- Preface
- Cisco UCS Central Overview
- License Management
- Managing Administrative Settings
- User Management
- Domain Management
- Remote Management
- Firmware Management
- Monitoring Inventory
- Managing Backup and Restore
- Working with Policies
- Service Profiles and Templates
- Server Policies
- Network Policies
- Storage Policies
- Statistics Management
- System Management
- Monitoring Logs
- Firmware Download from Cisco
- Firmware Library of Images
- Configuring Firmware Image Download from Cisco
- Downloading Firmware Image from Cisco
- Viewing Image Download Status
- Viewing Downloaded Firmware Image Bundles
- Configuring Firmware Image Download from a Remote File System
- Deleting Image Metadata from the Library of Images
- Firmware Upgrades for Cisco UCS Domains
- Scheduling Infrastructure Firmware Updates for Cisco UCS Domains
- Acknowledging a Pending Activity
- Viewing Infrastructure Firmware Packages
- Creating a Host Firmware Package
- Viewing Host Firmware Packages
- Scheduling Firmware Upgrades
Firmware Management
This chapter includes the following sections:
Firmware Download from Cisco
You can configure firmware downloads in Cisco UCS Central to communicate with Cisco website at specified intervals and fetch the firmware image list. After configuring Cisco credentials for image download, when you refresh, Cisco UCS Central fetches the available image data from Cisco.com and displays the firmware image in the firmware image library. You can download the actual firmware images when creating a policy using the firmware image version or when downloading the image using the Store Locally option.
Make sure you do the following to download firmware from Cisco into Cisco UCS Central.
Firmware Library of Images
Image Library in Cisco UCS Central displays a list of all firmware images downloaded into Cisco UCS Central from Cisco.com, local file system and remote file system.
The source for images downloaded from Cisco.com is Cisco and for images downloaded from local or remote file system is local. These firmware images are available for creating firmware policies.
The following are the options to delete firmware images from the library:
-
Deleting the firmware image — You can delete any downloaded image in the firmware library using the delete option.
-
Purging the firmware image metadata — You can delete the image metadata using the purge option. Even after you delete the firmware image from the library, the metadata will still exist. You can use the metadata information to download the actual firmware image anytime from Cisco.com even after deleting the image. If you want to completely remove the firmware image and associated metadata from the firmware image library, make sure to delete the actual firmware image and purge the metadata from the library.
Important: If you have already downloaded the image corresponding to the metadata into the firmware image library, you cannot purge the metadata without deleting the image.
Configuring Firmware Image Download from Cisco
The following example shows how to configure firmware download to Cisco UCS Central from Cisco:
UCSC# (ops-mgr)# connect policy-mgr UCSC(policy-mgr)# scope domain-group / UCSC(policy-mgr) /domain-group # scope download-policy cisco UCSC(policy-mgr) /domain-group/download-policy # set admin-state enable downloadinterval 1 day http-proxy Server[:Port] username Username password Password proxy-password HTTP Proxy Password proxy-username HTTP Proxy Username UCSC(policy-mgr) /domain-group/download-policy # commit-buffer UCSC(policy-mgr) /domain-group/download-policy* #
Downloading Firmware Image from Cisco
The following example shows how to download the actual firmware image from Cisco.com to Cisco UCS Central:
UCSC# connect operation-mgr UCSC(ops-mgr)# scope firmware UCSC(ops-mgr) /firmware # scope download-source cisco UCSC(ops-mgr) /firmware/download-source # download list
Viewing Image Download Status
| Command or Action | Purpose |
|---|
The following example shows how to view the download task details in Cisco UCS Central:
UCSC# connect operation-mgr
UCSC(ops-mgr)# scope firmware
UCSC(ops-mgr) /firmware # show download-task detail
Download task:
File Name: ucs-catalog.2.1.0.475.T.bin
Protocol: Ftp
Server:
Userid: User
Path: /automation/delmar/catalog
Downloaded Image Size (KB): 0
Image Url:
Image Url:
Proxy Userid:
State: Downloaded
Owner: Management
Current Task:
Viewing Downloaded Firmware Image Bundles
The following example shows how to view the downloaded firmware image bundles in Cisco UCS Central:
UCSC# connect operation-mgr UCSC(ops-mgr)# scope firmware UCSC(ops-mgr) /firmware # show package Name Version Download Status ---------------------------------------- ---------- --------------- ucs-catalog.2.1.0.489.T.gbin 2.1(0.489)T Downloaded ucs-k9-bundle-b-series.2.1.0.489.B.gbin 2.1(0.489)B Downloaded ucs-k9-bundle-infra.2.1.0.489.A.gbin 2.1(0.489)A Downloaded ucsCENTRAL-bundle.1.0.0.361.bin 1.0(0.361) Downloaded update.bin 1.0(0.376) Downloaded UCSC(ops-mgr) /firmware #
Configuring Firmware Image Download from a Remote File System
You can download firmware image from one of the following remote file systems:
| Command or Action | Purpose | |
|---|---|---|
| Step 1 | UCSC# connect operation-mgr |
Enters operations manager mode. |
| Step 2 | UCSC(ops-mgr)# scope firmware |
Enters the firmware management mode. |
| Step 3 | UCSC (ops-mgr)/firmware# download imageftpscpsftptftpimage file location | Enters firmware image download configuration and mode and specifies the remote location for firmware image. |
| Step 4 | UCSC(ops-mgr) /firmware # download image ftp: image file location /Password: | Authenticates access to the remote file system. |
The following example shows how to configure firmware download to Cisco UCS Central from a remote file system:
UCSC# connect operation-mgr UCSC(ops-mgr)# scope firmware UCSC(ops-mgr) /firmware # download image ftp: Enter URL ftp:[//[username@]server][/path] UCSC(ops-mgr) /firmware # download image ftp://image download path/Password: UCSC(ops-mgr) /firmware #
Deleting Image Metadata from the Library of Images
| Command or Action | Purpose | |
|---|---|---|
| Step 1 | UCSC# connect operation-mgr |
Enters operations manager mode. |
| Step 2 | UCSC(ops-mgr)# scope firmware |
Enters the firmware management mode. |
| Step 3 | UCSC(ops-mgr) /firmware# scope download-source cisco | Accesses the image metadata downloaded from Cisco website. |
| Step 4 | UCSC(ops-mgr) /firmware/download-source# purge list | Deletes the firmware images metadata from the library of images. |
The following example shows how to delete the image metadata from the library of images:
UCSC# connect operation-mgr UCSC(ops-mgr)# scope firmware UCSC(ops-mgr) /firmware # scope download-source cisco UCSC(ops-mgr) /firmware/download-source # purge list
Firmware Upgrades for Cisco UCS Domains
You can deploy infrastructure and server firmware upgrades for registered Cisco UCS domains from Cisco UCS Central.
If desired, you can upgrade the Cisco UCS domains in each domain group with different versions of firmware. Cisco UCS Central also provides you the option to acknowledge the fabric interconnect reboot globally from Cisco UCS Central or individually from each Cisco UCS domain.
Scheduling Infrastructure Firmware Updates for Cisco UCS Domains
You can schedule an infrastructure firmware upgrade or downgrade for either a classic or mini Cisco UCS Domain from Infrastructure Firmware panel. For more information on managing firmware in Cisco UCS domains, see Cisco UCS Manager Firmware Management Guides
When you create the infrastructure firmware policy in Cisco UCS Central CLI, the system automatically creates a schedule for the policy. You can edit the automatic scheduled for fw-infra and fi-reboot to change the date and time.
| Command or Action | Purpose | |
|---|---|---|
| Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
| Step 2 | UCSC(policy-mgr) # scope domain-group domain-group |
Enters domain group root mode and (optionally) enters a domain group under the domain group root. To enter the domain group root mode, type / as the domain-group. |
| Step 3 | UCSC(policy-mgr) /domain-group # scope infra-policy . |
Enters the infrastructure firmware policy mode. |
| Step 4 | UCSC(policy-mgr) /domain-group/infra-policy # scope product-family ucs-classic|ucs-mini |
Enters the specified product family mode in the domain group. Use ucs-classic to access infrastructure firmware for classic Cisco UCS domain . Use ucs-mini to access mini the infrastructure firmware for Mini Cisco UCS domain. |
| Step 5 | UCSC(policy-mgr) /domain-group/infra-policy/product-family # create fw-infra-pack default |
Initiates the process to create infrastructure firmware policy. |
| Step 6 | UCSC(policy-mgr) /domain-group/infra-policy/product-family# scope-infra-pack default |
Finds specified version of the infrastructure firmware pack. |
| Step 7 | UCSC(policy-mgr) /domain-group/infra-policy/product-family/fw-infra-pack# set infrabundleversion |
Specifies the infrastructure policy version for the update. |
| Step 8 | UCSC(policy-mgr) /domain-group/infra-policy/product-family/fw-infra-pack# set description | (Optional)
Specifies a description for this infrastructure firmware pack. |
| Step 9 | UCSC(policy-mgr) /domain-group/infra-policy/product-family/fw-infra-pack*#commit-buffer |
Commits the transaction to the system. |
UCSC# connect policy-mgr UCSC(policy-mgr)# scope domain-group UCSC(policy-mgr)/domain-group # scope infra-policy UCSC(policy-mgr)/domain-group/infra-policy # scope product-family ucs-classic ucs-mini UCSC(policy-mgr)/domain-group/infra-policy/product-family # create fw-infra-pack default UCSC(policy-mgr)/domain-group/infra-policy/product-family # scope fw-infra-pack default UCSC(policy-mgr)/domain-group/infra-policy/product-family/fw-infra-pack # set infrabundleversion UCSC(policy-mgr)/domain-group/infra-policy/product-family/fw-infra-pack # set descr UCSC(policy-mgr)/domain-group/infra-policy/product-family/fw-infra-pack* # commit-buffer
Acknowledging a Pending Activity
This procedure describes the process to acknowledge an fabric interconnect reboot pending activity from Cisco UCS Central CLI.
| Command or Action | Purpose | |
|---|---|---|
| Step 1 | UCSC# connect operation-mgr |
Enters operations manager mode. |
| Step 2 | UCSC(ops-mgr)# scope domain-group Marketing | Enters the domain group. |
| Step 3 | UCSC(ops-mgr) /domain-group # scope schedule fi-reboot | Enters the scheduled task mode. |
| Step 4 | UCSC(ops-mgr) /domain-group/schedule # show token-request | Displays the pending activities in the system. |
| Step 5 | UCSC(ops-mgr) /domain-group/schedule # scope token-request id sys-fw-system-ack | Finds the pending activity. |
| Step 6 | UCSC(ops-mgr) /domain-group/schedule/token-request # acknowledge token-request | Acknowledges the specified pending activity. |
| Step 7 | UCSC(ops-mgr) /domain-group/schedule/token-request* # commit-buffer | Commits the transaction to the system. |
The following example shows how to acknowledge a pending activity in Cisco UCS Central CLI:
UCSC# connect operation-mgr UCSC(ops-mgr)# scope domain-group Marketing UCSC(ops-mgr) /domain-group # scope schedule fi-reboot UCSC(ops-mgr) /domain-group/schedule # show token-request Token Request: ID Name Client IP Admin State Oper State ----- ---------- --------------- --------------- ---------- 1033 sys-fw-system-ack 10.193.23.150 Auto Scheduled Pending Ack UCSC(ops-mgr) /domain-group/schedule # scope token-request id sys-fw-system-ack UCSC(ops-mgr) /domain-group/schedule/token-request # acknowledge token-request UCSC(ops-mgr) /domain-group/schedule/token-request* # commit-buffer UCSC(ops-mgr) /domain-group/schedule/token-request #
Viewing Infrastructure Firmware Packages
| Command or Action | Purpose | |
|---|---|---|
| Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
| Step 2 | UCSC(policy-mgr) # scope domain-group domain-group |
Enters domain group root mode and (optionally) enters a domain group under the domain group root. To enter the domain group root mode, type / as the domain-group. |
| Step 3 | UCSC(policy-mgr) /domain-group # scope fw-infra-pack name | Enters the infrastructure firmware policy mode in the domain group. |
| Step 4 | UCSC(policy-mgr) /domain-group/fw-infra-pack #show | Displays the infrastructure firmware packages available in the system. |
The following example shows how to view the available infrastructure packages using Cisco UCS Central CLI:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope domain-group UCSC(policy-mgr) /domain-group # scope fw-infra-pack default UCSC(policy-mgr) /domain-group/fw-infra-pack # show Infra Pack: Name Mode Infra Bundle Version -------------------- -------- -------------------- root/default Staged 2.1(0.480)A UCSC(policy-mgr) /domain-group/fw-infra-pack #
Creating a Host Firmware Package
| Command or Action | Purpose | |
|---|---|---|
| Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
| Step 2 | UCSC(policy-mgr) # scope domain-group domain-group |
Enters domain group root mode and (optionally) enters a domain group under the domain group root. To enter the domain group root mode, type / as the domain-group. |
| Step 3 | UCSC(policy-mgr) /domain-group # create fw-host-packpolicy name | Creates the specified host firmware pack. |
| Step 4 | UCSC(policy-mgr) /domain-group/fw-host-pack* # set descr description | Specifies the description for the host firmware policy. |
| Step 5 | UCSC(policy-mgr) /domain-group/fw-host-pack* # set bladebundleversion version number | Specifies the blade server bundle version for the host firmware policy. |
| Step 6 | UCSC(policy-mgr) /domain-group/fw-host-pack* # set rackbundleversion version number | Specifies the rack server bundle version for the host firmware policy. |
| Step 7 | UCSC(policy-mgr) /domain-group/fw-host-pack* # commit-buffer | Commits the transaction to the system. |
The following example shows how to create a host firmware pack in Cisco UCS Central CLI:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope domain-group UCSC(policy-mgr) /domain-group # create fw-host-pack Policy name UCSC(policy-mgr) /domain-group/fw-host-pack* # set bladebundleversion descr rackbundleversion UCSC(policy-mgr) /domain-group/fw-host-pack* # commit-buffer UCSC(policy-mgr) /domain-group/fw-host-pack* #
Viewing Host Firmware Packages
| Command or Action | Purpose | |
|---|---|---|
| Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
| Step 2 | UCSC(policy-mgr) # scope domain-group domain-group |
Enters domain group root mode and (optionally) enters a domain group under the domain group root. To enter the domain group root mode, type / as the domain-group. |
| Step 3 | UCSC(policy-mgr) /domain-group # show fw-host-pack detail | Displays a list of host firmware packages. |
The following example shows how to display available host firmware packages in Cisco UCS Central CLI:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope domain-group UCSC(policy-mgr) /domain-group # show fw-host-pack detail Compute Host Pack: Name: root/Default Mode: Staged Blade Bundle Version: 2.1(0.469)B Rack Bundle Version: 2.1(0.469)C Description: UCSC Name: root/default Mode: Staged Blade Bundle Version: 2.1(0.474)B Rack Bundle Version: 2.1(0.474)C Description: default from UCSC Name: root/latest Mode: Staged Blade Bundle Version: 2.1(0.469)B Rack Bundle Version: 2.1(0.469)C Description: latest Name: root/Marketing/mytest Mode: Staged Blade Bundle Version: 2.1(0.469)B Rack Bundle Version: 2.1(0.469)C Description: Test UCSC(policy-mgr) /domain-group #
Scheduling Firmware Upgrades
Firmware Upgrade Schedules
To upgrade firmware by domain groups in registered Cisco UCS domains, you can schedule upgrades from Cisco UCS Central in the following ways:
If you configure the schedules for user acknowledgment, the fabric interconnect will not reboot without explicit acknowledgment.
Creating a One Time Occurrence Schedule
| Command or Action | Purpose | |
|---|---|---|
| Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
| Step 2 | UCSC(policy-mgr) # scope domain-group domain-group |
Enters domain group root mode and (optionally) enters a domain group under the domain group root. To enter the domain group root mode, type / as the domain-group. |
| Step 3 | UCSC(policy-mgr) /domain-group # create schedule onetime | Creates a one time occurrence schedule. |
| Step 4 | UCSC(policy-mgr) /domain-group/schedule* # set admin-state user-ack | Specifies user acknowledgment for the specified one time update task. |
| Step 5 | UCSC(policy-mgr) /domain-group/schedule # create occurrence one-time name | Specifies the time for one time occurrence. |
| Step 6 | UCSC(policy-mgr) /domain-group/schedule/one-time* # set |
Sets other related details for one time occurrence. |
| Step 7 | UCSC(policy-mgr) /domain-group/schedule/one-time* # commit-buffer | Commits the transaction to the system. |
The following example shows how to schedule a one time occurrence firmware update in Cisco UCS Central CLI:
UCSC# connect policy-mgr UCSC(policy-mgr)# scope domain-group UCSC(policy-mgr) /domain-group # create schedule onetime UCSC(policy-mgr) /domain-group/schedule* # set admin-state user-ack UCSC(policy-mgr) /domain-group/schedule* # commit-buffer UCSC(policy-mgr) /domain-group/schedule # create occurrence one-time Nov172012 UCSC(policy-mgr) /domain-group/schedule/one-time* # set concur-tasks Maximum Number of Concurrent Tasks date Start Date max-duration Max Duration (dd:hh:mm:ss) min-interval Minimum Interval Between Tasks Execution proc-cap Maximum Number of Tasks to Execute UCSC(policy-mgr) /domain-group/schedule/one-time* # set date nov 17 2012 16 00 00 UCSC(policy-mgr) /domain-group/schedule/one-time* # commit-buffer UCSC(policy-mgr) /domain-group/schedule/one-time* #
Viewing One Time Occurrence Schedule
| Command or Action | Purpose | |
|---|---|---|
| Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
| Step 2 | UCSC(policy-mgr) # scope domain-group domain-group |
Enters domain group root mode and (optionally) enters a domain group under the domain group root. To enter the domain group root mode, type / as the domain-group. |
| Step 3 | UCSC(policy-mgr) /domain-group/schedule* # scope schedule one-time | Enters the schedule mode. |
| Step 4 | UCSC(policy-mgr) /domain-group/schedule/one-time # show detail | Displays the one-time schedule. |
The following example shows how to display the scheduled one time occurrence in Cisco UCS Central CLI:
UCSC#connect policy-mgr UCSC(policy-mgr)# scope domain-group UCSC(policy-mgr) /domain-group # scope schedule onetime UCSC(policy-mgr) /domain-group/schedule/one-time # show detail One-Time Occurrence: Name: Friday Start Date: 2012-11-17T16:00:00.000 Max Duration (dd:hh:mm:ss): None Max Concur Tasks: Unlimited Max Tasks: Unlimited Min Interval (dd:hh:mm:ss): None Executed Tasks: 0 UCSC(policy-mgr) /domain-group/schedule/one-time #
Capability Catalog
The Capability Catalog is a set of tunable parameters, strings, and rules. Cisco UCS uses the catalog to update the display and configurability of components such as newly qualified DIMMs and disk drives for servers.
The catalog is divided by hardware components, such as the chassis, CPU, local disk, and I/O module. You can use the catalog to view the list of providers available for that component. There is one provider per hardware component. Each provider is identified by the vendor, model (PID), and revision. For each provider, you can also view details of the equipment manufacturer and the form factor.
For information about which hardware components are dependent upon a particular catalog release, see the component support tables in the Service Notes for the B- Series servers. For information about which components are introduced in a specific release, see the Cisco UCS Release Notes.
Contents of the Capability Catalog
The contents of the Capability Catalog include the following:
Updates to the Capability Catalog
Capability Catalog updates are included in each Cisco UCS Infrastructure Software Bundle. Unless otherwise instructed by Cisco TAC, you only need to activate the Capability Catalog update after you've downloaded, updated, and activated a Cisco UCS Infrastructure Software Bundle.
As soon as you activate a Capability Catalog update, Cisco UCS immediately updates to the new baseline catalog. You do not have to perform any further tasks. Updates to the Capability Catalog do not require you to reboot or reinstall any component in a Cisco UCS domain.
Each Cisco UCS Infrastructure Software Bundle contains a baseline catalog. In rare circumstances, Cisco releases an update to the Capability Catalog between Cisco UCS releases and makes it available on the same site where you download firmware images.
![]() Note | The Capability Catalog version is determined by the version of Cisco UCS that you are using. For example, Cisco UCS 2.0 releases work with any 2.0 release of the Capability Catalog, but not with 1.0 releases of the Capability Catalog. For information about Capability Catalog releases supported by specific Cisco UCS releases, see the Release Notes for Cisco UCS Software accessible through the Cisco UCS B-Series Servers Documentation Roadmap available at the following URL: http://www.cisco.com/go/unifiedcomputing/b-series-doc. |
Configuring a Capability Catalog Upgrade
| Command or Action | Purpose | |
|---|---|---|
| Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
| Step 2 | UCSC(policy-mgr) # scope domain-group domain-group |
Enters domain group root mode and (optionally) enters a domain group under the domain group root. To enter the domain group root mode, type / as the domain-group. |
| Step 3 | UCSC(policy-mgr)/domain-group# scope fw-catalog-pack |
Enters the capability catalog packages mode. |
| Step 4 | UCSC(policy-mgr) /domain-group/fw-catalog-pack # set catalogversion <catalogversion> |
Specifies the capability catalog version for this update. |
| Step 5 | UCSC(policy-mgr) /domain-group/fw-catalog-pack* # commit-buffer |
Commits the transaction to the system. |
The following example shows how to configure a capability catalog update for a domain group from Cisco UCS Central:
UCSC# connect policy-mgr UCSC(policy-mgr) /domain-group # fw-catalog-pack UCSC(policy-mgr) /domain-group/fw-catalog-pack # set catalogversion 2.1(0.475)T UCSC(policy-mgr) /domain-group* # commit-buffer UCSC(policy-mgr) /domain-group* #
Viewing a Capability Catalog in a Domain Group
| Command or Action | Purpose | |
|---|---|---|
| Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
| Step 2 | UCSC(policy-mgr) # scope domain-group domain-group |
Enters domain group root mode and (optionally) enters a domain group under the domain group root. To enter the domain group root mode, type / as the domain-group. |
| Step 3 | UCSC(policy-mgr)/domain-group# scope fw-catalog-pack default |
Enters the capability catalog packages mode. |
| Step 4 | UCSC(policy-mgr) /domain-group/fw-catalog-pack # show detail |
Specifies the capability catalog version for this update. |
The following example shows how to view the capability catalog in a domain group from Cisco UCS Central CLI:
UCSC# connect policy-mgr UCSC(policy-mgr) /domain-group # fw-catalog-pack default UCSC(policy-mgr) /domain-group/fw-catalog-pack # show detail Catalog Pack: Name: root/default Mode: Staged Catalog Version: 2.1(0.468)T Description: default UCSC(policy-mgr) /domain-group* #
Deleting a Capability Catalog Policy
| Command or Action | Purpose | |
|---|---|---|
| Step 1 | UCSC# connect policy-mgr |
Enters policy manager mode. |
| Step 2 | UCSC(policy-mgr) # scope domain-group domain-group |
Enters domain group root mode and (optionally) enters a domain group under the domain group root. To enter the domain group root mode, type / as the domain-group. |
| Step 3 | UCSC(policy-mgr) /domain-group # delete fw-catalog-packname | Deletes the specified catalog policy from the domain group. |
| Step 4 | UCSC(policy-mgr) /domain-group* # commit-buffer | Commits the transaction to the system. |
The following example shows how to delete a capability catalog policy from a domain group:
UCSC# connect policy-mgr UCSC(policy-mgr) /domain-group # delete fw-catalog-pack default UCSC(policy-mgr) /domain-group* # commit-buffer UCSC(policy-mgr) /domain-group* #

Feedback