSDPE2KE032T8K)

    UCSC-NVME2H-I3200

  • Support for NVIDIA T4 16GB GPU cards (UCSC-GPU-T4-16) on UCS C125 M5 servers and in the IO Expander on UCS S3260 M5 servers

  • Support for QLogic QLE 2692 - 2 x 16Gb Gen 6 Fibre Channel HBA on UCS C125 M5 servers

New Software Features in Release 4.1(3e)

Feature Enhancements

  • New property added to create and modify the Internet Group Management Protocol (IGMP) Source IP Proxy State in Multicast Policy.

  • Added an option to disable the Lewisburg SATA AHCI controller on Cisco UCS M5 servers.

  • Support to display the DIMM manufacturing date/country information in dmidecode’s (SMBIOS) Asset Tag field.

  • Support mechanism for 6400 series Fabric Interconnets to send the Registered State Change Notification (RSCN) when the Cisco UCS IOM port-channel membership changes.

New Software Features in Release 4.1(3a)

Feature Enhancements

  • Support for Enhanced Data Path (ENS) with Geneve Offload on Cisco UCS VIC 1400 Series adapters.

    N-VDS contains two network stacks: standard stack and ENS stack. NSX-T manager selects the stack based on the user setting. By default, N-VDS runs in the standard mode. It uses the standard stack and utilizes the standard network driver for its uplink ports. For the VIC adapter, the standard driver is neNIC driver. The ENS driver is supported on on ESX 6.7U3, ESX 7.0, and ESX 7.0U1.

  • Self-Monitoring, Analysis and Reporting Technology (SMART) attributes for Power-On Hours are now available for SAS SSDs, and are populated in the same manner as SATA drives.

  • A new adapter policy, Power Save Mode, allows global management of the chassis toward maximizing energy efficiency or availability. The policy is global and is inherited by all chassis managed by Cisco UCS Manager. It is disabled by default.

  • Cisco UCS Manager Release 4.1(3a) introduces the following BIOS tokens to improve RAS memory setting for UCS M5 servers:

    • Memory Thermal Throttling Mode

    • Advanced Memory Test

    • Transparent Secure Memory Encryption (TSME)

    • Auto Secure Encrypted Virtualization (SEV)

    • DRAM SW Thermal Throttling

    For more information on memory BIOS tokens, see the RAS Memory BIOS Settings section in Cisco UCS Manager Server Management Guide.

  • Ability to install secure FPGA in fabric interconnect. For more information, see Cisco UCS Manager Network Management Guide and Cisco UCS Manager Network Management Guide using the CLI.

  • Introduced the Create oui [oui-id] command to manually add OUIs into the databases which is necessary to establish FC port-channels with new Cisco FC devices or devices with newly assigned OUI ranges.

    For more information, see Cisco UCS Manager Storage Management Guide using the CLI.

  • Provision to configure Priority Flow Control (PFC) watchdog interval to detect whether packets in a no-drop queue are being drained within a specified time period.

    For more information, see Cisco UCS Manager Network Management Guide using the CLI.

  • Starting with Cisco UCS Manager Release 4.1(3a), you can connect Cisco UCS Rack servers with VIC 1455 and 1457 adapters, to the uplink ports 49-54 on Cisco UCS 6454 Fabric Interconnects and 97 to 108 in Cisco UCS 64108 Fabric Interconnects.

  • Generic Network Virtualization Encapsulation (GENEVE Offload) is now supported on ESX 7.0U1 Operating system.

  • Support for NVMe over Fibre Channel (FC-NVMe) on UCS 6300 series Fabric Interconnects, UCS 6454, and UCS 64108 Fabric Interconnects with Cisco UCS VIC 13xx series adapters on RHEL 7.8, RHEL 7.9, and RHEL 8.2. This support is also available on Cisco C220 and C240 M5 Standalone rack servers with Cisco UCS 13xx series adapters.

  • Support for NVMe over Fibre Channel (FC-NVMe) on UCS 6300 series Fabric Interconnects, UCS 6454, and UCS 64108 Fabric Interconnects with Cisco UCS VIC 14xx series adapters on ESX 7.0, ESX 7.0 U1 and ESX 7.0u2.

    This support is also available on Cisco Standalone rack servers with Cisco UCS 14xx series adapters.

  • Support for NVMe over Fibre Channel with Cisco UCS 1400 series adapters on RHEL 7.8, RHEL 7.9, RHEL 8.2.

  • Support for NVMe over Fabrics (NVMeoF) using IPv4 or IPv6 RDMA over Converged Ethernet version 2 (RoCEv2) on Red Hat Enterprise Linux 7.8 and 8.2.

  • Support for fNIC Multi-Queue on RHEL 7.6, RHEL 7.7, RHEL 7.9, RHEL 8.0, RHEL 8.1, RHEL 8.2, RHEL 8.3, SLES 12 SP5, and SLES15 SP2.

  • FDMI support on Red Hat Enterprise Linux 7.9/8.2 and SLES 15 SP 2.

  • Support for AMD Platform Secure Boot (PSB) in Cisco UCS C125 M5 servers that implements hardware-rooted boot integrity. PSB ensures the integrity and authenticity of ROM image by using the root of trust integrated in the hardware.

New Software Features in Release 4.1(2b)

Feature Enhancements

New Software Features in Release 4.1(2a)

Feature Enhancements

  • Support for Redfish on all Cisco UCS C-series and Cisco UCS B-series servers to enable Intersight with feature coverage of all endpoints.

  • Support for NVMe over Fabrics (NVMeoF) using IPv4 or IPv6 RDMA over Converged Ethernet version 2 (RoCEv2) is supported on Red Hat Enterprise Linux 7.7 with Linux Z-Kernel-3.10.0-1062.9.1.el7.x86_64.

  • Support for RoCEv2 protocol for Windows 2019 NDKPI mode 1 and mode 2, with both IPV4 and IPV6.

  • A new fan policy option, Acoustic Mode, for reducing noise levels in acoustic-sensitive environments, is now available on Cisco UCS C220 M5, C240 M5, and C240 SD M5 Rack Servers.

  • Support for Generic Network Virtualization Encapsulation (GENEVE) Offload on ESX 6.7U3 and ESX 7.0. GENEVE offload is present in all Ethernet adapter policies and is disabled by default.

  • Support for NVMe over Fibre Channel on Red Hat Enterprise Linux 7.7, 8.0 and 8.1.

  • Support for Red Hat Enterprise Linux 8.2 multi-queue on Unified fNIC drivers.

  • Support for VIC adapters on Redhat Enterprise Linux 7.8 and 8.2 and ESX 7.0.

Intersight Management Mode

Intersight Managed Mode (IMM) is a new set of features introduced in Cisco Intersight to configure, deploy, and manage a Server Profile for B-Series blade and FI-managed C-Series servers. IMM introduces a new implementation of concepts first introduced with Cisco UCS Manager and moves ownership of the policy model into Cisco Intersight. Hence, policies, VLANs, and VSANs are created in advance and built into a Server Profile. Then, the Server Profile is assigned and deployed to a Cisco Intersight discovered B-Series blade or managed C-Series servers.


Note

Cisco UCS Infrastructure and Server FW version 4.1(2) enables an opt-in to technical preview for IMM; a policy driven configuration platform for FIs and attached servers. When IMM is enabled, the entire UCS domain is reset to factory defaults and this will cause a disruption for workloads running on servers in the domain. While this feature is in technical preview, it is not recommended for production workloads or applications.

For more information, see https://intersight.com/help/resources#intersight_managed_mode.


New Software Features in Release 4.1(1a)

Cisco UCS 64108 Fabric Interconnect

This release introduces Cisco UCS 64108 Fabric Interconnects that support 96 10/25-Gbps ports (16 unified ports) and 12 40/100-Gbps uplink ports. The 16 unified ports can support 10/25-Gbps Ethernet or 8/16/32G Fibre Channel ports. The Cisco UCS Manager Getting Started Guide, Release 4.1 provides details about the specific ports.

Cisco UCS Manager Release 4.0(1) and 4.0(2) introduced support for various software features on Cisco UCS 6454 Fabric Interconnects. Cisco UCS Manager Release 4.1 extends support for these features on Cisco UCS 64108 Fabric Interconnects. These software features are:

  • Support for 10/25 Gigabit ports in the fabric with 40/100 Gigabit uplink ports

  • Support for VIC 1400 Series adapters

  • 128 additional VLANs reserved for internal usage

  • Forward Error Correction (FEC) configurations for ports

Legacy Features Not Supported

The following features are not supported on Cisco UCS 64108 Fabric Interconnects:

  • Chassis Discovery Policy in Non-Port Channel Mode

  • Chassis Connectivity Policy in Non-Port Channel Mode

  • Service profiles with dynamic vNICs

  • Multicast Optimize for QoS

  • Netflow

  • Port profiles and distributed virtual switches

RDMA Over Converged Ethernet Version 2 Support for UCS VIC Adapters

RDMA over Converged Ethernet (RoCE) v2 for Microsoft SMB Direct

RDMA over Converged Ethernet version 2 (RoCEv2) is an internet layer protocol, which means that RoCEv2 packets can be routed. RoCEv2 allows direct memory access over the network by encapsulating an Infiniband (IB) transport packet over Ethernet.

This release introduces support for RoCEv2 with Cisco UCS VIC 1400 Series adapters. It also adds support for Microsoft SMB Direct with RoCEv2 on Microsoft Windows 2019. Refer UCS Hardware and Software Compatibility for more details about support of Microsoft SMB Direct with RoCEv2 on Microsoft Windows 2019. RoCEv2 support is being enabled as a Tech Preview feature. Refer Cisco UCS Manager Configuration Guide for RDMA over Converged Ethernet (RoCE) v2 for more details on RoCEv2.


Note

RoCEv1 is not supported on Cisco UCS VIC 1400 Series adapters. RoCEv2 is not supported on UCS VIC 12xx Series and 13xx Series adapters.


NVMe over Fabric via Ethernet (NVMeoF) with Support for RDMA

NVMe over Fabric via Ethernet (NVMeoF) support on Redhat Enterprise Linux 7.6 z-kernels with version 3.10.0-957.27.2.el7 or later is added for Cisco UCS 14xx Series adapters. RDMA also supports NVMeoF.

Support for Fibre Channel and NVMe over Fibre Channel (FC-NVME)

Support for NVMe over Fibre Channel (FC-NVMe) on SLES 12 SP4, SLES 12 SP5, SLES 15, SLES 15 SP1 and RHEL 7.6. Unified driver support for Fibre Channel and NVMe over Fibre Channel (FC-NVME) on SLES 12 SP4, SLES 15, and RHEL 7.6. This support is available on UCS 6300 Series Fabric Interconnects and UCS 6454 Fabric Interconnects with Cisco UCS 14xx Series adapters. NVMe over Fibre Channel now supports up to 16 interfaces.

Memory RAS Enhancements

This release introduces the following Memory RAS enhancements:

Intel Post Package Repair (PPR) uses additional spare capacity within the DDR4 DRAM to remap and replace faulty cell areas detected during system boot time. Remapping is permanent and persists through power-down and reboot.

Partial DIMM Mirroring enables better Virtualization Host Resiliance by creating a mirror copy of specific regions of memory cells, instead of keeping the complete half of the mirror copy. Memory mirrors, using up to 50% of capacity, can be specified in gigabytes or percentage of total capacity, across up to 4 mirrors, and can be configured across multiple IMCs or sockets. Partial mirroring cannot be used in connection with standard mirroring or ADDDC sparing.

Address Range allows the memory presented to the user to be limited to a specified subset of actual memory.

Intel® VMD and Intel® Virtual RAID on CPU (VRoC)

Intel® Volume Management Device (VMD) provides storage management options for NVMe drives, including surprise hot-plug and LED status management. Virtual RAID on CPU (VRoC) enables creating and managing RAID volumes within the BIOS of VMD-enabled NVMe SSD drives by using hardware logic inside the Intel Xeon processor. The Cisco implementation of VRoC, supported only on Intel NVMe drives, supports RAID 0 (striping), RAID 1 (mirroring), RAID 5 (striping with parity) and RAID 10 (combined mirroring and striping).

Feature Enhancements

  • A per-chassis fan control policy for B-Series servers allows a single policy to control the speed of all server fans in an enclosure.

  • Support for configuring vMedia mount as writable when both the following conditions are met:

    • Device Type is HDD

    • Protocol is NFS or CIFS

  • Intel® Optane Data Center persistent memory module support is extended to C480 M5ML servers.

Deprecated Hardware and Software in Cisco UCS Manager Release 4.1

Beginning with Cisco UCS Manager Release 4.1(1), the KVM Console GUI is available only as an HTML5-based application. It is no longer available as a Java-based application.

Beginning with Cisco UCS Manager Release 4.1(1), VM-FEX is only supported with Red Hat Enterprise Linux (RHEL) on KVM.VMware VM-FEX on ESX, Windows VM-FEX, and Hyper-V VM-FEX are no longer supported.

Beginning with Cisco UCS Manager Release 4.1(1), FDMI on Unified Linux fNIC drivers is no longer supported.

Beginning with Cisco UCS Manager Release 4.1(3d), the following drives are no longer supported:

UCSC-F-FIO-1205M

Cisco UCS 1.2TB MLC Fusion ioDrive2

UCSC-F-FIO-3000M

Cisco UCS 3TB MLC Fusion ioDrive2

UCSC-F-FIO-365M

Cisco UCS 365GB MLC Fusion-io ioDrive2

UCSC-F-FIO-785M

Cisco UCS 785GB MLC Fusion-io ioDrive2

UCSB-F-FIO-785M

Cisco UCS 785GB MLC Fusion-io ioDrive2

UCSB-F-FIO-365M

Cisco UCS 365GB MLC Fusion-io ioDrive2

Deprecation in Future Releases

The following adapters are approaching end-of-life (EOL) and will not be supported in future releases of Cisco UCS Manager:

  • Emulex LPe12002 8G FC adapter (N2XX-AEPCI05)

  • Emulex LPe16002-M6 16G FC rack HBA (UCSC-PCIE-E16002)

  • AMD Firepro 7150 x2 PCIe x16 Graphics Card (UCSC-GPU-7150X2)

  • Cisco UCS Fusion ioDrive2 Adapter

Cisco UCS Manager and Cisco UCS C-Series Release Compatibility Matrix for C-Series Rack-Mount Servers

Cisco UCS C-Series Rack-Mount Servers are managed by built-in standalone software— Cisco Integrated Management Controller (Cisco IMC). However, when a C-Series Rack-Mount Server is integrated with Cisco UCS Manager, the Cisco IMC does not manage the server anymore.

Each Cisco UCS Manager release incorporates its corresponding C-Series Standalone release and some previous C-Series standalone releases. For example, Cisco UCS Manager Release 4.1(1) is integrated with C-Series Standalone Release 4.1(1) for the M5 servers, Release 4.0(2) for all the M4 servers, and Release 3.0(4) for all M3 servers. Hence, it supports all the M5, M4 and M3 servers supported by C-Series Standalone releases.

The following table lists the Cisco UCS Manager and C-Series software standalone releases for C-Series Rack-Mount Servers:

Table 1. Cisco UCS Manager and C-Series Software releases for C-Series Servers

Cisco UCS Manager Release

C-Series Standalone Releases Included

C-Series Servers Supported by the C-Series Standalone Releases

4.1(3)

4.1(3)

S3260 M4, All M5

4.1(2)

C220 M4, C240 M4, C460 M4

3.0(4)

All M3

4.1(2)

4.1(2)

C220 M5, C240 M5, C240 SD M5, C480 M5, S3260 M5, C480 M5 ML, C125 M5, C220 M4, C240 M4, C460 M4, S3260 M4

3.0(4)

All M3

4.1(1)

4.1(1)

C220 M5, C240 M5, C480 M5, S3260 M5, C125 M5, C480 M5 ML only

4.0(2)

C220 M4, C240 M4, C460 M4, S3260 M4, C125 M5 only

3.0(4)

All M3

4.0(4)

4.0(4)

C220 M5, C240 M5, C480 M5, S3260 M5, C480 M5 ML only

4.0(2)

C220 M4, C240 M4, C460 M4, S3260 M4, C125 M5 only

3.0(4)

All M3

4.0(2)

4.0(2)

C220 M4, C240 M4, C460 M4, C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5, C480 M5 ML only

3.0(4)

All M3

4.0(1)

4.0(1)

C220 M4, C240 M4, C460 M4, C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5 only

3.0(4)

All M3

3.2(3)

3.1(3)

C220 M5, C240 M5, C480 M5, S3260 M5 only

3.0(4)

All M3/M4

3.2(2)

3.1(2)

C220 M5, C240 M5, C480 M5 only

3.0(3)

All M3/M4

3.2(1)

3.1(1)

C220 M5, C240 M5 only

3.0(3)

All M3/M4

3.1(3)

3.0(3)

All M3/M4

3.1(2)

2.0(13)

All M3/M4

3.1(1)

2.0(10)

C220 M4, C240 M4 only

2.0(9)

All other M3/M4

2.2(8)

2.0(12)

C460 M4 only

2.0(10)

C220 M4, C240 M4 only

1.5(9)

C420-M3, C260-M2, C460-M2 only

2.0(9)

For all other M3/M4

System Requirements

Cisco UCS Central Integration

The following table provides the release version with which Cisco UCS Manager can be registered with Cisco UCS Central.

Cisco UCS Manager

Cisco UCS Central

4.1(3)

2.0(1m) or later releases

4.1(2)

2.0(1l) or later releases

4.1(1)

2.0(1k) or later releases


Note

For the complete list of compatible versions of Cisco UCS Central and Cisco UCS Manager, refer Release Notes for Cisco UCS Central.


Supported Operating Systems

For detailed information about supported operating system, see the interactive UCS Hardware and Software Compatibility matrix.

Supported Web Browsers

Cisco UCS Manager GUI

Web Browsers

HTML5

Microsoft Internet Explorer 11 or higher

Mozilla Firefox 45 or higher

Google Chrome 45 or higher

Apple Safari version 9 or higher

Opera version 35 or higher

Network Requirements

For using the device connector feature, you must configure HTTPS proxy settings. The Cisco UCS Manager Administration Management Guide, Release 4.1 provides detailed information about configuring the device connector.

Cross-Version Firmware Support

The Cisco UCS Manager A bundle software (Cisco UCS Manager, Cisco NX-OS, IOM and FEX firmware) can be mixed with previous B or C bundle releases on the servers (host firmware [FW], BIOS, Cisco IMC, adapter FW and drivers).

The following table lists the mixed A, B, and C bundle versions that are supported on Cisco UCS 6200, 6300, and 6400 Series Fabric Interconnects:

Table 2. Mixed Cisco UCS Releases Supported on Cisco UCS 6200, 6300, 6400 Series Fabric Interconnects

Infrastructure Versions (A Bundles)

Host FW Versions (B or C Bundles)

2.2(8)

3.1(3)

3.2(3)

4.0(1)

4.0(2)

4.0(4)

4.1(1)

4.1(2)

4.1(3)

2.2(8)

6200

6200

6200

6200

6200

6200

6200

6200

6200

3.1(3)

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

3.2(3)

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

6200,6332, 6332-16UP

4.0(1)

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

4.0(2)

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

4.0(4)

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

6200,6332, 6332-16UP, 6454

4.1(1)

6200,6332, 6332-16UP, 6454, 64108

6200,6332, 6332-16UP, 6454, 64108

6200,6332, 6332-16UP, 6454, 64108

4.1(2)

6200,6332, 6332-16UP, 6454, 64108

6200,6332, 6332-16UP, 6454, 64108

6200,6332, 6332-16UP, 6454, 64108

4.1(3)

6200,6332, 6332-16UP, 6454, 64108

6200,6332, 6332-16UP, 6454, 64108

6200,6332, 6332-16UP, 6454, 64108

The following table lists the mixed A, B, and C bundle versions that are supported on Cisco UCS Mini fabric interconnects:

Table 3. Mixed Cisco UCS Releases Supported on Cisco UCS Mini Fabric Interconnects

Infrastructure Versions (A Bundles)

Host FW Versions (B or C Bundles)

3.1(3)

3.2(3)

4.0(1)

4.0(2)

4.0(4)

4.1(1)

4.1(2)

4.1(3)

3.1(3)

6324

6324

6324

6324

6324

6324

6324

6324

3.2(3)

6324

6324

6324

6324

6324

6324

6324

4.0(1)

6324

6324

6324

6324

6324

6324

4.0(2)

6324

6324

6324

6324

6324

6324

4.0(4)

6324

6324

6324

6324

6324

6324

4.1(1)

6324

6324

6324

4.1(2)

6324

6324

6324

4.1(3)

6324

6324

6324

The following table lists the mixed B, C bundles that are supported on all platforms with the 4.1(x)A bundle:

Table 4. Mixed B, C Bundles Supported on All Platforms with the 4.1(x)A Bundle

Infrastructure Versions (A Bundles)

Host FW Versions (B, C Bundles)

4.1(x)

6200

6300

6324

6400

ucs-k9-bundle-infra. 4.1.x.xxx.A.bin ucs-6300-k9-bundle-infra. 4.1.x.xxx.A.bin ucs-mini-k9-bundle-infra. 4.1.x.xxx.A.bin

ucs-6400-k9-bundle -infra.4.1.x.xxx.A.bin

2.2(8)

(B, C Bundles)

Yes

3.1(3)

(B, C Bundles)

Yes

Yes

Yes

3.2(3)

(B, C Bundles)

Yes

Yes

Yes

4.0(1), 4.0(2), 4.0(4)

(B, C Bundles)

Yes

Yes

Yes

Yes

4.1(1)

Yes

Yes

Yes

Yes

4.1(2)

Yes

Yes

Yes

Yes

4.1(3)

Yes

Yes

Yes

Yes


Important

If you implement cross-version firmware, you must ensure that the configurations for the Cisco UCS domain are supported by the firmware version on the server endpoints.


Internal Dependencies

The following sections provide information on the interdependencies between Cisco UCS hardware and versions of Cisco UCS Manager.

  • Version dependencies for Server FRU items such as DIMMs depend on the server type.

  • Chassis items such as fans and power supplies work with all versions of Cisco UCS Manager.

6200 Series, 6332 Series, and 6400 Series Fabric Interconnects and Components

Blade Servers


Note

In a mixed firmware configuration, we recommend that the minimum server bundle corresponds to the Minimum Software Version. The infrastructure must be at or above the Minimum Software Version.


Table 5. Minimum Host Firmware Versions for Blade Servers

Servers

Minimum Software Version

UCS 6200 Series FI

Minimum Software Version

UCS 6332, 6332-16UP FI

Minimum Software Version

UCS 6332, 6332-16UP FI

Minimum Software Version

UCS 6454 FI

Minimum Software Version

UCS 64108 FI

Recommended Software Version

UCS 6200 Series FI

UCS 6332, 6332-16UP FI

UCS 6400 Series FI

UCS-IOM- 2204

UCS-IOM- 2208

UCS-IOM- 2204

UCS-IOM- 2208

UCS-IOM- 2304

UCS-IOM- 2304V2

UCS-IOM- 2204

UCS-IOM- 2208

UCS-IOM- 2408*

UCS-IOM- 2204

UCS-IOM- 2208

UCS-IOM- 2408*

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2408*

* UCS-IOM-2408 supported on M4 and M5 only with UCS 6400 Series FI & VIC 1300/1400

B22 M3 E5-2400

B22 M3 E5-2400 v2

Note:

M3 servers do not support the 6454 FI and 2408 IOM combination. However, they do support the 6454 FI and 2208 IOM, and 6454 FI and 2204 IOM combinations.

2.2(8a)

2.2(8a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4m)

4.0(1a)

4.1(1a)

4.1(3f)

B200 M3 E5-2600

B200 M3 E5-2600 v2

Note:

M3 servers do not support the 6454 FI and 2408 IOM combination. However, they do support the 6454 FI and 2208 IOM, and 6454 FI and 2204 IOM combinations.

2.2(8a)

2.2(8a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4m)

4.0(1a)

4.1(1a)

4.1(3f)

B200 M4

2.2(8a)

3.1(3a)

3.1(3a)

4.0(4m)

4.0(1a)

4.1(1a)

4.1(3f)

B200 M5

3.2(1d)

3.2(1d)

3.2(1d)

4.0(4m)

4.0(1a)

4.1(1a)

4.1(3f)

B260 M4 E7-2800 v2

B260 M4 E7-4800 v2

B260 M4 E7-8800 v2

B260 M4 E7-4800 v3

B260 M4 E7-8800 v3

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4m)

4.0(1a)

4.1(1a)

4.1(3f)

B260 M4 E7-4800 v4

B260 M4 E7-8800 v4

2.2(8b)

2.2(8b)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4m)

4.0(1a)

4.1(1a)

4.1(3f)

B420 M3 E5-4600

B420 M3 E5-4600 v2

Note:

M3 servers do not support the 6454 FI and 2408 IOM combination. However, they do support the 6454 FI and 2208 IOM, and 6454 FI and 2204 IOM combinations.

2.2(8a)

2.2(8a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4m)

4.0(1a)

4.1(1a)

4.1(3f)

B420 M4 E5-4600 v3

B420 M4 E5-4600 v4

2.2(8a)

2.2(8b)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4m)

4.0(1a)

4.1(1a)

4.1(3f)

B460 M4 E7-4800 v2

B460 M4 E7-8800 v2

B460 M4 E7-4800 v3

B460 M4 E7-8800 v3

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4m)

4.0(1a)

4.1(1a)

4.1(3f)

B460 M4 E7-4800 v4

B460 M4 E7-8800 v4

2.2(8b)

2.2(8b)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(4m)

4.0(1a)

4.1(1a)

4.1(3f)

B480 M5

3.2(2b)

3.2(2b)

3.2(2b)

4.0(4m)

4.0(1a)

4.1(1a)

4.1(3f)

Rack Servers

Table 6. Minimum Host Firmware Versions for Rack Servers

Servers

Minimum Software Version

UCS 6200 Series FI

Minimum Software Version

UCS 6332, 6332-16UP

Minimum Software Version

UCS 6454

Minimum Software Version

UCS 64108

Recommended Software Version

UCS 6200 Series FI

UCS 6332, 6332-16UP FI

UCS 6400 Series FI

C22 M3 and M3L

2.2(8a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

C24 M3, M3L, and M3S2

2.2(8a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

C220 M3

2.2(8a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

C220 M4

2.2(8a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

C220 M5

3.2(1d)

3.2(1d)

4.0(1a)

4.1(1a)

4.1(3f)

C240 M3

2.2(8a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

C240 M4

2.2(8a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

C240 M5

3.2(1d)

3.2(1d)

4.0(1a)

4.1(1a)

4.1(3f)

C460 M4 E7-2800 v2

C460 M4 E7-4800 v2

C460 M4 E7-8800 v2

C460 M4 E7-4800 v3

C460 M4 E7-8800 v3

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

2.2(8a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

C460 M4 E7-8800 v4

2.2(8b)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

C480 M5

3.2(2b)

3.2(2b)

4.0(1a)

4.1(1a)

4.1(3f)

S3260 M4

3.1(2b)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

S3260 M5

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(3f)

C125 M5

NA

4.0(1a) 4.0(1a)

4.1(1a)

4.1(3f) (only on UCS 6332, UCS 6332-16UP FI, and UCS 6400 Series FI

C480 M5 ML

4.0(2a)

4.0(2a)

4.0(2a)

4.1(1a)

4.1(3f)

Adapters

Table 7. Minimum Software Versions for Adapters

Adapters

Minimum Software Version

UCS 6200 Series FI

Minimum Software Version

UCS 6332, 6332-16UP

Minimum Software Version

UCS 6332, 6332-16UP

Minimum Software Version

UCS 6454

Minimum Software Version

UCS 64108

Recommended Software Version

UCS 6200 Series FI

UCS 6332, 6332-16UP FI

UCS 6400 Series FI

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2304

UCS-IOM-2304V2

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2408*

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2408*

UCS-IOM-2204

UCS-IOM-2208

UCS-IOM-2408*

* UCS-IOM-2408 supported on M4 and M5 only with UCS 6400 Series FI

UCSC-P-M5S100GF (Mellanox ConnectX-5 MCX515A-CCAT 1 x 100GbE QSFP PCI NIC)

4.1(1a)

4.1(1a)

4.1(1a)

4.1(1a)

4.1(1a)

Mellanox ConnectX-5 MCX512A-ACAT 2 x 25Gb/10GbE SFP PCI

UCSC-P-M5D25GF (Mellanox ConnectX-5 MCX512A-ACAT 2 x 25Gb/10GbE SFP PCI)

4.1(1a)

4.1(1a)

4.1(1a)

4.1(1a)

4.1(1a)

Mellanox ConnectX-5 MCX512A-ACAT 2 x 25Gb/10GbE SFP PCI

UCSC-O- M5S100GF (Mellanox ConnectX-5 MCX545B-ECAN 1 x 100GbE QSFP PCI NIC)

4.1(1a)

4.1(1a)

4.1(1a)

4.1(1a)

4.1(1a)

Mellanox ConnectX-5 MCX545B-ECAN 1 x 100GbE QSFP PCI

UCSC-P -M4D25GF (Mellanox MCX4121A-ACAT Dual Port 10/25G SFP28 NIC)

4.0(4m)

4.0(4m)

4.0(4m)

4.0(4m)

4.1(1a)

4.1(3f)

UCSC-PCIE-QS100GF (QLogic QL45611HLCU 100GbE)

4.0(4m)

4.0(4m)

4.0(4m)

4.0(4m)

4.1(1a)

4.1(3f)

UCSC-PCIE-C100-04 (UCS VIC 1495)

NA

4.0(2a)

4.0(2a)

NA

4.1(1a)

4.1(3f)(only on UCS 6332, 6332-16UP FI)

UCSC-MLOM-C100-04 (UCS VIC 1497)

NA

4.0(2a)

4.0(2a)

NA

4.1(1a)

4.1(3f)(only on UCS 6332, 6332-16UP FI)

UCSB-MLOM-40G-04 (UCS VIC 1440)

4.0(1a)

4.0(1a)

4.0(1a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSB-VIC-M84-4P (UCS VIC 1480)

4.0(1a) 4.0(1a) 4.0(1a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-C25Q-04 (UCS VIC 1455)

4.0(1a) 4.0(1a) 4.0(1a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-MLOM-C25Q-04 (UCS VIC 1457)

4.0(1a) 4.0(1a) 4.0(1a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-BD16GF (Emulex LPe31002 Dual-Port 16G FC HBA)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-ID40GF (Intel XL710 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-IQ10GF (Intel X710-DA4 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-ID10GF (Intel X710-DA2 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-ID25GF (Intel XXV710-DA2 Dual port 25 Gigabit Ethernet PCIe adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-ID10GC (Intel X550-T2 adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(3f)

N2XX-AIPCI01 (Intel X520 dual port adapter)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-ID25GF (Intel X710 25Gb Dual-port BaseT)

3.2(3a)

3.2(3a)

3.2(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-QD40GF (QLogic QL45412H 40GbE)

3.2(2b)

3.2(2b)

3.2(2b)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-IQ10GC (Intel X710-T4)

3.2(2b)

3.2(2b)

3.2(2b)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-QD16GF (QLogic QLE2692-CSC)

3.2(1d)

3.2(1d)

3.2(1d)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-C40Q-03 (UCS VIC 1385)

UCSC-MLOM-C40Q-03 (UCS VIC 1387)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCS-VIC-M82-8P (UCS VIC 1280)

UCSB-MLOM-40G-01 (UCS VIC 1240)

UCSB-MLOM-PT-01 (Cisco Port Expander Card)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSB-MLOM-40G-03 (UCS VIC 1340)

UCSB-VIC-M83-8P (UCS VIC 1380)

UCSC-MLOM-CSC-02 (UCS VIC 1227)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-CSC-02 (UCS VIC 1225)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-F-FIO-1000MP (Cisco UCS Fusion ioMemory – PX600, 1.0TB)

UCSC-F-FIO-1300MP (Cisco UCS Fusion ioMemory – PX600, 1.3TB)

UCSC-F-FIO-2600MP (Cisco UCS Fusion ioMemory – PX600, 2.6TB)

UCSC-F-FIO-5200MP (Cisco UCS Fusion ioMemory – PX600, 5.2TB)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSB-FIO-1600MS (Cisco UCS Fusion ioMemory Mezzanine SX300, 1.6TB)

UCSB-FIO-1300MS (Cisco UCS Fusion ioMemory Mezzanine PX600, 1.3TB)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-INVADER-3108

UCSC-NYTRO-200GB (Cisco Nytro MegaRAID 200GB Controller)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-MLOM-C10T-02 (UCS VIC 1227T)

UCSC-PCIE-C10T-02 (UCS VIC 1225T)

UCSC-F-FIO-785M (Cisco UCS 785GB MLC Fusion ioDrive2 for C-Series Servers)

UCSC-F-FIO-365M (Cisco UCS 365GB MLC Fusion ioDrive2 for C-Series Servers)

UCSC-F-FIO-1205M (Cisco UCS 1205GB MLC Fusion ioDrive2 for C-Series Servers)

UCSC-F-FIO-3000M (Cisco UCS 3.0TB MLC Fusion ioDrive2 for C-Series Servers)

UCSC-F-FIO-1000PS (UCS 1000GB Fusion ioMemory3 PX Performance line for Rack M4)

UCSC-F-FIO-1300PS (UCSC-F-FIO-1300PS)

UCSC-F-FIO-2600PS (UCS 2600GB Fusion ioMemory3 PX Performance line for Rack M4)

UCSC-F-FIO-5200PS (UCS 5200GB Fusion ioMemory3 PX Performance line for Rack M4)

UCSC-F-FIO-6400SS (UCS 6400GB Fusion ioMemory3 SX Scale line for C-Series)

UCSC-F-FIO-3200SS (UCS 3200GB Fusion ioMemory3SX Scale line for C-Series)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-E14102B (Emulex OCe14102B-F)

2.2(8a)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-IQ10GF (Intel X710-DA4 adapter)

UCSC-PCIE-ID10GF (Intel X710-DA2 adapter)

UCSC-PCIE-ID40GF (Intel XL710 adapter)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-F-I80010 (Intel P3700 HHHL 800GB NVMe PCIe SSD)

UCSC-F-I12003 (Intel P3600 HHHL 1200GB NVMe PCIe SSD)

UCSC-F-I160010 (Intel P3700 HHHL 1600GB NVMe PCIe SSD)

UCSC-F-I20003 (Intel P3600 HHHL 2000GB NVMe PCIe SSD )

UCS-PCI25-40010 (Intel P3700 400GB NVMe PCIe SSD)

UCS-PCI25-8003 (Intel P3600 800GB NVMe PCIe SSD)

UCS-PCI25-80010 (Intel P3700 800GB NVMe PCIe SSD)

UCS-PCI25-16003 (Intel P3600 1600GB NVMe PCIe SSD)

UCSC-F-H19001 (UCS Rack PCIe/NVMe Storage 1900GB HGST SN150)

UCSC-F-H38001 (UCS Rack PCIe/NVMe Storage 3800GB HGST SN150)

UCS-PCI25-38001 (UCS PCIe/NVMe2.5"SFF Storage 3800GB HGST SN100)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-QD32GF (Qlogic QLE2742)

N2XX-AQPCI05 (Qlogic QLE2562)

UCSC-PCIE-Q2672 (Qlogic QLE2672-CSC)

UCSC-PCIE-BD32GF (Emulex LPe32002)

UCSC-PCIE-BS32GF (Emulex LPe32000)

N2XX-AEPCI05 (Emulex LPe12002)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-E16002 (Emulex LPe16002-M6 16G FC rack HBA)

3.2(1d)

3.2(1d)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-PCIE-ID10GC (Intel X550 Dual-port 10GBase-T NIC)

3.1(2b)

3.1(3a)

3.1(3a)

4.0(1a)

4.1(1a)

4.1(3f)

UCSC-OCP-QD10GC (QLogic FastLinQ QL41132H Dual Port 10GbE Adapter)

4.0(1a) 4.0(1a) 4.0(1a) 4.0(1a) 4.0(1a)

4.2(1f) (C125 M5 only)

UCSC-PCIE-QD25GF (QLogic FastLinQ QL41212H 25GbE adapter )

3.1(3a)

3.1(3a)

3.1(3a)

4.0(1a)

4.0(1a)

4.2(1f) (M4, M5 servers)

UCSC-OCP-QD25GF (QLogic FastLinQ QL41232H Dual Port 25GbE Adapter)

4.0(1a) 4.0(1a) 4.0(1a) 4.0(1a) 4.0(1a)

4.2(1f) (C125 M5 only)

UCSC-PCIE-QD40GF (à QLogic FastLinQ QL45412H 40GbE adapter)

3.1(3a)

3.1(3a)

3.1(3a)

4.0(1a)

4.0(1a)

4.2(1f) (M4, M5 servers)

UCSC-PCIE-QD10GC (Qlogic QL41162HLRJ-11-SP dual-port 10GBase-T CAN)

4.0(2a)

4.0(2a)

4.0(2a)

4.0(2a)

4.0(2a)

4.2(1f) (C125 M5 only)

UCSC-PCIE-C100-04 (Cisco UCS VIC 1495)

4.0(1a) 4.0(1a) 4.0(1a) 4.0(1a) 4.0(1a)

4.2(1f) (M5, M6 servers)

UCSC-MLOM-C100-04 (Cisco UCS VIC 1497)

4.0(2a)

4.0(2a)

4.0(2a)

4.0(2a)

4.0(2a)

4.2(1f) (M5 servers)

Other Hardware

We recommend that you use the latest software version for all Chassis, Fabric Interconnects, Fabric Extenders, Expansion Modules and Power Supplies. To determine the minimum software version for your mixed environment, see Cross-Version Firmware Support. The following is the list of other supported hardware:

Table 8. Supported Hardware for UCS 6400 Series Fabric Interconnects

Type

Details

Chassis

UCSC-C4200-SFF

N20–C6508

UCSB-5108-DC

UCSB-5108-AC2

UCSB-5108-DC2

UCSB-5108-HVDC

Fabric Interconnects

UCS 64108

UCS 6454

Fabric Extenders

Cisco UCS 2204XP

Cisco UCS 2208XP

Cisco Nexus 2232PP

Cisco Nexus 2232TM-E

Cisco UCS 2408

Power Supplies

N9K-PUV-1200W

UCSB-PSU-2500HVDC

UCSB-PSU-2500DC48

UCSC-PSU-930WDC

UCSC-PSU2V2-930WDC

UCSC-PSUV2-1050DC

UCSC-PSU1-770W

UCSC-PSU1-1050W

UCSC-PSU2-1400

UCSC-PSU2V2-1400W

UCSC-PSU2V2-650W

UCSC-PSU2V2-1200W

UCSB-PSU-2500ACPL

UCSB-PSU-2500ACDV

N20-PAC5-2500W

Table 9. Supported Hardware for UCS 6332, UCS 6332-16UP Fabric Interconnects

Type

Details

Chassis

N20–C6508

UCSB-5108-DC

UCSB-5108-AC2

UCSB-5108-DC2

UCSB-5108-HVDC

Fabric Interconnects

UCS 6332UP

UCS 6332-16UP

Fabric Extenders

Cisco UCS 2208XP

Cisco UCS 2204XP

Cisco Nexus 2232PP

Cisco Nexus 2232TM-E

Cisco UCS 2304

Cisco UCS 2304V2

Cisco Nexus 2348UPQ

Power Supplies

UCSB-PSU-2500HVDC

UCSB-PSU-2500DC48

UCSC-PSU-930WDC

UCSC-PSU2V2-930WDC

UCSC-PSUV2-1050DC

UCSC-PSU1-770W

UCSC-PSU1-1050W

UCSC-PSU2-1400

UCSC-PSU2V2-1400W

UCSC-PSU2V2-650W

UCSC-PSU2V2-1200W

UCSB-PSU-2500ACPL

UCSB-PSU-2500ACDV

N20-PAC5-2500W

N9K-PUV-1200W


Note

The 40G backplane setting is not applicable for 22xx IOMs.


Table 10. Supported Hardware for UCS 6200 Fabric Interconnects

Type

Details

Chassis

N20–C6508

UCSB-5108-DC

UCSB-5108-AC2

UCSB-5108-DC2

UCSB-5108-HVDC

Fabric Interconnects

UCS 6248UP

UCS 6296UP

Fabric Extenders

UCS 2208XP

UCS 2204XP

Cisco Nexus 2232PP

Cisco Nexus 2232TM-E

Expansion Modules

UCS-FI-E16UP

Power Supplies

UCSB-PSU-2500HVDC

UCSB-PSU-25004DC48

UCSC-PSU-930WDC

UCSC-PSU2V2-930WDC

UCSC-PSUV2-1050DC

UCSC-PSU1-770W

UCSC-PSU1-1050W

UCSC-PSU2-1400

UCSC-PSU2V2-1400W

UCSC-PSU2V2-650W

UCSC-PSU2V2-1200W

UCSB-PSU-2500ACPL

UCSB-PSU-2500ACDV

N20-PAC5-2500W

GB Connector Modules, Transceiver Modules, and Cables

Following is the list of Gb connector modules, transceiver modules, and supported cables:


Note


Table 11. Supported Transceiver Modules and Cables for GB Connector Modules

Gb Connector Modules

Transceiver Modules and Cables

FC for UCS 6400 Series Fabric Interconnects

DS-SFP-FC8G-SW

DS-SFP-FC8G-LW

DS-SFP-FC16G-SW

DS-SFP-FC16G-LW

DS-SFP-FC32G-SW

DS-SFP-FC32G-LW

100-Gb for UCS 6400 Series Fabric Interconnects

QSFP-40/100G-SRBD

QSFP-100G-SR4-S

QSFP-100G-LR4-S

QSFP-100G-SM-SR

QSFP-100G-CU1M

QSFP-100G-CU2M

QSFP-100G-CU3M

QSFP-100G-AOC1M

QSFP-100G-AOC2M

QSFP-100G-AOC3M

QSFP-100G-AOC5M

QSFP-100G-AOC7M

QSFP-100G-AOC10M

QSFP-100G-AOC15M

QSFP-100G-AOC20M

QSFP-100G-AOC25M

QSFP-100G-AOC30M

40-Gb for UCS 6400 Series Fabric Interconnects

QSFP-40G-SR4

QSFP-40G-SR4-S

QSFP-40G-SR-BD

QSFP-40G-LR4

QSFP-40G-LR4-S

QSFP-40G-ER4

WSP-Q40GLR4L

QSFP-H40G-CU1M

QSFP-H40G-CU3M

QSFP-H40G-CU5M

QSFP-H40G-ACU7M

QSFP-H40G-ACU10M

QSFP-H40G-AOC1M

QSFP-H40G-AOC2M

QSFP-H40G-AOC3M

QSFP-H40G-AOC5M

QSFP-H40G-AOC10M

QSFP-H40G-AOC15M

40-Gb for UCS 6300 Series Fabric Interconnects

QSFP-40G-SR4 in 4x10G mode with external 4x10G splitter cable to SFP-10G-SR

QSFP-40G-CSR4

QSFP-40G-LR4

QSFP-40G-LR4-S

QSFP-40G-SR-BD

QSFP-40G-SR4

QSFP-40G-SR4-S

FET-40G

QSFP-4SFP10G-CU1M

QSFP-4SFP10G-CU3M

QSFP-4SFP10G-CU5M

QSFP-4X10G-AC7M

QSFP-4X10G-AC10M

QSFP-4X10G-AOC1M

QSFP-4X10G-AOC2M

QSFP-4X10G-AOC3M

QSFP-4X10G-AOC5M

QSFP-4X10G-AOC7M

QSFP-4X10G-AOC10M

QSFP-H40G-ACU7M

QSFP-H40G-ACU10M

QSFP-H40G-AOC1M

QSFP-H40G-AOC2M

QSFP-H40G-AOC3M

QSFP-H40G-AOC5M

QSFP-H40G-AOC7M

QSFP-H40G-AOC10M

QSFP-H40G-AOC15M

QSFP-H40G-CU1M

QSFP-H40G-CU3M

QSFP-H40G-CU5M

32-Gb FC for UCS 6454 Fabric Interconnects

DS-SFP-FC32G-SW

DS-SFP-FC32G-LW

25-Gb for UCS 6454 Fabric Interconnects

4x25GbE 10M1

25-Gb for UCS 6400 Series Fabric Interconnects

SFP-25G-SR-S

SFP-H25G-CU1M

SFP-H25G-CU2M

SFP-H25G-CU3M

SFP-H25G-CU5M

SFP-H25G-AOC1M

SFP-H25G-AOC2M

SFP-H25G-AOC3M

SFP-H25G-AOC5M

SFP-H25G-AOC7M

SFP-H25G-AOC10M

16-Gb for UCS 6454 and UCS 6332UP Fabric Interconnects

DS-SFP-FC16G-LW

DS-SFP-FC16G-SW

10-Gb for UCS 6400 Series Fabric Interconnects

SFP-10G-SR

SFP-10G-SR-S

SFP-10G-LR

SFP-10G-LR-S

SFP-10G-ER

SFP-10G-ER-S

SFP-10G-ZR

SFP-10G-ZR-S

FET-10G

Note 

FET-10G is only supported between Fabric Interconnects and IOMs/FEXs.

SFP-10G-LRM

SFP-H10GB-CU1M

SFP-H10GB-CU2M

SFP-H10GB-CU3M

SFP-H10GB-CU5M

SFP-H10GB-ACU7M

SFP-H10GB-ACU10M

SFP-10G-AOC1M

SFP-10G-AOC2M

SFP-10G-AOC3M

SFP-10G-AOC5M

SFP-10G-AOC7M

SFP-10G-AOC10M

10-Gb for UCS 6300 and 6200 Series Fabric Interconnects

SFP-10G-SR

SFP-10G-SR-S

SFP-10G-LR

SFP-10G-LR-S

SFP-H10GB-CU1M

SFP-H10GB-CU2M

SFP-H10GB-CU3M

SFP-H10GB-CU5M

SFP-H10GB-ACU7M

SFP-H10GB-ACU10M

FET-10G

2SFP-10G-AOC1M

SFP-10G-AOC2M

SFP-10G-AOC3M

SFP-10G-AOC5M

SFP-10G-AOC7M

SFP-10G-AOC10M

8-Gb FC for UCS 6400 Series and UCS 6332UP Fabric Interconnects

DS-SFP-FC8G-SW

DS-SFP-FC8G-LW

4-Gb FC for UCS 6300 and 6200 Series Fabric Interconnects

DS-SFP-FC4G-SW

DS-SFP-FC4G-LW

1-Gb for UCS 6400 Series Fabric Interconnects

GLC-TE

GLC-SX-MMD

SFP-GE-T

1-Gb for UCS 6300 and 6200 Series Fabric Interconnects

GLC-TE

GLC-SX-MM

GLC-LH-SM

1 Supported from Cisco UCS Manager, Release 4.1(2)
2 SFP-10G-AOC cables are only supported for Cisco 1455 and 1457 VIC cards.

Note

The maximum length of fiber optic runs is limited to 300 meters. This is imposed by our use of 802.3X/802.1Qbb Priority Pauses. SFP-10G-LR is supported between fabric interconnect and FEX, but the 300 m limit still applies.


Cisco UCS Mini and Components

UCS Mini Supported Chassis

Table 12. Minimum Software Versions for UCS Mini Chassis

Chassis

Minimum Software Version

Recommended Software Version

UCSB-5108-AC2

3.0(1e)

4.1(3f)

UCSB-5108-DC2

3.0(2c)

4.1(3f)

UCS Mini Supported Blade and Rack Servers

Table 13. Minimum Host Firmware Versions for Blade and Rack Servers on UCS Mini

Servers

Minimum Software Version

Recommended Software Version

B200 M5

3.2(1d)

4.1(3f)

B200 M3

3.1(3a)

4.1(3f)

B200 M4

3.1(3a)

4.1(3f)

B260 M4

3.1(3a)

4.1(3f)

B420 M3

3.1(3a)

4.1(3f)

B420 M4

3.1(3a)

4.1(3f)

B460 M4

3.1(3a)

4.1(3f)

B480 M5

3.1(3a)

4.1(3f)

B22 M3

3.1(3a)

4.1(3f)

C220 M3

3.1(3a)

4.1(3f)

C240 M3

3.1(3a)

4.1(3f)

C220 M4

3.1(3a)

4.1(3f)

C240 M4

3.1(3a)

4.1(3f)

C460 M4

3.1(3a)

4.1(3f)

C220 M5

3.2(1d)

4.1(3f)

C240 M5

3.2(1d)

4.1(3f)

C480 M5

3.2(2b)

4.1(3f)

UCS Mini Supported Adapters

Adapters

Minimum Software Version

Recommended Software Version

UCSB-MLOM-40G-04 (UCS VIC 1440)

UCSB-VIC-M84-4P (UCS VIC 1480)

4.0(2a)

4.1(3f)

UCSC-PCIE-IQ10GC (Intel X710-T4)

3.2(2b)

4.1(3a)

UCSC-PCIE-QD25GF (QLogic QL41212H 25GbE)

UCSC-PCIE-QD40GF (QLogic QL45212H 40GbE)

3.2(2b)

4.1(3f)

UCSC-PCIE-C40Q-03 (UCS VIC 1385)

UCSC-MLOM-C40Q-03 (UCS VIC 1387)

3.1(3a)

4.1(3f)

UCS-VIC-M82-8P (UCS VIC 1280)

UCSB-MLOM-40G-01 (UCS VIC 1240)

UCSB-MLOM-PT-01 (Cisco Port Expander Card)

3.1(3a)

4.1(3f)

UCSB-MLOM-40G-03 (UCS VIC 1340)

UCSB-VIC-M83-8P (UCS VIC 1380)

UCSC-MLOM-CSC-02 (UCS VIC 1227)

3.1(3a)

4.1(3f)

UCSC-PCIE-CSC-02 (UCS VIC 1225)

3.1(3a)

4.1(3f)

UCS Mini Supported Fabric Interconnects

Fabric Interconnects

Minimum Software Version

Recommended Software Version

Cisco UCS 6324

3.1(3a)

4.1(3f)

UCS Mini Supported Fabric Extenders for Secondary Chassis

Fabric Extenders

Minimum Software Version

Recommended Software Version

UCS 2204 XP

3.1(3a)

4.1(3f)

UCS 2208 XP

3.1(3a)

4.1(3f)

UCS Mini Supported Power Supplies

Power Supplies

Minimum Software Version

Recommended Software Version

UCSB-PSU-2500ACDV

UCSB-PSU-2500DC48

UCSC-PSU-930WDC

UCSC-PSU2V2-930WDC

UCSC-PSUV2-1050DC

UCSC-PSU1-770W

UCSC-PSU2-1400

UCSC-PSU2V2-1400W

UCSC-PSU2V2-650W

UCSC-PSU2V2-1200W

3.1(3a)

4.1(3f)

UCS Mini Supported Gb Connector Modules

We recommend that you use the current software version for Gb port speed connections. Following is the list of Gb connector modules and supported cables:


Note

Transceiver modules and cables that are supported on a specific Fabric Interconnect are not always supported on all VIC adapters, IOMs, or FEXes that are compatible with that Fabric Interconnect. Detailed compatibility matrices for the transceiver modules are available here:https://www.cisco.com/c/en/us/support/interfaces-modules/transceiver-modules/products-device-support-tables-list.html


Gb Connector Modules

Transceivers Modules and Cables

40-Gb

QSFP-40G-SR4 in 4x10G mode with external 4x10G splitter cable to SFP-10G-SR

QSFP-4SFP10G-CU1M

QSFP-4SFP10G-CU3M

QSFP-4SFP10G-CU5M

QSFP-4X10G-AC7M

QSFP-4X10G-AC10M

QSFP-4X10G-AOC1M

QSFP-4X10G-AOC2M

QSFP-4X10G-AOC3M

QSFP-4X10G-AOC5M

QSFP-4X10G-AOC7M

QSFP-4X10G-AOC10M

10-Gb

SFP-10G-LR

SFP-10G-LR-S

SFP-10G-LR-X

SFP-10G-SR

SFP-10G-SR-S

SFP-10G-SR-X

SFP-H10GB-CU1M

SFP-H10GB-CU2M

SFP-H10GB-CU3M

SFP-H10GB-CU5M

SFP-H10GB-ACU7M

SFP-H10GB-ACU10M

SFP-10G-AOC1M

SFP-10G-AOC2M

SFP-10G-AOC3M

SFP-10G-AOC5M

SFP-10G-AOC7M

SFP-10G-AOC10M

8-Gb

DS-SFP-FC8G-SW

DS-SFP-FC8G-LW

4-Gb

DS-SFP-FC4G-SW

DS-SFP-FC4G-LW

1-Gb

GLC-TE

GLC-LH-SM

GLC-SX-MM

Upgrade and Downgrade Guidelines

  • In a system with Cisco UCS 64108 Fabric Interconnects, you cannot downgrade from Cisco UCS Manager Release 4.1.

    See the Cisco UCS Manager Firmware Management Guide, Release 4.1 section Firmware Upgrade to Cisco UCS Manager Release 4.1 for detailed upgrade paths.

  • When upgrading or downgrading systems using Intel Volume Management Device (VMD) for NVMe, the system will fail to boot if VMD is enabled or disabled in the BIOS after OS installation. Do not change the BIOS setting after OS installation.

  • Upgrading to the latest Intel firmware images in Release 4.1(1a), requires Cisco UCS Manager to be updated to Release 4.1(1a) as well.

  • RDMA upgrade/downgrade: if downgrading from RDMA-supported releases to non-RDMA-supported releases, you must manually remove all RDMA-related configurations before downgrade. If upgrading eNIC and eNIC RDMA drivers, upgrade all drivers to the same version at the same time; otherwise, functionality could be lost.

Downgrade Limitation for Cisco UCS C125 M5 Servers

  • Starting with Release 4.1(3), AMD Platform Secure Boot (PSB) is introduced in Cisco UCS C125 M5 servers that implements hardware-rooted boot integrity. Once you upgrade to release 4.1(3) or later, you cannot:

    • downgrade Cisco UCS C125 M5 Rack Server Node based on 2nd generation AMD EPYC 7002 Series Processors (Rome) to any release earlier than 4.1(3).

    • downgrade Cisco UCS C125 M5 Rack Server Node based on AMD EPYC 7001 (Naples) to any release earlier than 4.0(2k).

Capability Catalog

The Cisco UCS Manager Capability Catalog is a set of tunable parameters, strings, and rules. Cisco UCS uses the catalog to update the display and configurability of components such as newly qualified DIMMs and disk drives for servers.

The Capability Catalog is embedded in Cisco UCS Manager, but at times it is also released as a single image file to make updates easier.

The following table lists the PIDs added in this release and maps UCS software releases to the corresponding Capability Catalog file.

Table 14. Version Mapping

UCS Release

Catalog File Name

Additional PIDs In This Release

4.1(3f)

ucs-catalog.4.1.3h.T.bin

4.1(3e)

ucs-catalog.4.1.3h.T.bin

4.1(3d)

ucs-catalog.4.1.3f.T.bin

Drives for C125 M5, C220 M5, C240 M5, C240 SD M5, C480 M5, and C480 M5 ML servers:

  • UCS-SD960GBKNK9

  • UCS-SD38TBKNK9

  • UCS-SD800GBKNK9

  • UCS-SD16TBKNK9

Drives for B200 M5 and B480 M5 servers:

  • UCS-SD960GBKBNK9

  • UCS-SD38TBKBNK9

  • UCS-SD800GBKBNK9

  • UCS-SD16TBKBNK9

Drives for S3260 M5 server:

  • UCS-S3260-TSD8K9

4.1(3c)

ucs-catalog.4.1.3c.T.bin

Drives for C125 M5, C220 M5, C240 M5, C240 SD M5, C480 M5, and C480 M5 ML servers:

  • UCS-SD960GK1X-EV

  • UCS-SD19TK1X-EV

  • UCS-SD38TK1X-EV

  • UCS-SD76TK1X-EV

  • UCS-SD15TK1X-EV

Drives for B200 M5 and B480 M5 servers:

  • UCS-SD960GKB1X-EV

  • UCS-SD19TKB1X-EV

  • UCS-SD38TKB1X-EV

  • UCS-SD76TKB1X-EV

  • UCS-SD15TKB1X-EV

  • UCS-SD800GKB3X-EP

  • UCS-SD16TKB3X-EP

  • UCS-SD32TKB3X-EP

Drives for C125 M5, C220 M5, C240 M5, and C480 M5 servers:

  • UCS-SD800GK3X-EP

  • UCS-SD16TK3X-EP

  • UCS-SD32TK3X-EP

Drives for S3260 M5 server:

  • UCS-S3260-3KSD8

  • UCS-S3260-3KSD16

  • UCS-S3260-3KSD32

Drives for C220 M5 and C240 M5 servers:

  • UCS-SD19TBEM2NK9

CPUs for C125 M5 server:

  • UCS-CPU-A7F32

  • UCS-CPU-A7262

  • UCS-CPU-A7272

  • UCS-CPU-A7282

  • UCS-CPU-A7302

  • UCS-CPU-A7402

  • UCS-CPU-A7452

4.1(3b)

ucs-catalog.4.1.3b.T.bin

4.1(3a)

ucs-catalog.4.1.2e.T.bin

CPUs for C125 M5 servers:

  • UCS-CPU-A7F32

  • UCS-CPU-A7302

  • UCS-CPU-A7272

4.1(2c)

ucs-catalog.4.1.2g.T.bin

4.1(2b)

ucs-catalog.4.1.2b.T.bin

Micro-SD Card:

  • UCS-S-MSD960K9

4.1(2a)

ucs-catalog.4.1.1d.T.bin

CPUs for C240 M5 servers:

  • UCS-CPU-I6256

  • UCS-CPU-I6250

Drives for C220 M5 and C240 M5 servers:

  • UCS-HD16T7KL4KN

  • UCS-HD14TT7KL4KN

Drives for UCS S3260 M5 servers:

  • UCS-S3260-HDT14T

  • UCS-S3260-HDT14TR

  • UCS-S3260-HD16T

  • UCS-S3260-HD16TR

4.1(1e)

ucs-catalog.4.1.1e.T.bin

4.1(1d)

ucs-catalog.4.1.1d.T.bin

CPUs for C240 M5 servers:

  • UCS-CPU-I6256

  • UCS-CPU-I6250

Drives for C220 M5 and C240 M5 servers:

  • UCS-HD16T7KL4KN

  • UCS-HD14TT7KL4KN

Drives for UCS S3260 M5 servers:

  • UCS-S3260-HDT14T

  • UCS-S3260-HDT14TR

  • UCS-S3260-HD16T

  • UCS-S3260-HD16TR

4.1(1c)

ucs-catalog.4.1.1c.T.bin

4.1(1b)

ucs-catalog.4.1.1b.T.bin

CPUs for UCS B200 M5, C220 M5, and C240 M5 servers:

  • UCS-CPU-I6258R

  • UCS-CPU-I6248R

  • UCS-CPU-I6242R

  • UCS-CPU-I6246R

Drives:

  • UCS-HD10T7K4KAN

  • UCS-S3260-HD10TA

  • UCS-S3260-10TARR

  • UCS-HD10T7K4KAN

  • UCS-SD960GBM2NK9

  • UCS-SD38TBEM2NK9

  • UCS-SD76TBEM2NK9

4.1(1a)

ucs-catalog.4.1.1a.T.bin

Cisco UCS 64108 Fabric Interconnect:

  • UCS-FI-6454

NICs for UCSC-C125 M5:

  • UCSC-PCIE-IQ10GF

  • UCSC-PCIE-ID25GF

  • UCSC-PCIE-ID10GF

GPU for UCSC-C125 M5:

  • UCSC-GPU-T4-16

NVME Drives for UCSC-C125:

  • UCSC-NVME2H-I1000

  • UCSC-NVME2H-I4000

  • UCSC-NVME2H-I1600

  • UCSC-NVME2H-I3200

HBA for UCSC-C125 M5:

  • UCSC-PCIE-QD16GF

Mellanox NICs for UCS C220 M5, C240 M5, C480 M5:

  • UCSC-P-M5S100GF

  • UCSC-P-M5D25GF

Mellanox NICs for UCS C125 M5:

  • UCSC-O-M5S100GF

GPU in the IO Expander for UCSC-S3260 M5:

  • UCSC-GPU-T4-16

Default Open Ports

The following table lists the default open ports used in Cisco UCS Manager Release 4.1.

Port

Interface

Protocol

Traffic Type

Fabric Interconnect

Usage

22

CLI

SSH

TCP

UCS 6200 Series

UCS 6300 Series

UCS 6400 Series

Cisco UCS Manager CLI access

80

XML

HTTP

TCP

UCS 6200 Series

UCS 6300 Series

UCS 6400 Series

Cisco UCS Manager GUI and third party management stations.

Client download

443

XML

HTTP

TCP

UCS 6200 Series

UCS 6300 Series

UCS 6400 Series

Cisco UCS Manager login page access

Cisco UCS Manager XML API access

743

KVM

HTTP

TCP

UCS 6200 Series

UCS 6300 Series

UCS 6400 Series

CIMC Web Service / Direct KVM

843

xmlPolicy

Adobe Flash

TCP

UCS 6200 Series

UCS 6300 Series

Adobe Flash port used by KVM launcher

7546

CFS

CFSD

TCP

UCS 6400 Series

Cisco Fabric Service

Cisco UCS Manager Network Management Guide, Release 4.1 provides a complete list of open TCP and UDP ports.

Security Fixes

The following security issues are resolved:

Release

Defect ID

CVE

Description

4.1(3e)

CSCvy16762

  • CVE-2020-12358

  • CVE-2020-12360

  • CVE-2020-24486

  • CVE-2020-24511

Cisco UCS B-series M5 blade servers and C-series M5 rack servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2020-12358: Out of bounds write in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.

  • CVE-2020-12360: Out of bounds read in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.

  • CVE-2020-24486: Improper input validation in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access.

  • CVE-2020-24511: Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

This release includes BIOS revisions for Cisco UCS M5 blade and tack servers. These BIOS revisions include Microcode update for Cisco UCS M5 blade and rack servers, which is a required part of the mitigation for these vulnerabilities.

4.1(3d)

CSCvx82644

CVE-2021-3450

CVE-2021-3449

On March 25, 2021 - the OpenSSL Software foundation disclosed two high severity vulnerabilities affecting the OpenSSL software package.

  • CVE-2021-3450 could allow a remote unauthenticated attacker to conduct a MiTM attack or to impersonate another user or device by providing a crafted certificate.

  • CVE-2021-3449 could allow a remote unauthenticated attacker to crash a TLS server resulting in a Denial of Service (DoS) condition.

Cisco has evaluated the impact of the vulnerability on this product and concluded that Cisco UCS M5 B-series server CIMCs are affected by CVE-2021-3449 .

However, all Cisco UCS M4 and earlier B-series server CIMCs are not affected by: CVE-2021-3450.

Cisco UCS Manager release bundle 4.1(3a)B through 4.1(3c)B packaged M5 CIMC is using CiscoSSL based on OpenSSL 1.1.1g. It was the first and only release to be affected by CVE-2021-3449..

It is not vulnerable to CVE-2021-3450 which only affects 1.1.1h-1.1.1j.

4.1(3a), 4.1(2c)

CSCvw45654, CSCvw38983, CSCvv96107, CSCvw38995

CVE-2021-1368

A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code with administrative privileges or cause a denial of service (DoS) condition on an affected device.

For more information on security advisory, see:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-udld-rce-xetH6w35

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

4.1(3a)

CSCvv34145

  • CVE-2020-8738

  • CVE-2020-8764

  • CVE-2020-0590

  • CVE-2020-8745

  • CVE-2020-8752

  • CVE-2020-8753

  • CVE-2020-8705

  • CVE-2020-12297

  • CVE-2020-12303

Cisco UCS B200 M5 blade servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2020-8738: Improper conditions check in Intel BIOS platform sample code for some Intel® Processors before may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2020-8764:Improper access control in BIOS firmware for some Intel® Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2020-0590:Improper input validation in BIOS firmware for some Intel® Processors may allow an authenticated user to potentially enable escalation of privilege via local access.

  • CVE-2020-8745:Insufficient control flow management in subsystem for Intel® CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel® TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

  • CVE-2020-8752:Out-of-bounds write in IPv6 subsystem for Intel® AMT, Intel® ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.

  • CVE-2020-8753:Out-of-bounds read in DHCP subsystem for Intel® AMT, Intel® ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.

  • CVE-2020-8705:Insecure default initialization of resource in Intel® Boot Guard in Intel® CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel® TXE versions before 3.1.80 and 4.0.30, Intel® SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300 may allow an unauthenticated user to potentially enable escalation of privileges via physical access.

  • CVE-2020-12297:Improper access control in Installer for Intel® CSME Driver for Windows versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access.

  • CVE-2020-12303:Use after free in DAL subsystem for Intel® CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel® TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access.

4.1(1a)

CSCvp31006

CVE-2019-0211

Cisco UCS Manager includes a version of the Apache HTTP Server that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:

  • CVE-2019-0211: In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

Apache 2.4.39 is integrated in UCS Manager 4.1(1a) and beyond.

4.1(1c)

CSCvw07430

  • CVE-2020-0591

  • CVE-2020-0592

  • CVE-2020-8738

  • CVE-2020-8740

  • CVE-2020-8764

The products Cisco UCS B-Series M4 Blade Servers (except B260, B460); Cisco UCS C-Series M4 Rack Servers (except C460) include an Intel CPU that are affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID(s):

  • CVE-2020-0591: Improper buffer restrictions in BIOS firmware for some Intel® Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2020-0592: Out of bounds write in BIOS firmware for some Intel® Processors may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.

  • CVE-2020-8738: Improper conditions check in Intel BIOS platform sample code for some Intel® Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2020-8740: Out of bounds write in Intel BIOS platform sample code for some Intel® Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2020-8764: Improper access control in BIOS firmware for some Intel® Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Cisco has reviewed these products and concluded that they are affected by these vulnerabilities. However, the products are not affected by the following vulnerabilities:

CVE-2020-0587 CVE-2020-0588 CVE-2020-0590 CVE-2020-0593 CVE-2020-8696 CVE-2020-8698 CVE-2020-8695 CVE-2020-8694 CVE-2020-8752 CVE-2020-8753 CVE-2020-8745 CVE-2020-8750 CVE-2020-8757 CVE-2020-8756 CVE-2020-8760 CVE-2020-8744 CVE-2020-8751 CVE-2020-8754 CVE-2020-8761 CVE-2020-8747 CVE-2020-8755 CVE-2020-8746 CVE-2020-8749 CVE-2020-8705 CVE-2020-12303 CVE-2020-12304 CVE-2020-12354 CVE-2020-12355 CVE-2020-12356 CVE-2020-12297

4.1(1e), 4.1(2a)

CSCvu53094

CVE-2020-11022

Cisco UCS Manager and UCS 6400 Series Fabric Interconnects using the jQuery software package with versions from 1.2 to 3.5.0, is affected by the following Common Vulnerability and Exposures (CVE) ID:

  • CVE-2020-11022: In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

4.1(2a)

CSCvt86097

CSCvt86093

  • CVE-2020-0548

  • CVE-2020-0549

Cisco UCS M5 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2020-0548 affects when cleanup errors in some Intel® processors may allow an authenticated user to potentially enable information disclosure through local access.

  • CVE-2020-0549 affects when cleanup errors in some data cache evictions for some Intel® processors may allow an authenticated user to potentially enable information disclosure through local access.

4.1(1d)

CSCvt86093

  • CVE-2020-0548

  • CVE-2020-0549

Cisco UCS M5 servers that are based on Intel® processors are affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID(s):

  • CVE-2020-0548: Clean-up errors in some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2020-0549: Clean-up errors in some data cache evictions for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.

This release includes BIOS revisions for Cisco UCS M5 servers. These BIOS revisions include Microcode update for Cisco UCS M5 servers, which is a required part of the mitigation for these vulnerabilities.

4.1(1c)

CSCvs81686

CSCvs81690

  • CVE-2020-0548

  • CVE-2020-0549

Cisco UCS M5 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2020-0548 Cleanup errors in some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2020-0549 Cleanup errors in some data cache evictions for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access.

This release includes BIOS revisions for Cisco UCS M5 servers. These BIOS revisions include the updated SINIT ACM for Cisco UCS M5 servers, which is a required part of the mitigation for these vulnerabilities.

4.1(1a)

CSCvr15082

CVE-2020-3120

A vulnerability in the Cisco Discovery Protocol implementation for Cisco FXOS Software, Cisco IOS XR Software, and Cisco NX-OS Software could have allowed an unauthenticated, local attacker to reload an affected device, resulting in a denial of service (DoS) condition.

The vulnerability is due to a missing check when the affected software processes Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to exhaust system memory, causing the device to reload.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

4.1(1a)

CSCvp27917

CVE-2018-12126

CVE-2018-12127

CVE-2018-12130

CVE-2019-11091

Cisco UCS B-Series M3 Blade Servers are based on Intel® Xeon®Sandy Bridge E5-2600 and Ivy Bridge E5 2600 v2 Product Family processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.

  • CVE-2018-12126 (Microarchitectural Store Buffer Data Sampling) affects store buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12127 (Microarchitectural Load Port Data Sampling) affects load buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12130 (Microarchitectural Fill Buffer Data Sampling) affects line fill buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2019-11091 (Microarchitectural Data Sampling Uncacheable Memory) affects uncacheable memory in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M3 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities.

Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html

4.1(1a)

CSCvr54409

CSCvr54415

  • CVE-2019-11135

  • CVE-2019-0151

  • CVE-2019-0152

  • CVE-2019-11136

  • CVE-2019-11137

  • CVE-2019-11139

  • CVE-2019-11109

Cisco UCS B-Series and C-Series M5 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2019-11135 (TSX Asynchronous Abort Advisory) condition affects certain 2nd Generation Intel® Xeon® Scalable Processors, 8th Generation Intel® CoreTM Processor Family, 9th Generation Intel® CoreTM Processor Family, and 10th Generation Intel® CoreTM Processor Family that utilize speculative execution, and may allow an authenticated user to potentially enable information disclosure through a side-channel with local access.

  • CVE-2019-0151 (CPU Local Privilege Escalation Advisory) affects certain Intel® 4th Generation Intel® CoreTM Processors, 5th Generation Intel® CoreTM Processors, 6th Generation Intel® Cores Processors, 7th Generation Intel® CoreTM Processors, 8th Generation Intel® CoreTM Processors, Intel® Xeon® Processors E3 v2/v3/v4/v5/v6 Family, Intel® Xeon® Processors E5 v3/v4 Family, Intel® Xeon® Processors E7 v3/v4 Family, Intel® Xeon® Scalable Processors 2nd Generation, Intel® Xeon® Scalable Processors, Intel® Xeon® Processors D-1500/D-2100), Intel® Xeon® Processors E-2100/E3100, and, Intel® Xeon® Processors W-2100/W-3100 when insufficient memory protection in Intel® TXT may allow a privileged user to potentially enable escalation of privilege through local access. This could result in bypassing Intel® TXT protections.

  • CVE-2019-0152 (CPU Local Privilege Escalation Advisory) affects certain Intel® Xeon® Scalable Processors, Intel® Xeon® Processor D-2100, D-3100, Intel® Xeon® Processor W-2100, W-3100 when insufficient memory protection may allow a privileged user to potentially enable an escalation of privilege through local access. This could result in bypassing System Management Mode (SMM) and Intel® TXT protections.

  • CVE-2019-11136 (BIOS 2019.2 IPU Advisory) affects 2nd Generation Intel® Xeon® Scalable Processors, Intel® Xeon® Scalable Processors, Intel® Xeon® Processor D Family when insufficient access control in the system firmware may allow a privileged user to potentially enable an escalation of privilege, denial of service, or information disclosure through local access.

  • CVE-2019-11137 (BIOS 2019.2 IPU Advisory) affects 2nd Generation Intel® Xeon® Scalable Processors, Intel® Xeon® Scalable Processors, Intel® Xeon® Processor D Family, Intel® Xeon® Processor E5 v4 Family, Intel® Xeon® Processor E7 v4 Family, Intel® Atom® Processor C Series when insufficient input validation in the system firmware may allow a privileged user to potentially enable an escalation of privilege, denial of service, or information disclosure through local access.

  • CVE-2019-11139 (Voltage Modulation Technical Advisory) vulnerability in voltage modulation of certain Intel® Xeon® Scalable Processors may allow a privileged user to potentially enable denial of service through local access.

  • CVE-2019-11109: Logic issue in subsystem in Intel® Server Platform Services before versions SPS_E5_04.01.04.297.0, SPS_SoC-X_04.00.04.101.0, and SPS_SoC-A_04.00.04.193.0 may allow a privileged user to potentially enable Denial of Service through local.

This release includes BIOS revisions for Cisco UCS B-Series and C-Series M5 servers. These BIOS revisions include the updated microcode and Secure Initialization (SINIT) Authenticated Code Modules (ACM), which are required parts of the mitigation for these vulnerabilities.

4.1(1a)

CSCvr54411

CVE-2019-0151

Cisco UCS B-Series and C-Series M3 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:

  • CVE-2019-0151 (CPU Local Privilege Escalation Advisory) affects certain Intel® 4th Generation Intel® CoreTM Processors, 5th Generation Intel® CoreTM Processors, 6th Generation Intel® Cores Processors, 7th Generation Intel® CoreTM Processors, 8th Generation Intel® CoreTM Processors, Intel® Xeon® Processors E3 v2/v3/v4/v5/v6 Family, Intel® Xeon® Processors E5 v3/v4 Family, Intel® Xeon® Processors E7 v3/v4 Family, Intel® Xeon® Scalable Processors 2nd Generation, Intel® Xeon® Scalable Processors, Intel® Xeon® Processors D-1500/D-2100), Intel® Xeon® Processors E-2100/E3100, and, Intel® Xeon® Processors W-2100/W-3100 when insufficient memory protection in Intel® TXT may allow a privileged user to potentially enable escalation of privilege through local access. This could result in bypassing Intel® TXT protections.

This release includes BIOS revisions for Cisco UCS B-Series and C-Series M3 servers. These BIOS revisions include the updated SINIT ACM for Cisco UCS M3 servers, which is a required part of the mitigation for these vulnerabilities.

4.1(1a)

CSCvr54413

CSCvr54414

  • CVE-2019-0151

  • CVE-2019-11137

Cisco UCS B-Series and C-Series M4 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2019-0151 (CPU Local Privilege Escalation Advisory) affects certain Intel® 4th Generation Intel® CoreTM Processors, 5th Generation Intel® CoreTM Processors, 6th Generation Intel® Cores Processors, 7th Generation Intel® CoreTM Processors, 8th Generation Intel® CoreTM Processors, Intel® Xeon® Processors E3 v2/v3/v4/v5/v6 Family, Intel® Xeon® Processors E5 v3/v4 Family, Intel® Xeon® Processors E7 v3/v4 Family, Intel® Xeon® Scalable Processors 2nd Generation, Intel® Xeon® Scalable Processors, Intel® Xeon® Processors D-1500/D-2100), Intel® Xeon® Processors E-2100/E3100, and, Intel® Xeon® Processors W-2100/W-3100 when insufficient memory protection in Intel® TXT may allow a privileged user to potentially enable escalation of privilege through local access. This could result in bypassing Intel® TXT protections.

  • CVE-2019-11137 (BIOS 2019.2 IPU Advisory) affects 2nd Generation Intel® Xeon® Scalable Processors, Intel® Xeon® Scalable Processors, Intel® Xeon® Processor D Family, Intel® Xeon® Processor E5 v4 Family, Intel® Xeon® Processor E7 v4 Family, Intel® Atom® Processor C Series when insufficient input validation in the system firmware may allow a privileged user to potentially enable an escalation of privilege, denial of service, or information disclosure through local access.

This release includes BIOS revisions for Cisco UCS B-Series and C-Series M4 servers. These BIOS revisions include the updated microcode and SINIT ACM for Cisco UCS M4 servers, which are required parts of the mitigation for these vulnerabilities.

4.1(1a)

CSCvp30013

CVE-2018-12126

CVE-2018-12127

CVE-2018-12130

CVE-2019-11091

Cisco UCS M4 servers and Hyperflex M4 servers are based on Intel® Xeon® Processor E7 v2, v3, and v4 Product Family processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.

  • CVE-2018-12126 (Microarchitectural Store Buffer Data Sampling) affects store buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12127 (Microarchitectural Load Port Data Sampling) affects load buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12130 (Microarchitectural Fill Buffer Data Sampling) affects line fill buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2019-11091 (Microarchitectural Data Sampling Uncacheable Memory) affects uncacheable memory in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M4 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities.

4.1(1a)

CSCvp27917

CVE-2018-12126

CVE-2018-12127

CVE-2018-12130

CVE-2019-11091

Cisco UCS B-Series M3 Blade Servers are based on Intel® Xeon®Sandy Bridge E5-2600 and Ivy Bridge E5 2600 v2 Product Family processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.

  • CVE-2018-12126 (Microarchitectural Store Buffer Data Sampling) affects store buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12127 (Microarchitectural Load Port Data Sampling) affects load buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2018-12130 (Microarchitectural Fill Buffer Data Sampling) affects line fill buffers in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

  • CVE-2019-11091 (Microarchitectural Data Sampling Uncacheable Memory) affects uncacheable memory in the CPU, and is addressed by applying the updated microcode included in the UCS Manager release as well as the relevant Operating System and Hypervisor patches from the appropriate vendors.

This release includes BIOS revisions for Cisco UCS M3 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities.

Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html

Resolved Caveats

The resolved bugs for a release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains up-to-date information about bugs and vulnerabilities in this product and other Cisco hardware and software products.


Note

You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, you can register for an account.


For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.

Resolved Caveats in Release 4.1(3f)

The following caveats are resolved in Release 4.1(3f):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvz21538

A Cisco UCS blade server running NXOS with a 2400 series fabric extender detected a drop in IOPS to FC storage during a fabric inerconnect reboot.

This issue is resolved.

4.0(1)A

4.1(3f)A

CSCvz26396

A Cisco UCS blade server with VIC 1400 series adapter could abort or drop packets during the initial link-up period.

This issue is resolved.

4.0(1)A

4.1(3f)A

CSCvz26417

On a Cisco UCS blade server with VIC 1400 series adapter, packet drops occurred during the first 2 seconds of link up between IOM and VIC adapter.

This issue is resolved.

4.0(1)A

4.1(3f)A

CSCvx25595

A Cisco UCS B200 M6 server with a 6400 Series fabric interconnect experienced an abort while running fibre channel and ethernet traffic.

This issue is resolved.

4.1(3e))A

4.1(3f)A

Resolved Caveats in Release 4.1(3e)

The following caveats are resolved in Release 4.1(3e):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvw55803

A Cisco UCS 6454 Fabric Interconnect is rebooted and recovered during normal operation. The system displayed the message:

Last reset at 591270 usecs after Fri Nov 20 13:49:23 2020

Reason: Kernel Panic

This issue is resolved.

4.0(4g)A

4.1(3e)A

CSCvx02892

When a default gateway is modified on Cisco UCS 6400 Series Fabric Interconnects through GUI or CLI, the new IP route statement was appended and replaced with the old VRF (default) route and resulted in intermittent or failed connections from outside of the MGMT subset.

This issue is resolved.

4.1(1a)C

4.1(3e)C

CSCvx93523

While upgrading the server firmware from 4.1(1e) to 4.1(3b), the UCSC-PCIE-IQ10GF (Intel X710-DA4 adapter) failed to update the firmware image on Cisco UCS C220 M5 servers.

This issue is resolved.

4.1(3b)C

4.1(3e)C

CSCvy80431

When a blade server was removed from a chassis and re-added, the core file dumps were created in the BladeAG service because of accessing the mgmtController-MO without checking the existing MO from computeExtBoard-MO. This operation further led to BladeAG service crash and continuous restarts.

This issue is resolved.

4.1(2b)A

4.1(3e)A

CSCvx09287

When multiple SNMP queries are triggered at the same time from different queriers to Cisco UCS Manager on Cisco UCS 6454 Fabric Interconnect, Cisco UCS Manager may send SNMP responses to the wrong querier.

This issue is resolved.

4.1(2b)A

4.1(3e)A

CSCvy39679

On Cisco UCS 6400 series Fabric Interconnect, (some) Ethernet ports with (certain) Fiber Channel SFPs can link-up. But these ports could see traffic issues (CRCs/Bad packets) and intermittent link drops.

The issue has been fixed and Ethernet ports with Fiber Channel SFPs will not be brought-up.

4.0(1a)A

4.1(3e)A

CSCvy81441

In rare situations, on UCS 6324 Fabric Interconnect, it is observed that high availability is not ready in peer Fabric Interconnect and sam dme crash is seen.

This issue is resolved.

4.1(2b)A

4.1(3e)A

CSCvy89884

On Cisco UCS 6400 series Fabric Interconnect, when VLAN1 is configured as non-native VLAN, the OS/Blade vNIC sends VLAN1 tagged traffic to Fabric Interconnect and the Fabric Interconnect sends return traffic to blade with Vlan1 as untagged. Thereby, resulting in network connectivity issues.

Whereas, the C-series integrated traffic for non-native VLAN1 is not affected whether it is directly connected to C-series or through fabric extender.

This issue is resolved.

4.1(3b)A

4.1(3e)A

CSCvy69863

On Cisco UCS 6454 Fabric Interconnects, when the repeated Remote (LDAP, Radius, etc) logins occur from a monitoring service several times per minute, the "samcproxy_proxy" process is crashed and a core file is generated.

Thereby, resulting in issue with NXOS process as the PortAG and dcosAG processes rely on samcproxy_proxy for communication to NXOS processes. The faults related to Fabric Interconnect ports or user login may also be present.

This issue is resolved.

4.1(3d)A

4.1(3e)A

CSCvx88769

In situations during downgrade of Cisco UCS Manager from 4.2(x) to 4.1(3d) or earlier releases, Cisco UCS manager gets downgraded to 4.1(3d) or earlier release. And, if for some reason Fabric Interconnect reboot happens even before Fabric Interconnect gets downgraded to 4.1(x) or earlier releases, the Fabric Interconnect gets stuck in 4.2(x). This situation results in failure of user login.

The defect is partially resolved to enable user login through CLI when Cisco UCS manager is up. So that, the user can recover the setup through CLI.

Note 

Cisco UCS Manager GUI will still not be accessible. For more information, see CSCvy90962 in the Open Caveats section.

4.1(3c)

4.1(3e)

CSCvy01206

Discovery of blade servers are stuck as the duplicate Processor Node Utility Operating System (PNuOS) ISO image files are retained in the bootflash/mgmtxt folder, whereas, new ISO files are saved in the bootflash/pnuos folder.

This issue is resolved.

4.1(3c)A

4.1(3e)A

CSCvw76521

On 6400 series Fabric Interconnect, if vHBA or vNIC is disabled when server is in shutdown state, vHBA or vNIC fails to come up when vHBA or vNIC is enabled after the server OS is booted up.

This issue is resolved.

4.1(2)A

4.1(3e)A

Resolved Caveats in Release 4.1(3d)

The following caveats are resolved in Release 4.1(3d):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvx99917

After an upgrade, service profiles failed with the error:

Too many RoCE resources applied on the adaptor. Reduce number of RoCE enabled vNIC's/SubvNIC's or reduce total number of queue pairs or memory regions applied on the adaptor.not enough vNIC available.

This issue is resolved.

4.1(3c)B

4.1(3d)B

CSCvw64214

The Azure Stack Hub server failed due to a failure in the QLogic NIC driver.

This issue is resolved.

4.0(4i)C

4.1(3d)C

CSCvw38535

A Cisco UCS S3260 SAS Expander was not accessible from CMC.

This issue is resolved.

4.0(4f)C

4.1(3d)C

CSCvw82919

Under specific ECC error conditions in which an uncorrectable ECC error occured, the system flagged only one DIMM in the channel as encountering a UECC, but should have reported both DIMMs in the channel for the error.

This issue is resolved.

4.0(4h)B

4.1(3d)B

CSCvy00304

On Cisco UCS M5 servers, BIOSDetailedErrorLog logged an incorrect Bank and Bank Group

This issue is resolved.

4.1(3c)B

4.1(3d)B

CSCvx50456

A Cisco UCW B460 M4 with UCSB-MLOM-40G-03 VIC 1340 fabric interconnect, UCSB-MLOM-PT-01 port expander, and UCSB-VIC-M83-8P VIC 1380 fabric interconnect was generating CRC errors on the HIF port .

This issue is resolved.

4.1(3b)A

4.1(3d)A

CSCvy11610

A Cisco UCS-managed blade server with a Cisco 2400 Series fabric extender was reporting 2408 IOMs were running with low amounts of memory available.

This issue is resolved.

4.0(4g)A

4.1(3d)A

CSCvt94075

On a Cisco UCS blade server with a VIC 6400 series fabric interconnect, IOM discovery failed after chassis decommission/recommission.

This issue is resolved.

4.1(200.18)A

4.1(3d)A

CSCvx07486

On a Cisco UCS B480-M5 blade server, the BMC/CIMC was rebooted after a BMC watchdog reset or kernel panic. The UCS CIMC logs showed the following messages:

- [platform_reset_init]:201:Using GPIO Based Platform Reset
- [watchdog_init]:465:BMC Watchdog resetted BMC.
- [watchdog_init]:467:BMC Watchdog System Bus Debug Status Registers: 0x0 and0x0

This issue is resolved.

4.0(4h)B

4.1(3d)B

CSCvw82192

Global Service Profile association on a UCS managed blade server with Cisco 2100 series fabric extender was creating a critical alert on an already associated profile and giving the error errorDescr="Insufficient space in array.

This issue is resolved.

4.0(1.45)A

4.1(3d)A

CSCvy02844

For firmware upgrade to 4.1(3a) or later, there is a one-time activation required for secure FPGA. The secure FPGA warning message that is currently present may lead users to manually reboot the FI after running these commands. If the FI is manually rebooted during this process it can cause the FI to brick and need to be replaced.

Current message:

Warning: This command will reset Fabric Interconnect and the system will be down till the Fabric Interconnect is reset

New message:

Warning: This command will upgrade the FPGA and automatically reboot. Please don’t reload or power-cycle during the upgrade. The system will reboot after upgrade is complete.

New behavior:

Given the potential impact, the "reboot" command will be locked from local-mgmt context while this process has been committed.

4.1(3a)A

4.1(3d)A

CSCvx80747

On four identical Cisco UCS-FI-6332-16UP-U fabric interconnects with no errors on the GUI, one fabric interconnect always returned integer four to SNMP:

nmpwalk -v 1 -c public <FI IP> 1.3.6.1.3.94.1.6.1.6

This issue is resolved.

4.0(4i)A

4.1(3d)A

CSCvx66360

On a UCS-managed blade server connected to a Cisco VIC 6454 fabric interconnect, an invalid object ID was found in the SNMP traps.

This issue is resolved.

4.0(4b)A

4.1(3d)A

CSCvx50196

On a UCS-managed blade server connected to a Cisco VIC 6400 Series fabric interconnect, configuration of the Smart Call Home could not be modified.

This issue is resolved.

4.0(2b)A

4.1(3d)A

CSCvx51724

On a Cisco UCS BX210c-M6 server, the BMC rebooted with the message: BMC Watchdog resetted BMC due to OOM.

This issue is resolved.

4.1(3b)B

4.1(3d)B

CSCvy26765

When the UCS KVM IP assignment was accepted (seen under Equipment > Chassis x > Server x > Inventory > CIMC > Modify Outband Static Management IP), a single LLDP packet was sent to neighbor devices with the MGMT TLV containing the recently changed KVM IP instead of the Fabric Interconnect Mgmt IP.

This issue is resolved.

4.1(2b)A

4.1(3d)A

CSCvv57606

When installing a Cisco UCS M5 server attached to a 6400 Series fabric interconnect for the first time, the service profile could fail association and display Connection Placement Error.

This issue is resolved.

4.0(4e)A

4.1(3d)A

Resolved Caveats in Release 4.1(3c)

The following caveats are resolved in Release 4.1(3c):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvu16747

Constant interface flapping occurred on a Cisco UCS 6454 Fabric Interconnect connected to an upstream catalyst 4500-x while using LACP port channel with SFP-H10GB-ACU7M.

This issue is resolved.

4.1(1)A

4.1(3c)A

CSCvw79335

SNMP timeouts occurred when polling dot1dTpPortTable on a Cisco UCS 6332 Fabric Interconnect.

This issue is resolved.

4.0(4e)A

4.1(3c)A

CSCvx01828

SNMPd becomes unresponsive and SNMP commands on the IP of a Cisco UCS 6454 timed out with no response. Error messages showed messages like the following.

[12679086.760577] [sap 28][pid 15470][comm:snmpd] WARNING: possible memory leak is detected on pers queue (len=729,bytes=208265168) - kernel

This issue is resolved.

4.0(4i)A

4.1(3c)A

CSCvx02918

If a faulty disk was present on a UCS-managed server attached to a 6400 Series Fabric Interconnect, the DME process failed while attempting to apply a storage policy, due to a disk zoning error.

This issue is resolved.

4.1(1e)A

4.1(3c)A

CSCvx33064

After upgrading a 6454 Fabric Interconnect to Cisco UCS Manager release 4.1(3b), local login fails if LDAP was configured as Native Authentication

This issue is resolved.

4.1(3b)A

4.1(3c)A

CSCvx15159

After the Firmware Upgrade of Cisco UCS 6300 Series Fabric Interconnect clusters from Cisco UCS Manager Release 3.2(2d) to Release 4.0(4h) or 4.1(2b), the following issues are faced on some domains:
  • The SNMP Collection Object gets timed out

  • SNMPwalk takes longer time for query

This issue is resolved.

4.0(4h)B

4.1(3c)B

CSCvx18169

On Cisco UCS 6248UP Fabric Interconnect, the fans were not detected by the switch though the fans were operating. This condition triggered alarms on the fan health status (Fan failure or Fan removed) and further resulted in switch shutdown.

This issue is resolved.

3.2(3o)A

4.1(3c)A

CSCvx60544

On Cisco UCS IOM 2408, the B200 M5 server nodes failed to parse the MPLS and incorrectly alter the dot1q tag from the MPLS encapsulated PDUs.

This issue is resolved.

4.0(4h)A

4.1(3c)A

Resolved Caveats in Release 4.1(3b)

The following caveats are resolved in Release 4.1(3b):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvx11527

During the upgrade of the infrastructure software bundle to the release 4.1(3a) for the first time, both the IOMs rebooted to update its BIOS without waiting for the user acknowledgment. This reboot affected the domain setups where UCS 5108 chassis with 2408 I/O Modules (IOM) is connected to UCS 6454 or UCS 64108 Fabric Interconnects resulting a complete loss of storage and network connectivity.

This issue is resolved.

4.1(3a)

4.1(3b)

CSCvw49192

After upgrading to Cisco UCS Manager release 4.1(2b), some system configurations may be unable to perform power characterization resulting in a POST failure. System freezes at Loading PTU driver screen. CATERR is also logged in the SEL.

This issue is now resolved.

4.1(2b)

4.1(2c) and 4.1(3b)

Resolved Caveats in Release 4.1(3a)

The following caveats are resolved in Release 4.1(3a):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvu24563

On Cisco UCS B460 M4 server, the health of the link between VIC 1240 and IOM HIF port going through the port expander card becomes poor which results in CRC errors and packet drops.

This condition is seen in the UCS B460 M4 server with VIC 1240 in the MLOM slot and UCSB-MLOM-PT-01 in the Mezzanine slot with IOM 2204/2208.

This issue is resolved.

3.1(2b)B, 3.2(3g)B

4.1(3a)B

CSCvu87940

After importing a VNIC config file on a standalone C-series VIC adapter, when the host was rebooted, VNICs did not receive a link-up, resulting in loss of network to the host OS. This occurred when all of the following conditions are met:

  • The user imported a VNIC configuration file that was exported when VIC was configured with VNTAG mode enabled.

  • VIC network ports are connected to Cisco Nexus switches supporting network interface virtualization.

  • The switch ports and/or portchannel are configured with switchport mode vntag.

This issue is resolved.

4.0(4h)C

4.1(3a)C

CSCvw89416

During OS runtime, an unexpected power-off event comes from NMPowerManager.

This issue is resolved.

4.1(2b)B

4.1(3a)B

CSCvv71216

In the Cisco UCS server, whenever the FlexFlash controller is reset, the operating mode of the SD card is switched between 3.3 V signaling (during initialization) and 1.8 V signaling (for data transfers). This condition results in the disappearance of SD card to OS. Thereby, resulting in OS crash.

This issue is resolved.

4.0(1d)

4.1(3a)

CSCvu95889

In response to the read error on the SD cards of UCS servers, the FlexFlash controller re-initializes the SD cards. The re-initialization of the SD cards may be stuck or encounter errors.

This issue is resolved.

4.0(4e)B

4.1(3a)B

CSCvs06864

BSOD was seen on Win2019/Win2016 installation on fNIC SAN LUN with a service profile configured with 2 or more vHBAs on a VIC 14xx series adapter.

4.0(4a)A

4.1(3a)A

CSCvw47746

On a Blade server attached to a 2400 Series Fabric Extender running NXOS, chassis technical support triggered generation of IOM satctrl core.

4.1(2b)A

4.1(3a)A

Resolved Caveats in Release 4.1(2c)

The following caveats are resolved in Release 4.1(2c):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvv55541

On reboot of a UCS-Managed C240 M4 rack server, the server entered into the Bitlock Recovery screen.

This issue is now resolved.

4.0(4b)C

4.1(2c)C

CSCvu79969

A Cisco UCS B200 M4 server running ESXi 6.5 experienced a P2_TEMP_SENS alarm.

This issue is resolved.

4.0(4f)B

4.1(2c)B

CSCvv89724

When creating an appliance port-channel in Access mode on on a Cisco UCS 6400 Series Fabric Interconnect, the borderDeployFSM operation failed.

This issue is resolved.

4.0(1a)A

4.1(2c)A

CSCvu87940

After importing a VNIC config file on a standalone C-series VIC adapter, when the host was rebooted, VNICs did not receive a link-up, resulting in loss of network to the host OS. This occurred when all of the following conditions are met:

  • The user imported a VNIC configuration file that was exported when VIC was configured with VNTAG mode enabled.

  • VIC network ports are connected to Cisco Nexus switches supporting network interface virtualization.

  • The switch ports and/or portchannel are configured with switchport mode vntag.

This issue is resolved.

4.0(4h)C

4.1(2c)C

CSCvw23303

Old internal IPs were not cleared correctly on the IOMs when migrating from Cisco UCS 2200 and 2300 series Fabric Interconnects to 6400 Series Fabric Interconnects.

This issue is resolved.

4.1(1e)A

4.1(2c)A

CSCvw54180

Cisco UCS 6454 Fabric Interconnects reboot sequentially due to a policyelem failure..

This issue is resolved.

4.1(2b)A

4.1(2c)A

CSCvw51222

Cisco UCS M6324 Fabric Interconnects with Micron's M500IT model would reboot after ~3.2 years power-on hours. then reboot every 1.5 months thereafter.

This issue is resolved.

4.0(1a)A

4.1(2c)A

CSCvv58989

After a management port interface flap on a Cisco UCS 6400 Series fabric interconnect, KVM OOB IPs were sent as the management address towards multiple CDP packet management addresses.

This issue is resolved.

4,1(2,21)A

4.1(2c)A

CSCvw01292

A Cisco UCS 6400 Series fabric interconnect rebooted during upgrade and displayed the message lldp hap reset.

This issue is resolved.

4.1(1c)A

4.1(2c)A

CSCvw89416

An unexpected power-off event occurred on a Cisco UCS M5 server.

This issue is resolved.

4.0(4a)B and C

4.1(2c)B and C

CSCvv32315

On a Cisco UCS 6454 Fabric Interconnect, on initial boot or after an erase configuration, the fabric interconnect did not boot to the initial configuration prompt. The after finishing booting, the fabric interconnect showed a login prompt with the default hostname of switch.

This issue is resolved.

4.0(4a)A

4.1(2c)A

CSCvw06021

SecureBoot Variables db/dbx on Cisco M4 EX servers were not always updated.

This issue is resolved.

4.2(0.17)B??

4.1(2c)

CSCvu16747

Constant interface flapping occurred on a Cisco UCS 6454 Fabric Interconnect connected to an upstream catalyst 4500-x while using LACP port channel with SFP-H10GB-ACU7M.

This issue is resolved.

4.1(1)A

4.1(2c)A

CSCvw73506

Failure of module 3 in a Cisco UCS 6296 Fabric Interconnect resulted in the ASIC error:show hardware internal sunny counters interrupts all.

This issue is resolved.

4.0(4h)A

4.1(2c)A

CSCvw79335

SNMP timeouts occurred when polling dot1dTpPortTable on a Cisco UCS 6332 Fabric Interconnect.

This issue is resolved.

4.0(4e)A

4.1(2c)A

CSCvx01828

SNMPd becomes unresponsive and SNMP commands on the IP of a Cisco UCS 6454 timed out with no response. Error messages showed messages like the following.

[12679086.760577] [sap 28][pid 15470][comm:snmpd] WARNING: possible memory leak is detected on pers queue (len=729,bytes=208265168) - kernel

This issue is resolved.

4.0(4i)A

4.1(2c)A

CSCvx02918

If a faulty disk was present on a UCS-managed server attached to a 6400 Series Fabric Interconnect, the DME process failed while attempting to apply a storage policy, due to a disk zoning error.

4.1(1e)A

4.1(2c)

CSCvw24269

UCS Manager was unable to download and extract an A-bundle with a size larger than 2G.

4.1(2b)

4.1(2c)

CSCvw49192

After upgrading to Cisco UCS Manager release 4.1(2b), some system configurations may be unable to perform power characterization resulting in a POST failure. System freezes at Loading PTU driver screen. CATERR is also logged in the SEL.

This issue is now resolved.

4.1(2b)

4.1(2c) and 4.1(3b)

Resolved Caveats in Release 4.1(2b)

The following caveats are resolved in Release 4.1(2b):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvu59607

The login failure due to entry of wrong password for a valid user name, is captured in the audit logs of Cisco UCS Manager and remote syslog server.

4.0(4i)A

4.1(2b)A

CSCvv69160

On Cisco UCS B260 M4 and B460 M4 Blade servers, the upper non recoverable (UNR) threshold and upper critical (UC) threshold values of the P0V9_SAS sensor are updated as follows:

  • UC=1.022

  • UNR=1.045

4.1(1a)B

4.1(2b)B

CSCvv26230

After upgrade of firmware to version 4.1(1x), chassis is reporting that the health LED and connection LED are OFF even though the chassis and hardware components within the chassis are in the working condition.

This issue is resolved.

4.1(1a)A

4.1(2b)A

CSCvv73735

Cisco UCS 6454 Fabric Interconnects are rebooted one at a time, due to the policyelem process crash.

This issue is resolved.

4.1(1c)A

4.1(2b)A

CSCvv80576

After vNIC fabric failover, if there is no continuous traffic from vNIC source, the traffic is not switched over to the second fabric interconnect (FI). This condition resulted in traffic drop.

This issue is resolved.

4.1(2a)A

4.1(2b)A

CSCvv89399

Fabric Login (FLOGI) can be dropped by fabric interconnect (FI) in the end host mode, with the reason as Nested NPV connectivity is not supported, when using certain combinations of PWWN and NWWN.

This issue is resolved.

4.0(4i)B

4.1(2b)B

CSCvv89810

Some or all the host vHBAs may not communicate with the SAN and the access to fibre channel storage may be lost with Fabric Login (FLOGI) failure in the following conditions:

  • Cisco UCS 6400 Fabric Interconnects with hosts configured for FC/FCoE connectivity using vHBAs.

  • WWxN pool is configured with prefix where third octet is non-zero.

This issue is resolved.

4.1(1a)A

4.1(2b)A

CSCvv80576

After vNIC failover, the traffic does not switch to the other fabric interconnect.

This issue is resolved.

4.1(2a)A

4.1(2b)A

Resolved Caveats in Release 4.1(2a)

The following caveats are resolved in Release 4.1(2a):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvt35661

After upgrade of Cisco UCS Infrastructure from release 4.0(4e) to release 4.0(4g), fabric extender (FEX) ports connected to System I/O Controller (SIOC) of Cisco UCS S3260 Storage server remain in the administratively down state with incomplete configuration. Hence, Cisco UCS S3260 Storage Server cannot be discovered.

This issue is now resolved.

4.0(4g)A

4.1(1e)A, 4.1(2a)A

CSCvh30116

When a hot plug drive is replaced due to RAID 0 drive failure, the virtual drive is re-initialized automatically to bring back the failed RAID 0 online.

3.1(2b)A

4.1(2a)A

CSCvj91628

LSI Logic MegaRAID SAS 9271-8i controller fails with the following errors:

T9: EVT#258908-06/04/18 3:49:08: 15=Fatal firmware error: Driver detected possible FW hang, halting FW. T9: EVT#258909-06/04/18 3:49:08: 15=Fatal firmware error: Line 1307 in ../../raid/1078dma.c T9: EVT#258910-06/04/18 3:49:08: 15=Fatal firmware error: Line 1307 in ../../raid/1078dma.c

Any filesystems on the RAID controller goes offline or be disconnected.

This issue is now resolved.

3.2(3l)

4.1(2a)

CSCvr95393

A TACACS user is able to login to the Fabric Interconnect even when the NOLOGIN policy has been set.

4.0(1a)A

4.1(2a)A

CSCvt73487

Cisco UCS C480 M5 servers may stop responding at BIOS POST with the following SEL:

System Software event: Post sensor, System Firmware error (POST Error), No video adapter present/enabled [0x9263] was asserted

This issue is now resolved.

4.0(4h)

4.1(2a)

CSCvr70569

When updating the firmware on Cisco UCS S3260 Storage Server with DDRAID controller, using the Non-Interactive host update utility (NIHUU) tool, the drive firmware update is skipped.

This issue is now resolved.

4.1(1)

4.1(2a)

CSCvr79299

The link between Cisco UCS 6400 Series Fabric Interconnect and VIC 1400 or Cisco UCS 2400 IOM adapters, with the SFP-10/25G-LR-S transceiver may go down when the UCS 6400 Series FI interface does not have "fec rs-fec" in the configuration and the type of transceiver is not displayed in Cisco UCS Manager.

This issue is now resolved.

4.1(1)A

4.1(2a)A

CSCvs57940

When a non-RoCE vNIC is added to a server configured with two RoCE vNICs, Cisco UCS Manager displays the configruation failure message.

This issue is now resolved.

4.1(1a)B

4.1(2a)B

CSCvt63740

vMedia policy mapping fails when using HTTPS protocol without specifying username and password. This condition is seen when:

  • One or more mapping information is missing or invalid

  • Same device type exists more than once

  • Image file extension and device type mismatches in vMedia policy

This issue is resolved.

3.1(3l)C, 4.0(4b)C

4.1(2a)C

CSCvt63778

On Cisco UCS C220 M5 Rack Server, the power capping setting is failed when configuring a service profile.

This issue is resolved.

4.0(1a)B

4.1(2a)B

CSCvu33503

On triggering pending reboot in vNIC with VMQ policy, the VLAN configuration is changed to vNIC in service profile.

This issue is resolved.

4.0(4h)A

4.1(2a)A

CSCvu52479

Cisco UCS 6454 Fabric Interconnect is rebooted due to nbproxy process crash. Thereby, resulting in loss of all the SAN and LAN traffic to the directly attached rack servers and blade servers.

This issue is resolved.

4.0(4e)A

4.1(2a)A

CSCvq17291

During the reboot of Cisco UCS 6200 and 6300 Series Fabric Interconnects, you can run the e2fsck command to clean up the file systems.

4.0(3)A

4.1(2a)A

Resolved Caveats in Release 4.1(1e)

The following caveats are resolved in Release 4.1(1e):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvt76668

Cisco UCS S3260 storage servers equipped with SAS expander fail to upgrade the expander and report it as inoperable.

This issue is resolved.

4.0(4h)

4.1(1e)

CSCvq76790

After firmware upgrade of Cisco IMC or Fabric Interconnect, the connectivity between Cisco IMC and Fabric Interconnect is lost due to a Physical Layer 1 issue or misconfiguration of port mode on the Fiber Channel port.

This issue is resolved.

3.2(3g)A, 3.2(3j)A

4.1(1e)A

CSCvu25233

Link-flapping or link-down occurs on some ports of 6400 series Fabric Interconnet connected to VIC 1455/1457 using SFP-H25G-CU3M or SFP-H25G-CU5M and on VIC 1455/1457 connected to 2232PP using SFP-10GB-CUxM cable.

This issue is resolved.

4.0(1a)A

4.1(1e)A

CSCvu03323

When Cisco IMC or VIC 1385/1387 adapter is rebooted due to firmware update or reset from Cisco UCS Manager Web UI or CLI, the following issue may occur:

  • In a C-series server managed by Cisco UCS Manager with Cisco VIC 1385/1387 adapter as a management adapter, firmware update of the server components may fail occasionally.

This issue is resolved.

4.0(4g)A

4.1(1e)A

CSCvu10837

Discovery of Cisco UCS C240 M5 rack server integrated with Cisco UCS Manager, fails and gets stuck at 0% of FSM with the following error messages:

  • lBits is 0#lBits is 0#ERROR: Error adding TLV

  • As per the PortAG logs: Error getting chassis inventory, details: ERROR: Error adding TLV

  • As per the rsdAG logs, though the UCS C240 M5 server gets the DHCP address from Cisco UCS Manager, the server discovery fails with the error: ~ 100 - Rack server fails discovery with "Error adding TLV" message

This issue is resolved.

4.0(4g)A

4.1(1e)A

CSCvu25519

During server scale up, the rack server discovery may get stuck due to duplicate entries in chassis inventory.

This issue is resolved.

4.0(4g)A

4.1(1e)A

Resolved Caveats in Release 4.1(1d)

The following caveats are resolved in Release 4.1(1d):

Defect ID

Symptom

First Bundle Affected

Resolved in Release

CSCvq53066

During auto-upgrade of firmware from Cisco UCS Manager 4.0(2d) or earlier releases to Cisco UCS Manager 4.0(4b) or later releases, the SAS controller firmware is not activated on an integrated rack server.

This issue is resolved.

4.0(4b)A and C

4.1(1d)A and C

CSCvt27869

In rare situations, on UCS 6200 Series Fabric Interconnect, the data sent from IOM are corrupted due to the corrupted parameter going out of bounds.

This issue is resolved.

2.2(8)A

4.1(1d)A

CSCvs97236

On detecting an uncorrectable ECC error, the CPU Integrated Memory Controller (iMC) patrol scrubber logs a truncated system address (4KB page boundary) to the machine check banks. Cisco UCS C460 M4 Rack Server translates the truncated memory address to a physical DIMM address. Depending on system population and configuration, the system event log (SEL) message logging the uncorrectable ECC error may point to a wrong DIMM.

This issue is resolved.

4.0(4g)B, 4.1(1c)B

4.1(1d)B

CSCvt08435

On the 6300 Series Fabric Interconnect, while monitoring SNMP on IOM 2304, HIF ports counts intermittently dropped to zero, causing high traffic indications on the third party monitoring applications.

This issue is resolved.

4.0(4b)A

4.1(1d)A

CSCvu16418

On Cisco UCS 6400 Series Fabric Interconnect running with Cisco UCS Manager 4.0(4g) firmware, UCS fibre channel (FC) ports can stay online when upstream MDS experiences a Kernel panic. Depending on configuration, this situation can cause UCS FC uplinks to stay online even though MDS is inoperable. Thereby, causing pinned vHBAs to stay up which leads to the OS being unaware that FC interfaces are not functioning properly.

This issue is resolved.

4.0(4g)A, 4.1(1a)A

4.1(1d)A

CSCvt29474

On Cisco UCS 6332-16UP Fabric Interconnect (FI) in switched mode direct attached to a Fibre Channel (FC) storage unit, a large number of link reset (LR) or link reset response (LRR) in FC interface can make any FI link to become unusable.

This issue is resolved.

4.0(2a)A

4.1(1d)A

CSCvt44506

Cisco UCS Manager receives multiple delta events for Graphics Processing Units (GPU) card.

This issue is resolved.

4.0(4h)C

4.1(1d)C

CSCvs35747

In rare situations, during loss of FC Uplink connectivity and credit on 6300 series Fabric Interconnect, the key information such as port/link/speed FSM information needed for troubleshooting in the FC Port may be lost.

The logging of FC port issues is enhanced to display the port/Link/Speed FSM information in the fc-mac output.

4.0(1b)A

4.1(1d)A

CSCvt64871