Cisco UCS Manager
Cisco UCS™ Manager, Release 4.0 provides unified, embedded management of all software and hardware components of the Cisco Unified Computing System™ (Cisco UCS) across multiple chassis, Cisco UCS servers, and thousands of virtual machines. Cisco UCS Manager manages Cisco UCS as a single entity through an intuitive GUI, a command-line interface (CLI), or an XML API for comprehensive access to all Cisco UCS Manager functions. For more information on Cisco UCS Manager, see Cisco UCS Manager on Cisco.com.
This document contains information on new features, resolved caveats, open caveats, and workarounds for Cisco UCS Manager, Release 4.0. This document also includes the following:
-
Current information that became available after the technical documentation was published
-
Related firmware and BIOSes on blade and rack servers and other Cisco Unified Computing System (UCS) components associated with the release
Upgrading directly to Cisco UCS Manager 4.0(x) is supported from Release 2.2(8), and 3.1(3) and later releases. For UCS Mini, upgrading directly to Cisco UCS Manager Release 4.0(x) is supported from Release 3.1(3) and later releases. See Cisco UCS Manager Firmware Management Guide, Release 4.0 for details.
Deprecation Notice
Deprecated Release 4.0(4h)
Release 4.0(4h) is deprecated and firmware files are no longer available. For more information, refer Field Notice: FN - 70595.
Cisco recommends that you upgrade to release 4.0(4i) or later.
Revision History
Release |
Date |
Description |
---|---|---|
4.0(4o) |
January 31, 2023 |
Created release notes for Cisco UCS Manager Release 4.0(4o). |
4.0(4n) |
March 21, 2022 |
Created release notes for Cisco UCS Manager Release 4.0(4n). |
4.0(4m) |
July 7, 2021 |
Created release notes for Cisco UCS Manager Release 4.0(4m). |
January 13, 2022 |
Added section for UCS Manager Health and Pre-Upgrade Check Tool. |
|
4.0(4l). |
March 18, 2021 |
Created release notes for Cisco UCS Manager Release 4.0(4l). |
4.0(4k) |
November 3, 2020 |
Created release notes for Cisco UCS Manager Release 4.0(4k). |
December 17, 2020 |
Added the Known limitations in Release 4.0(4). |
|
December 22, 2020 |
Added CSCvq17291 to the list of Resolved Caveats for Release 4.0(4k). |
|
4.0(4i) |
July 6, 2020 |
Created release notes for Cisco UCS Manager Release 4.0(4i). |
July 23, 2020 |
Added CSCvt64871 and CSCvu11155 to the list of Resolved Caveats for Release 4.0(4i). |
|
July 24, 2020 |
Moved CSCvq53066 from Open Caveats to Resolved Caveats. |
|
4.0(4h) |
March 23, 2020 |
Created release notes for Cisco UCS Manager Release 4.0(4h). |
April 03, 2020 |
Updated the description for CSCvr79388 in the Resolved Caveats for Release 4.0(4h). Added CSCvt64871 to the list of Open Caveats for Release 4.0(4h). |
|
April 8, 2020 |
Added behavior change - Fibre Channel Ports Experiencing txmit Credit Loss Are Now Disabled . |
|
June 12, 2020 |
Added CSCvu11155 to the list of Open Caveats for Release 4.0(4h). |
|
4.0(4g) |
December 9, 2019 |
Created release notes for Cisco UCS Manager Release 4.0(4g). |
January 16, 2020 |
Updated the Internal Dependencies table to clarify support for M3 blade servers. |
|
February 27, 2020 |
Corrected cable SFP-H25G-CU3M to SFP-H25G-CU5M in CSCvr76930 in Open Caveats |
|
4.0(4f) |
November 5, 2019 |
Created release notes for Cisco UCS Manager Release 4.0(4f). |
December 02, 2019 |
Updated the description for CSCvr40744 in the Resolved Caveats for Release 4.0(4f). |
|
4.0(4e) |
September 27, 2019 |
Created release notes for Cisco UCS Manager Release 4.0(4e). |
4.0(4d) |
August 19, 2019 |
Created release notes for Cisco UCS Manager Release 4.0(4d). |
4.0(4c) |
August 01, 2019 |
Created release notes for Cisco UCS Manager Release 4.0(4c). |
October 01, 2019 |
Removed CSCvn49417 from the list of Resolved Caveats. |
|
4.0(4b) |
May 17, 2019 |
Created release notes for Cisco UCS Manager Release 4.0(4b). |
May 20, 2019 |
Updated Catalog File Name for 4.0(4b). |
|
June 3, 2019 |
Added a known limitation - UCS 6300 Series Fabric Interconnect ASIC Limitation with Passive Cables. |
|
4.0(4a) |
April 26, 2019 |
Created release notes for Cisco UCS Manager Release 4.0(4a). |
May 15, 2019 |
Added CSCvp68182 to the list of Open Caveats. Added the Software Deferral Notice for CSCvp68182. |
|
November 14, 2019 |
Added behavior change - Cannot Create Virtual Drives with Cached IO Policy Enabled |
|
4.0(2e) |
May 15, 2019 |
Created release notes for Cisco UCS Manager Release 4.0(2e). |
4.0(2d) |
March 13, 2019 |
Created release notes for Cisco UCS Manager Release 4.0(2d). |
4.0(2b) |
January 19, 2019 |
Created release notes for Cisco UCS Manager Release 4.0(2b). |
January 22, 2019 |
Corrected the UCS Mini model number in the New Hardware in Release 4.0(2b) section. |
|
4.0(2a) |
January 02, 2019 |
Created release notes for Cisco UCS Manager Release 4.0(2a). |
January 08, 2019 |
Updated the Open Caveats for Release 4.0(2a) to include CSCvk63036. |
|
March 03, 2019 |
Added UCSC-GPU-V100-32 to the list of new hardware. |
|
4.0(1d) |
December 20, 2018 |
Created release notes for Cisco UCS Manager Release 4.0(1d). |
September 04, 2019 |
Updated the description for CSCvq28261. Added CSCvr08327 to the list of Open Caveats. |
|
4.0(1c) |
October 11, 2018 |
Created release notes for Cisco UCS Manager Release 4.0(1c). |
4.0(1b) |
September 13, 2018 |
Created release notes for Cisco UCS Manager Release 4.0(1b). |
4.0(1a) |
August 14, 2018 |
Created release notes for Cisco UCS Manager Release 4.0(1a). |
August 27, 2018 |
Added the L1 Terminal Fault caveats — CSCvm03356, CSCvm03351, and CSCvm03339 — to the list of Security Fixes. |
|
June 7, 2019 |
Added behavior change - Allowed WWPN and WWNN Ranges for a WWN Pool |
|
February 04, 2020 |
Added CSCvr98210 to the list of Open Caveats. |
Top Reasons to Move to Cisco UCS Manager Release 4.0
Here are the top reasons to move to Cisco UCS Manager Release 4.0:
-
Support for UCS 6454 Fabric Interconnects
-
Support for C4200 chassis and Cisco UCS C125 M5 Servers
-
Support for VIC 1400 series adapter cards on UCS M5 servers
-
Support for Cisco UCS C480 M5 ML Servers
-
Support for the Second Generation Intel® Xeon® Scalable processor refresh and Intel® Optane™ Data Center persistent memory modules on UCS Intel-based M5 servers
-
Improved memory RAS features on M5 servers
-
Support for a new SIOC with S3260 storage servers
-
Support for Hyperflex 3.5 and later releases
-
Support for new peripherals
New Features in Release 4.0
Cisco UCS Manager, Release 4.0 is a unified software release for all supported UCS hardware platforms.
New Hardware Features
-
New Hardware in Release 4.0(4o) — None
-
New Hardware in Release 4.0(4n) — None
-
New Hardware in Release 4.0(4m) — None
-
New Hardware in Release 4.0(4l) — None
-
New Hardware in Release 4.0(4k) — None
-
New Hardware in Release 4.0(4i) — None
-
New Hardware in Release 4.0(4h) — None
-
New Hardware in Release 4.0(4g) — None
-
New Hardware in Release 4.0(4f) — None
-
New Hardware in Release 4.0(4d) — None
-
New Hardware in Release 4.0(4b) — None
-
New Hardware in Release 4.0(2e) — None
-
New Hardware in Release 4.0(2d) — None
-
New Hardware in Release 4.0(2b) — None
-
New Hardware in Release 4.0(1d) — None
-
New Hardware in Release 4.0(1c) — None
-
New Hardware in Release 4.0(1b) — None
New Software Features
-
New Software in Release 4.0(4o) — None
-
New Software in Release 4.0(4n) — None
-
New Software in Release 4.0(4m) — None
-
New Software in Release 4.0(4l) — None
-
New Software in Release 4.0(4k) — None
-
New Software in Release 4.0(4i) — None
-
New Software in Release 4.0(4h) — None
-
New Software in Release 4.0(4g) — None
-
New Software in Release 4.0(4f) — None
-
New Software in Release 4.0(4d) — None
-
New Software in Release 4.0(4b) — None
-
New Software in Release 4.0(2e) — None
-
New Software in Release 4.0(2d) — None
-
New Software in Release 4.0(2b) — None
-
New Software in Release 4.0(1d) — None
-
New Software in Release 4.0(1c) — None
-
New Software in Release 4.0(1b) — None
New Hardware in Release 4.0(4e)
Peripherals
Support for the Cisco UCS 2408 Fabric Extender (UCS-IOM-2408).
New Hardware in Release 4.0(4c)
Intel NVMe P4510/4511 and P4610 Drive Support
Cisco UCS Manager Release 4.0(4c) introduces firmware support for the following NVMe drives on blade and rack servers:
NMVe Drive |
PID for Blade Servers |
PID for Rack Servers |
---|---|---|
Intel P4510 1TB (SSDPE2KX010T8K) |
UCSB-NVME2H-I1000 |
UCSC-NVME2H-I1000 |
Intel P4510 2TB (SSDPE2KX020T8K) |
UCSB-NVME2H-I2TBV |
UCSC-NVME2H-I2TBV |
Intel P4510 4TB (SSDPE2KX040T8K) |
UCSB-NVME2H-I4000 |
UCSC-NVME2H-I4000 |
Intel P4510 8TB (SSDPE2KX080T8K) |
UCSB-NVMEHW-I8000 |
UCSC-NVMEHW-I8000 |
Intel P4610 1.6TB (SSDPE2KE016T8K) |
UCSB-NVME2H-I1600 |
UCSC-NVME2H-I1600 |
Intel P4610 3.2TB (SSDPE2KE032T8K) |
UCSB-NVME2H-I3200 |
UCSC-NVME2H-I3200 |
New Hardware in Release 4.0(4a)
Second Generation Intel® Xeon® Scalable Processors
Cisco UCS Manager Release 4.0(4a) introduces support for Second Generation Intel® Xeon® Scalable processors on the following servers:
-
Cisco UCS B200 M5 Server
-
Cisco UCS B480 M5 Server
-
Cisco UCS C220 M5 Server
-
Cisco UCS C240 M5 Server
-
Cisco UCS C480 M5 Server
-
Cisco UCS S3260 M5 Server
Intel® Optane™ Data Center Persistent Memory Modules
Intel® Optane™ Data Center persistent memory modules can be used only with the Second Generation Intel® Xeon® Scalable processors.
Cisco UCS Manager Release 4.0(4a) introduces support for the Intel® Optane™ DC persistent memory modules on the following servers that are based on the Second Generation Intel® Xeon® Scalable processors:
-
Cisco UCS B200 M5 Server
-
Cisco UCS B480 M5 Server
-
Cisco UCS C220 M5 Server
-
Cisco UCS C240 M5 Server
-
Cisco UCS C480 M5 Server
-
Cisco UCS S3260 M5 Server
Intel® Optane™ DC persistent memory modules support 128GB, 256GB and 512GB of persistent memory. This can be configured through Cisco UCS Manager or the host Operating System tools.
Peripherals
-
Support for NVIDIA T4 16GB GPU cards (UCSC-GPU-T4-16) on the following servers:
-
UCS C220 M5
-
UCS C240 M5
-
UCS C480 M5
-
-
Support for AMD Radeon Pro V340, 2X16GB, 300W GPU cards (UCSC-GPU-V340)
-
Support for the Cisco UCS 2304V2 Fabric Extender (UCS-IOM-2304V2)
-
Support for Mellanox MCX4121A-ACAT Dual Port 10/25G SFP28 NIC (UCSC-P-M4D25GF)
-
Support for the QLogic QL45611HLCU single port 100GbE PCIe NIC (UCSC-PCIE-QS100GF) on all UCS M5 servers except Cisco UCS C125 M5 Server.
-
Support for the Cisco QSFP 40/100 Gb (QSFP-40/100G-SRBD) dual-rate bi-directional (BiDi) transceiver on UCS 6454 Fabric Interconnects.
-
Hardware RAID support for Cisco Boot Optimized M.2 RAID Controller (UCS-M2-HWRAID) on the following servers:
-
Cisco UCS C220 M5 Server
-
Cisco UCS C240 M5 Server
-
Cisco UCS C480 M5 Server
-
Cisco UCS B200 M5 Server
-
Cisco UCS B480 M5 Server
-
New Hardware in Release 4.0(2a)
Cisco UCS C480 M5 ML Server
The Cisco UCS C480 M5 ML Rack Server is a purpose-built server for Deep Learning. It is storage- and I/O-optimized for training models. The Cisco UCS C480 M5 ML Server delivers outstanding levels of storage expandability and performance options for standalone or Cisco UCS-managed environments in a 4RU form factor. It offers these capabilities:
-
8 NVIDIA SXM2 V100 32G modules with NVLink interconnect
-
Latest Intel® Xeon® Scalable processors with up to 28 cores per socket and support for two processor configurations
-
2666-MHz DDR4 memory and 24 DIMM slots for up to 3 terabytes (TB) of total memory
-
4 PCI Express (PCIe) 3.0 slots for up to 4 10/25 or 40/100G Cisco VICs (VIC 1455 and VIC 1495)
-
Flexible storage options with support for up to 24 Small-Form-Factor (SFF) 2.5-inch, SAS/SATA Solid-State Disks (SSDs) and Hard-Disk Drives (HDDs)
-
Up to 6 PCIe NVMe disk drives
-
Cisco 12-Gbps SAS Modular RAID Controller in a dedicated slot
-
M.2 boot options
-
Dual embedded 10 Gigabit Ethernet LAN-On-Motherboard (LOM) ports
UCS VIC 1400 Series Adapters
Support for the following new UCS VIC 1400 Series adapters on UCS M5 servers and UCS C125 servers:
-
VIC 1495 40/100G PCIe for C-Series (UCSC-PCIE-C100-04)
-
VIC 1497 40/100G mLOM for C-Series (UCSC-MLOM-C100-04)
This release introduces support for 40G Ethernet connections between the UCS 6300 Series Fabric Interconnects and C-Series servers in direct connect mode while using VIC 1495 or VIC 1497.
In this release, UCS VIC 1400 Series adapters for B-Series are supported on UCS Mini Fabric Interconnects. UCS 6454, UCS 6300 Series, and 6200 Series Fabric Interconnects support all UCS VIC 1400 Series adapters.
Note |
Cisco C-Series servers cannot be integrated with Cisco UCS Manager using a combination of Cisco UCS 6324 Fabric Interconnect and Cisco UCS VIC 14xx. |
Note |
You cannot install VIC adapters from different series on the same server. For example, you cannot install UCS VIC 1300 Series adapters and UCS VIC 1400 Series adapters on the same server. |
The following tables illustrate the supported VIC 1400 Series adapter/server combinations for Cisco UCS Manager Release 4.0(2):
FI |
IOM |
1400 Series VIC Adapters |
|||
---|---|---|---|---|---|
VIC 1440 |
VIC 1440 + Port Expander |
VIC 1480 |
VIC 1440 + VIC 1480 |
||
UCSB-MLOM-40G-04 |
UCSB-MLOM-40G-04 + UCSB-MLOM-PT-01 |
UCSB-VIC-M84-4P |
UCSB-MLOM-40G-04 + UCSB-VIC-M84-4P |
||
6200 Series |
2204/2208 |
B480 M5, B200 M5 |
NA |
B480 M5 |
B480 M5, B200 M5 |
6300 Series |
2304 |
B480 M5, B200 M5 |
B480 M5, B200 M5 |
B480 M5 |
B480 M5, B200 M5 |
2204/2208 |
B480 M5, B200 M5 |
NA |
B480 M5 |
B480 M5, B200 M5 |
|
6454 |
2204/2208 2408 Note: Support for 2408 (B-Series M4 and M5 servers) was added in Release 4.0(4e) |
B480 M5, B200 M5 |
NA |
B480 M5 |
B480 M5, B200 M5 |
6324 (UCS Mini |
NA |
B480 M5, B200 M5 |
NA |
B480 M5 |
B480 M5, B200 M5 |
2204/2208 |
NA |
NA |
NA |
NA |
FI |
FEX |
1400 Series VIC Adapters |
|||
---|---|---|---|---|---|
VIC 1455 |
VIC 1457 |
VIC 1495 |
VIC 1497 |
||
UCSC-PCIE-C25Q-04 |
UCSC-MLOM-C25Q-04 |
UCSC-PCIE-C100-04 |
UCSC-MLOM- C100-04 |
||
6200 Series |
Direct Attach |
C220 M5, C240 M5, C480 M5, C480 M5 ML, S3260 M5 (with UCS-S3260 -PCISIOC) |
C220 M5, C240 M5 |
NA |
NA |
2232 PP |
C220 M5, C240 M5, C480 M5, S3260 M5 (with UCS-S3260 -PCISIOC) |
C220 M5, C240 M5 |
NA |
NA |
|
2232-T |
NA |
NA |
NA |
NA |
|
6300 Series |
Direct Attach |
C220 M5, C240 M5, C480 M5, C125 M5, C480 M5 ML, S3260 M5 (with UCS-S3260 -PCISIOC) |
C220 M5, C240 M5 |
C220 M5, C240 M5, C480 M5, C125 M5, C480 M5 ML, S3260 M5 (with UCS-S3260 -PCISIOC) |
C220 M5, C240 M5 |
Direct Attach (Break-out) |
C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260 -PCISIOC) |
C220 M5, C240 M5 |
C220 M5, C240 M5, C480 M5, C125 M5, C480 M5 ML, S3260 M5 (with UCS-S3260 -PCISIOC) |
C220 M5, C240 M5 |
|
2232 PP |
C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260 -PCISIOC) |
C220 M5, C240 M5 |
NA |
NA |
|
2232-T |
NA |
NA |
NA |
NA |
|
2348 |
C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260 -PCISIOC) |
C220 M5, C240 M5 |
NA |
NA |
|
6454 |
Direct Attach (10G/25G) |
C220 M5, C240 M5, C480 M5, C125 M5, C480 M5 ML, S3260 M5 (with UCS-S3260 -PCISIOC) |
C220 M5, C240 M5 |
NA |
NA |
2232 PP |
C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260 -PCISIOC) |
C220 M5, C240 M5 |
NA |
NA |
|
2232-T |
NA |
NA |
NA |
NA |
|
2348 |
NA |
NA |
NA |
NA |
|
6324 (UCS Mini |
Direct Attach (10G) |
NA |
NA |
NA |
NA |
Direct Attach (Break-out) |
NA |
NA |
NA |
NA |
For more details regarding server and adapter combinations, refer the Server Spec Sheets:
UCS Mini with UCS VIC 1400 Series Adapters
Starting with Cisco UCS Manager Release 4.0(2), UCS Mini (6324) Fabric Interconnects support the following UCS VIC 1400 Series adapters for B-Series servers on the primary chassis:
-
UCSB-MLOM-40G-04 (UCS VIC 1440)
-
UCSB-VIC-M84-4P (UCS VIC 1480)
Peripherals
-
Support for NVIDIA V100 PCIe PG500-200 250W 32GB GPU cards (UCSC-GPU-V100-32) for UCS C240 M5 servers.
-
Support for TPM2 (UCSX-TPM2-002-C) for all UCS servers.
-
Support for hot-plug NVMe drive support on HyperFlex.
-
Support for the High Voltage DC 1200 Watt Power Supply (N9K-PUV-1200W) on UCS 6454 Fabric Interconnects
-
Support for Intel® OptaneTM NVMe Extreme Performance Drives (UCSC-NVMEXP-I750)
-
Support for the QLogic 10G Network Adapter card (UCSC-PCIE-QD10GC) on UCS C125.
-
Support for the QLogic 25G Network Adapter card (UCSC-PCIE-QD25GF) on UCS C125.
-
Support for the QLogic 100G Network Adapter card (UCSC-PCIE-QS100GF) on UCS C480 M5 ML.
New Hardware in Release 4.0(1a)
Fourth Generation Fabric Interconnect
The Cisco UCS 6454 Fabric Interconnect is a core part of the Cisco Unified Computing System, providing both network connectivity and management capabilities for the system. The Cisco UCS 6454 offers line-rate, low-latency, lossless 10/25/40/100 Gigabit Ethernet, Fibre Channel over Ethernet (FCoE), and Fibre Channel functions.
The Cisco UCS 6454 54-Port Fabric Interconnect is a one-rack-unit (1RU) 10/25/40/100 Gigabit Ethernet, FCoE and Fibre Channel switch offering up to 3.82 Tbps throughput and up to 54 ports. The switch has 40 10/25-Gbps fixed Ethernet, 8 10/25-Gbps Ethernet or 8/16/32G Fibre Channel ports and 6 40/100-Gbps Ethernet uplink ports. All Ethernet ports are capable of supporting FCoE.
Cisco UCS C125 M5 Server
Cisco UCS Manager 4.0(1) supports Cisco UCS C125 M5 Servers on UCS 6300 Series and UCS 6454 Fabric Interconnects. The C125 M5 server is Cisco’s first server based on AMD EPYC™ processors. Cisco UCS C125 M5 Servers are housed in the Cisco UCS C4200 Series rack server chassis. Each Cisco UCS C4200 Series rack server chassis supports two to four Cisco UCS C125 M5 Server nodes. The Cisco UCS C125 M5 Server supports the following peripherals:
-
Dual Port 10Gbase-T and 10G/25G SFP28 OCP cards
-
Cisco 12G 9460-8i PCIe 12G SAS RAID controller
-
32 GB, 64 GB, and 128 GB SD cards
-
32GB Micro-SD card
Note
This is not managed through Cisco UCS Manager.
-
240 GB and 960 GB M.2 SATA SSD drives
-
16 GB Flash USB drive
Note
This is not managed through Cisco UCS Manager.
-
Mini Storage Carriers for SD and M.2 SATA
-
On-board AHCI controllers
New Generation SIOC for Cisco UCS S3260 Storage Servers
Cisco UCS S3260 Storage Server system supports a new server SIOC UCS-S3260-PCISIOC with S3260 M5 servers. This SIOC has PCIe slots to replace the network adapters. These slots support both Cisco VIC and third-party adapters. Additionally, the new SIOC has two NVME slots. For a complete list of supported cards and adapters, see the Cisco UCS S3260 Server Integration with Cisco UCS Manager, Release 4.0 guide.
UCS VIC 1400 Series Adapters
Support for the following UCS VIC 1400 Series adapters on UCS M5 servers:
-
VIC 1440 10/40G mLOM for B-Series (UCSB-MLOM-40G-04)
-
VIC 1480 10/40G PCIe for B-Series (UCSB-VIC-M84-4P)
-
VIC 1455 10/25G PCIe for C-Series and S-Series (UCSC-PCIE-C25Q-04)
-
VIC 1457 10/25G mLOM for C-Series (UCSC-MLOM-C25Q-04)
In Cisco UCS Manager Release 4.0(1), UCS VIC 1400 Series adapters are supported on UCS 6454, UCS 6300 Series, and 6200 Series Fabric Interconnects. They are not supported on UCS Mini. This release supports 10G/25G Ethernet connections between the UCS 6454 Fabric Interconnect and C-Series servers that have VIC 1455 or VIC 1457.
Note |
You cannot install VIC adapters from different series on the same server. For example, you cannot install UCS VIC 1300 Series adapters and UCS VIC 1400 Series adapters on the same server. |
The following tables illustrate the supported VIC 1400 Series adapter/server combinations for Cisco UCS Manager Release 4.0(1):
FI |
IOM |
1400 Series VIC Adapters |
|||
---|---|---|---|---|---|
VIC 1440 |
VIC 1440 + Port Expander |
VIC 1480 |
VIC 1440 + VIC 1480 |
||
UCSB-MLOM-40G-04 |
UCSB-MLOM-40G-04 + UCSB-MLOM-PT-01 |
UCSB-VIC-M84-4P |
UCSB-MLOM-40G-04 + UCSB-VIC-M84-4P |
||
6200 Series |
2204/2208 |
B480 M5, B200 M5 |
NA |
B480 M5 |
B480 M5, B200 M5 |
6300 Series |
2304 |
B480 M5, B200 M5 |
B480 M5, B200 M5 |
B480 M5 |
B480 M5, B200 M5 |
2204/2208 |
B480 M5, B200 M5 |
NA |
B480 M5 |
B480 M5, B200 M5 |
|
6454 |
2204/2208 |
B480 M5, B200 M5 |
NA |
B480 M5 |
B480 M5, B200 M5 |
FI |
FEX |
1400 Series VIC Adapters |
|
---|---|---|---|
VIC 1455 |
VIC 1457 |
||
UCSC-PCIE-C25Q-04 |
UCSC-MLOM-C25Q-04 |
||
6200 Series |
Direct Attach |
C220 M5, C240 M5, C480 M5, S3260 M5 (with UCS-S3260-PCISIOC) |
C220 M5, C240 M5 |
2232 PP |
C220 M5, C240 M5, C480 M5, S3260 M5 (with UCS-S3260-PCISIOC) |
C220 M5, C240 M5 |
|
2232-T |
NA |
NA |
|
6300 Series |
Direct Attach |
C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260-PCISIOC) |
C220 M5, C240 M5 |
Direct Attach (Break-out) |
C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260-PCISIOC) |
C220 M5, C240 M5 |
|
2232 PP |
C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260-PCISIOC) |
C220 M5, C240 M5 |
|
2232-T |
NA |
NA |
|
2348 |
C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260-PCISIOC) |
C220 M5, C240 M5 |
|
6454 |
Direct Attach (10G/25G) |
C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260-PCISIOC) |
C220 M5, C240 M5 |
2232 PP |
C220 M5, C240 M5, C480 M5, C125 M5, S3260 M5 (with UCS-S3260-PCISIOC) |
C220 M5, C240 M5 |
|
2232-T |
NA |
NA |
Note |
For more details regarding server and adapter combinations, refer the Server Spec Sheets: |
Peripherals
-
Support for the HX-PCIE-OFFLOAD-1 co-processor card with C240Hx M5 servers
-
Support for the High Voltage DC 1200 Watt Power Supply N9K-PUV-1200W on UCS 6332-16UP fabric interconnects
-
Intel Optane NVMe Med. Performance Drives for M5 servers including C220, C240, C480, B200, B480, and S3260 and Hyperflex equivalents.
-
Support for the LSI 9400-8e external SAS HBA on UCS C220, C240, C480 M5 servers.
New Software Features in Release 4.0(4k)
-
Support for AMD Platform Secure Boot (PSB) in Cisco UCS C125 M5 servers that implements hardware-rooted boot integrity. PSB ensures the integrity and authenticity of ROM image by using the root of trust integrated in the hardware.
New Software Features in Release 4.0(4e)
Support for UCS Fabric Extender 2408
UCS Fabric Extender 2408 (UCS-IOM-2408) enables deployment flexibility by supporting 10/25 GbE connectivity to B-Series M4 and M5 servers only on UCS 6454 Fabric Interconnects.
New Software Features in Release 4.0(4c)
ADDDC RAS Changes
-
Adaptive Double Device Data Correction (ADDDC) is a memory RAS feature that enables dynamic mapping of failing DRAM by monitoring corrected errors and taking action before uncorrected errors can occur and cause an outage. It is now enabled by default.
After ADDDC sparing remaps a memory region, the system could incur marginal memory latency and bandwidth penalties on memory bandwidth intense workloads that target the impacted region. Cisco recommends scheduling proactive maintenance to replace a failed DIMM after an ADDDC RAS fault is reported.
BIOS Updates
-
Default for Select Memory RAS configuration token changed from
Maximum Performance
toADDDC sparing
for all M5 servers.
Intel ® VMD Enhancements to NVME
Support for Intel Volume Management Devices (VMD) for local storage on 4.0(4c) and later releases. Optional VMD driver .iso packages are available on the Cisco download site for the following Operating Systems:
-
RHEL 7.3, 7.4, 7.5, 7.6
-
CENTOS 7.3, 7.4, 7.5, 7.6
-
SLES-15, SLES-15 v4
-
Windows 2016, Windows 2019
-
ESXi 6.5U2, 6.7U1, 6.7U2
-
Ubuntu 18.04.1
Enhanced features provided by VMD provide support for hot-plugging of PCIe Solid State Drives (SSD), as well as the ability to use a command line interface to configure blinking patterns to indicate drive status.
New Software Features in Release 4.0(4a)
Intel® Optane™ Data Center Persistent Memory Modules
Cisco UCS Manager Release 4.0(4) introduces support for the Intel® Optane™ Data Center persistent memory modules on the UCS M5 servers that are based on the Second Generation Intel® Xeon® Scalable processors. Intel® Optane™ DC persistent memory modules can be used only with the Second Generation Intel® Xeon® Scalable processors.
This release provides the ability to configure and manage Intel® Optane™ DC persistent memory modules through Cisco UCS Manager. Persistent memory modules are non-volatile memory modules that bring together the low latency of memory and the persistence of storage. Data stored in persistent memory modules can be accessed quickly compared to other storage devices, and is retained across power cycles.
Cisco UCS 6454 Fabric Interconnect Enhancements
-
Multicast MAC-Filtering—This enhancement allows hosts to register for the type of traffic to be received, and facilitates traffic forwarding to vNICs based on this criteria.
-
The number of unified ports have been increased from 8 to 16. Beginning with Cisco UCS Manager Release 4.0(4), the port numbering for Cisco UCS 6454 Fabric Interconnects is:
Table 5. Port Numbering for UCS 6454 Fabric Interconnects Ports
Description
Ports
Description
1-16
Unified Ports can operate as 10/25 Gbps Ethernet or 8/16/32 Gbps Fibre Channel. FC ports are converted in groups of 4 ports by the first 4 ports (port 1 to 4) or the first 8 ports (port 1 to 8).
17-44
Each port can operate as either a 10 Gbps or 25 Gbps SFP28 port.
45-48
Each port can operate as a 1 Gbps, 10 Gbps, or 25 Gbps Ethernet or FCoE port.
49-54
Each uplink port can operate as either a 40 Gbps or 100 Gbps Ethernet or FCoE port. When using a breakout cable, each of these ports can operate as 4 x 10 Gbps or 4 x 25 Gbps Ethernet or FCoE ports.
Ports 49-54 can be used only to connect to Ethernet or FCoE uplink ports, and not to UCS server ports.
-
Support for FCoE uplink ports in Fibre Channel switch mode on the Cisco UCS 6454 Fabric Interconnect.
-
Maximum of 8 FCoE SAN uplink port channels are supported per Cisco UCS 6454 Fabric Interconnect, in both FC switch mode and FC end-host mode. A maximum of 4 FC SAN port channels are supported per Cisco UCS 6454 Fabric Interconnect.
If a Cisco UCS 6454 Fabric Interconnect has a mix of FC SAN port channels and FCoE SAN port channels, they cannot exceed 8 port channels in total.
Support for UCS Fabric Extender 2304V2
UCS Fabric Extender 2304V2 (UCS-IOM-2304V2) is based on UCS Fabric Extender 2304, I/O module with eight 40-Gigabit backplane ports and four 40-Gigabit uplink ports.
Feature Enhancements
-
Consistent Device Naming (CDN) support for SUSE Linux Enterprise Server (SLES)—CDN support has been expanded to include SLES 12 SP3, SLES 12 SP4, and SLES 15.
-
Intel Speed Select—Intel Speed Select allows you to optimize CPU performance by selecting one of three operating profiles, based on the number of logical processor cores, frequency, and TDP thread setting. You can configure Intel Speed Select within a BIOS policy. At boot time, the BIOS discovers the supported CPU and configures it to one of three user-specified profiles.
-
MSwitch Disaster Recovery—This enhancement enables you to recover a corrupted MSwitch and roll back to a previous working firmware.
-
Alternate KVM Port—You can configure a port number between 1024 and 49151 as the KVM port.
-
Disk Scrub for UCS S3260 M4 and M5 servers—This release extends the disk scrub feature for UCS S3260 M4 and M5 servers. For a server associated with a service profile, disk scrub occurs during disassociation, based on the scrub policy used in the service profile.
-
Unified driver support for Fibre Channel and NVMe over Fibre Channel on SLES 12 SP4, SLES 15, and RHEL 7.6. This is in addition to being previously supported on SLES 12 SP3. This support is available on UCS 6300 Series Fabric Interconnects and UCS 6454 Fabric Interconnects. NVMe over Fibre Channel now supports up to 16 interfaces.
-
Support for signed drivers in all supported Linux platforms. All Cisco Linux drivers are now cryptographically signed, which means that they can be used with UEFI Secure Boot on all supported Linux platforms. UEFI Secure Boot ensures that only trusted firmware and drivers are allowed to run at system boot, decreasing vulnerability to malware at boot time.
-
Hardware RAID support for Cisco Boot Optimized M.2 RAID Controller (UCS-M2-HWRAID) on the following servers:
-
Cisco UCS C220 M5 Server
-
Cisco UCS C240 M5 Server
-
Cisco UCS C480 M5 Server
-
Cisco UCS B200 M5 Server
-
Cisco UCS B480 M5 Server
-
New Software Features in Release 4.0(2a)
Cisco UCS 6454 Fabric Interconnect Enhancements
This release introduces support for the following features on the Cisco UCS 6454 Fabric Interconnect:
-
Support for Ethernet and Fibre Channel switching modes.
In the Ethernet switching mode:
-
VLAN Port Count Optimization Enabled is not supported. Without VLAN Port Count Optimization Enabled, the Cisco UCS 6454 Fabric Interconnect supports 16000 PV count.
In the Fibre Channel switching mode:
-
FCoE uplink is not supported
-
-
Support for splitting a single 40/100G QSFP port into four 10/25G ports using a supported breakout cable. These ports can be used only as Ethernet uplink or FCoE uplink ports connecting to a 10/25G switch. They cannot be configured as server ports, FCoE storage ports, appliance ports or monitoring ports.
-
Support for MAC Security on Cisco UCS 6454 Fabric Interconnects
Cisco UCS C480 M5 ML Server
This release introduces support for Cisco UCS C480 M5 ML Servers.
The following features are not supported on Cisco UCS C480 M5 ML Servers:-
Rear NVME cage and PCIe NVME Switch Card
-
Rear auxilliary drive cage
-
Cisco 12G 9460-8i RAID controller (UCSC-SAS9460-8i)
UCS VIC 1400 Series Adapter Enhancements
This release adds support for the newly introduced UCS VIC 1495 and 1497 adapters on UCS M5 servers.
The UCS VIC 1400 Series adapters now support the following features:
-
Support for UCS Mini on UCS VIC 1440 and UCS VIC 1480 adapters on the primary chassis.
-
Support for NVMe over Fibre Channel, which defines a mapping protocol for applying the NVMe interface to Fibre Channel. This release adds support for the FC NVME Initiator adapter policy on UCS 6300 Series Fabric Interconnects and UCS 6454 Fabric Interconnects.
FC NVME Target and FC Target are available as Tech Preview options.
-
FC Multi Queue—Enhanced I/O queue range support for FC Multi Queue. The new range is between 1 and 64 queues.
-
Support for Windows 2016 VMQ and SET.
-
Increased Tx and Rx queues for the eNIC driver—Is supported on all VIC 1400, 1300, and 1200 Series adapter cards on B-series and C-series servers. To efficiently use this speed, the number of Tx and Rx queues have been increased from 8 to 256 each. The eNIC driver now supports 256 Tx queues and 256 Rx queues. However, the maximum number of supported Rx and Tx queues cannot be more than the number of CPU cores in the system.
Out of Band NVME Support on New Generation SIOC for Cisco UCS S3260 Storage Servers
Enhancement to support out of band NVME on the UCS-S3260-PCISIOC new generation SIOC for S3260 M5 servers.
Feature Enhancements
-
UCS Mini Fabric Interconnect Enhancements⎯Cisco UCS Manager Release 4.0(2) introduces the following enhancements for Cisco UCS Mini:
-
Cisco UCS Mini Fabric Interconnects now support the following VIC 1400 Series adapter cards for B-Series servers on the primary chassis:
-
UCSB-MLOM-40G-04 (UCS VIC 1440)
-
UCSB-VIC-M84-4P (UCS VIC 1480)
-
-
Cisco UCS Mini Fabric Interconnects with VIC 1300 Series adapter cards now support the following features:
-
usNIC
-
VXLAN
-
NetFlow
-
-
-
Slow Drain—Cisco UCS Manager Release 4.0(2) introduces the QoS Slow Drain Detection and Mitigation feature on Cisco UCS 6454 Fabric Interconnects. This feature provides various enhancements that enable you to detect slow drain devices that cause congestion in the network, and also mitigate it.
-
Simplified RAID0 Configuration—Cisco UCS Manager provides the ability to configure a range of disk slots into individual RAID0 LUNs by using the LUN set option.
-
Support for SED security policies on B-Series M5 servers—Cisco UCS Manager Release 4.0(2) extends the SED security policies to UCS B-Series M5 servers.
-
Support for Redfish version 1.01 on UCS C-Series servers that are attached to the Fabric Interconnect.
-
Life Left on NVMe drives—NVMe statistics are now enhanced to display Life Left on NVMe drives based on their workload.
-
Parallel Disk Update—Support for parallel firmware update on multiple disks.
-
Support for optimized memory initialization and test processes to reduce boot times on UCS M5 servers—Cisco UCS Manager Release 4.0(2) introduces the following BIOS tokens to improve boot time for UCS M5 servers:
-
Adaptive Memory Training Control
-
OptionROM Launch Optimization Control
-
BIOS Tech Message Level Control
The default value for all three tokens is Enabled.
-
-
Certificate Manager for Device Connector—The Certificate Manager allows you to view a list of trusted certificates and import a valid trusted certificate.
New Software Features in Release 4.0(1a)
Cisco UCS 6454 Fabric Interconnect
This release introduces Cisco UCS 6454 Fabric Interconnects that support 10/25 Gigabit ports in the fabric with 40/100 Gigabit uplink ports. The Cisco UCS Manager Getting Started Guide, Release 4.0 provides details about the specific ports.
New Features Supported
The Cisco UCS 6454 Fabric Interconnect introduces the following new features:
-
Support for 10/25 Gigabit ports in the fabric with 40/100 Gigabit uplink ports
-
Support for VIC 1400 Series adapters
-
128 additional VLANs reserved for internal usage
-
Forward Error Correction (FEC) configurations for ports
Customer Certificate for KVM Usage— This Cisco UCS Manager release enables the KVM certificate to be changed on Cisco UCS M3 and M4 servers.
Legacy Features Not Supported
The following features are not supported on Cisco UCS 6454 Fabric Interconnects:
-
Chassis Discovery Policy in Non-Port Channel Mode
-
Chassis Connectivity Policy in Non-Port Channel Mode
-
Ethernet or FC switching modes
-
Service profiles with dynamic vNICs
-
Multicast Optimize for QoS
-
Netflow
-
MAC security
-
Port profiles and distributed virtual switches
-
VMFEX
Features Configured Differently
The following features are configured differently on Cisco UCS 6454 Fabric Interconnects:
-
Unified Ports—Cisco UCS 6454 fabric interconnects support up to 8 unified ports, which can be configured as FC.
-
VLAN Optimization—On Cisco UCS 6454 Fabric Interconnects, the PV count is as follows:
-
with VLAN port count optimization disabled—16000
-
with VLAN port count optimization enabled—64000
-
Cisco UCS C125 M5 Server
This release introduces support for Cisco UCS C125 M5 Servers.
The following are the two main differences between C125 M5 servers and other rack servers.
-
Power capping is not supported on Cisco UCS C125 M5 Servers.
-
For Cisco UCS C125 M5 Servers, ensure that you select the same Fan Speed Policy for all the servers in an enclosure. Cisco UCS Manager applies the Fan Speed Policy of the server which gets associated last. Having the same Fan Speed Policy for the all the server ensures that the desired Fan Speed Policy is applied irrespective of which server is associated last.
UCS VIC 1400 Series Adapters
Support for UCS VIC 1400 Series adapters on UCS M5 servers.
These adapters introduce support for the following new features:
-
Stateless offloads with VxLAN and NVGRE encapsulation for Windows
-
VMMQ for Windows
-
UDP RSS for ESXi and Linux
-
IPv6 Header support
-
NetFlow
-
QoS support
-
Port channel support with UCS VIC 1455 and 1457 adapters
Note
Cisco UCS Manager Release 4.0(1) supports only single link port channel for FC/FCoE between VIC 1455 or 1457 adapters that are on direct-connect rack-servers, and UCS 6300 Series Fabric Interconnects.
Note
In the port-channel, both ports should have same speed.
The following features are not supported on UCS VIC 1400 Series adapters:
-
VM-FEX for Hyper-V
-
VM-FEX for VMware
-
Dynamic vNICs
-
A port channel with four member ports on UCS VIC 1455 and 1457 adapters
-
usNIC on Cisco UCS C125 M5 Servers
New Generation SIOC for Cisco UCS S3260 Storage Servers
Support for S3260 M5 servers with a new server SIOC UCS-S3260-PCISIOC and the VIC 1400 Series adapter cards.
Feature Enhancements
-
Pre-enablement support for Hyperflex 3.5 release features
-
Support for KMIP client on C480 M5 to support integration with key management servers
-
Support for the IPv6 option on PXE boot devices on Cisco UCS Manager managed C-Series and S-Series M4 servers.
-
Support for the Login Profile feature, which provides the ability to block login requests to Cisco UCS Manager for a specific period after failed login attempts. This feature is currently supported only on UCS 6454 Fabric Interconnects and on Cisco UCS Manager Release 4.0(1) and later releases.
Deprecated Hardware and Software in Cisco UCS Manager Release 4.0
Cisco UCS Manager Release 4.0 does not support UCS B-Series M2 generation blade servers. Cisco UCS Manager Release 4.0 does not support hardware or software that was deprecated in previous releases of Cisco UCS Manager.
Cisco UCS Manager and Cisco UCS C-Series Release Compatibility Matrix for C-Series Rack-Mount Servers
Cisco UCS C-Series Rack-Mount Servers are managed by built-in standalone software— Cisco Integrated Management Controller(Cisco IMC). However, when a C-Series Rack-Mount Server is integrated with Cisco UCS Manager, the Cisco IMC does not manage the server anymore.
Each Cisco UCS Manager release incorporates its corresponding C-Series Standalone release and some previous C-Series standalone releases. For example, Cisco UCS Manager Release 4.0(1) is integrated with C-Series Standalone Release 4.0(1) for the M5 servers and Release 3.0(4) for all M3 and M4 servers. Hence, it supports all the M5, M4 and M3 servers supported by C-Series Standalone releases.
The following table lists the Cisco UCS Manager and C-Series software standalone releases for C-Series Rack-Mount Servers:
Cisco UCS Manager Release |
C-Series Standalone Releases Included |
C-Series Servers Supported by the C-Series Standalone Releases |
---|---|---|
4.0(4) |
4.0(4) |
C220 M5, C240 M5, C480 M5, S3260 M5, C480 M5 ML only |
4.0(2) |
C220 M4, C240 M4, C460 M4, S3260 M4, C125 M5 only |
|
3.0(4) |
All M3 |
|
4.0(2) |
4.0(2) |
C220 M4, C240 M4, C460 M4, C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5, C480 M5 ML only |
3.0(4) |
All M3 |
|
4.0(1) |
4.0(1) |
C220 M4, C240 M4, C460 M4, C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5 only |
3.0(4) |
All M3 |
|
3.2(3) |
3.1(3) |
C220 M5, C240 M5, C480 M5, S3260 M5 only |
3.0(4) |
All M3/M4 |
|
3.2(2) |
3.1(2) |
C220 M5, C240 M5, C480 M5 only |
3.0(3) |
All M3/M4 |
|
3.2(1) |
3.1(1) |
C220 M5, C240 M5 only |
3.0(3) |
All M3/M4 |
|
3.1(3) |
3.0(3) |
All M3/M4 |
3.1(2) |
2.0(13) |
All M3/M4 |
3.1(1) |
2.0(10) |
C220 M4, C240 M4 only |
2.0(9) |
All other M3/M4 |
|
2.2(8) |
2.0(12) |
C460 M4 only |
2.0(10) |
C220 M4, C240 M4 only |
|
1.5(9) |
C420-M3, C260-M2, C460-M2 only |
|
2.0(9) |
For all other M3/M4 |
System Requirements
Cisco UCS Central Integration
Cisco UCS Manager Release 4.0 can only be registered with Cisco UCS Central, Release 2.0(1f) or higher.
Supported Operating Systems
For detailed information about supported operating system, see the interactive UCS Hardware and Software Compatibility matrix.
Supported Web Browsers
Cisco UCS Manager GUI |
Web Browsers |
---|---|
HTML5 |
Microsoft Internet Explorer 11 or higher Mozilla Firefox 45 or higher Google Chrome 45 or higher Apple Safari version 9 or higher Opera version 35 or higher |
Network Requirements
For using the device connector feature, you must configure HTTPS proxy settings. The Cisco UCS Manager Administration Management Guide, Release 4.0 provides detailed information about configuring the device connector.
Cross-Version Firmware Support
The Cisco UCS Manager A bundle software (Cisco UCS Manager, Cisco NX-OS, IOM and FEX firmware) can be mixed with previous B or C bundle releases on the servers (host firmware [FW], BIOS, Cisco IMC, adapter FW and drivers).
The following table lists the mixed A, B, and C bundle versions that are supported on Cisco UCS 6200, 6300, and 6454 fabric interconnects:
Infrastructure Versions (A Bundles) |
||||||||
---|---|---|---|---|---|---|---|---|
Host FW Versions (B or C Bundles) |
2.2(8) |
3.1(3) |
3.2(1) |
3.2(2) |
3.2(3) |
4.0(1) |
4.0(2) |
4.0(4) |
2.2(8) |
6200 |
6200 |
6200 |
6200 |
6200 |
6200 |
6200 |
6200 |
3.1(3) |
— |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
3.2(1) |
— |
— |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
3.2(2) |
— |
— |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
3.2(3) |
— |
— |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
6200,6332, 6332-16UP |
4.0(1) |
— |
— |
— |
— |
— |
6200,6332, 6332-16UP, 6454 |
6200,6332, 6332-16UP, 6454 |
6200,6332, 6332-16UP, 6454 |
4.0(2) |
— |
— |
— |
— |
— |
6200,6332, 6332-16UP, 6454 |
6200,6332, 6332-16UP, 6454 |
6200,6332, 6332-16UP, 6454 |
4.0(4) |
— |
— |
— |
— |
— |
6200,6332, 6332-16UP, 6454 |
6200,6332, 6332-16UP, 6454 |
6200,6332, 6332-16UP, 6454 |
The following table lists the mixed A, B, and C bundle versions that are supported on Cisco UCS Mini fabric interconnects:
Infrastructure Versions (A Bundles) |
|||||||
---|---|---|---|---|---|---|---|
Host FW Versions (B or C Bundles) |
3.1(3) |
3.2(1) |
3.2(2) |
3.2(3) |
4.0(1) |
4.0(2) |
4.0(4) |
3.1(3) |
6324 |
6324 |
6324 |
6324 |
6324 |
6324 |
6324 |
3.2(1) |
— |
6324 |
6324 |
6324 |
6324 |
6324 |
6324 |
3.2(2) |
— |
6324 |
6324 |
6324 |
6324 |
6324 |
6324 |
3.2(3) |
— |
6324 |
6324 |
6324 |
6324 |
6324 |
6324 |
4.0(1) |
— |
— |
— |
— |
6324 |
6324 |
6324 |
4.0(2) |
— |
— |
— |
— |
6324 |
6324 |
6324 |
4.0(4) |
— |
— |
— |
— |
6324 |
6324 |
6324 |
The following table lists the mixed B, C bundles that are supported on all platforms with the 4.0(4)A bundle:
Infrastructure Versions (A Bundles) |
||||
---|---|---|---|---|
Host FW Versions (B, C Bundles) |
4.0(4) |
|||
6200 |
6300 |
6324 |
6454 |
|
ucs-k9-bundle-infra. 4.0.x.xxx.A.bin | ucs-6300-k9-bundle-infra. 4.0.x.xxx.A.bin | ucs-mini-k9-bundle-infra. 4.0.x.xxx.A.bin |
ucs-6400-k9 -bundle-infra. 4.0.x.xxx.A.bin |
|
2.2(8) (B, C Bundles) |
Yes |
— |
— |
— |
3.1(3) (B, C Bundles) |
Yes |
Yes |
Yes |
— |
3.2(1), 3.2(2), 3.2(3) (B, C Bundles) |
Yes |
Yes |
Yes |
— |
4.0(1), 4.0(2), 4.0(4) (B, C Bundles) |
Yes |
Yes |
Yes |
Yes |
The following table lists the mixed B, C bundles that are supported on all platforms with the 4.0(2)A bundle:
Infrastructure Versions (A Bundles) |
||||
---|---|---|---|---|
Host FW Versions (B, C Bundles) |
4.0(2) |
|||
6200 |
6300 |
6324 |
6454 |
|
ucs-k9-bundle-infra. 4.0.x.xxx.A.bin | ucs-6300-k9-bundle-infra. 4.0.x.xxx.A.bin | ucs-mini-k9-bundle-infra. 4.0.x.xxx.A.bin |
ucs-6400-k9 -bundle-infra. 4.0.x.xxx.A.bin |
|
2.2(8) (B, C Bundles) |
Yes |
— |
— |
— |
3.1(3) (B, C Bundles) |
Yes |
Yes |
Yes |
— |
3.2(1), 3.2(2), 3.2(3) (B, C Bundles) |
Yes |
Yes |
Yes |
— |
4.0(1), 4.0(2), 4.0(4) (B, C Bundles) |
Yes |
Yes |
Yes |
Yes |
The following table lists the mixed B, C bundles that are supported on all platforms with the 4.0(1)A bundle:
Infrastructure Versions (A Bundles) |
||||
---|---|---|---|---|
Host FW Versions (B, C Bundles) |
4.0(1) |
|||
6200 |
6300 |
6324 |
6454 |
|
ucs-k9-bundle-infra. 4.0.x.xxx.A.bin | ucs-6300-k9-bundle-infra. 4.0.x.xxx.A.bin | ucs-mini-k9-bundle-infra. 4.0.x.xxx.A.bin |
ucs-6400-k9 -bundle-infra. 4.0.x.xxx.A.bin |
|
2.2(8) (B, C Bundles) |
Yes |
— |
— |
— |
3.1(3) (B, C Bundles) |
Yes |
Yes |
Yes |
— |
3.2(1), 3.2(2), 3.2(3) (B, C Bundles) |
Yes |
Yes |
Yes |
— |
4.0(1), 4.0(2), 4.0(4) (B, C Bundles) |
Yes |
Yes |
Yes |
Yes |
Important |
If you implement cross-version firmware, you must ensure that the configurations for the Cisco UCS domain are supported by the firmware version on the server endpoints. |
Internal Dependencies
The following sections provide information on the interdependencies between Cisco UCS hardware and versions of Cisco UCS Manager.
-
Version dependencies for Server FRU items such as DIMMs depend on the server type.
-
Chassis items such as fans and power supplies work with all versions of Cisco UCS Manager.
6200 Series, 6332 Series, and 6454 Fabric Interconnects and Components
Blade Servers
Note |
In a mixed firmware configuration, we recommend that the minimum server bundle corresponds to the Minimum Software Version. The infrastructure must be at or above the Minimum Software Version. |
Servers |
Minimum Software Version UCS 6200 Series FI |
Minimum Software Version UCS 6332, 6332-16UP FI |
Minimum Software Version UCS 6332, 6332-16UP FI |
Minimum Software Version UCS 6454 FI |
Suggested Software Version UCS 6200 Series FI UCS 6332, 6332-16UP FI UCS 6454 FI |
|
---|---|---|---|---|---|---|
UCS-IOM-2204 UCS-IOM-2208 |
UCS-IOM-2204 UCS-IOM-2208 |
UCS-IOM-2304 |
UCS-IOM-2304V2 |
UCS-IOM-2204 UCS-IOM-2208 UCS-IOM-2408* |
UCS-IOM-2204 UCS-IOM-2208 UCS-IOM-2408* |
|
* UCS-IOM-2408 supported on M4 and M5 only with UCS 6454 FI & VIC 1300/1400 |
||||||
B22 M3 E5-2400 B22 M3 E5-2400 v2 Note: M3 servers do not support the 6454 FI and 2408 IOM combination. However, they do support the 6454 FI and 2208 IOM, and 6454 FI and 2204 IOM combinations. |
2.2(8a) 2.2(8a) |
3.1(3a) 3.1(3a) |
3.1(3a) |
4.0(4o) |
4.0(1a) |
4.0(4o) |
B200 M3 E5-2600 B200 M3 E5-2600 v2 Note: M3 servers do not support the 6454 FI and 2408 IOM combination. However, they do support the 6454 FI and 2208 IOM, and 6454 FI and 2204 IOM combinations. |
2.2(8a) 2.2(8a) |
3.1(3a) 3.1(3a) |
3.1(3a) |
4.0(4o) |
4.0(1a) |
4.0(4o) |
B200 M4 |
2.2(8a) |
3.1(3a) |
3.1(3a) |
4.0(4o) |
4.0(1a) |
4.0(4o) |
B200 M5 |
3.2(1d) |
3.2(1d) |
3.2(1d) |
4.0(4o) |
4.0(1a) |
4.0(4o) |
B260 M4 E7-2800 v2 B260 M4 E7-4800 v2 B260 M4 E7-8800 v2 B260 M4 E7-4800 v3 B260 M4 E7-8800 v3 |
2.2(8a) 2.2(8a) 2.2(8a) 2.2(8a) 2.2(8a) |
3.1(3a) 3.1(3a) 3.1(3a) 3.1(3a) 3.1(3a) |
3.1(3a) |
4.0(4o) |
4.0(1a) |
4.0(4o) |
B260 M4 E7-4800 v4 B260 M4 E7-8800 v4 |
2.2(8b) 2.2(8b) |
3.1(3a) 3.1(3a) |
3.1(3a) 3.1(3a) |
4.0(4o) |
4.0(1a) |
4.0(4o) |
B420 M3 E5-4600 B420 M3 E5-4600 v2 |
2.2(8a) 2.2(8a) |
3.1(3a) 3.1(3a) |
3.1(3a) |
4.0(4o) |
4.0(1a) |
4.0(4o) |
B420 M4 E5-4600 v3 B420 M4 E5-4600 v4 |
2.2(8a) 2.2(8b) |
3.1(3a) 3.1(3a) |
3.1(3a) 3.1(3a) |
4.0(4o) |
4.0(1a) |
4.0(4o) |
B460 M4 E7-4800 v2 B460 M4 E7-8800 v2 B460 M4 E7-4800 v3 B460 M4 E7-8800 v3 |
2.2(8a) 2.2(8a) 2.2(8a) 2.2(8a) |
3.1(3a) 3.1(3a) 3.1(3a) 3.1(3a) |
3.1(3a) |
4.0(4o) |
4.0(1a) |
4.0(4o) |
B460 M4 E7-4800 v4 B460 M4 E7-8800 v4 |
2.2(8b) 2.2(8b) |
3.1(3a) 3.1(3a) |
3.1(3a) |
4.0(4o) |
4.0(1a) |
4.0(4o) |
B480 M5 |
3.2(2b) |
3.2(2b) |
3.2(2b) |
4.0(4o) |
4.0(1a) |
4.0(4o) |
Rack Servers
Servers |
Minimum Software Version UCS 6200 Series FI |
Minimum Software Version UCS 6332, 6332-16UP |
Minimum Software Version UCS 6454 |
Suggested Software Version UCS 6200 Series FI UCS 6332, 6332-16UP FI UCS 6454 |
---|---|---|---|---|
C22 M3 and M3L |
2.2(8a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
C24 M3, M3L, and M3S2 |
2.2(8a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
C220 M3 |
2.2(8a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
C220 M4 |
2.2(8a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
C220 M5 |
3.2(1d) |
3.2(1d) |
4.0(1a) |
4.0(4o) |
C240 M3 |
2.2(8a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
C240 M4 |
2.2(8a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
C240 M5 |
3.2(1d) |
3.2(1d) |
4.0(1a) |
4.0(4o) |
C460 M4 E7-2800 v2 C460 M4 E7-4800 v2 C460 M4 E7-8800 v2 C460 M4 E7-4800 v3 C460 M4 E7-8800 v3 |
2.2(8a) 2.2(8a) 2.2(8a) 2.2(8a) 2.2(8a) |
3.1(3a) 3.1(3a) 3.1(3a) 3.1(3a) 3.1(3a) |
4.0(1a) |
4.0(4o) |
C460 M4 E7-8800 v4 |
2.2(8b) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
C480 M5 |
3.2(2b) |
3.2(2b) |
4.0(1a) |
4.0(4o) |
S3260 M4 |
3.1(2b) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
S3260 M5 |
3.2(3a) |
3.2(3a) |
4.0(1a) |
4.0(4o) |
C125 M5 |
NA |
4.0(1a) | 4.0(1a) |
4.0(4o) (only on UCS 6332, UCS 6332-16UP FI, and UCS 6454 |
C480 M5 ML |
4.0(2a) |
4.0(2a) |
4.0(2a) |
4.0(4o) |
Adapters
Adapters |
Minimum Software Version UCS 6200 Series FI |
Minimum Software Version UCS 6332, 6332-16UP |
Minimum Software Version UCS 6332, 6332-16UP |
Minimum Software Version UCS 6454 |
Suggested Software Version UCS 6200 Series FI UCS 6332, 6332-16UP FI UCS 6454 |
---|---|---|---|---|---|
UCS-IOM-2204 UCS-IOM-2208 |
UCS-IOM-2204 UCS-IOM-2208 |
UCS-IOM-2304 UCS-IOM-2304V2 |
UCS-IOM-2204 UCS-IOM-2208 |
UCS-IOM-2204 UCS-IOM-2208 UCS-IOM-2408* |
|
* UCS-IOM-2408 supported on M4 and M5 only with UCS 6454 FI |
|||||
UCSC-P-M4D25GF (Mellanox MCX4121A-ACAT Dual Port 10/25G SFP28 NIC) |
4.0(4o) |
4.0(4o) |
4.0(4o) |
4.0(4o) |
4.0(4o) |
UCSC-PCIE-QS100GF (QLogic QL45611HLCU 100GbE) |
4.0(4o) |
4.0(4o) |
4.0(4o) |
4.0(4o) |
4.0(4o) |
UCSC-PCIE-C100-04 (UCS VIC 1495) |
NA |
4.0(2a) |
4.0(2a) |
NA |
4.0(4o)(only on UCS 6332, 6332-16UP FI) |
UCSC-MLOM-C100-04 (UCS VIC 1497) |
NA |
4.0(2a) |
4.0(2a) |
NA |
4.0(4o)(only on UCS 6332, 6332-16UP FI) |
UCSB-MLOM-40G-04 (UCS VIC 1440) |
4.0(1a) |
4.0(1a) |
4.0(1a) |
4.0(1a) |
4.0(4o) |
UCSB-VIC-M84-4P (UCS VIC 1480) |
4.0(1a) | 4.0(1a) | 4.0(1a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-C25Q-04 (UCS VIC 1455) |
4.0(1a) | 4.0(1a) | 4.0(1a) |
4.0(1a) |
4.0(4o) |
UCSC-MLOM-C25Q-04 (UCS VIC 1457) |
4.0(1a) | 4.0(1a) | 4.0(1a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-BD16GF (Emulex LPe31002 Dual-Port 16G FC HBA) |
3.2(3a) |
3.2(3a) |
3.2(3a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-ID40GF (Intel XL710 adapter) |
3.2(3a) |
3.2(3a) |
3.2(3a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-IQ10GF (Intel X710-DA4 adapter) |
3.2(3a) |
3.2(3a) |
3.2(3a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-ID10GF (Intel X710-DA2 adapter) |
3.2(3a) |
3.2(3a) |
3.2(3a) |
4.0(1a) |
4.0(4o) |
XXV710-DA2 (Intel XXV710-DA2 adapter) |
3.2(3a) |
3.2(3a) |
3.2(3a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-ID10GC (Intel X550-T2 adapter) |
3.2(3a) |
3.2(3a) |
3.2(3a) |
4.0(1a) |
4.0(4o) |
N2XX-AIPCI01 (Intel X520 dual port adapter) |
3.2(3a) |
3.2(3a) |
3.2(3a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-ID25GF (Intel X710 25Gb Dual-port BaseT) |
3.2(3a) |
3.2(3a) |
3.2(3a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-QD25GF (QLogic QL41212H 25GbE) |
3.2(2b) |
3.2(2b) |
3.2(2b) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-QD40GF (QLogic QL45212H 40GbE) |
3.2(2b) |
3.2(2b) |
3.2(2b) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-IQ10GC (Intel X710-T4) |
3.2(2b) |
3.2(2b) |
3.2(2b) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-QD16GF (QLogic QLE2692-CSC) |
3.2(1d) |
3.2(1d) |
3.2(1d) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-C40Q-03 (UCS VIC 1385) UCSC-MLOM-C40Q-03 (UCS VIC 1387) |
2.2(8a) |
3.1(3a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
UCS-VIC-M82-8P (UCS VIC 1280) UCSB-MLOM-40G-01 (UCS VIC 1240) UCSB-MLOM-PT-01 (Cisco Port Expander Card) |
2.2(8a) |
3.1(3a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
UCSB-MLOM-40G-03 (UCS VIC 1340) UCSB-VIC-M83-8P (UCS VIC 1380) UCSC-MLOM-CSC-02 (UCS VIC 1227) |
2.2(8a) |
3.1(3a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-CSC-02 (UCS VIC 1225) |
2.2(8a) |
3.1(3a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
UCSC-F-FIO-1000MP (Cisco UCS Fusion ioMemory – PX600, 1.0TB) UCSC-F-FIO-1300MP (Cisco UCS Fusion ioMemory – PX600, 1.3TB) UCSC-F-FIO-2600MP (Cisco UCS Fusion ioMemory – PX600, 2.6TB) UCSC-F-FIO-5200MP (Cisco UCS Fusion ioMemory – PX600, 5.2TB) |
2.2(8a) |
3.1(3a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
UCSB-FIO-1600MS (Cisco UCS Fusion ioMemory Mezzanine SX300, 1.6TB) UCSB-FIO-1300MS (Cisco UCS Fusion ioMemory Mezzanine PX600, 1.3TB) |
2.2(8a) |
3.1(3a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
UCSC-INVADER-3108 UCSC-NYTRO-200GB (Cisco Nytro MegaRAID 200GB Controller) |
2.2(8a) |
3.1(3a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
UCSC-MLOM-C10T-02 (UCS VIC 1227T) UCSC-PCIE-C10T-02 (UCS VIC 1225T) UCSC-F-FIO-785M (Cisco UCS 785GB MLC Fusion ioDrive2 for C-Series Servers) UCSC-F-FIO-365M (Cisco UCS 365GB MLC Fusion ioDrive2 for C-Series Servers) UCSC-F-FIO-1205M (Cisco UCS 1205GB MLC Fusion ioDrive2 for C-Series Servers) UCSC-F-FIO-3000M (Cisco UCS 3.0TB MLC Fusion ioDrive2 for C-Series Servers) UCSC-F-FIO-1000PS (UCS 1000GB Fusion ioMemory3 PX Performance line for Rack M4) UCSC-F-FIO-1300PS (UCSC-F-FIO-1300PS) UCSC-F-FIO-2600PS (UCS 2600GB Fusion ioMemory3 PX Performance line for Rack M4) UCSC-F-FIO-5200PS (UCS 5200GB Fusion ioMemory3 PX Performance line for Rack M4) UCSC-F-FIO-6400SS (UCS 6400GB Fusion ioMemory3 SX Scale line for C-Series) UCSC-F-FIO-3200SS (UCS 3200GB Fusion ioMemory3SX Scale line for C-Series) |
2.2(8a) |
3.1(3a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-E14102B (Emulex OCe14102B-F) |
2.2(8a) |
3.1(3a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-IQ10GF (Intel X710-DA4 adapter) UCSC-PCIE-ID10GF (Intel X710-DA2 adapter) UCSC-PCIE-ID40GF (Intel XL710 adapter) |
— |
— |
3.1(3a) |
4.0(1a) |
4.0(4o) |
UCSC-F-I80010 (Intel P3700 HHHL 800GB NVMe PCIe SSD) UCSC-F-I12003 (Intel P3600 HHHL 1200GB NVMe PCIe SSD) UCSC-F-I160010 (Intel P3700 HHHL 1600GB NVMe PCIe SSD) UCSC-F-I20003 (Intel P3600 HHHL 2000GB NVMe PCIe SSD ) UCS-PCI25-40010 (Intel P3700 400GB NVMe PCIe SSD) UCS-PCI25-8003 (Intel P3600 800GB NVMe PCIe SSD) UCS-PCI25-80010 (Intel P3700 800GB NVMe PCIe SSD) UCS-PCI25-16003 (Intel P3600 1600GB NVMe PCIe SSD) UCSC-F-H19001 (UCS Rack PCIe/NVMe Storage 1900GB HGST SN150) UCSC-F-H38001 (UCS Rack PCIe/NVMe Storage 3800GB HGST SN150) UCS-PCI25-38001 (UCS PCIe/NVMe2.5"SFF Storage 3800GB HGST SN100) |
— |
3.1(3a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-QD32GF (Qlogic QLE2742) N2XX-AQPCI05 (Qlogic QLE2562) UCSC-PCIE-Q2672 (Qlogic QLE2672-CSC) UCSC-PCIE-BD32GF (Emulex LPe32002) UCSC-PCIE-BS32GF (Emulex LPe32001) N2XX-AEPCI05 (Emulex LPe12002) |
— |
3.1(3a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-E16002 (Emulex LPe16002-M6 16G FC rack HBA) |
— |
3.2(1d) |
3.2(1d) |
4.0(1a) |
4.0(4o) |
UCSC-PCIE-ID10GC (Intel X550 Dual-port 10GBase-T NIC) |
3.1(2b) |
3.1(3a) |
3.1(3a) |
4.0(1a) |
4.0(4o) |
Other Hardware
We recommend that you use the latest software version for all Chassis, Fabric Interconnects, Fabric Extenders, Expansion Modules and Power Supplies. To determine the minimum software version for your mixed environment, see Cross-Version Firmware Support. The following is the list of other supported hardware:
Type |
Details |
---|---|
Chassis |
UCSC-C4200-SFF N20–C6508 UCSB-5108-DC UCSB-5108-AC2 UCSB-5108-DC2 UCSB-5108-HVDC |
Fabric Interconnects |
UCS 6454 |
Fabric Extenders |
Cisco UCS 2204XP Cisco UCS 2208XP Cisco Nexus 2232PP Cisco Nexus 2232TM-E Cisco UCS 2408 |
Power Supplies |
UCS-PSU-6332-AC UCS-PSU-6332-DC UCS-PSU-64108-AC UCS-PSU-6332-D |
Type |
Details |
---|---|
Chassis |
N20–C6508 UCSB-5108-DC UCSB-5108-AC2 UCSB-5108-DC2 UCSB-5108-HVDC |
Fabric Interconnects |
UCS 6332UP UCS 6332-16UP |
Fabric Extenders |
Cisco UCS 2208XP Cisco UCS 2204XP Cisco Nexus 2232PP Cisco Nexus 2232TM-E Cisco UCS 2304 Cisco UCS 2304V2 Cisco Nexus 2348UPQ |
Power Supplies |
UCS-PSU-6332-AC UCS-PSU-6332-DC |
Note |
The 40G backplane setting is not applicable for 22xx IOMs. |
Type |
Details |
---|---|
Chassis |
N20–C6508 UCSB-5108-DC UCSB-5108-AC2 UCSB-5108-DC2 UCSB-5108-HVDC |
Fabric Interconnects |
UCS 6248UP UCS 6296UP |
Fabric Extenders |
UCS 2208XP UCS 2204XP Cisco Nexus 2232PP Cisco Nexus 2232TM-E |
Expansion Modules |
UCS-FI-E16UP |
Power Supplies |
UCS-PSU-6248UP-AC UCS-PSU-6248UP-DC UCS-PSU-6248-HVDC UCS-PSU-6296UP-AC UCS-PSU-6296UP-DC |
GB Connector Modules, Transceiver Modules, and Cables
Following is the list of Gb connector modules, transceiver modules, and supported cables:
Note |
|
Gb Connector Modules |
Transceiver Modules and Cables |
||
---|---|---|---|
FC for UCS 6454 Fabric Interconnects |
DS-SFP-FC8G-SW DS-SFP-FC8G-LW DS-SFP-FC16G-SW DS-SFP-FC16G-LW DS-SFP-FC32G-SW DS-SFP-FC32G-LW |
||
100-Gb for UCS 6454 Fabric Interconnects |
QSFP-40/100G-SRBD QSFP-100G-SR4-S QSFP-100G-LR4-S QSFP-100G-SM-SR QSFP-100G-CU1M QSFP-100G-CU2M QSFP-100G-CU3M QSFP-100G-AOC1M QSFP-100G-AOC2M QSFP-100G-AOC3M QSFP-100G-AOC5M QSFP-100G-AOC7M QSFP-100G-AOC10M QSFP-100G-AOC15M QSFP-100G-AOC20M QSFP-100G-AOC25M QSFP-100G-AOC30M |
||
40-Gb for UCS 6454 Fabric Interconnects |
QSFP-40G-SR4 QSFP-40G-SR4-S QSFP-40G-SR-BD QSFP-40G-LR4 QSFP-40G-LR4-S QSFP-40G-ER4 WSP-Q40GLR4L QSFP-H40G-CU1M QSFP-H40G-CU3M QSFP-H40G-CU5M QSFP-H40G-ACU7M QSFP-H40G-ACU10M QSFP-H40G-AOC1M QSFP-H40G-AOC2M QSFP-H40G-AOC3M QSFP-H40G-AOC5M QSFP-H40G-AOC10M QSFP-H40G-AOC15M |
||
40-Gb for UCS 6300 Series Fabric Interconnects |
QSFP-40G-SR4 in 4x10G mode with external 4x10G splitter cable to SFP-10G-SR QSFP-40G-CSR4 QSFP-40G-LR4 QSFP-40G-LR4-S QSFP-40G-SR-BD QSFP-40G-SR4 QSFP-40G-SR4-S FET-40G QSFP-4SFP10G-CU1M QSFP-4SFP10G-CU3M QSFP-4SFP10G-CU5M QSFP-4X10G-AC7M QSFP-4X10G-AC10M QSFP-4X10G-AOC1M QSFP-4X10G-AOC2M QSFP-4X10G-AOC3M QSFP-4X10G-AOC5M QSFP-4X10G-AOC7M QSFP-4X10G-AOC10M QSFP-H40G-ACU7M QSFP-H40G-ACU10M QSFP-H40G-AOC1M QSFP-H40G-AOC2M QSFP-H40G-AOC3M QSFP-H40G-AOC5M QSFP-H40G-AOC7M QSFP-H40G-AOC10M QSFP-H40G-AOC15M QSFP-H40G-CU1M QSFP-H40G-CU3M QSFP-H40G-CU5M |
||
32-Gb FC for UCS 6454 Fabric Interconnects |
DS-SFP-FC32G-SW DS-SFP-FC32G-LW |
||
25-Gb for UCS 6454 Fabric Interconnects |
SFP-25G-SR-S SFP-H25G-CU1M SFP-H25G-CU2M SFP-H25G-CU3M SFP-H25G-CU5M SFP-H25G-AOC1M SFP-H25G-AOC2M SFP-H25G-AOC3M SFP-H25G-AOC5M SFP-H25G-AOC7M SFP-H25G-AOC10M |
||
16-Gb for UCS 6454 and UCS 6332UP Fabric Interconnects |
DS-SFP-FC16G-LW DS-SFP-FC16G-SW |
||
10-Gb for UCS 6454 Fabric Interconnects |
SFP-10G-SR SFP-10G-SR-S SFP-10G-LR SFP-10G-LR-S SFP-10G-ER SFP-10G-ER-S SFP-10G-ZR SFP-10G-ZR-S FET-10G
SFP-10G-LRM SFP-H10GB-CU1M SFP-H10GB-CU2M SFP-H10GB-CU3M SFP-H10GB-CU5M SFP-H10GB-ACU7M SFP-H10GB-ACU10M SFP-10G-AOC1M SFP-10G-AOC2M SFP-10G-AOC3M SFP-10G-AOC5M SFP-10G-AOC7M SFP-10G-AOC10M |
||
10-Gb for UCS 6300 and 6200 Series Fabric Interconnects |
SFP-10G-SR SFP-10G-SR-S SFP-10G-LR SFP-10G-LR-S SFP-H10GB-CU1M SFP-H10GB-CU2M SFP-H10GB-CU3M SFP-H10GB-CU5M SFP-H10GB-ACU7M SFP-H10GB-ACU10M FET-10G 1SFP-10G-AOC1M SFP-10G-AOC2M SFP-10G-AOC3M SFP-10G-AOC5M SFP-10G-AOC7M SFP-10G-AOC10M |
||
8-Gb FC for UCS 6454 and UCS 6332UP Fabric Interconnects |
DS-SFP-FC8G-SW DS-SFP-FC8G-LW |
||
4-Gb FC for UCS 6300 and 6200 Series Fabric Interconnects |
DS-SFP-FC4G-SW DS-SFP-FC4G-LW |
||
1-Gb for UCS 6454 Fabric Interconnects |
GLC-TE GLC-SX-MMD SFP-GE-T |
||
1-Gb for UCS 6300 and 6200 Series Fabric Interconnects |
GLC-TE GLC-SX-MM GLC-LH-SM |
Note |
The maximum length of fiber optic runs is limited to 300 meters. This is imposed by our use of 802.3X/802.1Qbb Priority Pauses. SFP-10G-LR is supported between fabric interconnect and FEX, but the 300 m limit still applies. |
Cisco UCS Mini and Components
UCS Mini Supported Chassis
Chassis |
Minimum Software Version |
Suggested Software Version |
---|---|---|
UCSB-5108-AC2 |
3.0(1e) |
4.0(4o) |
UCSB-5108-DC2 |
3.0(2c) |
4.0(4o) |
UCS Mini Supported Blade and Rack Servers
Servers |
Minimum Software Version |
Suggested Software Version |
---|---|---|
B200 M5 |
3.2(1d) |
4.0(4o) |
B200 M3 |
3.1(3a) |
4.0(4o) |
B200 M4 |
3.1(3a) |
4.0(4o) |
B260 M4 |
3.1(3a) |
4.0(4o) |
B420 M3 |
3.1(3a) |
4.0(4o) |
B420 M4 |
3.1(3a) |
4.0(4o) |
B460 M4 |
3.1(3a) |
4.0(4o) |
B480 M5 |
3.1(3a) |
4.0(4o) |
B22 M3 |
3.1(3a) |
4.0(4o) |
C220 M3 |
3.1(3a) |
4.0(4o) |
C240 M3 |
3.1(3a) |
4.0(4o) |
C220 M4 |
3.1(3a) |
4.0(4o) |
C240 M4 |
3.1(3a) |
4.0(4o) |
C460 M4 |
3.1(3a) |
4.0(4o) |
C220 M5 |
3.2(1d) |
4.0(4o) |
C240 M5 |
3.2(1d) |
4.0(4o) |
C480 M5 |
3.2(2b) |
4.0(4o) |
UCS Mini Supported Adapters
Adapters |
Minimum Software Version |
Suggested Software Version |
---|---|---|
UCSB-MLOM-40G-04 (UCS VIC 1440) UCSB-VIC-M84-4P (UCS VIC 1480) |
4.0(2a) |
4.0(4o) |
UCSC-PCIE-IQ10GC (Intel X710-T4) UCSC-PCIE-QD25GF (QLogic QL41212H 25GbE) UCSC-PCIE-QD40GF (QLogic QL45212H 40GbE) |
3.2(2b) |
4.0(4o) |
UCSC-PCIE-C40Q-03 (UCS VIC 1385) UCSC-MLOM-C40Q-03 (UCS VIC 1387) |
3.1(3a) |
4.0(4o) |
UCS-VIC-M82-8P (UCS VIC 1280) UCSB-MLOM-40G-01 (UCS VIC 1240) UCSB-MLOM-PT-01 (Cisco Port Expander Card) |
3.1(3a) |
4.0(4o) |
UCSB-MLOM-40G-03 (UCS VIC 1340) UCSB-VIC-M83-8P (UCS VIC 1380) UCSC-MLOM-CSC-02 (UCS VIC 1227) |
3.1(3a) |
4.0(4o) |
UCSC-PCIE-CSC-02 (UCS VIC 1225) |
3.1(3a) |
4.0(4o) |
UCS Mini Supported Fabric Interconnects
Fabric Interconnects |
Minimum Software Version |
Suggested Software Version |
---|---|---|
Cisco UCS 6324 |
3.1(3a) |
4.0(4o) |
UCS Mini Supported Fabric Extenders for Secondary Chassis
Fabric Extenders |
Minimum Software Version |
Suggested Software Version |
---|---|---|
UCS 2204 XP |
3.1(3a) |
4.0(4o) |
UCS 2208 XP |
3.1(3a) |
4.0(4o) |
UCS Mini Supported Power Supplies
Power Supplies |
Minimum Software Version |
Suggested Software Version |
---|---|---|
UCSB-PSU-2500ACDV UCSB-PSU-2500DC48 UCSC-PSU-930WDC UCSC-PSU2V2-930WDC UCSC-PSUV2-1050DC UCSC-PSU1-770W UCSC-PSU2-1400 UCSC-PSU2V2-1400W UCSC-PSU2V2-650W UCSC-PSU2V2-1200W |
3.1(3a) |
4.0(4o) |
UCS Mini Supported Gb Connector Modules
We recommend that you use the current software version for Gb port speed connections. Following is the list of Gb connector modules and supported cables:
Note |
Transceiver modules and cables that are supported on a specific Fabric Interconnect are not always supported on all VIC adapters, IOMs, or FEXes that are compatible with that Fabric Interconnect. Detailed compatibility matrices for the transceiver modules are available here:https://www.cisco.com/c/en/us/support/interfaces-modules/transceiver-modules/products-device-support-tables-list.html |
Gb Connector Modules |
Transceivers Modules and Cables |
---|---|
40-Gb |
QSFP-40G-SR4 in 4x10G mode with external 4x10G splitter cable to SFP-10G-SR QSFP-4SFP10G-CU1M QSFP-4SFP10G-CU3M QSFP-4SFP10G-CU5M QSFP-4X10G-AC7M QSFP-4X10G-AC10M QSFP-4X10G-AOC1M QSFP-4X10G-AOC2M QSFP-4X10G-AOC3M QSFP-4X10G-AOC5M QSFP-4X10G-AOC7M QSFP-4X10G-AOC10M |
10-Gb |
SFP-10G-LR SFP-10G-LR-S SFP-10G-LR-X SFP-10G-SR SFP-10G-SR-S SFP-10G-SR-X SFP-H10GB-CU1M SFP-H10GB-CU2M SFP-H10GB-CU3M SFP-H10GB-CU5M SFP-H10GB-ACU7M SFP-H10GB-ACU10M SFP-10G-AOC1M SFP-10G-AOC2M SFP-10G-AOC3M SFP-10G-AOC5M SFP-10G-AOC7M SFP-10G-AOC10M |
8-Gb |
DS-SFP-FC8G-SW DS-SFP-FC8G-LW |
4-Gb |
DS-SFP-FC4G-SW DS-SFP-FC4G-LW |
1-Gb |
GLC-TE GLC-LH-SM GLC-SX-MM |
UCS Manager Health and Pre-Upgrade Check Tool
The UCS Manager Health and Pre-Upgrade Check Tool provides automated health and pre-upgrade checks that are designed to ensure your clusters are healthy before you upgrade. It is imperative that this healthcheck is not just performed, but that you take corrective action on any cluster that is found to be unhealthy. Correct all issues reported by the UCS Manager health check before continuing.
Upgrade and Downgrade Guidelines
-
In a system with Cisco UCS 6454 Fabric Interconnects, you cannot downgrade from Cisco UCS Manager Release 4.0.
See the Cisco UCS Manager Firmware Management Guide, Release 4.0 section Firmware Upgrade to Cisco UCS Manager Release 4.0 for detailed upgrade paths.
-
Do not downgrade systems equipped with LITE-ON 1050W PSUs to a Cisco UCS Manager release earlier than Release 4.0(2). Board controller activation for UCS C240 M5 servers with LITE-ON 1050W PSU may fail during the discovery process when it is downgraded from Cisco UCS Manager Release 4.0(2).
-
In a system with Cisco UCS 6454 Fabric Interconnects, you cannot downgrade from Cisco UCS Manager Release 4.0(2) when Ethernet or FC switch mode is enabled on the Fabric Interconnect because this mode is not supported in versions earlier than 4.0(2).
Also, if port-security is enabled in the network control policy, it is disabled during downgrade from Cisco UCS Manager Release 4.0(2) because it is not supported in versions earlier than 4.0(2).
-
When upgrading or downgrading systems using Intel Volume Management Device (VMD) for NVMe, the system will fail to boot if VMD is enabled or disabled in the BIOS after OS installation. Do not change the BIOS setting after OS installation.
-
When upgrading Fabric Interconnects or servers (B-Series and C-Series) from Cisco UCS Manager Release 4.0(4c) to 4.0(4d), the FSM skips validation, and firmware upgrades complete without reboot.
Downgrade Limitation for Cisco UCS C125 M5 Servers
Starting with Release 4.0(4k), AMD Platform Secure Boot (PSB) is introduced in Cisco UCS C125 M5 servers that implements hardware-rooted boot integrity. Once you upgrade, you cannot downgrade Cisco UCS C125 M5 Rack Server Node based on AMD EPYC 7001 (Naples) to any release earlier than 4.0(4k).
Capability Catalog
The Cisco UCS Manager Capability Catalog is a set of tunable parameters, strings, and rules. Cisco UCS uses the catalog to update the display and configurability of components such as newly qualified DIMMs and disk drives for servers.
The Capability Catalog is embedded in Cisco UCS Manager, but at times it is also released as a single image file to make updates easier.
The following table lists the PIDs added in this release and maps UCS software releases to the corresponding Capability Catalog file.
UCS Release |
Catalog File Name |
Additional PIDs In This Release |
---|---|---|
4.0(4o) |
ucs-catalog.4.0.4q.T.bin |
— |
4.0(4n) |
ucs-catalog.4.0.4o.T.bin |
— |
4.0(4m) |
ucs-catalog.4.0.4f.T.bin |
— |
4.0(4l) |
ucs-catalog.4.0.4f.T.bin |
— |
4.0(4k) |
ucs-catalog.4.0.4k.T.bin |
Micro-SD Card:
|
4.0(4i) |
ucs-catalog.4.0.4i.T.bin |
Drives for C220 M5 and C240 M5 servers:
Drives for S3260 M5 server:
|
4.0(4h) |
ucs-catalog.4.0.4h.T.bin |
CPUs for UCS B200 M5, C220 M5, and C240 M5 servers:
CPUs for UCS B200 M5, C220 M5, C240 M5, and UCS S3260 M5 servers:
CPUs for UCS B200 M5, UCS B480 M5, C220 M5, C240 M5, and C480 M5 servers:
|
4.0(4g) |
ucs-catalog.4.0.4g.T.bin |
CPUs for UCS B200 M5, C220 M5, and C240 M5 servers:
|
4.0(4f) |
ucs-catalog.4.0.4f.T.bin |
— |
4.0(4e) |
ucs-catalog.4.0.4e.T.bin |
CPUs for UCS B200 M5, B480 M5, C220 M5, C240 M5, and C480 M5 servers:
CPUs for UCS C220 M5, C240 M5, B200 M5, B480 M5, C480 M5, and S3260-M5 servers:
CPUs for UCS C220 M5, C240 M5, and B200 M5 servers:
CPUs for UCS C220 M5, C240 M5, B480 M5, and B200 M5 servers:
CPUs for UCS C220 M5, C240 M5, C480 M5, and B200 M5 servers:
Drives:
Fabric Extender:
|
4.0(4d) |
ucs-catalog.4.0.4d.T.bin |
Drives:
|
4.0(4c) |
ucs-catalog.4.0.4c.T.bin |
|
4.0(4b) |
ucs-catalog.4.0.4b.T.bin |
— |
4.0(4a) |
ucs-catalog.4.0.4a.T.bin |
CPUs for UCS B200 M5, C220 M5, C240 M5 servers:
CPUs for UCS B480 M5 and C480 M5:
CPUs for UCS S3260 M5:
Memory:
Intel® Optane™ DC persistent memory:
Fabric Extender:
GPUs:
Network Interface Cards:
Hardware RAID Controller:
|
4.0(2e) |
ucs-catalog.4.0.2e.T.bin |
— |
4.0(2d) |
ucs-catalog.4.0.2d.T.bin |
— |
4.0(2b) |
ucs-catalog.4.0.2a.T.bin |
— |
4.0(2a) |
ucs-catalog.4.0.2a.T.bin |
Cisco UCS Rack-Mount Servers:
CPUs for UCSC-C480-M5ML:
Memory for UCSC-C480-M5ML:
PSU for UCSC-C480-M5ML:
Fan module for UCSC-C480-M5ML:
Cisco VICs for UCSC-C480-M5ML:
NIC for UCSC-C480-M5ML:
HDDs for UCSC-C480-M5ML:
SSDs for UCSC-C480-M5ML:
Flash drive for UCSC-C480-M5ML:
GPU for UCSC-C480-M5ML:
NVMe drives for UCSC-C480-M5ML:
Mini Storage Carriers for UCSC-C480-M5ML:
SD Cards for UCSC-C480-M5ML:
Micro SD Card for UCSC-C480-M5ML:
M.2 SATA SSD for UCSC-C480-M5ML:
RAID Controller for UCSC-C480-M5ML:
Cisco VIC Adapters:
TPM2 for all UCS servers:
High Voltage DC 1200 Watt Power Supply on UCS 6454 Fabric Interconnects:
Intel Optane NVMe Extreme Performance Drive for M5 servers:
GPU for C240 M5 servers:
QLogic Network Adapter cards for UCSC-C125:
|
4.0(1d) |
ucs-catalog.4.0.1c.T.bin |
Drives:
|
4.0(1c) |
ucs-catalog.4.0.1a.T.bin |
— |
4.0(1b) |
ucs-catalog.4.0.1a.T.bin |
— |
4.0(1a) |
ucs-catalog.4.0.1a.T.bin |
Cisco UCS 6454 Fabric Interconnect:
Cisco UCS Rack-Mount Servers:
Chassis for C125 M5:
CPUs for UCSC-C125:
Memory for UCSC-C125:
OCP NICs for UCSC-C125:
Storage Controller for UCSC-C125:
SD Cards for UCSC-C125:
Micro SD Card for UCSC-C125:
M.2 SATA SSD for UCSC-C125:
Flash USB Drive for UCSC-C125:
Mini Storage Carriers for UCSC-C125:
Cisco VIC Adapters:
HX NVMe Server:
PCIe compression and cryptographic CPU offload card with C240HX M5 servers
Intel Optane NVMe Med. Performance Drives for M5 servers:
|
Security Fixes
The following security issues are resolved:
Release |
Defect ID |
Common Vulnerability and Exposures (CVE) ID |
Description |
---|---|---|---|
4.0(4o) |
CSCwb74497 CSCwb74513 |
CVE-2022-20824 |
A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. For more information, see Cisco FXOS and NX-OS Software Cisco Discovery Protocol Denial of Service and Arbitrary Code Execution Vulnerability |
4.0(4n) |
CSCvy95840 |
CVE-2022-20624 |
In UCS 6400 Series Fabric Interconnects, the Cisco Fabric Services over IP (CFSoIP) is affected by the vulnerability identified by the following Common Vulnerability and Exposures (CVE) ID:
|
4.0(4n) |
CSCvz72466 |
CVE-2022-20625 |
In Cisco UCS 6400 Series Fabric Interconnects, the Cisco Discovery Protocol service of Cisco NX-OS Software is affected by the vulnerability identified by the following Common Vulnerability and Exposures (CVE) ID:
|
4.0(4n) |
CSCvz74433 |
CVE-2022-20625 |
In Cisco UCS 6300 Series, UCS 6200 Series, and UCS-FI-6324 Fabric Interconnects, the Cisco Discovery Protocol service of Cisco NX-OS Software is affected by the vulnerability identified by the following Common Vulnerability and Exposures (CVE) ID:
|
4.0(4k) |
CSCvu53094 |
CVE-2020-11022 |
Cisco UCS Manager and UCS 6400 Series Fabric Interconnects using the jQuery software package with versions from 1.2 to 3.5.0, is affected by the following Common Vulnerability and Exposures (CVE) ID:
|
4.0(4i) |
CSCvt86093 |
|
Cisco UCS M5 servers that are based on Intel® processors are affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID(s):
This release includes BIOS revisions for Cisco UCS M5 servers. These BIOS revisions include Microcode update for Cisco UCS M5 servers, which is a required part of the mitigation for these vulnerabilities. |
4.0(4i) |
CSCvq33385 |
CVE-2016-2183 |
The latest CiscoSSL 1.0.2r.6.2.341 now includes mitigations for the OpenSSL vulnerabilities in Cisco UCS Manager identified by the Common Vulnerability and Exposures (CVE) ID listed. |
4.0(4h) |
CSCvs81686 |
|
Cisco UCS M5 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
This release includes BIOS revisions for Cisco UCS M5 servers. These BIOS revisions include the updated SINIT ACM for Cisco UCS M5 servers, which is a required part of the mitigation for these vulnerabilities. |
4.0(4g) |
CSCvr54409 CSCvr54415 |
|
Cisco UCS M5 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
This release includes BIOS revisions for Cisco UCS M5 servers. These BIOS revisions include the updated microcode and Secure Initialization (SINIT) Authenticated Code Modules (ACM), which are required parts of the mitigation for these vulnerabilities. |
4.0(4g) |
CSCvr54413 CSCvr54414 CSCvr54416 |
|
Cisco UCS M4 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
This release includes BIOS revisions for Cisco UCS M4 servers. These BIOS revisions include the updated microcode and SINIT ACM for Cisco UCS M4 servers, which are required parts of the mitigation for these vulnerabilities. |
4.0(4g) |
CSCvr54411 |
CVE-2019-0151 |
Cisco UCS B-Series and C-Series M3 servers that are based on Intel® processors are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:
This release includes BIOS revisions for Cisco UCS B-Series and C-Series M3 servers. These BIOS revisions include the updated SINIT ACM for Cisco UCS M3 servers, which is a required part of the mitigation for these vulnerabilities. |
4.0(4f) |
CSCvq19565 |
CVE-2019-11479 CVE-2019-11478 |
This bug was filed to evaluate the product against the vulnerability affecting Linux kernel, identified by the following CVE IDs:
TCP networking vulnerabilities have been identified affecting Linux kernel. The vulnerabilities specifically relate to the minimum segment size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed "SACK Panic" allows a remotely-triggered kernel panic on recent Linux kernels. Cisco UCS servers with 6200 Series Fabric Interconnects have been determined to contain a vulnerable version of Linux Kernel. However the product is not affected by the following vulnerability: CVE-2019-11477: SACK Kernel Panic Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html |
4.0(4f) |
CSCvq21317 |
CVE-2019-11477 CVE-2019-11478 CVE-2019-11479 |
This bug was filed to evaluate the product against the vulnerability affecting Linux kernel, identified by the following CVE IDs:
TCP networking vulnerabilities have been identified affecting Linux kernel. The vulnerabilities specifically relate to the minimum segment size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed "SACK Panic" allows a remotely-triggered kernel panic on recent Linux kernels. Cisco UCS servers with 6400 Series Fabric Interconnects have been determined to contain a vulnerable version of Linux Kernel. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html |
4.0(4f) |
CSCvm80093 |
CVE-2019-1966 |
A vulnerability in the CLI implementation of a specific command for the Cisco UCS Fabric Interconnect could have allowed an authenticated, local attacker to escape the CLI and gain unauthorized access to the underlying operating system of the device. An attacker could have exploited this vulnerability to escape the CLI and execute arbitrary commands on the underlying operating system with the privileges of the root user. The attacker would need valid device credentials. Additional information on Cisco's security vulnerability policy can be found at the following URL: |
4.0(4f) |
CSCvp56979 |
CVE-2019-9213 |
Cisco UCS servers with 6400 Series Fabric Interconnects have been determined to contain third-party software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2019-9213: Linux Kernel expand_downwards Function NULL Pointer Dereference Vulnerability Cisco has released software updates that address this vulnerability. Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html. |
4.0(4e) |
CSCvp62709 CSCvp69717 |
CVE-2019-11358 |
Cisco UCS Manager and UCS 6200 Series Fabric Interconnects included a version of the jQuery software package that is affected by the cross-site scripting vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2019-11358 Additional information on Cisco's security vulnerability policy can be found here: |
4.0(4e) |
CSCvn23535 CSCvn23538 |
CVE-2019-1963 |
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of Abstract Syntax Notation One (ASN.1) encoded variables in SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the SNMP daemon on the affected device. A successful exploit could allow the attacker to cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: |
4.0(4c) |
CSCvp27917 |
CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 |
Cisco UCS B-Series M3 Blade Servers are based on Intel® Xeon®Sandy Bridge E5-2600 and Ivy Bridge E5 2600 v2 Product Family processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.
This release includes BIOS revisions for Cisco UCS M3 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities. Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html |
4.0(4c) |
CSCvq66225 |
CVE-2019-9836 |
On the Cisco UCS C-Series servers that are based on AMD EPYC™ processors, using the user-selectable AMD secure encryption feature on a virtual machine running the Linux operating system, an encryption key could be compromised by manipulating the encryption technology’s behavior. This release includes the BIOS revision to mitigate this risk. For more information about this vulnerability, see https://www.amd.com/en/corporate/product-security. |
4.0(4c) |
CSCvp12424 |
CVE-2019-1559 |
Cisco UCS Manager includes a version of the OpenSSH Protocol that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:
This issue is resolved through the OpenSSL software updates. For more information, go to https://tools.cisco.com/security/center/viewAlert.x?alertId=59697. |
4.0(4b) 4.0(2e) |
CSCvo21412 CSCvp30013 |
CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 |
Cisco UCS M4 servers and Hyperflex M4 servers are based on Intel® Xeon® Processor E7 v2, v3, and v4 Product Family processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.
This release includes BIOS revisions for Cisco UCS M4 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities. |
4.0(4b) 4.0(2e) |
CSCvp28016 |
CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 |
Cisco UCS M4 servers and Hyperflex M4 servers are based on Intel® Xeon® Processor E5 v3 and v4 Product Family processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.
This release includes BIOS revisions for Cisco UCS M4 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities. |
4.0(4b) 4.0(2e) |
CSCvp31847 |
CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 |
Cisco UCS M5 servers and Hyperflex M5 servers are based on Intel® Xeon® Scalable processors that are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.
This release includes BIOS revisions for Cisco UCS M5 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities. |
4.0(2a) |
CSCvm35067 |
CVE-2018-3655 |
Cisco UCS C-Series servers include a version of the Intel® Converged Security Management Engine (CSME) that maybe affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:
An attacker with physical access could use these vulnerabilities to do the following:
This release includes BIOS revisions for Cisco UCS M5 generation C-Series servers. |
4.0(1d) |
CSCvm19864 |
CVE-2016-3115 |
Cisco UCS Manager and UCS 6200 Series Fabric Interconnects include a version of the OpenSSH Protocol that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
Cisco has released software updates that address this vulnerability. |
4.0(1c) |
CSCvk20775 |
CVE-2018-3655 |
Cisco UCS B-Series servers include a version of the Intel® Converged Security Management Engine (CSME) that maybe affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:
An attacker with physical access could use these vulnerabilities to do the following:
This release includes BIOS revisions for Cisco UCS M5 generation B-Series servers. |
4.0(1a) |
CSCvm03356 |
CVE-2018-3615 CVE-2018-3620 CVE-2018-3646 |
Cisco UCS B-Series M3 servers and C-Series M3 servers are based on Intel® processors that are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).
This release includes BIOS revisions for Cisco UCS M3 generation servers. These BIOS revisions include the updated processor microcode that is a required part of the mitigation for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM). Operating System and Hypervisor patches from the appropriate vendors may also be required to mitigate these vulnerabilities. For more information, please see the Cisco Security Advisory available here: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 |
4.0(1a) |
CSCvm03351 |
CVE-2018-3615 CVE-2018-3620 CVE-2018-3646 |
Cisco UCS B-Series M4 servers, C-Series M4 servers, S3260 M4 storage servers, and HyperFlex M4 servers are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).
This release includes BIOS revisions for Cisco UCS M4 generation servers. These BIOS revisions include the updated processor microcode that is a required part of the mitigation for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM). Operating System and Hypervisor patches from the appropriate vendors may also be required to mitigate these vulnerabilities. For more information, please see the Cisco Security Advisory available here: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 |
4.0(1a) |
CSCvm03339 |
CVE-2018-3615 CVE-2018-3620 CVE-2018-3646 |
Cisco UCS B-Series M5 servers, C-Series M5 servers, and HyperFlex M5 servers are based on Intel® processors that are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).
This release includes BIOS revisions for Cisco UCS M5 generation servers. These BIOS revisions include the updated processor microcode that is a required part of the mitigation for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM). Operating System and Hypervisor patches from the appropriate vendors may also be required to mitigate these vulnerabilities. For more information, please see the Cisco Security Advisory available here: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 |
4.0(1a) |
CSCvg58650 |
|
Cisco UCS 6200 Series and 6300 Series Fabric Interconnects include a version of Intel system firmware for Intel Core Processors that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:
This release includes BIOS revisions to address the vulnerabilty. |
4.0(1a) |
CSCvh25150 |
CVE-2017-3883 |
A vulnerability in the authentication, authorization, and accounting (AAA) implementation of Cisco Firepower Extensible Operating System (FXOS) and NX-OS System Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability occurs because AAA processes prevent the NX-OS System Manager from receiving keepalive messages when an affected device receives a high rate of login attempts, such as in a brute-force login attack. System memory can run low on the FXOS devices under the same conditions, which could cause the AAA process to unexpectedly restart or cause the device to reload. An attacker could exploit this vulnerability by performing a brute-force login attack against a device that is configured with AAA security services. A successful exploit could allow the attacker to cause the affected device to reload. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. For more information, see the Cisco Security Advisory available here: |
4.0(1a) |
CSCva61699 |
Common Weakness Enumeration (CWE) IDs:
|
The following security vulnerabilities were identified for HTTP response and affected Cisco UCS Manager:
Of these security vulnerabilities, Cisco has addressed the following in this release:
The Incomplete or no cache-control and Pragma HTTP header set vulnerability vulnerability will not be fixed because of the following:
|
4.0(1a) |
CSCvi95784 |
|
The Apache version used with previous Cisco UCS Manager releases was affected by the Common Vulnerability and Exposures (CVE) IDs listed. Most of these CVE IDs are low risk, or not applicable to Cisco UCS Manager. |
Default Open Ports
The following table lists the default open ports used in Cisco UCS Manager Release 4.0.
Port |
Interface |
Protocol |
Traffic Type |
Fabric Interconnect |
Usage |
---|---|---|---|---|---|
22 |
CLI |
SSH |
TCP |
UCS 6200 Series UCS 6300 Series UCS 6400 Series UCS 6500 Series |
Cisco UCS Manager CLI access |
80 |
XML |
HTTP |
TCP |
UCS 6200 Series UCS 6300 Series UCS 6400 Series UCS 6500 Series |
Cisco UCS Manager GUI and third party management stations. Client download |
443 |
XML |
HTTP |
TCP |
UCS 6200 Series UCS 6300 Series UCS 6400 Series UCS 6500 Series |
Cisco UCS Manager login page access Cisco UCS Manager XML API access |
743 |
KVM |
HTTP |
TCP |
UCS 6200 Series UCS 6300 Series UCS 6400 Series |
CIMC Web Service / Direct KVM |
843 |
xmlPolicy |
Adobe Flash |
TCP |
UCS 6200 Series UCS 6300 Series |
Adobe Flash port used by KVM launcher |
5661 |
HTTPD |
TCP |
UCS 6400 Series |
Internal communication Disabled in Cisco UCS Manager Release 4.0(4f) |
|
7162 |
HTTPD |
TCP |
UCS 6400 Series |
Internal communication Disabled in Cisco UCS Manager Release 4.0(4g) |
|
7546 |
CFS |
CFSD |
TCP |
UCS 6400 Series UCS 6500 Series |
Cisco Fabric Service |
Cisco UCS Manager Network Management Guide, Release 4.0 provides a complete list of open TCP and UDP ports.
Libfabric and Open MPI
Cisco usNIC support in the Libfabric and Open MPI open source packages is readily available from their community web sites (http://libfabric.org/ and http://www.open-mpi.org/, respectively).
Cisco UCS Manager Release 3.1(3) and later releases no longer include Open MPI binary packages. Future UCS software driver bundles distributed through the usual Cisco software channels may not include binaries for the libfabric packages. Cisco engineers continue to be active, core contributors in both the Libfabric and Open MPI communities, and will actively develop and support users through the usual community or commercial ISV support mechanisms (e.g., IBM Spectrum MPI).
Resolved Caveats
The resolved bugs for a release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains up-to-date information about bugs and vulnerabilities in this product and other Cisco hardware and software products.
Note |
You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, you can register for an account. |
For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.
Resolved Caveats for this Release 4.0(4o)
The following caveats are resolved in Release 4.0(4o):
Defect ID |
Symptom |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCvy52458 |
The system time on Cisco UCS Manager is not in synchronization with the NTP servers. This issue is seen when:
This issue is resolved. |
4.0(4g)A |
4.0(4o)A |
CSCwa85770 |
Cisco UCS M4 servers show additional remote NDIS compatible devices in the Ethernet interfaces. This issue is resolved. |
4.1(3h)C |
4.0(4o)C |
CSCvx37634 |
Cisco UCS B200 M5 server discovery fails with the following fault message: Setup of Vmediafailed(sam:dme:ComputeBladeDiscover :SetupVm This issue is resolved. |
4.1(1c)B |
4.0(4o)B |
CSCwa85667 |
BMC reset is observed on Cisco UCS C-Series and B-Series M5/M6 servers due to kernel crash and watchdog reset. This issue is resolved. |
4.0(4m)A |
4.0(4o)A |
CSCwc99962 |
Unable to form san-port-channel between UCS and Nexus 9000 switch in a setup equipped with Cisco UCS 6200 series FI. This issue is resolved. |
4.1(3h)A |
4.0(4o)A |
CSCwb89732 |
In a setup with 6400 FIs, while accessing the KVM IP address, you are redirected to Cisco UCS Manager GUI. This issue is resolved. |
4.1(3f)A |
4.0(4o)A |
CSCvv57606 |
Cisco UCS Manager fails to associate Service Profile for Cisco UCS servers connected to Cisco UCS 6400 FI through 2408 IOMs. Following error message is displayed: Connection Placement ErrorThis issue is resolved. |
4.0(4e)B |
4.0(4o)B |
CSCwd19078 |
Cisco UCS Blade servers lose SAN connectivity when one of the FC up-link or FI is down because of the following reasons:
This issue is resolved. |
4.2(1f)A |
4.0(4o)A |
Resolved Caveats for this Release 4.0(4n)
The following caveats are resolved in Release 4.0(4n):
Defect ID |
Symptom |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCvz44891 |
During the firmware upgrade on the 2300 series IOMs, the Power Supply Unit (PSU) shut down on the IOM unexpectedly powers off the entire chassis. This issue is resolved. |
4.1(2b)A |
4.0(4n)A |
CSCvw64214 |
The Azure Stack Hub server failed due to a failure in the QLogic NIC driver. This issue is resolved. |
4.0(4i)C |
4.0(4n)C |
CSCvx99711 |
In Cisco UCS 6300 series Fabric Interconnects, the
This issue is resolved. |
3.2(3a)A |
4.0(4n)A |
CSCvz08447 |
The Cisco UCS 6400 series Fabric Interconnects running on 4.0(4x) unexpectedly resets the Fabric Interconnect B. The NXOS
logs show the following reset reason: This issue is resolved. |
4.0(4a)A |
4.0(4n)A |
CSCvz64536 |
The Cisco UCS C240 M5 Rack server discovery fails with This issue is resolved. |
4.1(3c)A |
4.0(4n)A |
CSCwa97427 |
When upgrading to 4.2(2) CIMC software from 4.0(4m) or older versions, the update process fails and runs into an endless retry loop. The issue is because of the CIMC 4.0(4m) or older contains an incorrect size limit check for new images and it prevents the upgrade. This issue is resolved. |
4.0(4m)B |
4.0(4n)B |
CSCvx54145 |
Unable to expand the UCS Manager when navigating through Firmware Management > Installed Firmware > Activate Firmware and clicking on the + sign to open the list view. The issue is observed only on Chrome and Edge browsers. This issue is resolved. |
4.2(1d) |
4.0(4n) |
CSCvz01679 |
On a UCSM domain, when an SNMP walk is using Object Identifier (OIDs), discrepancy in return values between Fabric Interconnect A and Fabric Interconnect B is observed. This issue is resolved. |
4.1(3b)A |
4.0(4n)A |
CSCvz86823 |
In Cisco UCS B200 M4 server, the host demands multiple reboots to ensure the UEFI boot option is not written to BIOS NVRAM when the OS is installed. This issue is resolved. |
4.1(1) |
4.0(4n) |
CSCwa85770 |
On Cisco UCS C220 M4 and C240 M4 server with 4.1.3h firmware and Qlogic adapter displays the error This issue is resolved. |
4.1(3h)C |
4.0(4n)C |
CSCvz49048 |
In Cisco UCS-IOM-2408, I2C bus corruption error results wrong temperature reading with LED color in Amber though the Fan shows as normal. This issue is resolved. |
4.1(2b)A |
4.0(4n)A |
CSCvx88769 |
In the scenario where Cisco UCS Manager is downgraded from 4.2 to 4.1 or any other previous release version, but if the switch fails to downgrade to the previous release version and gets rebooted, that is, the switch remains at 4.2 version, the user will not be able to login and all the UCS management services will be down. This issue is resolved. |
4.1(3c) |
4.0(4n) |
CSCvw24269 |
During UCS firmware upgrade, the UCS Manager was unable to download and extract an A-bundle with a size larger than 2 GB and
shows the following failure message This issue is resolved. |
4.2(33.329)A |
4.0(4n)A |
CSCvz45878 |
During UCS firmware upgrade, when the UCSM Infrastructure bundle image size exceeds 2 GB, the image size shows 0 KB after download. This issue is resolved. |
4.2(1.39)A |
4.0(4n)A |
CSCvu77511 |
An issue in the Cisco Discovery Protocol (CDP) feature of Cisco FXOS Software and Cisco NX-OS Software can allow an out-of-bounds read condition for certain CDP TLVs, impacting multiple Cisco products. The issue is due to incomplete error checking of the CDP packet header fields. This issue is resolved. |
3.2(3o)C |
4.0(4n)C |
Resolved Caveats for this Release 4.0(4m)
The following caveats are resolved in Release 4.0(4m):
Defect ID |
Symptom |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCvw64214 |
The Azure Stack Hub server failed due to a failure in the QLogic NIC driver. This issue is resolved. |
4.0(4i)C |
4.0(4m)C |
CSCvx42342 |
Correct Port-ID was not inserted in LLDP packets sent to virtual Ethernet. This issue is resolved. |
4.0(4l) |
4.0(4m) |
CSCvt94075 |
On a Cisco UCS blade server with a VIC 6400 series fabric interconnect, IOM discovery failed after chassis decommission/recommission. This issue is resolved. |
4.1(200.18)A |
4.0(4m) |
CSCvx50196 |
On a UCS-managed blade server connected to a Cisco VIC 6400 Series fabric interconnect, configuration of the Smart Call Home could not be modified. This issue is resolved. |
4.0(2b)A |
4.0(4m)A |
CSCvy26765 |
When the UCS KVM IP assignment was accepted (seen under Equipment > Chassis x > Server x > Inventory > CIMC > Modify Outband Static Management IP), a single LLDP packet was sent to neighbor devices with the MGMT TLV containing the recently changed KVM IP instead of the Fabric Interconnect Mgmt IP. This issue is resolved. |
4.1(2b)A |
4.0(4m)A |
CSCvx50196 |
Configuration of the Smart Call Home could not be modified. This issue is resolved. |
4.0(2b)A |