- Preface
- New and Changed Information
- Overview
- Equipment Policies
- Chassis Management
- I/O Module Management
- SIOC Management
- Power Management in Cisco UCS
- Blade Server Hardware Management
- Rack-Mount Server Hardware Management
- S3260 Server Node Hardware Management
- Virtual Interface Management
- Troubleshoot Infrastructure
SIOC
Management
SIOC Management in Cisco UCS Manager
You can manage and monitor all System Input/Output Controllers (SIOC) in a Cisco UCS domain through Cisco UCS Manager.
SIOC Removal or Replacement
You can remove or replace an SIOC from a chassis. Removal or replacement of an SIOC is a service-affecting operation, which requires you to power down the entire chassis.
Guidelines for SIOC Removal
SIOC Removal
Do the following to remove an SIOC from the system:
SIOC Replacement
Do the following to remove an SIOC from the system and replace it with another SIOC:
-
Shut down and remove power from the entire chassis. You must disconnect all power cords to completely remove power.
-
Disconnect the cables connecting the SIOC to the system.
-
Remove the SIOC from the system.
-
Connect the new SIOC to the system.
-
Connect the cables to the SIOC.
-
Connect power cords and then power on the system.
-
Acknowledge the new SIOC.
The server connected to the replaced SIOC is rediscovered.

Note
If the firmware of the replaced SIOC is not the same version as the peer SIOC, then it is recommended to update the firmware of the replaced SIOC by re-triggering chassis profile association.
Acknowledging an SIOC
Cisco UCS Manager has the ability to acknowledge a specific SIOC in a chassis. Perform the following procedure when you replace an SIOC in a chassis.
![]() Caution | This operation rebuilds the network connectivity between the SIOC and the fabric interconnects to which it is connected. The server corresponding to this SIOC becomes unreachable, and traffic is disrupted. |
Resetting the CMC
CMC Secure Boot
With Chassis Management Controller (CMC) secure boot, only Cisco-signed firmware images can be installed and run on the CMC. When the CMC is updated, the image is certified before the firmware is flashed. If certification fails, the firmware is not flashed. This prevents unauthorized access to the CMC firmware.
Guidelines and Limitations for CMC Secure Boot
-
CMC secure boot is supported only on the Cisco UCS S3260 chassis.
-
When chassis association is in progress, enabling secure boot on one of the SIOCs will result in a failed operation.
-
After CMC secure boot is enabled, it cannot be disabled.
-
CMC secure boot is specific to the SIOC on which it is enabled. If you replace the SIOC on which CMC secure boot is enabled, the Secure boot operational state field will now display the secure boot status of the new SIOC.
-
After CMC secure boot is enabled on a chassis, you cannot move the chassis back to standalone mode and downgrade the firmware to a CMC firmware image earlier than Cisco IMC Release 2.0(13).
-
The Secure boot operational state field shows the secure boot status. This can be one of the following:

Feedback