Release Notes for Cisco UCS Manager, Release 2.2
Overview
This document describes system requirements, new features, resolved caveats, known caveats and workarounds for Cisco UCS Manager software Release 2.2. This document also includes the following:
-
Current information that became available after the technical documentation was published
-
Related firmware and BIOS on blade and rack servers and other Cisco Unified Computing System (UCS) components associated with the release
-
Use this release note as a supplement with the other documents listed in documentation roadmaps:
Contents of the various bundles for this release are described in:
Make sure to review other available documentation on Cisco.com to obtain current information on Cisco UCS Manager.
Support for Web User Interface Post Deprecation of Adobe Flash
The Web user interface of Cisco UCS Manager releases earlier than 3.1(3a) — including the releases on the 2.2 release train — are Java-based and may not be accessible on browser versions that will deprecate support for Adobe Flash on Dec 31, 2020. For more details on the problem description and workarounds, refer to the Field Notice: FN72012.
Revision History
Date |
Description |
December 12, 2013 |
Created release notes for Cisco UCS Manager, Release 2.2(1b). |
December 20, 2013 |
Added additional caveats. |
February 9, 2014 |
Updated release notes for Cisco UCS Software Release 2.2(1c). |
February 19, 2014 |
Updated release notes for Catalog Release 2.2.1c.T. |
April 2, 2014 |
Updated release notes for Catalog Release 2.2.1d.T. |
April 10, 2014 |
Updated release notes for Cisco UCS Software Release 2.2(1d). |
May 16, 2014 |
Added CSCuo78883 to Open Caveats for release 2.2(1d). |
May 22, 2014 |
Updated release notes for Cisco UCS Software Release 2.2(2c). |
May 24, 2014 |
Updated to include additional Open Caveats for Cisco UCS Software Release 2.2(2c). |
May 30, 2014 |
Modified several Caveat descriptions. |
June 18, 2014 |
Added CSCul74278 to 2.2(1b) Open Caveats and to 2.2(2c) Resolved Caveats; added ‘Behavior Changes’ section; and corrected three items in Servers list. |
August 1, 2014 |
Updated release notes for Cisco UCS Software Release 2.2(1e). |
August 21, 2014 |
Added B22 PID support and updated PID support for other servers in Version Mapping table for 2.2(2c); added ‘Chassis’ section to Internal Dependencies table; added UCSB-5108-AC2, -DC2, and -HVDC to New Hardware Features section; added note to Upgrade section for CSCud81176 consideration; added CSCuj81245 to 2.2(1b) Open Caveats table and to 2.2(2c) Resolved Caveats table. |
September 8, 2014 |
Updated release notes for Cisco UCS Software Release 2.2(3a). |
September 11, 2014 |
Updated release notes for Cisco UCS Software Release 2.2(2d); updated the Recommended Minimum Software in Table 4. |
October 9, 2014 |
Updated release notes for Cisco UCS Software Release 2.2(3b). |
October 24, 2014 |
Updated release notes for Cisco UCS Software Release 2.2(2e) and 2.2(3c). |
October 31, 2014 |
Updated release notes for Cisco UCS Software Release 2.2(1f). |
November 10, 2014 |
Added CSCuo60330 to 2.2(3a) resolved caveats. |
November 17, 2014 |
Added missing 2.2(3c) adapter to Internal Dependencies table. |
December 4, 2014 |
Updated release notes for Catalog Release 2.2.3b.T. |
December 22, 2014 |
Updated release notes for Cisco UCS Software Release 2.2(1g) and 2.2(3d). |
January 13, 2015 |
Updated first affected bundle for CSCuq20755. |
March 4, 2015 |
Updated release notes for Cisco UCS Software Release 2.2(3e). |
March 18, 2015 |
Updated the New Hardware Features list for Release 2.2(3a). |
March 20, 2015 |
Updated release notes for Cisco UCS Software Release 2.2(3f). |
April 15, 2015 |
Updated the Recommended Software Version for C260 and C460 M2 servers. |
May 14, 2015 |
Updated release notes for Cisco UCS Software Releases 2.2(3g) and 2.2(4b). |
May 26, 2015 |
Added CSCus10255 to the Resolved Caveats for Cisco UCS Software Release 2.2(4b). |
June 5, 2015 |
Updated release notes for Cisco UCS Software Release 2.2(5a). |
June 15, 2015 |
Updated release notes for Cisco UCS Software Release 2.2(1h). |
June 30, 2015 |
Updated the Capability Catalog and New Hardware Features sections with information about Cisco 12G SAS Modular RAID Controller. Updated the Resolved Caveats for 2.2(4b). |
July 10, 2015 |
Added CSCuv04436 to the Open Caveats for 2.2(4b) and 2.2(5a). This issue has a software advisory associated with it. |
July 17, 2015 |
Updated release notes for Cisco UCS Software Release 2.2(4c). |
July 30, 2015 |
Updated release notes for Cisco UCS Software Release 2.2(5b). |
August 27, 2015 |
Updated release notes for Cisco UCS Software Release 2.2(5c). |
September 11, 2015 |
Updated the Behavior Changes section for Release 2.2(4b). Updated the Resolved and Open Caveats for Release 2.2(5c). Added CSCus81832 to the list of Resolved Caveats for Release 2.2(4b). |
September 22, 2015 |
Added CSCus73196 to the list of Open Caveats for Release 2.2(3d). |
September 25, 2015 |
Updated release notes for Cisco UCS Software Release 2.2(3h). |
October 8, 2015 |
Updated release notes for Cisco UCS Software Release 2.2(6c). |
October 17, 2015 |
Added CSCuv45173 to the Known Limitations table. This issue has a software advisory associated with it. |
November 4, 2015 |
Updated release notes for Cisco UCS Software Release 2.2(6d). |
November 16, 2015 |
Updated release notes for Cisco UCS Software Release 2.2(5d). |
December 14, 2015 |
Updated release notes for Cisco UCS Catalog Release 2.2.6e.T. |
December 16, 2015 |
Updated release notes for Cisco UCS Software Release 2.2(6e). |
January 18, 2016 |
Updated the Behavior Changes section for Release 2.2(6c). |
February 2, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(6f). |
February 9, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(3j). |
February 29, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(6g). |
March 31, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(7b). |
April 18, 2016 |
Updated the New Software Features description for Release 2.2(7b). |
May 13, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(3k). |
May 18, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(6i). |
May 24, 2016 |
Added CSCuz74973 to the Open Caveats for Cisco UCS Software Release 2.2(3b), and updated the workaround for CSCut63966. |
June 2, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(7c). |
June 13, 2016 |
Updated the note in Updating Cisco UCS Release. |
June 17, 2016 |
Added CSCut46044 and CSCup58725 to the Open Caveats for Cisco UCS Software Release 2.2(3a). Added CSCuj84274 to the Open Caveats for Cisco UCS Software Release 2.2(1a). Added CSCut46044 to the Security Fixes for Cisco UCS Software Release 2.2(7b). |
June 20, 2016 |
Removed note for UCS-ML-1X324RU-G and UCS-ML-1X644RU-G. Added a note for UCS-ML-1X324RV-A and UCS-ML-1X644RV-A. |
July 5, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(6j). |
July 13, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(8a). Updated the Recommended Software Version for C200, C210, and C250 M2 servers. |
July 29, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(7d). |
August 8, 2016 |
Updated the New Software Features description for Release 2.2(7b). |
August 12, 2016 |
Added CSCva87230 to the list of open caveats for release 2.2(8a). |
August 24, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(8b). Added software advisory associated with CSCva87230. |
August 26, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(7e). |
September 29, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(8c). |
October 18, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(8d). |
November 21, 2016 |
Added CSCuz74973 to the Resolved Caveats for Cisco UCS Software Release 2.2(7b). |
November 23, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(8e)T. |
December 22, 2016 |
Updated release notes for Cisco UCS Software Release 2.2(8f). |
January 30, 2017 |
Updated release notes for Cisco UCS Software Release 2.2(3l). |
March 14, 2017 |
Updated release notes for Cisco UCS Software Release 2.2(8g). |
September 12, 2017 |
Updated the list of security fixes with CSCvf35705. |
November 21, 2017 |
Updated release notes for Cisco UCS Software Release 2.2(8i). |
December 15, 2017 |
Updated the Resolved Caveat version for CSCuu33864. |
January 9, 2018 |
Updated the list of security fixes with CSCuq77241. |
April 06, 2018 |
Updated release notes for Cisco UCS Software Release 2.2(8j). |
May 18, 2018 |
Updated the Resolved Caveats for Cisco UCS Software Release 2.2(7b) with CSCun07367. |
May 28, 2018 |
Updated the Open Caveats for Cisco UCS Software Release 2.2(1b) with CSCvj59299, CSCvj59301, CSCvj54880, CSCvj54847, CSCvj54187, and their Software Advisory. |
August 01, 2018 |
Updated release notes for Cisco UCS Software Release 2.2(8l). |
August 27, 2018 |
Added the L1 Terminal Fault caveats — CSCvm02934, CSCvm03356, CSCvm03351, and CSCvm03339 — to the list of Security Fixes for Cisco UCS Software Release 2.2(8l). |
February 26, 2019 |
Added CSCvf32853 to the list of Open Caveats for Cisco UCS Software Release 2.2(8a). |
October 18, 2019 |
Updated release notes for Cisco UCS Software Release 2.2(8m). |
December 20, 2020 |
Added notice: Support for Web User Interface Post Deprecation of Adobe Flash. |
Introduction
Cisco UCS Manager™ provides unified, embedded management of all software and hardware components of the Cisco Unified Computing System™ (Cisco UCS) across multiple chassis, rack servers, and thousands of virtual machines. Cisco UCS Manager manages Cisco UCS as a single entity through an intuitive GUI, a command-line interface (CLI), or an XML API for comprehensive access to all Cisco UCS Manager functions.
System Requirements
To use Cisco UCS Manager your computer must meet or exceed the following minimum system requirements:
-
The Cisco UCS Manager GUI is a Java-based application which requires Java Runtime Environment 1.6 or later.
-
Cisco UCS Manager uses web start and supports the following web browsers:
-
Microsoft Internet Explorer 9.0 or higher
-
Mozilla Firefox 7.0 or higher
-
Google Chrome 14.0 or higher
-
-
Adobe Flash Player 10 or higher is required for some features
-
Cisco UCS Manager is supported on the following operating systems:
-
Microsoft Windows 7 with minimum 4.0 GB memory
-
Red Hat Enterprise Linux 5.0 or higher with minimum 4.0 GB memory
-
-
Cisco UCS Central integration:
-
Cisco UCS Manager Release 2.2(1) and 2.2(2) can only be registered with Cisco UCS Central, Release 1.1(1b) or higher.
-
Cisco UCS Manager Release 2.2(3) and later releases can only be registered with Cisco UCS Central, Release 1.2(1a) or higher.
-
Cisco UCS Manager Release 2.2(7) and later releases require Cisco UCS Central, Release 1.4(1b) or higher.
-
Note |
For more information, see the Feature Support Matrix section of the Cisco UCS Central Installation and Upgrade Guides. |
Updating Cisco UCS Releases
The Cisco UCS Manager A bundle software (Cisco UCS Manager, Cisco NX-OS, IOM firmware) can be mixed with previous B or C bundle releases on the servers (host firmware (FW), BIOS, CIMC, adapter FW and drivers).
The following table lists the mixed A, B, and C bundle versions that are supported:
Infrastructure Versions (A Bundles) |
||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Host FW Versions (B or C Bundles) |
2.0(1) |
2.0(2) |
2.0(3) |
2.0(4) |
2.0(5) |
2.1(1) |
2.1(2) |
2.1(3) |
2.2(1) |
2.2(2) |
2.2(3) |
2.2(4) |
2.2(5) |
2.2(6) |
2.2(7) |
2.2(8) |
2.0(1) |
Yes |
— |
— |
— |
— |
Yes |
Yes |
Yes |
— |
— |
— |
— |
— |
— |
||
2.0(2) |
— |
Yes |
— |
— |
— |
Yes |
Yes |
Yes |
— |
— |
— |
— |
— |
— |
||
2.0(3) |
— |
— |
Yes |
— |
— |
Yes |
Yes |
Yes |
— |
— |
— |
— |
— |
— |
||
2.0(4) |
— |
— |
— |
Yes |
— |
Yes |
Yes |
Yes |
— |
— |
— |
— |
— |
— |
||
2.0(5) |
— |
— |
— |
— |
Yes |
Yes |
Yes |
Yes |
— |
— |
— |
— |
— |
— |
||
2.1(1) |
— |
— |
— |
— |
— |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
2.1(2) |
— |
— |
— |
— |
— |
— |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
2.1(3) |
— |
— |
— |
— |
— |
— |
— |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
2.2(1) |
— |
— |
— |
— |
— |
— |
— |
— |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
2.2(2) |
— |
— |
— |
— |
— |
— |
— |
— |
— |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
2.2(3) |
— |
— |
— |
— |
— |
— |
— |
— |
— |
— |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
2.2(4) |
— |
— |
— |
— |
— |
— |
— |
— |
— |
— |
— |
Yes |
Yes |
Yes |
Yes |
Yes |
2.2(5) |
— |
— |
— |
— |
— |
— |
— |
— |
— |
— |
— |
Yes |
Yes1 |
Yes1 |
Yes1 |
Yes1 |
2.2(6) |
— |
— |
— |
— |
— |
— |
— |
— |
— |
— |
— |
Yes1 |
Yes1 |
Yes1 |
Yes1 |
Yes1 |
2.2(7) |
— |
— |
— |
— |
— |
— |
— |
— |
— |
— |
— |
Yes1 |
Yes1 |
Yes1 |
Yes1 |
Yes1 |
2.2(8) |
Yes1 |
Yes1 |
Yes1 |
Yes1 |
Yes1 |
|||||||||||
1 Beginning with Cisco UCS Manager Release 2.2(4), and for M4 servers, a lower version of the infrastructure A bundle will be compatible with the previous version and higher version of B and C server bundles. For example, the Cisco UCS Manager Release 2.2(4)A bundle will be supported with any of the following B bundles for B200-M4 servers: 2.1(1)B, 2.1(2)B, 2.1(3)B, 2.2(1)B, 2.2(2)B, 2.2(3)B, 2.2(4)B, 2.2(5)B, 2.2(6)B, 2.2(7)B, 2.2(8)B. |
Note |
For M1, M2, M3 servers, only N, N-1 cross-version firmware is supported. For example, for B200 M3 servers, the 2.2(4)A bundle will be supported with 2.1(1)B, 2.1(2)B, 2.1(3)B, 2.2(1)B, 2.2(2)B, 2.2(3)B, and 2.2(4)B bundles). |
-
If upgrading from a pre-2.2(1b) release and running Management Firmware Pack, refer to open caveat information for CSCud81176 in Release Notes for Cisco UCS Software, Release 2.1.
-
If an environment includes a mix of servers, refer to CSCuh61202 and CSCus64439 for caveat information.
Note
To avoid this issue, first upgrade any Cisco UCS 1240, Cisco UCS 1280, and Cisco M81KR adapter firmware before updating the Cisco UCS infrastructure components—Cisco UCS Manager, IOM, and FI.
-
During manual or auto firmware installs, the fabric interconnect may fail to reload after a reboot or power cycle. Refer to CSCut63966 for caveat information.
A workaround for this issue is to modify a script file, which is called before any reboots occur. This modification can limit the chances of experiencing this issue during an upgrade to firmware versions in which this issue is resolved. Contact Cisco TAC for more information regarding this workaround, and to recover from this issue.
-
A mix of servers running different B-bundles may be run with a single A-bundle. However, any given server must be running the entire B/C-bundles (with associated drivers). Example: mixing the 2.1(2)B BIOS with the 2.1(3)B CIMC on a server is not supported.
-
The OS hardware and software interoperability is relative to the B/C-bundle on any given server. To see what OS is supported, see the Hardware and Software Interoperability documentation associated with the B-bundle version.
-
For all M3 or older servers released with Cisco UCS Manager Release 2.2(3) and earlier versions, the A-bundle version must be at or above the same version(s) of any B/C-bundles running on the servers (see Table 2). This applies to patch levels as well, even though they are not displayed on the table. For example, you can mix 2.1(1f)A with 2.1(1b)B, but you cannot mix 2.1(1b)A with 2.1(1f)B.
You do not need the A-bundle version to be at or above the same version(s) of any B/C-bundles when using Cisco UCS Manager Release 2.2(4) and later releases with M4 servers.
For all M1, M2, M3, and M4 servers released with Cisco UCS Manager Release 2.2(4) and later versions, the patch version of the A-bundle version does not affect the compatibility with B/C bundles running on the servers. The patch versions within a release, such as 2.2(8a) and 2.2(8e), are always supported regardless of the combination. For example, you can mix 2.2(4b)A with 2.2(4c)B, or 2.2(4c)A with 2.2(4b)C.
-
Some features introduced in Cisco UCS Release 2.2 require that both the A-bundle version and the B/C-bundle versions be upgraded to the same version. For example, the lower power budget supported for Cisco UCS Release 2.2 is not supported for servers using 2.1 firmware.
-
In Cisco UCSM Release 2.2 and later releases, the adapter firmware version is different from the Cisco UCSM Release version.
Minimum B/C Bundle Version Requirements for Cisco UCS Manager Features
The following Cisco UCS Manager 2.2 features require the specified minimum B/C bundle version to perform expected operations:
Feature |
B Bundle Version |
C Bundle Version |
||
---|---|---|---|---|
IPv6 Management Support |
2.2(1b)B |
2.2(1b)C |
||
usNIC for Low Latency |
2.2(1b)B |
2.2(1b)C |
||
Support for Virtual Machine Queue (VMQ) |
2.2(1b)B |
2.2(1b)C |
||
VM-FEX for Hyper-V Management with Microsoft SCVMM |
2.2(1b)B |
2.2(1b)C |
||
Secure Boot |
2.2(1b)B |
2.2(1b)C |
||
Local Storage Management |
2.2(1b)B |
2.2(1b)C |
||
Flash Adapters and HDD Firmware Management |
2.2(1b)B |
2.2(1b)C |
||
Precision Boot Order Control |
2.2(1b)B |
2.2(1b)C |
||
Trusted Platform Module (TPM) Inventory |
2.2(1b)B |
2.2(1b)C |
||
DIMM Blacklisting and Correctable Error Reporting |
2.2(1b)B |
2.2(3a)C |
||
Netflow monitoring support:
|
2.2(2c)B — — 2.2(3a)B — |
— 2.2(2c)C 2.2(3a)C — 2.2(4b)C |
||
Stateless Offload for Overlay Networks (NVGRE / VXLAN)
|
2.2(3a)B |
— |
||
BIOS secure boot support |
2.2(1b)B |
2.2(3a)C |
||
CIMC secure boot support |
2.2(1b)B |
2.2(3a)C |
||
RDMA over Converged Ethernet (RoCE) support for Microsoft SMB Direct
|
2.2(4b)B |
— |
||
LLDP support for Fabric Interconnect vEthernet Interfaces |
2.2(4b)B |
2.2(4b)C |
||
Policy-based port error handling |
2.2(4b)B |
2.2(4b)C |
||
Advanced Local Storage Configuration |
2.2(4b)B |
2.2(4b)C |
||
Pass-through capability for Gen 3 Fusion IO Mezzanine cards |
2.2(4b)B |
— |
||
Fabric Interconnect traffic evacuation |
2.2(4b)B |
2.2(4b)C |
||
Per Fabric Interconnect chassis reacknowledgment |
2.2(4b)B |
— |
||
Trusted Platform Module (TPM) configuration support |
2.2(4b)B |
2.2(4b)C |
||
Consistent Device Naming (CDN) support
|
2.2(4b)B |
2.2(4b)C |
||
CIFS authentication protocol support for Scriptable vMedia |
2.2(4b)B |
2.2(4b)C |
||
Support for Service Profile migration with UEFI boot mode |
2.2(4b)B |
2.2(4b)C |
||
Support NVGRE with IPv6 and VMQ |
2.2(4b)B |
— |
||
Support usNIC with Intel® MPI |
2.2(4b)B |
2.2(4b)C |
||
Server support for 4K Drives |
— |
2.2(4b)C |
For detailed instructions for updating the Cisco UCS software and firmware, see the appropriate Upgrading Cisco UCS document for your installation.
Hardware and Software Interoperability
For a complete list of hardware and software interdependencies, see the Hardware and Software Interoperability for UCSM Managed Servers for a specific Cisco UCS Manager release, here:
Internal Dependencies
The table shows interdependencies between the hardware and versions of Cisco UCS Manager. Server FRU items such as DIMMs are dependent on their server type, and chassis items such as fans and power supplies work with all versions of Cisco UCS Manager.
Component |
Minimum Qualified Software Version1 |
Recommended Software Version |
---|---|---|
Servers |
||
B22 M3 E5-2400 B22 M3 E5-2400 v2 |
2.1(3k) 2.2(2e) |
2.2(8m) 2.2(8m) |
B200 M1 and M2 |
2.2(2e) |
2.2(8m) |
B200 M3 E5-2600 B200 M3 E5-2600 v2 |
2.1(3k) 2.2(2e) |
2.2(8m) |
B200 M4 E5-2600 v3 B200 M4 E5-2600 v42 |
2.2(3a) |
2.2(8m) |
2.2(7b) |
2.2(8m) |
|
B230 M1 and M2 |
2.1(3k) |
2.2(8m) |
B250 M1 and M2 |
2.1(3k) |
2.2(8m) |
B260 M4 E7-2800 v2 B260 M4 E7-4800 v2 B260 M4 E7-8800 v2 B260 M4 E7-4800 v3 B260 M4 E7-8800 v3 B260 M4 E7-4800 v4 B260 M4 E7-8800 v4 |
2.2(2e) 2.2(2e) 2.2(2e) 2.2(5d) 2.2(5d) 2.2(8c) 2.2(8c) |
2.2(8m) 2.2(8m) 2.2(8m) 2.2(8m) 2.2(8m) 2.2(8m) 2.2(8m) |
B420 M3 E5-4600 B420 M3 E5-4600 v2 |
2.1(3k) 2.2(2e) |
2.2(8m) 2.2(8m) |
B440 M1 and M2 |
2.1(3k) |
2.2(8m) |
B420 M4 E5-4600 v3 B420 M4 E5-4600 v4 |
2.2(5d) 2.2(8a) |
2.2(8m) 2.2(8m) |
B460 M4 E7-4800 v2 B460 M4 E7-8800 v2 B460 M4 E7-4800 v3 B460 M4 E7-8800 v3 B460 M4 E7-4800 v4 B460 M4 E7-8800 v4 |
2.2(2e) 2.2(2e) 2.2(5d) 2.2(5d) 2.2(8c) 2.2(8c) |
2.2(8m) 2.2(8m) 2.2(8m) 2.2(8m) 2.2(8m) 2.2(8m) |
C22 M3 and M3L |
2.1(3k) |
2.2(8m) |
C24 M3, M3L, and M3S2 |
2.1(3k) |
2.2(8m) |
C200 M2 and M2 SFF |
2.1(3k) |
2.2(8m) |
C210 M2 |
2.1(3k) |
2.2(8m) |
C220 M33 |
2.1(3k) |
2.2(8m) |
C220 M4 C220 M4 E5-2600 v4 |
2.2(3k) 2.2(7c) |
2.2(8m) 2.2(8m) |
C240 M33 |
2.1(3k) |
2.2(8m) |
C240 M4 C240 M4 E5-2600 v4 |
2.2(3k) 2.2(7c) |
2.2(8m) 2.2(8m) |
C250 M2 |
2.1(3k) |
2.2(8m) |
C260 M2 |
2.1(3k) |
2.2(8m) |
C420 M3 |
2.1(3k) |
2.2(8m) |
C460 M2 |
2.1(3k) |
2.2(8m) |
C460 M4 E7-2800 v2 C460 M4 E7-4800 v2 C460 M4 E7-8800 v2 C460 M4 E7-4800 v3 C460 M4 E7-8800 v3 C460 M4 E7-8800 v4 |
2.2(2e) 2.2(2e) 2.2(2e) 2.2(5d) 2.2(5d) 2.2(8d) |
2.2(8m) 2.2(8m) 2.2(8m) 2.2(8m) 2.2(8m) 2.2(8m) |
Adapters |
||
UCS 82598KR-CI UCS M71KR-E UCS M71KR-Q |
2.1(3k) |
2.2(8m) |
UCS M81KR |
2.1(3k) |
2.2(8m) |
UCS NIC M51KR-B UCS CNA M61KR-I4 UCS CNA M72KR-Q UCS CNA M73KR-Q UCS CNA M72KR-E |
2.1(3k) |
2.2(8m) |
UCS-VIC-M82-8P UCSB-MLOM-40G-01 UCSB-MLOM-PT-01 |
2.1(3k) |
2.2(8m) |
UCSB-MLOM-40G-03 UCSB-VIC-M83-8P UCSC-MLOM-CSC-02 |
2.2(3a) |
2.2(8m) |
UCSB-MEZ-ELX-03 UCSB-MEZ-QLG-03 UCSC-PCIE-CSC-02 |
2.1(3k) |
2.2(8m) |
UCSC-F-FIO-1000MP UCSC-F-FIO-1300MP UCSC-F-FIO-2600MP UCSC-F-FIO-5200MP |
2.2(3a) |
2.2(8m) |
UCSB-FIO-1600MS UCSB-FIO-1300MS |
2.2(3a) |
2.2(8m) |
UCSC-INVADER-3108 UCSC-NYTRO-200GB |
2.2(3a) |
2.2(8m) |
UCSC-MLOM-C10T-02 UCSC-PCIE-C10T-02 UCSC-F-FIO-785M UCSC-F-FIO-365M UCSC-F-FIO-1205M UCSC-F-FIO-3000M UCSC-F-FIO1000PS UCSC-F-FIO1300PS UCSC-F-FIO2600PS UCSC-F-FIO5200PS UCSC-F-FIO-6400SS UCSC-F-FIO-3200SS |
2.2(4b) |
2.2(8m) |
GPU |
||
UCSB-GPU-M6 |
2.2(7b) |
2.2(8m) |
Chassis5 |
||
N20-C6508 |
2.2(1b) |
2.2(8m) |
UCSB-5108-DC |
2.2(1b) |
2.2(8m) |
UCSB-5108-AC2 |
2.2(1b) |
2.2(8m) |
UCSB-5108-DC2 |
2.2(1b) |
2.2(8m) |
UCSB-5108-HVDC |
2.2(2c) |
2.2(8m) |
Fabric Interconnect |
||
UCS 6120XP |
2.2(7c) |
2.2(8m) |
UCS 6140XP |
2.2(7c) |
2.2(8m) |
UCS 6248UP |
2.2(7c) |
2.2(8m) |
UCS 6296UP |
2.2(7c) |
2.2(8m) |
Fabric Extender or I/OM |
||
UCS 2104 |
2.2(7c) |
2.2(8m) |
UCS 2208XP |
2.2(7c) |
2.2(8m) |
UCS 2204XP |
2.2(7c) |
2.2(8m) |
Cisco Nexus 2232PP |
2.2(7c) |
2.2(8m) |
Cisco Nexus 2232TM-E |
2.2(7c) |
2.2(8m) |
Fabric Interconnect Expansion Modules |
||
N10-E0440 N10-E0600 N10-E0080 |
2.2(7c) |
2.2(8m) |
N10-E0060 |
2.2(7c) |
2.2(8m) |
UCS-FI-E16UP |
2.2(7c) |
2.2(8m) |
Power Supplies |
||
UCSC-PSUV2-1050DC |
2.2(7c) |
2.2(8m) |
UCSB-PSU-2500HVDC |
2.2(7c) |
2.2(8m) |
UCSC-PSU-930WDC UCSC-PSU1-770W UCSC-PSU2-1400 UCSC-PSU2V2-650W UCSC-PSU2V2-1200W |
2.2(7c) |
2.2(8m) |
NVME SSD Drives |
||
UCS-SDHPCIE800GB |
2.2(7c) |
2.2(8m) |
UCS-SDHPCIE1600GB[1] |
2.2(7c) |
2.2(8m) |
10-GB Connections |
||
SFP-10G-SR, SFP-10G-LR SFP-H10GB-CU1M SFP-H10GB-CU3M SFP-H10GB-CU5M |
2.2(7c) |
2.2(8m) |
SFP-H10GB-ACU7M SFP-H10GB-ACU10M |
2.2(7c) |
2.2(8m) |
FET-10G SFP-10G-AOC7: SFP-10G-AOC1M SFP-10G-AOC2M SFP-10G-AOC3M SFP-10G-AOC5M SFP-10G-AOC7M SFP-10G-AOC10M |
2.2(7c) |
2.2(8m) |
8-GB Connections (FC Expansion Module N10-E0060) |
||
DS-SFP-FC8G-SW DS-SFP-FC8G-L |
2.2(7c) |
2.2(8m) |
4-GB Connections (FC Expansion Module N10-E0080) |
||
DS-SFP-FC4G-SW DS-SFP-FC4G-LW |
2.2(7c) |
2.2(8m) |
1-GB Connections |
||
GLC-T (V03 or higher) GLC-SX-MM GLC-LH-SM |
2.2(7c) |
2.2(8m) |
-
This is the minimum server bundle recommended for this hardware in a mixed firmware configuration, assuming the infrastructure is at the recommended software version.
-
Cisco UCS Manager Release 2.2(4) introduced a server pack feature that allows Intel E5-2600 v4 CPUs to run with Cisco UCS Manager Release 2.2(4) or later releases, provided the CIMC, BIOS, and Capability Catalog are all running Cisco UCS Manager Release 2.2(7). For upgrading B200 M4 servers from v3 CPUs to v4 CPUs, refer to Cisco UCS B200 M4 Server Upgrade Guide for E5-2600 v4 Series CPUs.
-
See the Software Advisory for the minimum firmware level required on the Cisco UCS C220 M3 and Cisco UCS C240 M3.
-
N20-AI0002, the Cisco UCS 82598KR-CI 10-Gb Ethernet Adapter, is not supported on the B440 server but is still available for other models. We suggest you use the Cisco UCS CNA M61KR-I Intel Converged Network Adapter in place of the Cisco UCS 82598KR-CI 10-Gb Ethernet Adapter.
-
Recommended minimum software versions do not take into account mixed environments; to determine the minimum software version for your mixed environment, refer to, Updating Cisco UCS Releases.
-
For 1.6 TB HGST NVME drives, when used with B200-M4 blade servers, the minimum required board controller version is 12, which is bundled with Cisco UCS Manager Release 2.2(7c)B.
-
Cisco 1225 and 1227 VIC cards are not supported with SFP-10G-AOC cables. SFP-10G-AOC cables are only supported with Cisco 1385 and 1387 VIC cards.
Capability Catalog
The Cisco UCS Manager uses the catalog to update the display and configurability of server components such as newly qualified DIMMs and disk drives. The Cisco UCS Manager Capability Catalog is a single image, but it is also embedded in Cisco UCS Manager. Cisco UCS Manager 2.2(x) releases work with any 2.2(x) catalog file, but not the 1.x, 2.0 or 2.1 catalog versions. If a server component is not dependent on a specific BIOS version, using it and having it recognized by Cisco UCS Manager is primarily a function of the catalog version. The catalog is released as a single image in some cases for convenience purposes in addition to being bundled with UCS infrastructure releases. See Table 5 for details on the mapping of versions to bundles.
UCS Release |
Catalog File |
Adds Support for PID |
Additional Parts Qualified for PID |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
2.2(8m) |
ucs-catalog.2.2.8k.T.bin |
— |
— |
||||||||
2.2(8l) |
ucs-catalog.2.2.8k.T.bin |
— |
— |
||||||||
2.2(8j) |
ucs-catalog.2.2.8k.T.bin |
Drives
|
— |
||||||||
2.2(8g) |
ucs-catalog.2.2.8h.T.bin |
-- |
-- |
||||||||
2.2(8f) |
ucs-catalog.2.2.8f.T.bin |
Cisco UCS C220, C240, B200, B420, and S3260 CPUs UCS-CPU-E52699AE |
-- |
||||||||
-- |
ucs-catalog.2.2.8e.T.bin |
Drives UCS-SD480GBKS-EV UCS-SD19TBKSS-EV |
-- |
||||||||
2.2(8d) |
ucs-catalog.2.2.8d.T.bin |
-- |
-- |
||||||||
2.2(8c) |
ucs-catalog.2.2.8c.T.bin |
-- |
-- |
||||||||
2.2(8b) |
ucs-catalog.2.2.8b.T.bin |
-- |
-- |
||||||||
2.2(8a) |
ucs-catalog.2.2.8a.T.bin |
Cisco UCS B420 M4 CPU
Memory
TPM
C460 M4 E7-8800 v4 CPU
Memory
TPM
B260 M4 and B460 M4 E7- 4800 v4 , E7-8800 v4 CPU
Memory
HDD
TPM
|
CPU
Memory
|
||||||||
2.2(7e) |
ucs-catalog.2.2.7c.T.bin |
— |
— |
||||||||
2.2(7d) |
ucs-catalog.2.2.7c.T.bin |
— |
— |
||||||||
2.2(7c) |
ucs-catalog.2.2.7c.T.bin |
— |
— |
||||||||
2.2(7b) |
ucs-catalog.2.2.7b.T.bin |
Cisco UCS B200 M4, C220 M4, and C240 M4 CPUs
Storage Controller
PCIe adapter card
Memory
Drives
GPU
Crypto Card
NVME Drives
Qlogic network adapters
Cisco UCS VIC adapters
|
Memory
|
||||||||
2.2(6j) |
— |
— |
— |
||||||||
2.2(6i) |
— |
— |
— |
||||||||
2.2(6g) |
— |
— |
— |
||||||||
2.2(6f) |
ucs-catalog.2.2.6f.T.bin |
— |
— |
||||||||
2.2(6e) |
— |
— |
— |
||||||||
— |
ucs-catalog.2.2.6e.T.bin |
— |
|
||||||||
2.2(6d) |
— |
— |
|||||||||
2.2(6c) |
ucs-catalog.2.2.6c.T.bin |
Additional Memory
Drives
|
|||||||||
2.2(5d) |
— |
— |
|||||||||
2.2(5c) |
ucs-catalog.2.2.5b.T.bin |
— |
|||||||||
2.2(5b) |
— |
Cisco UCS B420 M4 (UCSB-B420-M4)
|
|||||||||
2.2(5a) |
ucs-catalog.2.2.5a.T.bin |
Cisco UCS B420 M4 (UCSB-B420-M4) CPU
Memory
Cisco UCS B260 M4 (UCSB-B260-M4) and Cisco UCS B460 M4 (UCSB-B460-M4) CPU
Memory
Cisco UCS C460 M4 (UCSC-C460-M4) CPU
Memory
Storage Controller
GPU
|
|||||||||
2.2(4c) |
— |
Additional Cisco UCS B200 M4
|
|||||||||
2.2(4b) |
ucs-catalog.2.2.4b.T.bin1 |
Additional Cisco UCS B200 M4, C220 M4, and C240 M4 Memory
Additional Cisco UCS C220 M4, and C240 M4 Memory
Adapters
Drives
Fabric Extender
|
|||||||||
2.2(3l) |
— |
— |
— |
||||||||
2.2(3k) |
— |
— |
— |
||||||||
2.2(3j) |
— |
— |
— |
||||||||
2.2(3h) |
ucs-catalog.2.2.3d.T.bin |
— |
|||||||||
2.2(3g) |
ucs-catalog.2.2.3c.T.bin |
— |
|||||||||
2.2(3f) |
— |
— |
|||||||||
2.2(3e) |
— |
— |
|||||||||
2.2(3d) |
— |
— |
|||||||||
— |
ucs-catalog.2.2.3b.T.bin1 |
— |
|||||||||
2.2(3c) |
— |
Additional Cisco UCS B200 M4 CPUs
|
|||||||||
2.2(3b) |
— |
— |
|||||||||
2.2(3a) |
ucs-catalog.2.2.3a.T.bin1 |
Cisco UCS B200 M4 (UCSB-B200-M4) CPU
Memory
Fusion IO Memory
Cisco UCS C220 M4 (UCSC-C220-M4) and Cisco UCS C240 M4 (UCSC-C240-M4) CPU
Memory
|
|||||||||
2.2(2e) |
— |
— |
|||||||||
2.2(2d) |
— |
— |
|||||||||
2.2(2c) |
ucs-catalog.2.2.2c.T.bin1 |
Cisco UCS B22 M3 (UCSB-B22-M3) CPU
Memory
Cisco UCS B260-M4 (UCSB-EX-M4-1) CPU
Memory
Cisco UCS B420-M3 (UCSB-B420-M3) CPU
Memory
Cisco UCS B460-M4 (UCSB-EX-M4-1) CPU
Memory
|
|||||||||
2.2(1h) |
— |
— |
|||||||||
2.2(1g) |
— |
— |
|||||||||
2.2(1f) |
— |
— |
|||||||||
2.2(1e) |
ucs-catalog.2.2.1d.T.bin |
— |
|||||||||
2.2(1d) |
ucs-catalog.2.2.1d.T.bin1 |
— |
|||||||||
— |
ucs-catalog.2.2.1d.T.bin1 |
UCS-HD12T10KS2-E UCS-ML-1X324RY-A UCS-MR-2X041RY-B UCS-MR-2X082RY-B |
|||||||||
— |
ucs-catalog.2.2.1c.T.bin1 |
UCS-MR-1X041RY-A UCS-MR-1X082RY-A UCS-MR-1X082RZ-A UCS-MR-2X041RX-C UCS-MR-2X082RX-C UCS-MR-2X162RX-C |
|||||||||
2.2(1c) |
ucs-catalog.2.2.1b.T.bin |
— |
|||||||||
2.2(1b) |
ucs-catalog.2.2.1b.T.bin |
UCS-ML-1X324RZ-A UCS-SD200G0KS2-EP UCS-SD400G0KS2-EP UCS-SD800G0KS2-EP UCSB-5108-AC2 UCSB-5108-DC2 |
|||||||||
1 Available for separate download. |
Further details are in the Cisco UCS Manager Configuration Guides.
New Hardware Features in Release 2.2
New Hardware Features in Release 2.2(8m)
None
New Hardware Features in Release 2.2(8l)
None
New Hardware Features in Release 2.2(8j)
None
Release 2.2(8f) adds support for the following:
-
Cisco C220, C240, B200, B420, and S3260 shipping with Intel® Xeon® Processor E5 2699A v4 series CPU
Release 2.2(8c) adds support for the following:
-
Cisco UCS B260 and B460 M4 shipping with Intel® Xeon® Processor E7-4800 v4 and E7-8800 v4 series CPUs
-
Cisco UCS C460 M4 shipping with Intel® Xeon® Processor E7-8800 v4 series CPUs
Release 2.2(8a) adds support for the following:
-
Cisco UCS B420 M4 shipping with Intel® Xeon® Processor E5-4600 v4 series CPUs
-
Trusted Platform Module (TPM) 2.0 for B260, B420, B460 and C460 M4 servers
Release 2.2(7b) adds support for the following:
-
Cisco UCS B200 M4, C220 M4, and C240 M4 shipping with the Intel® Xeon® Processor E5-2600 v4 series CPUs on Cisco UCS 6100 and 6200 Series fabric interconnects
-
NVIDIA Tesla M6 GPU accelerator for B200 M4 servers
-
NVIDIA Tesla M60 GPU accelerator for C-Series Servers
-
UCSB-LSTOR-PT storage controller
-
SX350 Fusion IO adapters:
-
UCSC-F-S32002
-
UCSC-F-S13002
-
UCSC-F-S16002
-
UCSC-F-S64002
-
-
UCSC-SAS12GHBA PCIe adapter card
-
UCS-RAID9286CV-8E RAID controller
-
UCSC-C240-M4SNEBS
-
PCIe SSD on B200 M4 servers
-
Trusted Platform Module (TPM) 2.0
-
QLogic QLE8442 10Gb Dual port 10GBaseT network adapter
-
QLogic QLE8442 10Gb Dual port SFP+ network adapter
-
Cisco UCS VIC 1385 and VIC 1387 network adapters
-
Emulex OCE14102 B network adapter
Release 2.2(5a) adds support for the following:
-
Cisco UCS B420 M4 servers shipping with Intel E5-4600 v3 series CPUs
-
Cisco UCS B260 M4 and B460 M4 servers shipping with Intel E7-4800 v3 series or E7-8800 v3 series CPUs
-
Cisco UCS C460 M4 servers shipping with Intel E7-4800 v3 series and E7-8800 v3 series CPUs
-
Cisco 12G SAS Modular RAID Controller (12-port)
-
Cisco 12G SAS Modular RAID Controller support for Cisco UCS C460 M4 servers
-
NVIDIA Tesla K80 GPU accelerator for C-Series servers
Release 2.2(4b) adds support for the following:
-
Cisco UCS VIC 1227T adapter modular LOM (mLOM) for Cisco UCS C220 M4 and C240 M4 servers
-
Cisco UCS VIC 1225T adapter for C-Series servers1
-
Cisco UCS VIC 1340 and VIC 1380 adapters for Cisco UCS B420 M3 server2
-
Cisco UCSC-PCIE-Q8362 adapter for all M3 and M4 C-Series servers
-
Cisco Nexus 2232TM-E 10GE Fabric Extender with support for Cisco UCS VIC 1225T and VIC 1227T adapters.
1 Except for Cisco UCS C22 M3, C24 M3 and C420 M3 servers
2 Cisco UCS VIC 1340 and VIC 1380 adapters only support Cisco 6200 Series Fabric Interconnects and later models.
Release 2.2(3a) adds support for the following:
-
Cisco UCS B200 M4 servers shipping with Intel E5-2600 v3 series CPUs
-
Cisco UCS C220 M4/C240 M4 servers shipping with Intel E5-2600 v3 Series CPUs
-
Cisco UCS VIC 1227 adapter modular LOM (mLOM) for Cisco UCS C220 M4 and C240M4 servers
-
Cisco UCS VIC 1340 and VIC 1380 adapters for Cisco UCS B200 M3, B200 M4, B260 M4, and B460 M4 servers2
-
Fusion IO ioMemory for B-series and C-series servers
-
LSI Nytro MegaRaid NMR 8110-4i for C240 M3 server
-
NVIDIA Tesla K40 GPU accelerator for C-Series Servers
-
Emulex OCE14102 CNA
-
FX3S Support
-
10GB TwinAx cables (2m)
-
10GB AOC cables (1m, 2m, 3m, 5, 7m, and 10m)
Release 2.2(2c) adds support for the following:
-
B22 M3 servers shipping with Intel E5-2400 v2 CPUs.
-
B420 M3 servers shipping with Intel E5-4600 v2 CPUs.
-
B260 M4 servers shipping with two Intel E7-2800 v2 or E7-4800 v2 or E7-8800 v2 CPUs.
-
B460 M4 servers shipping with four Intel E7-4800 v2 or E7-8800 v2 CPUs.
-
C22 M3/C24 M3 servers shipping with Intel E5-2400 v2 CPUs.
-
C460 M4 servers shipping with two or four Intel E7-4800 v2 or E7-8800 v2 CPUs.
-
Chassis with updated backplane and High Voltage DC support (200v DC - 380v DC) - UCSB-5108-HVDC
Release 2.2(1b) adds support for the following:
-
Chassis with updated backplane UCSB-5108-AC2 or UCSB-5108-DC2
New Software Features in Release 2.2
New Software Features in Release 2.2(8m)
None
New Software Features in Release 2.2(8l)
None
New Software Features in Release 2.2(8j)
None
Release 2.2(8a) adds support for the following:
-
Next Boot—The maintenance policy now provides an On Next Boot option. This option is used in combination with either User Ack or Timer Automatic. With the On Next Boot option enabled, one of the following conditions can trigger the associated FSM to apply the changes waiting for the User Ack, or the Timer Automatic maintenance window.
-
If the host OS reboots, shuts down, or resets, initiated from an external, non-UCS source
-
If the server resets, or shuts down
-
-
Graceful shutdown—When you acknowledge a server reboot using the graceful shut down options or a change in the service profile that requires the server reboot, Cisco UCS Manager waits until the time specified time in the maintenance policy before performing a hard shut down.
-
Health monitoring of end points—Enhanced health monitoring of end points for fabric interconnects, IOMs, FEXes, blade servers, and rack servers.
-
Power synchronization between servers and their associated service profiles—Cisco UCS Manager includes a global (default) power sync policy to synchronize the power state between the associated service profiles and the servers when the desired power state of the service profile differs from the actual power state of the server. The power sync policy applies to all the service profiles by default. You can edit the default policy, but cannot delete it. You can also create your own policies and apply them to service profiles.
-
Factory reset of blade servers—You can now reset a blade server to its factory settings. By default, the factory reset operation does not affect storage drives and flexflash drives. This is to prevent any loss of data. However, you can also choose to reset these devices to a known state.
-
Support for 160 LDAP group maps—Cisco UCS Manager now supports a maximum of 160 LDAP group maps.
-
Virtual Volume Support—Virtual volume support is now supported for ESXi 5.5 and higher.
Release 2.2(7b) adds support for the following:
-
Firmware Upgrade Checks the VIF/Interface Status After Fabric Interconnect Reboot—During firmware upgrade, to ensure proper functioning of all services on the fabric interconnect, it is essential to ensure that port configurations and services that go down when the fabric interconnect reboots are re-established after the fabric interconnect comes back up. Cisco UCS Manager displays any service that is not re-established after the last reboot of a fabric interconnect.
-
vNIC Redundancy Pair— Supports two vNICs/vHBAs that are being configured with a common set of parameters through the vNIC/vHBA template pair. This prevents the configuration between two vNICs/vHBAs from going out of sync. Multiple vNIC/vHBA pairs can be created from the same vNIC/vHBA template pair.
-
Ability to perform UCS Manager initial configuration without console connectivity based on DHCP lease availability.
-
Preserving the following properties during backup or import operations:
-
User-defined labels for Chassis, FEX, Rack Servers, IOMs and Blade Servers
-
Assigned IDs for Chassis, FEX and Rack Servers
-
-
Locator LED support for server hard-disks—You can now identify where a specific disk is inserted in a blade or rack server using the local locator LED.
-
When you add new servers or adapters to an existing Cisco UCS system with a Cisco UCS Manager release that does not support these servers and adapters, discovery of the system may fail. In case of such a failure, the FSM will display an error message that the server or adapter is not supported on the current UCS firmware version. To resolve this issue, do one of the following:
-
Update the Capability Catalog to the latest compatible release
-
Upgrade the Cisco UCS Manager infrastructure firmware to the version required by the new hardware.
-
-
Provision to Reset Peer I/O Modules to Factory Defaults—Sometimes, I/O module upgrades can result in failures or I/O modules can become unreachable from Cisco UCS Manager due to memory leaks. You can now reboot an I/O module that is unreachable through its peer I/O module.
Resetting the I/O module restores the I/O module to factory default settings, deletes all cache files and temporary files, but retains the size-limited OBFL file.
-
vNIC template CDN Source—Enables you to select the Consistent Naming Device (CDN) Source as the vNIC Name, which in turn can either be customized or derived from the vNIC instance.
-
NVMe PCIe SSD Inventory—Cisco UCS Manager discovers, identifies, and displays the inventory of Non-Volatile Memory Express (NVMe) Peripheral Component Interconnect Express (PCIe) SSD storage devices. You can view the health of the storage devices in the server. NVMe with PCIe SSD storage devices reduce latency, increase input/output operations per second (IOPS), and lower power consumption compared to SAS or SATA SSDs.
-
PCH SSD Controller Definition—Cisco UCS Manager Platform Controller Hub (PCH) Solid State Drive (SSD) Controller Definition provides a local storage configuration in storage profiles where you can configure all the disks in a single RAID or in a JBOD disk array.
-
Host Firmware Package Enhancement—You can now exclude firmware of specific components from a host firmware package either when creating a new host firmware package or when modifying an existing host firmware package. For example, if you do not want to upgrade RAID controller firmware through the host firmware package, you can exclude RAID controller firmware from the list of firmware package components.
Local disk firmware is excluded from the host firmware package by default.
-
Installed Firmware Tab Enhancement—The Installed Firmware tab now displays all the firmware available on the blade server, including SAS controller firmware, FlexFlash controller firmware, and Disk firmware.
-
Provision to suppress VIF down alert—When a blade server that is associated with a service profile is shut down, the VIF down alert F0283 and F0479 are automatically suppressed.
-
EFI Shell as a Boot Device—You can create a boot policy with an EFI Shell as the boot device. Booting from an EFI Shell prevents loss of data and provides more options to script, debug, and control various booting scenarios. EFI Shell is supported as a boot device only in the Uefi boot mode.
-
Multicast Hardware Hash—In a port channel, by default, ingress multicast traffic on any port in the fabric interconnect (FI) selects a particular link between the IOM and the fabric interconnect to egress the traffic. To reduce potential issues with the bandwidth, and to provide effective load balancing of the ingress multicast traffic, hardware hashing is used for multicast traffic. When multicast hardware hashing is enabled, all links between the IOM and the fabric interconnect in a port channel can be used for multicast traffic.
-
Reset All Memory Errors—Provides the ability to clear all the errors from the UCS Manager.
-
CPLD Update of the UCSB-MRAID12G Storage Controller—Starting with Cisco UCS Manager Release 2.2(7b), the infrastructure bundle now supports a CPLD component update. The CPLD update for the UCSB-MRAID12G storage controller can be triggered by doing one of the following:
-
Re-acknowledging the server—If the server did not go through a deep-assoc after upgrading to the Cisco UCS Manager 2.2(7) or later releases.
-
Updating the associated HFP with a supported B bundle—If the server was associated after upgrading to the Cisco UCS Manager 2.2(7) or later releases.
-
-
VM-FEX Support—Support for ESX VM-FEX added. The support matrix in the Hardware and Software Interoperability Matrix for this release provides more details.
-
SHA-2 Certificate Support—Support for SHA-2 certificate added.
Release 2.2(6c) adds support for the following:
-
KVM—The Virtual Media > Activate Virtual Devices is available.
Release 2.2(4b) adds support for the following:
-
Server Pack—This feature allows you to support new server platforms* on existing infrastructure without requiring a complete firmware upgrade. In this model, new B/C server bundles enabling the new servers will be supported on the previous infrastructure A bundle. For example, Release 2.2(5) B/C server bundles are supported with Release 2.2(4) infrastructure A bundle as highlighted in Updating Cisco UCS Releases. New features introduced in the B/C bundles may only become available after upgrading the A bundle to the respective version.
The Server Pack feature provides the additional flexibility of adding new server platforms to active UCS domains without incurring the operational overhead of upgrading firmware across the whole domain.
*The feature will apply to select server platforms.
-
RDMA over Converged Ethernet (RoCE) for Microsoft SMB Direct—RoCE is a link layer protocol, and hence, it enables communication between any two hosts in the same Ethernet broadcast domain. RoCE delivers superior performance compared to traditional network socket implementations because of lower latency, lower CPU utilization and higher utilization of network bandwidth.
RoCE for Microsoft SMB Direct is supported only on Windows 2012 R2 with Cisco UCS VIC 1340 and 1380 adapters.
-
LLDP Support for Fabric Interconnect vEthernet Interfaces—You can enable and disable LLDP on a vEthernet interface and retrieve information about LAN uplink neighbors. When using Cisco UCS with Cisco Application Centric Infrastructure (ACI), LAN uplinks of the Fabric Interconnect are connected to ACI leaf nodes. Enabling LLDP on a vEthernet interface will help the Application Policy Infrastructure Controller (APIC) to identify the servers connected to the Fabric Interconnect by using vCenter.
-
Policy-Based Port Error Handling—If Cisco UCS Manager detects any errors on active IOM Network Interface (NIF) ports, and if the Error-disable setting is enabled, Cisco UCS Manager automatically disables the respective FI port that is connected to the IOM NIF port that had errors.
When a FI port is error disabled, it is effectively shut down and no traffic is sent or received on that port.
-
Advanced Local Storage Configuration:
-
Configuration of Storage Profiles and multiple virtual drives—To allow flexibility in defining the number of storage disks, roles and usage of these disks, and other storage parameters, you can create and use storage profiles. A storage profile encapsulates the storage requirements for one or more service profiles. You can also configure multiple virtual drives.
-
Configuration of a local LUN or a JBOD as the primary boot device
-
Support for local storage configuration on multiple storage controllers
-
Support for out-of-band configuration for local storage
-
-
Pass-through Capability for Gen 3 Fusion IO Mezzanine Cards—Cisco UCS Manager now supports the pass-through capability of Gen 3 Fusion IO Mezzanine cards for blade servers. Pass-through for Mezzanine cards is a hardware capability that extends the available ports for the Cisco UCS VIC 1340 or VIC 1240 adapter though the Mezzanine slot, and brings the total I/O bandwidth of the VIC 1340 or VIC 1240 adapters to dual 4 x 10 GbE.
-
Fabric Interconnect Traffic Evacuation—During upgrade, you can evacuate the secondary Fabric Interconnect traffic to ensure that there is no traffic flowing through the Fabric Interconnect from all servers attached to it through an IOM or FEX. This allows you to ensure that traffic will properly failover to the other Fabric Interconnect before you can proceed with the firmware upgrade.
-
Per Fabric Interconnect Chassis Reacknowledgment—You can now reacknowledge a chassis per Fabric Interconnect. This allows you to maintain connectivity to the chassis through the other Fabric Interconnect.
-
TPM and TXT Configuration through UCSM—The Trusted Platform Module (TPM) is a component that can securely store artifacts, such as passwords, certificates, or encryption keys, which are used to authenticate the server. A TPM can also be used to store platform measurements that help ensure that the platform remains trustworthy. Intel Trusted Execution Technology (TXT) provides greater protection for information that is used and stored on the server.
This release supports TPM and TXT configuration on Cisco UCS M4 blade and rack-mount servers through Cisco UCS Manager. TPM is enabled by default and TXT is disabled by default.
-
Consistent Device Naming Support—Consistent Device Naming (CDN) allows Ethernet interfaces to be named in a consistent manner. This makes Ethernet interface names more persistent when adapter or other configuration changes are made.
Note
CDN is supported only on Windows 2012 R2.
-
Fabric Scale Improvements—Each Cisco UCS domain now supports:
-
Up to 8 appliance ports
-
320 endpoints
-
Up to 320 vHBAs per Fabric Interconnect
-
-
Scriptable vMedia:
-
You can configure the file name of the vMedia mount image to use the name of the service profile with which the vMedia policy is associated.
-
You can specify the authentication protocol to be used when you select CIFS as the communication protocol with the remote server.
-
-
Support for Service Profile Migration with UEFI Boot Mode—When a service profile is migrated from one server to another, the BIOS on the destination server will continue to load the boot loader information and boot in UEFI boot mode.
-
NVGRE with IPv6 and VMQ—You can enable NVGRE with VMQ and NVGRE with IPv6 on the same vNIC.
-
usNIC Support with Intel® MPI—Intel® Message Passing Interface (MPI) is developed for high performance computing. You can now use the Intel MPI Library version 4 or 5 with Cisco user-space NIC (Cisco usNIC) for a low-latency and high-throughput communication transport.
-
Other Enhancements:
-
While the infrastructure firmware is being upgraded, an automatic, internal, full state backup file is created.
-
When creating an SNMP trap, you can use an IPv4 address, or an IPv6 address, or a fully qualified domain name of an IPv4 address as the SNMP host name.
-
A new tech-support memory option is introduced to create a tech-support file with only server memory information gathered across the Cisco UCS domain.
-
When creating a server pool qualification policy, you can now specify the storage disk type as HDD, SSD or unspecified.
-
Release 2.2(3c) adds support for the following:
-
QPI snoop mode via Service Profile
Release 2.2(3a) adds support for the following:
-
Tiered Port-Licensing for direct-connect C-Series servers
-
Smart Call Home Enhancements
-
BIOS/CIMC secure boot support for C-series servers
-
DIMM blacklisting support for C-series servers
-
ENIC - DPDK Integration
-
Stateless Offload for Overlay Networks (NVGRE / VXLAN)
-
Monitoring of the IOM/FI interfaces
-
LAN and SAN topology information
-
usNIC support for IP-routable transport
Release 2.2(2c) adds support for the following:
-
Scriptable vMedia
-
NetFlow support
-
PVLAN Enhancements
-
Pre-Upgrade Validation Checks
-
GPU Firmware Management
-
Wear-Level Monitoring on Flash Adapters
-
KVM/vMedia Client Enhancements
-
Cisco VIC Driver Enhancements:
-
Adaptive Interrupt Coalescing (AIC)
-
Accelerated Receive Flow Steering (ARFS)
-
netQueue Support
-
-
Support for ‘lacp suspend-individual’ on Uplink Port-Channel
Release 2.2(1b) adds support for the following:
-
IPv6 Management support
-
Cisco Integrated Management Controller (CIMC) In-band Management
-
Fabric scaling: VLAN, VIFs, IGMP, Network Adapter Endpoints
-
Uni-Directional Link Detection (UDLD) support
-
User Space NIC (usNIC) for Low Latency
-
Support for Virtual Machine Queue (VMQ)
-
C-Series Servers Direct Connect to FI without FEX
-
Two-factor Authentication for UCS Manager Logins
-
VM-FEX for Hyper-V Management with Microsoft SCVMM
-
Direct KVM Access
-
Server Firmware Auto Sync
-
Enhanced Local Storage Management
-
Flash Adapters and HDD Firmware Management
-
Precision Boot Order Control
-
Secure Boot (B-series only)
-
UEFI Boot Support
-
FlexFlash (Local SD card) support
-
Trusted Platform Module (TPM) Inventory
-
DIMM Blacklisting and Correctable Error Reporting (B-series only)
-
C-Series Board Controller Firmware Management
Note |
If you want to refer to a list of supported OS in this release, check the Hardware and Software Interoperability Matrix for this release. |
Security Fixes
The following are security fixes in Cisco UCS Manager Release 2.2:
Release |
Defect ID |
CVE (s) |
Description |
---|---|---|---|
2.2(8m) |
CSCvc22208 |
CVE-2018-0303 |
A vulnerability in the Cisco Discovery Protocol component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code as root, or cause a denial of service (DoS) condition on the affected device. The vulnerability exists because of insufficiently validated Cisco Discovery Protocol packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2 adjacent affected device. A successful exploit could allow the attacker to cause a buffer overflow, which could allow the attacker to execute arbitrary code as root, or cause a denial of service (DoS) condition on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: Cisco FXOS and NX-OS Software Cisco Discovery Protocol Arbitrary Code Execution Vulnerability |
2.2(8m) |
CSCve02433 |
CVE-2018-0314 |
A vulnerability in the Cisco Fabric Services (CFS) component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability exists because the affected software insufficiently validates Cisco Fabric Services packet headers when the software processes packet data. An attacker could exploit this vulnerability by sending a maliciously crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the device, which could allow the attacker to execute arbitrary code on the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: Cisco FXOS and NX-OS Software Cisco Fabric Services Arbitrary Code Execution Vulnerability |
2.2(8m) |
CSCve02461 CSCve41538 |
CVE-2018-0304 CVE-2018-0310 |
A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to obtain sensitive information from memory content, create a denial of service (DoS) condition, or execute arbitrary code as root. The vulnerability exists because the affected software insufficiently validates Cisco Fabric Services packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow or buffer overread condition in the Cisco Fabric Services component, which could allow the attacker to obtain sensitive memory content, create a DoS condition, or execute arbitrary code as root. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. These advisories are available at the following links: Cisco FXOS and NX-OS Software Cisco Fabric Services Denial of Service Vulnerability Cisco FXOS and NX-OS Software Cisco Fabric Services Arbitrary Code Execution Vulnerability |
2.2(8m) |
CSCve02787 CSCve02819 |
CVE-2018-0308 CVE-2018-0312 |
A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the affected software insufficiently validates header values in Cisco Fabric Services packets. An attacker could exploit this vulnerability by sending a crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow, which could allow the attacker to execute arbitrary code or cause a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. These advisories are available at the following links: Cisco FXOS and NX-OS Software Cisco Fabric Services Arbitrary Code Execution Vulnerability Cisco FXOS and NX-OS Software Cisco Fabric Services Arbitrary Code Execution Vulnerability |
2.2(8m) |
CSCve41541 CSCve41593 |
CVE-2018-0311 CVE-2018-0305 |
A vulnerability in the Cisco Fabric Services (CFS) component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the affected software insufficiently validates Cisco Fabric Services packets when the software processes packet data. An attacker could exploit this vulnerability by sending a maliciously crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to force a NULL pointer dereference or cause a buffer overflow condition on the device, which could cause process crashes and result in a DoS condition on the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. These advisories are available at the following links: Cisco FXOS and NX-OS Software Cisco Fabric Services Denial of Service Vulnerability Cisco FXOS and NX-OS Software Cisco Fabric Services Denial of Service Vulnerability |
2.2(8m) |
CSCvg71290 |
CVE-2018-0291 |
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: |
2.2(8m) |
CSCvj10183 |
CVE-2019-1616 |
A vulnerability in the Cisco Fabric Services component of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Cisco Fabric Services packets. An attacker could exploit this vulnerability by sending a crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow, resulting in process crashes and a DoS condition on the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: Cisco NX-OS Software Cisco Fabric Services Denial of Service Vulnerability |
2.2(8m) |
CSCvm53116 |
CVE-2019-1599 |
A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to an issue with allocating and freeing memory buffers in the network stack. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device in a sustained way. A successful exploit could cause the network stack of an affected device to run out of available buffers, impairing operations of control plane and management plane protocols, resulting in a DoS condition. This advisory is available at the following link: Cisco NX-OS Software Netstack Denial of Service Vulnerability |
2.2(8m) |
CSCvn61411 |
— |
A vulnerability in the diagnostic CLI command of the Cisco UCS 6200 Series Fabric Interconnects may allow an authenticated local attacker to view sensitive information in the command output. The vulnerability is due to lack of proper masking of sensitive information before being written to the diagnostic support output. An attacker may exploit this vulnerability by authenticating to the targeted device and issuing a specific diagnostic CLI command. However, an attacker needs a valid user credentials to exploit this vulnerability. Cisco UCS Manager Release 2.2(8m) includes the fix for this issue. Password hashes that show in the CLI command are now hidden. |
2.2(8m) |
CSCvp28016 CSCvp27917 CSCvo21412 CSCvp30013 |
CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 |
Cisco UCS M3 and M4 servers and Hyperflex M4 servers are vulnerable to variants of exploits that use Microarchitectural Data Sampling (MDS) to gain access to data being processed in the CPU by other applications.
This release includes BIOS revisions for the follwing servers:
These BIOS revisions include the updated microcode that is a required part of the mitigation for these vulnerabilities. |
2.2(8m) |
CSCvd34862 |
CVE-2018-0294 |
A vulnerability in the write-erase feature of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to configure an unauthorized administrator account for an affected device. The vulnerability exists because the affected software does not properly delete sensitive files when certain CLI commands are used to clear the device configuration and reload a device. An attacker could exploit this vulnerability by logging into an affected device as an administrative user and configuring an unauthorized account for the device. The account would not require a password for authentication and would be accessible only via a Secure Shell (SSH) connection to the device. A successful exploit could allow the attacker to configure an unauthorized account that has administrative privileges, does not require a password for authentication, and does not appear in the running configuration or the audit logs for the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: Cisco FXOS and NX-OS Software Unauthorized Administrator Account Vulnerability |
2.2(8m) |
CSCvk70633 |
CVE-2019-1962 |
A vulnerability in the Cisco Fabric Services (CFS) component of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause process crashes, which can result in a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient validation of TCP packets when processed by the Cisco Fabric Services over IP (CFSoIP) feature. An attacker could exploit this vulnerability by sending a crafted CFS TCP packet to an affected device. A successful exploit could allow the attacker to cause process crashes, resulting in a device reload and a DoS condition. Note: There are three distribution methods that can be configured for CFS. This vulnerability only affects distribution method CFSoIP, which is disabled by default. See the Security Advisory for more information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: Cisco NX-OS Software Cisco Fabric Services over IP Denial of Service Vulnerability |
2.2(8m) |
CSCvn52167 |
CVE-2019-1965 |
A vulnerability in the Virtual Shell (VSH) session management for Cisco NX-OS Software could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in into the device via the remote management connection. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: Cisco NX-OS Software Remote Management Memory Leak Denial of Service Vulnerability |
2.2(8l) |
CSCvm02934 |
CVE-2018-3615 CVE-2018-3620 CVE-2018-3646 |
Cisco UCS B-Series M2 servers and C-Series M2 servers are based on Intel® processors that are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).
This release includes BIOS revisions for Cisco UCS M2 generation servers. These BIOS revisions include the updated processor microcode that is a required part of the mitigation for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM). Operating System and Hypervisor patches from the appropriate vendors may also be required to mitigate these vulnerabilities. For more information, please see the Cisco Security Advisory available here: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 |
2.2(8l) |
CSCvm03356 |
CVE-2018-3615 CVE-2018-3620 CVE-2018-3646 |
Cisco UCS B-Series M3 servers and C-Series M3 servers are based on Intel® processors that are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).
This release includes BIOS revisions for Cisco UCS M3 generation servers. These BIOS revisions include the updated processor microcode that is a required part of the mitigation for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM). Operating System and Hypervisor patches from the appropriate vendors may also be required to mitigate these vulnerabilities. For more information, please see the Cisco Security Advisory available here: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 |
2.2(8l) |
CSCvm03351 |
CVE-2018-3615 CVE-2018-3620 CVE-2018-3646 |
Cisco UCS B-Series M4 servers, C-Series M4 servers, S3260 M4 storage servers, and HyperFlex M4 servers are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).
This release includes BIOS revisions for Cisco UCS M4 generation servers. These BIOS revisions include the updated processor microcode that is a required part of the mitigation for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM). Operating System and Hypervisor patches from the appropriate vendors may also be required to mitigate these vulnerabilities. For more information, please see the Cisco Security Advisory available here: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 |
2.2(8l) |
CSCvj54847 CSCvj54187 |
CVE-2018-3639 CVE-2018-3640 |
Cisco UCS M4 servers and Hyperflex M4 servers are based on Intel® processors that are vulnerable to variants of an exploit that uses CPU speculative processing and data cache timing to efficiently leak information, known as Spectre. CVE-2018-3639 (Spectre/Variant #4) and CVE-2018-3640 (Spectre/Variant #3a) are addressed by applying the updated processor microcode from Intel included in the server firmware bundle, and the relevant Operating System and Hypervisor patches from the appropriate vendors. This release includes BIOS revisions for Cisco UCS M4 and Hyperflex M4 generation servers. These BIOS revisions include the updated processor microcode that is a required part of the mitigation for CVE-2018-3639 (Spectre/Variant #4) and CVE-2018-3640 (Spectre/Variant #3a). For more information, see the Cisco Software Advisory at: CPU Side-Channel Information Disclosure Vulnerabilities: May 2018 |
2.2(8l) |
CSCvj54880 |
CVE-2018-3639 CVE-2018-3640 |
Cisco UCS M3 servers are based on Intel® processors that are vulnerable to variants of an exploit that uses CPU speculative processing and data cache timing to efficiently leak information, known as Spectre. CVE-2018-3639 (Spectre/Variant #4) and CVE-2018-3640 (Spectre/Variant #3a) are addressed by applying the updated processor microcode from Intel included in the server firmware bundle, and the relevant Operating System and Hypervisor patches from the appropriate vendors. This release includes BIOS revisions for Cisco UCS M3 generation servers. These BIOS revisions include the updated processor microcode that is a required part of the mitigation for CVE-2018-3639 (Spectre/Variant #4) and CVE-2018-3640 (Spectre/Variant #3a). For more information, see the Cisco Software Advisory at: CPU Side-Channel Information Disclosure Vulnerabilities: May 2018 |
2.2(8l) |
CSCvj59299 CSCvj59301 |
CVE-2018-3639 CVE-2018-3640 |
Cisco UCS M2 servers that are based on Intel® EP and EX Series processors are vulnerable to variants of an exploit that uses CPU speculative processing and data cache timing to efficiently leak information, known as Spectre. CVE-2018-3639 (Spectre/Variant #4) and CVE-2018-3640 (Spectre/Variant #3a) are addressed by applying the updated processor microcode from Intel included in the server firmware bundle, and the relevant Operating System and Hypervisor patches from the appropriate vendors. This release includes BIOS revisions for Cisco UCS M2 servers that are based on Intel® EP and EX Series processors. These BIOS revisions include the updated processor microcode that is a required part of the mitigation for CVE-2018-3639 (Spectre/Variant #4) and CVE-2018-3640 (Spectre/Variant #3a). For more information, see the Cisco Software Advisory at: CPU Side-Channel Information Disclosure Vulnerabilities: May 2018 |
2.2(8l) |
CSCvb86743 |
CVE-2018-0302 |
A vulnerability in the CLI parser of Cisco FXOS Software and Cisco Unified Computing (UCS) Fabric Interconnect Software could allow an authenticated, local attacker to cause a buffer overflow on an affected device. The vulnerability is due to incorrect input validation in the CLI parser subsystem. An attacker could exploit this vulnerability by exceeding the expected length of user input. A successful exploit could allow the attacker to execute arbitrary code with root privileges on the affected system. There are no workarounds that address this vulnerability. Cisco has released software updates that address this vulnerability. For more information, see the Cisco Security Advisory, which is available at the following link: Cisco FXOS Software and UCS Fabric Interconnect Arbitrary Code Execution Vulnerability |
2.2(8j) |
CSCvh51224 CSCvg97965 CSCvg98015 CSCvg97979 CSCvh31576 |
CVE-2017-5715 CVE-2017-5753 CVE-2017-5754 |
Cisco UCS and Hyperflex servers are based on Intel processors that are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as Spectre and Meltdown.
This release includes BIOS revisions for Cisco UCS M2, M3, and M4 generation servers. These BIOS revisions include the updated microcode that is a required part of the mitigation for CVE-2017-5715 (Spectre/Variant 2). For more information, see the Cisco Security Advisory at https://tools.cisco.com/security/center/content/ |
2.2(8i) |
CSCvb61637 CSCvb86764 CSCvb86775 CSCvb86797 CSCvb86816 |
CVE-2017-6600 CVE-2017-6601 CVE-2017-6602 CVE-2017-6598 CVE-2017-6597 |
A vulnerability in the CLI of the Cisco Unified Computing System Manager could allow an authenticated, local attacker to perform a command injection attack. The security vulnerabilities are addressed. |
2.2(8i) |
CSCvc37931 |
CVE-2017-6604 |
The following Cisco UCS Manager and Cisco Integrated Management Controller versions may be affected by the redirection vulnerabilities: For Unified Computing System (UCS) B-Series M3 and M4 Blade Servers, this affects any of the 2.2(8) and 3.1(2) blade bundle versions. None of the 3.0 or 3.1(1) blade bundle versions are affected. For Unified Computing System (UCS) C-Series M3 and M4 Rack Servers, this affects 3.0(1c) CIMC versions. None of the 1.5 or 2.0 CIMC versions are affected. |
2.2(8i) |
CSCuz52483 |
CVE-2016-2105 CVE-2016-2106 CVE-2016-2107 CVE-2016-2108 CVE-2016-2109 |
Cisco UCS Manager may be affected by the following vulnerabilities:
Cisco UCS Manager is not affected by the following vulnerability:
|
2.2(8i) |
CSCuu83383 |
CVE-2015-1788 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 CVE-2014-8176 |
The OpenSSL vulnerabilities with Cisco UCS Manager identified by the Common Vulnerability and Exposures (CVE) IDs listed are fixed. |
2.2(8i) |
CSCvc94686 CSCvc96103 |
CVE-2017-3731 |
The OpenSSL vulnerabilities with Cisco UCS Manager identified by the Common Vulnerability and Exposures (CVE) IDs listed are fixed. Cisco UCS Manager 2.2 may be affected by the following vulnerability:
Cisco UCS Manager is not affected by the following vulnerabilities:
|
2.2(8i) |
CSCvb48577 CSCvb48644 |
CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 CVE-2016-2183 CVE-2015-4000 CVE-2016-6303 CVE-2016-6302 CVE-2016-6304 CVE-2016-6305 CVE-2016-6306 CVE-2016-6307 CVE-2016-6308 CVE-2016-6309 CVE-2016-7052 |
The latest CiscoSSL 6.1.188-fips (corresponding to OpenSSL 1.0.2k, and detailed in CSCvc94686) now automatically fixes the OpenSSL vulnerabilities identified by one or more of the Common Vulnerability and Exposures (CVE) IDs listed. |
2.2(8i) |
CSCux41398 |
CVE-2015-3194 CVE-2015-3195 |
The OpenSSL vulnerabilities with Cisco UCS Manager identified by the Common Vulnerability and Exposures (CVE) IDs listed are fixed. Cisco Unified Computing System B-Series (Blade) Servers are affected by:
Cisco Unified Computing System B-Series (Blade) Servers are not affected by:
|
2.2(8i) |
CSCvc88543 |
|
The following CVEs do not apply to Cisco UCS Manager 2.2(8) because the relevant modules are not compiled as part of the Apache HTTP server used in Cisco UCS Manager:
CVE-2016-8743 is only applicable when backend servers are used. This does not affect Cisco UCS Manager Release 2.2(8). |
2.2(8i) |
CSCvf27392 |
|
The Apache vulnerabilities with Cisco UCS Manager identified by the Common Vulnerability and Exposures (CVE) IDs listed are fixed. |
2.2(8i) |
CSCvd72179 |
|
Cisco UCS Manager included a version of NTPd that was affected by the vulnerability identified by one or more of the following Common Vulnerability and Exposures (CVE) IDs. These CVE IDs no longer impact any Cisco UCS Manager release:
Cisco UCS Manager is not affected by the following CVE IDs:
|
2.2(8a)A |
CSCvf35705 |
CVE-2017-9788 CVE-2017-9789 |
The vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs listed are applicable only when mod_http2 and mod_auth_digest modules are used in the Apache server. The Apache server used by Cisco UCS Manager does not use mod_http2 and mod_auth_digest modules. Hence, the vulnerabilities identified by both CVE IDs listed do not impact any Cisco UCS Manager release. |
2.2(3l)A |
CSCvb85544 |
CVE-2016-5195 |
The security vulnerability is addressed. |
2.2(8c)A |
CSCuz91263 |
CVE-2016-6402 |
The security vulnerability is addressed. |
2.2(8a)A |
CSCuz92668 |
CVE-2016-4957 CVE-2016-4953 CVE-2016-4954 CVE-2016-4955 CVE-2016-4956 |
The security vulnerabilities are addressed. |
2.2(3e)A |
CSCus69458 |
CVE-2015-0235 |
The heap-based buffer overflow vulnerability in the GNU C library is addressed. |
2.2(3d)A |
CSCur29264 |
CVE-2014-3566 |
The security vulnerability is addressed. |
2.2(3b)A |
CSCur01379 |
CVE-2014-7169 CVE-2014-6271 CVE-2014-6277 CVE-2014-7186 CVE-2014-7187 CVE-2014-6278 |
The security vulnerabilities are addressed. |
2.2(6c)B |
CSCuq77241 |
CVE-2015-4265 |
The security vulnerability is addressed. |
2.2(7b) |
CSCut46044 |
CVE-2015-0286 CVE-2015-0287 CVE-2015-0289 CVE-2015-0292 CVE-2015-0293 CVE-2015-0209 CVE-2015-0288 |
The security vulnerabilities are addressed. |
2.2(7c) |
CSCux95107 |
CVE-2015-7973 CVE-2015-7974 CVE-2015-7975 CVE-2015-7976 CVE-2015-7977 CVE-2015-7978 CVE-2015-7979 CVE-2015-8138 CVE-2015-8139 CVE-2015-8140 CVE-2015-8158 |
The security vulnerabilities are addressed. |
Resolved Caveats
The resolved bugs for a release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains up-to-date information about bugs and vulnerabilities in this product and other Cisco hardware and software products.
Note |
You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, you can register for an account. |
For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.
Resolved Caveats in Release 2.2(8m)
The following caveats are resolved in Release 2.2(8m):
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
||
---|---|---|---|---|---|
CSCvk71319 |
The VIM process core causes Fabric Interconnect reboot. This issue has been resolved. |
2.2(8l)A 3.2(3g)A |
2.2(8m)A 3.2(3h)A |
||
CSCvk63036 |
Unable to form a SAN port-channel between a Cisco UCS Fabric Interconnect pair and a Cisco Fibre Channel switch, where the Organizationally Unique ID (OUI) of the switch is one of the following:
This issue has been resolved. |
2.2(3k)A 3.2(3d)A 4.0(2a)A |
2.2(8m)A 3.2(3i)A 4.0(2b)A |
||
CSCvf03280 |
When Cisco Fabric Services (CFS) distribution is enabled on UCS 6200 Series Fabric Interconnects, the Fabric Interconnect may reload due to a CFS process crash. This issue has been resolved. |
2.2(8g)A |
2.2(8m)A |
||
CSCvg75477 |
After upgrading to Java 10, the Java GUI for Cisco UCS Manager could not be launched. This issue has been resolved, and the Java GUI for Cisco UCS Manager can now be launched using Java 10.
|
2.2(8i)A |
2.2(8m)A |
Resolved Caveats in Release 2.2(8l)
The following caveats are resolved in Release 2.2(8l):
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCvi98058 |
New OS installation in UEFI mode and BIOS version 2.2.6f.0 no longer fails. |
3.1(3h)B |
2.2(8l)B 3.1(3j)B |
CSCvg64592 |
Rack servers integrated with 6200 Series FI have connectivity after reboot of the subordinate FI, if the VLAN range (expressed as a string of characters) applied on a port-profile exceeds 255 characters. |
3.1(3c)A |
2.2(8l)A 3.1(3j)A 3.2(3a)A |
Resolved Caveats in Release 2.2(8j)
The following caveats are resolved in Release 2.2(8j)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCvh22485 |
In a VMFEX setup with PVLAN host configurations on the Veths, after vMotion or VM migration, VMs were unable to receive broadcast or multicast packets, including ARP packets. This issue has been resolved. |
2.2(8g)A |
2.2(8j) |
Resolved Caveats in Release 2.2(8i)
The following caveats are resolved in Release 2.2(8i).
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCvg44307 |
Communication between two end hosts no longer fails within the same VLAN and fabric interconnect. |
2.2(4b)A |
2.2(8i)A |
CSCux49157 |
UCS Manager now has a user configurable option to select the TLS version. |
2.2(6d)A |
2.2(8i)A |
CSCuz98957 |
UCS Manager no longer incorrectly reports the amount of drive slots on B200-M2 blade servers. |
2.2(7b)A |
2.2(8i)A |
CSCva31113 |
After a fabric interconnect reboot, the fabric interconnect may not fully boot and become network accessible. The Serial Console connection to the fabric interconnect may show a 'loader' prompt or show initial configuration prompts. |
2.2(3d)A |
2.2(8i)A |
CSCvb00303 |
During a Server discovery, Rack servers no longer get stuck and may not discover due to a lost connection status from the B side while only A side is appearing. This may occur after upgrading to 2.2(8b) and performing an Erase Samdb operation and then enabling all required server ports to bring the server up. |
2.2(8b)A |
2.2(8i)A |
CSCvc58789 |
A port no longer shows a disabled error after 10 consecutive DFE tuning failures. |
2.2(8c)A |
2.2(8i)A |
CSCvc92275 |
A kernel panic no longer occurs on the fabric interconnect which could cause a reboot. The following command:
Shows that the panic may occur in the process usd_mts_kthread. The call trace can be reviewed for a full match to this defect. |
2.2(6e)A |
2.2(8i)A |
CSCvd02546 |
During a UCS Manager upgrade from 2.2(3l) to 3.1(2) only the secondary fabric interconnect may be upgraded. |
2.2(1b)A |
2.2(8i)A |
CSCvd54116 |
Setting a custom cipher suite for UCS Manager HTTPS to remove the usage of TLS v1.0 and 1.1, no longer results in a "handshake failure" error message when attempting to open a Java login to UCS Manager or a KVM session to a blade server. |
2.2(8c)A |
2.2(8i)A |
CSCve19522 |
UCS domains running version 3.1(3a) no longer moves to a state of lost visibility after a certificate is regenerated on UCS Central and is able to recover. In some cases, the UCS 3.1(3a) domain registration may also get stuck in a registering state. |
2.2(8g)A |
2.2(8i)A |
CSCvg06830 |
After adding a secondary fabric interconnect to a standalone setup and converting it to clustered setup, the VLAN 1 may not be added to the uplink port-channel, and no longer causes the vEth on the B side to fail pinning and render the subordinate fabric interconnect unusable. |
2.2(6c)A |
2.2(8i)A |
CSCvc88543 |
Cisco UCS Manager includes a version of the Apache HTTP Server software that no longer affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
|
2.2(6c)A |
2.2(8i)A |
CSCuu83383 CSCvb48644 |
UCS Manager includes a version of OpenSSL that is no longer affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:
|
1.1(1j)A |
2.2(8i)A |
CSCux41398 |
UCS Manager includes a version of OpenSSL that is no longer affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:
|
2.2(3a)B |
2.2(8i)B |
CSCuz52483 |
UCS Manager includes a version of OpenSSL that is no longer affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:
|
2.2(8a)A |
2.2(8i)A |
CSCvb48577 |
UCS Manager includes a version of OpenSSL that is no longer affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2016-6304 CVE-2016-6305 CVE-2016-2183 CVE-2016-6303 CVE-2016-6302 CVE-2016-2182 CVE-2016-2180 CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2181 CVE-2016-6306 CVE-2016-6307 CVE-2016-6308 CVE-2016-6309 CVE-2016-7052 And disclosed in https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl |
2.2(8g)B |
2.2(8i)B |
CSCvc94686 |
UCS Manager includes a version of OpenSSL that is no longer affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:
This product is not affected by the following vulnerabilities:
|
2.2(8g)A |
2.2(8i)A |
CSCvc96103 |
UCS Manager includes a version of OpenSSL that is no longer affected by the vulnerability identified by one or more of the following Common Vulnerability and Exposures (CVE) IDs:
And disclosed in https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170130-openssl |
2.2(8g)A |
2.2(8i)A |
CSCvb61637 |
A vulnerability in the CLI of the Cisco Unified Computing System Manager could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation for the affected command. An authenticated local attacker could exploit this vulnerability by injecting crafted command arguments into a redirect of a vulnerable CLI command. An exploit could allow the attacker to execute arbitrary system commands with the privileges of the authenticated user. UCS Manager is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2017-6600 |
2.2(8g)A |
2.2(8i)A |
CSCvb86764 |
A vulnerability in the CLI of the Cisco UCS Manager could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. UCS Manager is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2017-6601 |
2.2(8g)A |
2.2(8i)A |
CSCvb86775 |
A vulnerability in CLI of the Cisco Unified Computing System Manager could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside the expected path and gain access to other devices. The vulnerability is identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE ID CVE-2017-6602 |
2.2(8g)A |
2.2(8i)A |
CSCvb86797 |
A vulnerability in the debug plugin functionality of the Cisco Unified Computing System Manager could allow an authenticated, local attacker to execute arbitrary commands. The vulnerability is due to inadequate integrity checks for the debug plugin. An attacker could exploit this vulnerability by crafting a debug plugin and load it using elevated privileges. An exploit could allow the attacker to run malicious code that would allow for the execution of arbitrary commands as root. The vulnerability is identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE ID CVE-2017-6598 |
2.2(8g)A |
2.2(8i)A |
CSCvb86816 |
A vulnerability in local-mgmt CLI of the Cisco Unified Computing System Manager could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation for the affected command. An authenticated local attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to execute arbitrary system commands with the privileges of the authenticated user. The vulnerability is identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE ID CVE-2017-6597 |
2.2(8g)A |
2.2(8i)A |
CSCvc37931 |
Unvalidated redirects and forwards may be possible when UCS Manager accepts untrusted input that could cause it to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Unvalidated redirect and forward attacks can also be used to maliciously craft a URL that would pass the applications access control check and then forward the attacker to privileged functions that they would normally not be able to access. The vulnerability is identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE ID CVE-2017-6604 |
2.2(8g)A |
2.2(8i)A |
Resolved Caveats in Release 2.2(8g)
The following caveats are resolved in Release 2.2(8g)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCva14937 |
M4 blades installed with SD cards instead of a hard disk no longer halt at 'Local Drive' for automated deployments with the following boot policy: Boot Policy
|
2.2(3f)B |
2.2(8g)B |
CSCvb85331 |
The following fault no longer occurs after a UCS Manager software upgrade. Code: F1781 Description: Management database version mismatch detected failover may not complete Affected Object: sys/mgmt-entity-B Name: Mgmt Entity Mgmt Db Version Mismatch Cause: Replication Failure Type: Management |
2.2(8c)A |
2.2(8g)A |
CSCvc39322 |
For B260 M4 Blades, BIOS v3.1.2.2 no longer intermittently fails Windows HLK and HCK Trusted Platform Module (TPM) tests on Windows Server 2016 and Windows Server 2012 R2. |
2.2(7b)B |
2.2(8g)B |
CSCvc10791 |
A DME process no longer crashes when the dynamic vNIC and static vNIC contain a different adminVcon property value. |
2.2(3e)A |
2.2(8g)A |
CSCvc89242 |
The Fabric Interconnect no longer reboots due to a CDP process crash. |
2.2(6e)A |
2.2(8g)A |
CSCvc46313 |
The remote operation of making the LUN online from UCS Central no longer fails with the error message: Global Service profile [org-root/org-GKDC/org-<name>/ls-SP_3260_03] can not be modified from UCS domain. Please make the changes
from UCS Central that you are registered with. |
2.2(4b)A |
2.2(8g)A |
CSCvc60876 |
The 6248, 6296, and 6332 Series Fabric Interconnects no longer sends Smart Call Home messages in the wrong format. |
2.2(8b)A |
2.2(8g)A |
CSCvc31867 |
When upgrading the SSD to firmware 32F3Q, the firmware is no longer truncated and written as 2F3Q, which may cause a second request for the reboot of the server. |
2.2(8a)A |
2.2(8g)A |
CSCux96072 |
During heavy I/O traffic, the Cisco 12G Modular RAID controller no longer goes offline with the Storage Controller SLOT HBA inoperable error logged in CIMC event logs. |
2.2(6e)C |
2.2(8g)C |
CSCvc48423 |
Downloading a bundle more than 1GB in size from a local desktop no longer fails. |
2.1(1a)A |
2.2(8g)A |
Resolved Caveats in Release 2.2(8f)
The following caveats are resolved in Release 2.2 (8f)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuy81688 |
From Cisco UCS Manager tech-support, running /var/sysmgr/sam_logs/httpd_cimc.log on the affected fabric interconnect no longer shows the exceeded max time without restart error. From Cisco UCS Manager tech-support, running /ls_l.out on the affected fabric interconnect no longer shows the existence of a 'cimcrestart' file under /isan/apache/conf/. The modified date is now updated. |
2.2(8a)A |
2.2(8f)A |
CSCuz53730 |
UCSM httpd process no longer experiences high memory usage or crash with a core file showing indications of memory allocation failure. |
2.2(2c)A |
2.2(8f)A |
CSCva35757 |
Latency between the UCS Manager Client and fabric interconnect no longer causes the firmware page to load slowly. |
2.2(7b)A |
2.2(8f)A |
CSCvb11667 |
Server with UEFI BIOS enabled, no longer fails to SAN boot from a target LUN with an ID other than 0 and using T10 DIF protection. |
2.2(8d)B |
2.2(8f)B |
CSCvb16804 |
Booting from SAN to 4K UEFI target no longer fails. |
2.2(8a)B |
2.2(8f)B |
CSCvb08928 |
A fabric interconnect no longer reboots on VLAN deletion due to a FWM hap reset. |
2.2(5a)A |
2.2(8f)A |
CSCvb78971 |
When attempting the auto-install of UCS Manager, the fabric interconnect upgrade no longer fails when the /var/tmp usage exceeds 10%. |
2.2(3k)A |
2.2(8f)A |
CSCvb82862 |
EUI-64 bit addresses are now valid for storage connection policies or SAN boot targets. |
2.2(8d)A |
2.2(8f)A |
CSCvb95978 |
On C460 M4 servers, TPM version 1.2 no longer fails to initialize after installing ESXi OS, and enabling and activating TPM and TXT. |
2.2(8d)B |
2.2(8f)B |
CSCvc17769 |
The fabric interconnect no longer crashes when the bound interface of a Veth is in the Not Initialized State during a VLAN configuration change. |
2.2(7c)A |
2.2(8f)A |
Resolved Caveats in Release 2.2 (8d)
The following caveats are resolved in Release 2.2 (8d)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCvb05762 |
UCS Manager GUI and CLI no longer fail to respond when the Data Management Engine (DME) hangs with a WaitOnLimit log message. |
2.2(7b)A |
2.2(8d)A |
Resolved Caveats in Release 2.2 (8d)T
The following caveats are resolved in Release 2.2 (8d)T
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCva53726 |
UCS Manager no longer allows the downgrade of firmware for the following rack servers installed with v4 CPU models to a version less than the minimum required version of CIMC / BIOS firmware:
After a downgrade, servers no longer fail the BIOS post. |
2.2(7c)T |
2.2(8d)T |
Resolved Caveats in Release 2.2 (8c)
The following caveats are resolved in Release 2.2 (8c)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuu29425 |
In RHEL 7.0 and 7.1 the ENIC driver now properly handles packets received on the native VLAN. |
2.2(4b)B |
2.2(8c)B |
CSCuw50361 |
While collecting IOM tech-support by using the show platform software satctrl global output from the IOM, the HIF/NIF interfaces of an IOM no longer flap due to SDP heartbeat timeout. |
2.2(4b)A |
2.2(8c)A |
CSCux11611 |
Seagate hard drives left spinning idle without an operating system installed or setup with the JBOD configuration without read or write activity are no longer prone to failure. Impacted hard drives are listed here:
|
2.2(7c)B |
2.2(8c)B |
CSCuy79306 |
When Cisco UCS C-Series servers with VIC 1225 or VIC 1227 are directly connected to Cisco Nexus 9000 switches, after making a large change on a switch, ports no longer flap or show as down on the switch but up on the server. |
2.2(3f)B |
2.2(8c)B |
CSCuz41121 |
When booting to RHEL or running system stress tests, Cisco UCS B420 M4 servers with certain Intel ® E5 v3 CPUs no longer report QPI Correctable System Event Logs with the following error message: Link Layer CRC successful reset with no degradation |
2.2(8a)B |
2.2(8c)B |
CSCuz91263 |
A vulnerability in the command-line interface (CLI) of the Cisco UCS Manager and UCS 6200 Series Fabric Interconnects is resolved. |
2.2(1a)A |
2.2(8c)A |
CSCuz96855 |
UCS M71KR cards no longer crashes with the error “E4194871”. |
2.2(6e)B |
2.2(8c)B |
CSCva27558 |
In scenarios such as traffic loops in external networks, a series of MAC add or delete operations no longer causes the MAC address to display in the software table, and nor in the hardware table for all the ASICs. |
2.2(5c)A |
2.2(8c)A |
CSCva34343 |
UCS Manager no longer reports false alerts due to P0V75_STBY sensor in Cisco B200 and M4 Blade Servers. |
2.2(6e)B |
2.2(8c)B |
CSCva38476 |
An infrastructure software upgrade to UCS Manager 2.2(7b) or higher no longer fails when both fabric interconnects are incompatible or when one of the fabric interconnects is unresponsive. |
2.2(7b)A |
2.2(8c)A |
CSCva71801 |
UCS Manager no longer fails to synchronize with IPv6 NTP server. |
2.2(8a)A |
2.2(8c)A |
CSCva96740 |
Changes in adapter policy from UCS Manager now triggers a server redeploy. |
2.2(8b)A |
2.2(8c)A |
CSCvb35827 |
Upgrade failure no longer occurs when a Cisco UCS system is configured with more than 128 LDAP groups and upgrade is performed either from Cisco UCS Manager Release 2.2.8 to Cisco UCS Manager Release 3.1(2b) or from Cisco UCS Manager Release 3.1(2b) to a later release. |
2.2(8a)A |
2.2(8c)A |
Resolved Caveats in Release 2.2 (8b)
The following caveats are resolved in Release 2.2 (8b)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuu40978 |
The syslog is now truncated after it reaches the configured maximum size. It no longer fills up the Fabric Interconnect file system. |
2.2(3d)A |
2.2(8b)A |
CSCuz54661 |
Cisco B200 M3 Server no longer fails to post if NUMA is disabled. |
2.2(6g)B |
2.2(8b)B |
CSCuz86450 |
The server no longer reboots because the system does not accept user input on the order property of adaptorHostIf. |
1.4(1j)A |
2.2(8b)A |
CSCva08256 |
Cisco CIMC and BIOS no longer get stuck updating or activating with the host firmware pack when the new host firmware pack has the same name and version as the system being updated. |
2.2(7b)A |
2.2(8b)A |
CSCva34426 |
Cisco UCS 3X60 Server no longer fails to boot from LSI RAID controller managed disk slots 1 or 2, when the disks are in JBOD mode. |
2.2(7c)A |
2.2(8b)A |
CSCva36835 |
A board controller update now ensures proper functionality of the LSI controller during a warm reboot or reset signal when using the Cisco B460 M4 or B260 M4 blade servers. |
2.2(8a)B |
2.2(8b)B |
CSCva54957 |
A reboot is no longer triggered without a “user -ack” when modifying a service profile that requires a reboot while shallow association is failing. |
2.1(3a)A |
2.2(8b)A |
CSCva67159 |
Cisco UCS Manager httpd no longer fails to start when the default keyring was deleted. |
2.2(8a)A |
2.2(8b)A |
CSCva72096 |
Cisco UCS servers running Intel E5 Xeon v4 CPUs no longer crash with a signature pointing to internal parity errors, page fault, general detect, or undefined opcode exceptions. |
2.2(4b)B |
2.2(8b)B |
CSCva87230 |
A temporary loss in server connectivity no longer occurs when performing a Cisco UCS Manager upgrade to release 2.2(8a) from a build that does not contain the fix for CSCuq57142. |
2.2(8a)A |
2.2(8b)A |
Resolved Caveats in Release 2.2 (8a)
The following caveats are resolved in Release 2.2 (8a)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuv13019 |
When the desired power state of a service profile was set to Power ON, and Cisco UCS Manager triggered shallow discovery for the blade server, server shutdown from the OS was powered ON by Cisco UCS Manager. This issue is now resolved. |
2.1(1f)B |
2.2(8a)B |
CSCuv31912 |
UCS Manager iptables are no longer duplicating rules in the FORWARD table. |
2.2(3d)A |
2.2(8a)A |
CSCuw16950 |
FSM failures no longer trigger the addition of duplicate entries in IP tables. |
2.2(3b)A |
2.2(8a)A |
CSCux59912 |
A Cisco UCS system with servers connected to a Cisco Nexus 2232 FEX no longer experiences bladeAG cores. |
2.2(5c)C |
2.2(8a)C |
CSCux63909 |
FC abort is no longer observed while running uplink port flap test on uplink Ethernet port-channel from an FI to a Cisco Nexus 7000 switch. |
2.0(2m)B |
2.2(8a)B |
CSCuy98678 |
Cisco UCS 6296 fabric interconnect no longer crashes unexpectedly with kernel panic, and impact any devices connected the fabric interconnect. |
2.2(6c)A |
2.2(8a)A |
CSCuz92668 |
Vulnerabilities affecting various versions of NTPd are now resolved. |
2.2(1a)A |
2.2(8a)A |
CSCva04106 |
Removing a SAN port channel member no longer causes SAN ports to go down. |
2.2(3d)A |
2.2(8a)A |
Resolved Caveats in Release 2.2 (7e)
The following caveats are resolved in Release 2.2 (7e)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCva72096 |
Cisco UCS servers running Intel E5 Xeon v4 CPUs no longer crash with a signature pointing to internal parity errors, page fault, general detect, or undefined opcode exceptions. |
2.2(4b)B |
2.2(7e)B |
Resolved Caveats in Release 2.2(7d)
The following caveats are resolved in Release 2.2(7d)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuz69100 |
Disk Firmware update no longer fails for local disks on a C240 rack server that has an UCSC-SAS12GHBA storage controller. |
2.2(7b)A |
2.2(7d)A |
CSCuz86450 |
The server no longer reboots because the system does not accept user input on the order property of adaptorHostIf. |
1.4(1j)A |
2.2(7d)A |
CSCuz65286 |
Cisco UCS Manager firmware upgrade failed with the following message UCSM upgrade validation failed when the default value for IO throttle count in the FC adapter policy had a value of 16. This issue is resolved. The default IO throttle count is now set to 256. |
2.2(3a)A |
2.2(7d)A |
CSCuv45574 |
After downgrading the controller firmware on C220/C240 M3 systems with LSI 9271-8i controller, the GUID of virtual disks no longer change and the virtual machines running on the ESXi OS no longer become inaccessible. |
2.2(6f)A |
2.2(7d)A |
CSCux53224 |
A fatal error may be observed when creating or removing virtual drives with RAID 5 and RAID 6 controller combinations. This issue is now resolved. |
2.2(7c)C |
2.2(7d)C |
CSCva01733 |
PXE in Legacy Boot mode no longer hangs with excessive unicast or multicast high background traffic with a packet size larger than MTU directed to the client server. This was seen with ESXi Autodeploy on a specific setup which likely had unusually high multicast traffic directed at the client server. This traffic was not from the PXE server for file transfer, but from some other source. |
2.2(6e)B |
2.2(7d)B |
CSCva29365 |
Enabling stateless offloads for NVGRE in the following 3rd generation Cisco VIC adapters' configuration with UCSM/CIMC no longer leads to inaccessible vNIC interfaces in the host OS:
|
2.2(7b)B |
2.2(7d)B |
CSCuu40291 |
When debug logging is enabled, Cisco UCS Manager tech-support showed that syslogd_debug files were present, but the show debug logfile syslogd_debugs CLI command failed with the following error: Logfile(syslogd_debugs) does not exist This issue is now resolved. |
2.2(3a)A |
2.2(7d)A |
CSCuu40978 |
The Fabric Interconnect file system previously generated too many syslog messages and prevented further logging. This issue is now resolved. |
2.2(3d)A |
2.2(7d)A |
CSCuz20650 |
When syslog messages are generated continuously, the syslog suspend timer does not recover. Thus, no events are sent to the remote syslog server. This issue is now resolved. |
2.2(3a)A |
2.2(7d)A |
Resolved Caveats in Release 2.2 (7c)
The following caveats are resolved in Release 2.2 (7c)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCul97240 |
When a UCS rack server is present in a UCS setup, DHCP renewal now triggers Information level syslog messages to be sent to the syslog server configured on Cisco UCS Manager. |
2.2(1a)A |
2.2(7c)A |
CSCuq57142 |
In a port channel universe, the following no longer happen:
|
2.2(3a)A |
2.2(7c)A |
CSCuq74472 |
Unnecessary thermal events on IOM stating “Thermal sensor reading not available” are no longer seen. |
2.1(3c)B |
2.2(7c)B |
CSCux58865 |
DIMM temperature readings are no longer missed when CPUs are in a low power (or “sleep”) mode. |
2.1(3d)B |
2.2(7c)B |
CSCuy01645 |
DIMM temperature readings are no longer not available when more than 16 degrees Centigrade different than the previous reading. |
2.2(5b)B |
2.2(7c)B |
CSCux63909 |
FC abort is no longer observed while running an uplink port flap test on an uplink Ethernet port-channel from an FI to a Cisco Nexus 7000 switch. |
2.0(2m)B |
2.2(7c)B |
CSCuy34161 |
Any DIMM that is functioning correctly is no longer disabled after the reboot of the UCS B250 M2 blade server. |
2.0(5c)B |
2.2(7c)B |
CSCuy62783 |
In a UCS setup with a VIC13xx adapter on blade servers or rack-mount servers, the server or VIC adapter no longer becomes unresponsive after running IO across network file systems. |
2.2(3a)B |
2.2(7c)B |
CSCuy64856 |
The Cisco UCS fabric interconnects (FI) are no longer rebooted with the reboot reason FWM hap reset. |
2.1(3h)A |
2.2(7c)A |
CSCuy93451 |
VLANs are now deleted from the vNICs if they are deleted from the updating vNIC template. |
2.2(7b)A |
2.2(7c)A |
CSCuz69373 |
CATERR faults due to cpu lockup in VIC 1340 no longer occur. |
2.2(7b)B |
2.2(7c)B |
Resolved Caveats in Release 2.2 (7b)
The following caveats are resolved in Release 2.2 (7b)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuz74973 |
When you use a B200 M4 server with a UCSB-MRAID12G SAS RAID controller and a CPLD firmware version earlier than version 05D, the B200 M4 server no longer powers off unexpectedly. |
2.2(3b)B |
2.2(7b)B |
CSCun07367 |
Under normal state of operation, the statsAG process used to crash and restart on the Fabric Interconnect. This was also observed in the Cisco UCS Mini firmware. This issue has been resolved. |
2.1(3a)A |
2.2(7b)A 3.1(1e)A 3.1(2b)A |
CSCud75506 |
The UUID display on ESXi 5.1 is now consistent with the UUID display on UCSM when upgrading ESXi to version 5.1 on UCS B200 M3, B22 M3 and B420 M3 blade servers. |
2.0(2r)B |
2.2(7b)B |
CSCuv43349 |
During server discovery, Cisco UCS Blade server association or disassociation, the following failures are no longer reported:
|
2.2(6e)B |
2.2(7b)B |
CSCuw36128 |
The buffer overflow condition that caused the statsAG mts queue to leak is now fixed. |
2.2(1d)A |
2.2(7b)A |
CSCuw46478 |
The Local disk Locator LED remains OFF, although enabled in Cisco UCS Manager. |
2.2(6j)B |
2.2(7b)B |
CSCuw55142 |
Cisco UCS B420M4 server with the UCSB-MRAID12G-HE no longer reports the following critical fault: Controller 1 on server is inoperable. Reason: Device non-responsive |
2.2(6c)B |
2.2(6f)B, 2.2(7b)B |
CSCux05389 |
After upgrading to release 2.2(7b) and rebooting the subordinate fabric interconnect, occasional VSAN misconfiguration will no longer occur. |
2.2(3f)A |
2.2(7b)A |
CSCux07578 |
Cisco UCS Blade servers B400 M1 or B400 M2 running on Liberator firmware version 4.10 with SATA drives, no longer experience data consistency failures. |
2.2(6f)B |
2.2(7b)A |
CSCux21413 |
When you remove and reinsert a drive in the same slot, the Locator Storage Locator LED no longer remains on all the time. |
2.2(6j)B |
2.2(7b)A |
CSCux66675 |
After rebooting a Cisco UCS 6296UP FI, all physical interfaces will no longer connect incorrectly with the Cisco UCS C460 M4 servers. |
2.2(6c)A |
2.2(7b)A |
CSCux85580 |
Fabric Interconnect cores will no longer be seen on IGMP. |
2.2(3b)A |
2.2(7b)A |
CSCux65310 |
During blade discovery or CIMC controller reset, a chassis thermal critical fault can be generated due to the time it takes for reconnecting from the IOM to the CIMC. However, after several minutes this fault clears on its own. |
3.1(1e)B |
2.2(7b)B |
CSCut46044 |
Cisco Unified Computing Server Management Software (UCSM) includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:
This issue is now fixed. |
2.2(3a)A |
2.2(7b)A |
CSCuw19082 |
During Cisco UCS Manager initial setup, while configuring the fabric interconnect, setup will assume the GUI configuration method if a DHCP lease is obtained for the mgmt interface. In addition, an url will be provided for the setup of the fabric interconnect. |
2.2(6c)A |
2.2(7b)A |
Resolved Caveats in Release 2.2 (6j)
The following caveats are resolved in Release 2.2 (6j)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCux63909 |
FC abort is no longer observed while running an uplink port flap test on an uplink Ethernet port-channel from an FI to a Cisco Nexus 7000 switch. |
2.0(2m)B |
2.2(6j)B |
CSCva01733 |
PXE in Legacy Boot mode no longer hangs with excessive unicast or multicast high background traffic with a packet size larger than MTU directed to the client server. This was seen with ESXi Autodeploy on a specific setup which likely had unusually high multicast traffic directed at the client server. This traffic was not from the PXE server for file transfer, but from some other source. |
2.2(6e)B |
2.2(6j)B |
Resolved Caveats in Release 2.2 (6i)
The following caveats are resolved in Release 2.2 (6i)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuw36128 |
The buffer overflow condition that caused the statsAG mts queue to leak is now fixed. |
2.2(1d)A |
2.2(6i)A |
CSCuw44595 |
DIMMs with correctable ECC errors are marked Inoperable or Degraded even though correctable errors do not affect normal system operation. This issue is now resolved. |
2.2(3a)A |
2.2(6i)A |
CSCuy01645 |
DIMM temperature readings are no longer missed when the temperature is 16 degrees Centigrade more than the previous reading. |
2.2(5b)B |
2.2(6i)B |
CSCuj71400 |
Cisco UCS Manager no longer displays the “FCoE or FC uplink is down on VSAN X” fault when the member ports for the VSAN are up. |
2.2(1a)A |
2.2(6i)A |
CSCuy62783 |
In a UCS setup with a VIC13xx adapter on blade servers or rack-mount servers, the server or VIC adapter no longer becomes unresponsive after running IO across network file systems. |
2.2(3a)B |
2.2(6i)B |
CSCuy34161 |
Any DIMM that is functioning correctly is no longer disabled after the reboot of the UCS B250 M2 blade server. |
2.0(5c)B |
2.2(6i)B |
CSCux58865 |
DIMM temperature readings are no longer missed when the temperature is 10 degrees Centigrade more than the previous reading. |
2.1(3d)B |
2.2(6i)B |
CSCuu40978 |
The syslog is now truncated after it reaches the configured maximum size. It no longer fills up the Fabric Interconnect file system. |
2.2(3d)A |
2.2(6i)A |
CSCux45723 |
UCS SNMP memory leaks no longer occur when polling FC interfaces and SNMP processes (Walk/Get/Get Bulk) that parse any of the following SNMP MIBs:
|
2.2(3a)A |
2.2(6i)A |
CSCuq57142 |
In a port channel universe, the following no longer happen:
|
2.2(3a)A |
2.2(6i)A |
CSCuw02439 |
When using Cisco UCS M81KR VIC adapters on a system running Cisco UCS Manager Release 2.2(2c), the adapters no longer crash and generate core files. |
2.2(2c)B |
2.2(6i)B |
CSCux59298 |
When using UCS B200 M3 servers with VIC 1240 on a system running Cisco UCSM Release 2.2(2c), network and SAN no longer lose connectivity. |
2.2(2c)B |
2.2(6i)B |
CSCuy64856 |
The Cisco UCS fabric interconnects (FI) are no longer rebooted with the reboot reason FWM hap reset. |
2.1(3h)A |
2.2(6i)A |
CSCuz20650 |
When syslog messages are generated continuously, the syslog suspend timer does not recover. Thus, no events are sent to the remote syslog server. This issue is now resolved. |
2.2(3a)A |
2.2(6i)A |
CSCuu40291 |
When debug logging is enabled, Cisco UCS Manager tech-support showed that syslogd_debug files were present, but the show debug logfile syslogd_debugs CLI command failed with the following error: Logfile(syslogd_debugs) does not exist This issue is now resolved. |
2.2(3a)A |
2.2(6i)A |
Resolved Caveats in Release 2.2 (6g)
The following caveats are resolved in Release 2.2 (6g)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCux98751 |
Anytime a new blade is inserted into the chassis, or a blade CIMC controller reboots, a chassis thermal fault is no longer generated because of the time taken to reconnect from the IOM to the CIMC. |
2.2(6c)B |
2.2(6g)B |
CSCuv20324 |
The FCoE storage no longer becomes unavailable or performs very poorly after a reset of either host-attached switch in the case of standalone systems, or after the reset of an IOM or FI in UCS-managed systems when the IOM or FI sends configuration information to the adapter later than 5 seconds after link-up. |
2.2(1b)B |
2.2(6g)B |
CSCuv89839 |
When the fabric interconnect is in switch mode with direct attached storage, and its FC uplinks to the direct attached storage are up, these FC uplinks now allow traffic to pass. |
2.2(3f)A |
2.2(6g)A |
CSCuv97713 |
After upgrading Cisco UCS Manager, in rare cases, the IOM may core in the sysmgr process leading to IOM reboot. This is now resolved. |
2.2(3j)A |
2.2(6g)A |
CSCux68679 |
When a UCS B460 M4 server is configured with Fusion IO cards installed in same mezzanine slot of the master and slave blades, actions such as Cisco UCS Manager upgrade, cluster failover, fabric interconnect reboot no longer trigger server reboot. |
2.2(3a)A |
2.2(6g)A |
CSCux96432 |
Discovery no longer fails on UCS B420 M4 servers with a 2-CPU configuration and a Fusion IO card in adapter slot 3. |
2.2(5b)B |
2.2(6g)B |
CSCux76128 |
Firmware Auto Install upgrade validation fails as expected when upgrading to Cisco UCS Manager Release 2.2(6g) with deprecated hardware. Auto Install can now be initiated by using the force option either through the GUI or the CLI. |
2.1(3j)A |
2.2(6g)A |
Resolved Caveats in Release 2.2 (6f)
The following caveats are resolved in Release 2.2 (6f)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
||
---|---|---|---|---|---|
CSCuv46749 |
When using Cisco B200 M4 blade servers with the UCSB-MRAID12G storage controller, the following random, incorrect transient alerts or faults are no longer reported:
|
2.2(3g)B |
2.2(6f)B |
||
CSCux40478 |
When installing a Cisco B200 M3 blade server with a UCSB-MLOM-40G-01 40G VIC and either a UCSB-F-FIO-1300MP or a UCSB-F-1600MS ioMemory PCIe flash Mezzanine card, in a chassis with an N20-I6584 IOM, blade discovery no longer fails because of an “Invalid adapter-iocard combination” error. |
2.2(5b)B |
2.2(6f)B |
||
CSCux47667 |
Service profile association no longer fails if the service profile was previously associated to a different server with LUN deployed. |
2.2(6e)A |
2.2(6f)A |
||
CSCuw44524 |
The server reboot issues related to clear CMOS BIOS operation in Cisco UCS Manager Release 2.2(5a), 2.2(5b), 2.2(5c) or 2.2(6c) for E7 v2 processors on the C460 M4, B260 M4, and B460 M4 servers are resolved. |
2.2(5a)B |
2.2(6e)B |
||
CSCuw23829 |
When inserting a HDD into the final disk slot of a C240 M4 server with 8 supported slots for disks, Cisco UCS Manager no longer displays a disk in the 9th slot. |
2.2(4b)A |
2.2(6e)A |
||
CSCux10203 |
When you decommission a C-Series server after it was discovered in direct attached configuration, and the direct attached switch port was changed from Ethernet to FC mode, the following error message no longer appears: |
2.2(3h)A |
2.2(3j)A, 2.2(6e)A |
||
Warning : if_index 0x1a01a000[Ethx/x] does not exists in VLAN database#ERROR |
|||||
CSCuw84010 |
Integrated C-Series rack servers with Seagate drives no longer fail association when using the host firmware policy in a service profile. |
2.2(3h)A |
2.2(3j)A, 2.2(6e)A |
||
CSCuw59409 |
The DME crash issue that you may experience when you upgrade a directly connected C-Series rack server without decommissioning to 2.2(5c), and connect the server to FI port, is resolved. |
2.2(3h)A |
2.2(3j)A, 2.2(6e)A |
||
CSCuv55823 |
Faults no longer occur when incompatible combinations of CIMC firmware and UCS Manager firmware are installed at the same time. |
2.2(1a)A |
2.2(6e)A |
||
CSCuv32417 |
Cisco B200 M4 and B420 M4 blade servers that run on UEFI OS will not reboot unexpectedly.
|
2.2(4b)B |
2.2(6e)B |
Resolved Caveats in Release 2.2 (6e)
The following caveats are resolved in Release 2.2 (6e)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
||
---|---|---|---|---|---|
CSCuw44524 |
The server reboot issues related to clear CMOS BIOS operation in Cisco UCS Manager Release 2.2(5a), 2.2(5b), 2.2(5c) or 2.2(6c) for E7 v2 processors on the C460 M4, B260 M4, and B460 M4 servers are resolved. |
2.2(5a)B |
2.2(6e)B |
||
CSCuw23829 |
When inserting a HDD into the final disk slot of a C240 M4 server with 8 supported slots for disks, Cisco UCS Manager no longer displays a disk in the 9th slot. |
2.2(4b)A |
2.2(6e)A |
||
CSCux10203 |
When you decommission a C-Series server after it was discovered in direct attached configuration, and the direct attached switch port was changed from Ethernet to FC mode, the following error message no longer appears: |
||||
Warning : if_index 0x1a01a000[Ethx/x] does not exists in VLAN database#ERROR |
2.2(3h)A |
2.2(3j)A, 2.2(6e)A |
|||
CSCuw84010 |
Integrated C-Series rack servers with Seagate drives no longer fail association when using the host firmware policy in a service profile. |
2.2(3h)A |
2.2(3j)A, 2.2(6e)A |
||
CSCuw59409 |
The DME crash issue that you may experience when you upgrade a directly connected C-Series rack server without decommissioning to 2.2(5c), and connect the server to FI port, is resolved. |
2.2(3h)A |
2.2(3j)A, 2.2(6e)A |
||
CSCuv55823 |
Faults no longer occur when incompatible combinations of CIMC firmware and UCS Manager firmware are installed at the same time. |
2.2(1a)A |
2.2(6e)A |
||
CSCuv32417 |
Cisco B200 M4 and B420 M4 blade servers that run on UEFI OS will not reboot unexpectedly.
|
2.2(4b)B |
2.2(6e)B |
Resolved Caveats in Release 2.2 (6d)
The following caveats are resolved in Release 2.2 (6d)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuv45173 |
When you upgrade C-series server firmware for C220-M4, C240-M4 to Cisco UCS Manager 2.2(6d), you will no longer see the following critical alarm: Board controller upgraded, manual a/c power cycle required on server x. |
2.2(6d) |
2.2(6d)C |
Resolved Caveats in Release 2.2 (6c)
The following caveats are resolved in Release 2.2 (6c)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuq77241 |
Inventory scanning software such as Snow Inventory on Windows OS, CIMC, host OS or a remote KVM session no longer goes into an unresponsive state. |
2.2(2c)B |
2.2(6c)B |
CSCuw03000 |
PXE boot fails with BSOD when RoCE is enabled. |
2.2(5a)B |
2.2(6c)B |
CSCut78943 |
When making changes to vNICs or vHBAs that will be provisioned on Cisco Virtual Interface Cards (VICs) 1340 and 1380 adapters, a warning on the placement order impact appears. |
2.2(3c)A |
2.2(6c)A |
CSCuu33864 |
When upgrading to UCS Manager 2.2(6c) or later, the FI boots successfully without the possibility of causing a file system corruption on the SSD if the FI is equipped with a Unigen SSD. |
2.2(3b)A |
2.2(6c)A, 3.1(1e), 3.1(2b) |
CSCum50468 |
After upgrading the UCS Manager to version 2.2(6c) or higher, false faults for Fabric VSAN Membership Down are cleared. |
2.2(1b)A |
2.2(6c)A |
CSCut37134 |
A Cisco UCS B200 M4 server running ESXi 5.5 no longer crashes when you boot locally. |
2.2(3a)A |
2.2(6c)A |
CSCur79257 |
During an FI bootup, the RACE condition no longer causes UCS Manager configure interface vethernet 0” to switch. |
2.2(3a)A |
2.2(6c)A |
CSCup95855 |
FSM tasks are no longer stuck in the throttled state in Cisco UCS Manager during Cisco UCS C240 M3 server upgrade. |
2.2(1d)A |
2.2(3j)A, 2.2(6c)A |
CSCuv51214 |
Messages log are no longer overfilled with BMC is suspecting that palo is in the boot block. Leaving I2C bus alone messages. |
2.2(3g)B |
2.2(6c)B |
CSCuo93591 |
For a fabric interconnect in end-host mode, the MAC address table aging time no longer gets stuck at 300 regardless of the configuration. The value got stuck at 300 regardless of the configuration. This was the issue which was resolved. This value can be changed through UCSM GUI or CLI. |
2.2(1c)A |
2.2(6c)A |
CSCuu68351 |
The updated BIOS in UCS M3 B-Series Servers is compatible when running the Snow Inventory client on Windows OS, and does not hang. |
2.0(1m)B |
2.2(6c)B |
CSCut88909 |
The KVM option, Virtual Media > Activate Virtual Devices is now available. |
2.2(3b)A |
2.2(6c)A |
CSCuu55899 |
When the VLAN port-count optimization is enabled, and an uplink Ethernet is in a port channel, traffic is now able to flow to the available members in the port channel when there is a link flap on one of its members. |
2.2(3b)A |
2.2(6c)A |
CSCuq63868 |
When creating a vNIC in a LAN connectivity policy, the show configuration command no longer generates a software error. |
2.2(2a)A |
2.2(6c)A |
CSCut35123 |
After high-availability failover, chassis-seeprom local IO failures are no longer triggered. |
2.2(4b)A |
2.2(6c)A |
Resolved Caveats in Release 2.2 (5d)
The following caveats are resolved in Release 2.2 (5d)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuw50417 |
After upgrading the BIOS of Cisco UCS B200 M3 servers to Release 2.2(5d), the OS no longer displays the following error message if the OS boot time is exceptionally slow: Initializing Power Management ... Power: 2568: No supported CPU power management technology detected Intel Enhanced SpeedStep is supported but disabled in BIOS |
2.2(4b)B |
2.2(5d)B |
CSCuv20999 |
When Cisco UCS Manager is managed by Cisco UCS Central, and there is a global service profile associated with a blade server, global VLANs can now be successfully assigned to a particular uplink interface through Cisco UCS Manager (VLAN Uplink Manager > VLANs > VLAN Manager) without an error message being displayed. |
2.2(4b)A |
2.2(5d)A |
CSCuw13170 |
When auto-deploying the installation of ESX on Ivy Bridge-EX platforms, some platforms that enforce ACS violations strictly will no longer generate a non-maskable interrupt (NMI) and crash the host OS. |
2.2(5c)B |
2.2(5d)B |
Resolved Caveats in Release 2.2 (5c)
The following caveats are resolved in Release 2.2 (5c)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
||
---|---|---|---|---|---|
CSCuu89283 |
You can create LUNs with certain non-default virtual drive policy attributes, such as read-policy, write-policy, and cache-policy, which are managed through storage profiles for rack servers with a UCSC-MRAID12G storage controller. You can modify such virtual drive policy attributes for these LUNs as well without causing service profile association to fail. |
2.2(4b)A |
2.2(5c)A |
||
CSCuv00089 |
After upgrading the Fabric Interconnect (FI) to Cisco UCS Manager Release 2.2(5c), systems that have OS-based NIC teaming configured as Active-Standby no longer experience network connectivity issues.
|
2.2(4b)A |
2.2(5c)A |
||
CSCuv49345 |
When a server is discovered from only one Fabric Interconnect (FI), and the DME primary instance is the other FI, disassociation of the associated service profile no longer fails. |
2.2(1a)A |
2.2(5c)A |
||
CSCuu60867 |
Cisco UCS C240 M3 servers with dual RAID controllers can now be discovered on SimpliVity solutions with OmniStack cards. |
2.2(3f)A |
2.2(5c)A |
||
CSCuv13545 |
If Cisco UCS Manager is registered with Cisco UCS Central, and the service profile refers to a global host firmware pack policy, UCSM no longer downloads images during shallow discovery. |
2.2(4b)A |
2.2(5c)A |
||
CSCuv28540 |
When you run Cisco UCS Manager Releases between 2.2(1) and 2.2(3) with catalog version 2.2(5b)T, the VIC PCI slot ID is now populated correctly. Hence, SAN boot no longer fails on servers where the boot vHBAs are placed on a VIC.
|
2.2(4b)T |
2.2(5b)T |
||
CSCuu15250 |
Toggling the locator LED for a Fabric Interconnect in UCSM no longer fails. |
2.2(1d)A |
2.2(5c)A |
Resolved Caveats in Release 2.2 (5b)
The following caveats are resolved in Release 2.2 (5b)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuv04436 |
Cisco UCS B200 M4 servers with the following CPUs will no longer experience performance degradation:
|
2.2(4b)B |
2.2(5b)B 2.2(4c)B |
CSCuv29668 |
When using Cisco UCS 6100 Series Fabric Interconnects with Cisco UCS 2100 IOMs, blade servers with two Cisco UCS M81KR VIC adapters no longer fail discovery after updating Cisco UCS Manager to Release 2.2.(5b) and later releases. |
2.2(4b)A |
2.2(5b)A |
CSCus11782 |
After rebooting a Cisco UCS 6248UP Fabric Interconnect (FI) that is operating in the FC end-host mode, all member links of the SAN port channel come up. |
2.2(1d)A |
2.2(3j)A, 2.2(5b)A |
CSCuu35687 |
In Cisco UCS B420 M4 servers with UCSB-MRAID12G and UCSB-LSTOR-PT RAID controllers, the Fault/Locator LEDs for disks 3 and 4 are no longer swapped. |
2.2(5a)B |
2.2(5b)B |
CSCuu58282 |
In Cisco UCS B420 M4 servers with UCSB-MRAID12G and UCSB-LSTOR-PT RAID controllers, in the rare event that Online Controller Reset (OCR) is triggered during normal I/Os on JBOD drives, excessive Fast Path IO failures are no longer seen after the controller is reset. |
2.2(5a)B |
2.2(5b)B |
Resolved Caveats in Release 2.2 (5a)
The following caveats are resolved in Release 2.2 (5a)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCus03683 |
The Cisco UCS 6200 series primary and subordinate FIs no longer reboot unexpectedly due to high volume traffic impacting the management interface. |
2.2(1d)A |
2.2(5a)A, 2.2(4b)A |
CSCut54652 |
During service profile association, firmware upgrade on third-party Converged Network Adapters (CNA) no longer fails with the following error: Unable to find VNIC Device |
2.2(4b)A |
2.2(5a)A |
CSCuu37369 |
Storage profiles can now be created within a sub-organization in Cisco UCS Manager. |
2.2(4b)A |
2.2(5a)A |
CSCuu42945 |
Service profiles created from service profile templates with local storage profiles no longer fail association with server pools. |
2.2(4b)A |
2.2(5a)A |
CSCuu52001 |
In Cisco UCS C240 M3 rack mount servers with external LSI RAID controllers, service profile association no longer fails. |
2.2(4b)A |
2.2(5a)A |
CSCuu53920 |
In Cisco UCS B260 M4 and B 460 M4 servers, LUN creation and service profile association no longer fails. |
2.2(4b)A |
2.2(5a)A |
CSCuu65128 |
Continuous reboots of Cisco UCS 6200 series Fabric Interconnect are no longer observed after configuring more than 64 vNICs (excluding dynamic vNICs) on a single server. |
2.2(4b)A |
2.2(5a)A |
Resolved Caveats in Release 2.2 (4c)
The following caveats are resolved in Release 2.2 (4c)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuv04436 |
Cisco UCS B200 M4 servers with the following CPUs will no longer experience performance degradation:
|
2.2(4b)B |
2.2(4c)B |
Resolved Caveats in Release 2.2 (4b)
The following caveats are resolved in Release 2.2 (4b)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCus03683 |
The Cisco UCS 6200 series primary and subordinate FIs no longer reboot unexpectedly due to high volume traffic impacting the management interface. |
2.2(1d)A |
2.2(4b)A, 2.2(5a)A |
CSCus81832 |
Using a Cisco UCS VIC 1340 or VIC 1380 adapter with a Sandy Bridge CPU in a Cisco UCS B420 or UCS B200 M3 server no longer causes the server to hang. Red Hat Enterprise Linux 6.5 or 7.0 now installs successfully. |
2.2(3c)B |
2.2(4b)B |
CSCus18092 |
IOMs that are connected to a Fabric Interconnect no longer reboot due to a software-controlled reset. |
2.1(3e)A |
2.2(4b)A |
CSCus10255 |
The number of licenses used by ports is now displayed correctly. |
2.2(3a)A |
2.2(4b)A, 2.2(6c)A |
CSCup88161 |
Cisco UCS 6248 Fabric Interconnect crashes with no cores are no longer observed when new blade servers are being added to the environment. |
2.2 (1d)A |
2.2(4b)A |
CSCus72177 |
After changing the IP address of the KVM pool and Fabric Interconnect from one subnet to another, KVM launches successfully. |
2.2(3d)A |
2.2(4b)A |
CSCus40519 |
Changing the Fibre Channel trunking mode when the Fibre Channel port-channel is active no longer impacts the Fabric Interconnect expansion module. |
2.2(3c)A |
2.2(4b)A |
CSCur39162 |
When you run the show platform fwm info hw-stm asic num command on a Fabric Interconnect, the FWM process no longer crashes and reboots the Fabric Interconnect. |
2.0(1q)A |
2.2(4b)A |
CSCup99955 |
In a scale Cisco UCS environment, the Call Home process no longer crashes and reboots the Fabric Interconnect due to a memory leak. |
2.2(1b)A |
2.2(4b)A |
CSCut04941 |
Cisco UCS clusters scheduled for an update from Cisco UCS Central will conform to the user acknowledgment setting. |
2.2(1b)A |
2.2(4b)A |
CSCur79565 |
On a Cisco UCS B-Series server running Cisco UCS Manager Release 2.2(3b) or later versions, Netflow data is now sent to the collector. |
2.2(3b)A |
2.2(4b)A |
CSCut03052 |
IP QoS core may happen in a VM-FEX scale set up, when you reboot Fabric Interconnects back to back. |
2.2(1b)A |
2.2(4b)A |
CSCva43666 |
Whenever the chassis IOM is reset, the FI server port no longer gets into Error disable state. |
2.2(3a)A |
2.2(4b)A |
Resolved Caveats in Release 2.2 (3l)
The following caveats are resolved in Release 2.2 (3l)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuu66595 |
It is now possible to perform multiple backups to the same host. |
2.2(3f)A |
2.2(3l)A |
CSCuu99255 |
The “show fabric-interconnect inventory expand” command no longer displays the ethernet port with a role of “Unknown” instead of “Server” on a fabric interconnect with a GEM card. |
2.1(1a)A |
2.2(3l)A |
CSCuw78008 |
Web sessions no longer remain on after the Web Session Timeout period specified in the authentication option under user management in the Admin tab. |
2.1(3a)A |
2.2(3l)A |
CSCuz55693 |
When you attempt to reset memory errors using ucs-fi chassis/server # reset-all-memory-errors Cisco UCS Manager no longer generates a 'Managed object does not exist' error. |
2.2(1b)A |
2.2(3l)A |
CSCuz86450 |
The server no longer reboots because the system does not accept user input on the order property of adaptorHostIf. |
1.4(1j)A |
2.2(3l)A |
CSCvb78971 |
When attempting the auto-install of UCS Manager, the fabric interconnect upgrade no longer fails when the /var/tmp usage exceeds 10%. |
2.1(3k)A |
2.2(3l)A |
CSCvb85544 |
A race condition in the Linux kernel's memory subsystem that handled the copy-on-write (COW) of read-only memory mappings no longer occurs on fabric interconnects. This vulnerability is documented in Common Vulnerability and Exposures (CVE) CVE-2016-5195. |
2.2(1a)A |
2.2(3l)A |
Resolved Caveats in Release 2.2 (3k)
The following caveats are resolved in Release 2.2 (3k)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuv03557 |
During Cisco UCS Manager upgrade, FI activation no longer fails with the following error: Pre-Upgrade check failed. Insufficient free space in /var/tmp. Less than required 90%. |
2.1(3a)A |
2.2(3k)A |
CSCuv46749 |
When using Cisco B200 M4 blade servers with the UCSB-MRAID12G storage controller, the following random, incorrect transient alerts or faults are no longer reported:
|
2.2(3g)B |
2.2(3k)B |
CSCuv53399 |
After IOM firmware upgrade, or after an IOM reset while running effected firmware, Cisco UCS Manager will no longer show Major fault F0481 indicating the IOM encountered a POST failure. |
2.2(3a)A |
2.2(3k)A |
CSCuv89839 |
When the fabric interconnect is in switch mode with direct attached storage, and its FC uplinks to the direct attached storage are up, these FC uplinks now allow traffic to pass. |
2.2(3f)A |
2.2(3k)A |
CSCuv97713 |
After upgrading Cisco UCS Manager, in rare cases, the IOM may core in the sysmgr process leading to IOM reboot. This is now resolved. |
2.2(3j)A |
2.2(3k)A |
CSCuj71400 |
Cisco UCS Manager no longer displays the ’FCoE or FC uplink is down on VSAN X' fault when the member ports for the VSAN are up. |
2.2(1a)A |
2.2(3k)A |
CSCuo93591 |
For a fabric interconnect in end-host mode, the MAC address table aging time no longer gets stuck at 300 regardless of the configuration. The value got stuck at 300 regardless of the configuration. This issue in now resolved. This value can be changed through UCSM GUI or CLI. |
2.2(1c)A |
2.2(3k)A |
CSCus34689 |
When using Cisco UCS Manager with C-Series integration, Cisco UCSM GUI no longer displays the following message on hovering between the C-Series servers and FIs: |
2.2(1b)A |
2.2(3k)A |
CSCuw36128 |
The buffer overflow condition that caused the statsAG mts queue to leak is now fixed. |
2.2(1d)A |
2.2(3k)A |
CSCuw44595 |
DIMMs with correctable ECC errors are marked Inoperable or Degraded even though correctable errors do not affect normal system operation. This issue is now resolved. |
2.2(3a)A |
2.2(3k)A |
CSCur39162 |
When you run the show platform fwm info hw-stm asic num command on a Fabric Interconnect, the FWM process no longer crashes and reboots the Fabric Interconnect. |
2.0(1q)A |
2.2(3k)A |
CSCus59926 |
You can see the following issues with Call Home messages, although Smart Call Home registers successfully:
This issue is now resolved. |
2.2(3a)A |
2.2(3k)A |
CSCus76125 |
Global service profile now resolves the LAN ping group even when the ping group is created in Cisco UCS Manager. |
2.2(3d)A |
2.2(3k)A |
CSCuv20324 |
The FCoE storage no longer becomes unavailable or performs very poorly after a reset of either host-attached switch in the case of standalone systems, or after the reset of an IOM or FI in UCS-managed systems when the IOM or FI sends configuration information to the adapter later than 5 seconds after link-up. |
2.2(1b)B |
2.2(3k)A |
CSCux68679 |
When a UCS B460 M4 server is configured with Fusion IO cards installed in same mezzanine slot of the master and slave blades, actions such as Cisco UCS Manager upgrade, cluster failover, fabric interconnect reboot no longer trigger server reboot. |
2.2(3a)A |
2.2(3k)A |
CSCuq57142 |
In a port channel universe, the following no longer happen:
|
2.2(3a)A |
2.2(3k)A |
CSCux45723 |
UCS SNMP memory leaks no longer occur when polling FC interfaces and SNMP processes (Walk/Get/Get Bulk) that parse any of the following SNMP MIBs:
|
2.2(3a)A |
2.2(3k)A |
CSCux59298 |
When using UCS B200 M3 servers with VIC 1240 on a system running Cisco UCSM Release 2.2(2c), network and SAN no longer lose connectivity. |
2.2(2c)B |
2.2(3k)A |
CSCuy64856 |
The Cisco UCS fabric interconnects (FI) are no longer rebooted with the reboot reason FWM hap reset. |
2.1(3h)A |
2.2(3k)A |
CSCuu40291 |
When debug logging is enabled, Cisco UCS Manager tech-support showed that syslogd_debug files were present, but the show debug logfile syslogd_debugs CLI command failed with the following error: Logfile(syslogd_debugs) does not exist This issue is now resolved. |
2.2(3a)A |
2.2(3k)A |
CSCuu40978 |
The syslog is now truncated after it reaches the configured maximum size. It no longer fills up the Fabric Interconnect file system. |
2.2(3d)A |
2.2(3k)A |
CSCuw02439 |
When using Cisco UCS M81KR VIC adapters on a system running Cisco UCS Manager Release 2.2(2c), the adapters no longer crash and generate core files. |
2.2(2c)B |
2.2(3k)A |
CSCuw44595 |
DIMMs with correctable ECC errors are marked Inoperable or Degraded even though correctable errors do not affect normal system operation. This issue is now resolved. |
2.2(3a)A |
2.2(3k)A |
CSCux58865 |
DIMM temperature readings are no longer missed when the temperature is 10 degrees Centigrade more than the previous reading. |
2.1(3d)B |
2.2(3k)A |
CSCuz20650 |
When syslog messages are generated continuously, the syslog suspend timer does not recover. Thus, no events are sent to the remote syslog server. This issue is now resolved. |
2.2(3a)A |
2.2(3k)A |
CSCuy34161 |
Any DIMM that is functioning correctly is no longer disabled after the reboot of the UCS B250 M2 blade server. |
2.0(5c)B |
2.2(3k)A |
Resolved Caveats in Release 2.2 (3j)
The following caveats are resolved in Release 2.2 (3j)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCus55944 |
While updating a service profile template, the service profile no longer reboots without a warning when you create and add a VLAN to a rack server that is associated with an inherited service profile. |
2.2(3a)A |
2.2(3j)A |
CSCuw78688 |
The failure to load configuration that caused system outage when upgrading Cisco UCS Manager to 2.2(5c) is resolved. |
2.2(3a)A |
2.2(3j)A |
CSCus11782 |
After rebooting a Cisco UCS 6248UP Fabric Interconnect (FI) that is operating in the FC end-host mode, all member links of the SAN port channel come up. |
2.2(1d)A |
2.2(3j)A, 2.2(5b)A |
CSCus85186 |
After activating Cisco Trusted Platform Module (TPM), the enable and active statuses now remain as disabled and deactivated. |
2.2(1d)B |
2.2(1h)B,2.2(3j)B |
CSCuv06504 |
The svc_sam_dme process is no longer crashing during a steady state of operation when a database (db) corruption is detected primarily on the subordinate fabric interconnect. |
2.2(3d)A |
2.2(3j)A, 2.2(6c)A |
CSCuv72975 |
When upgrading the Cisco UCS Manager infrastructure bundle and using VIC-1340 or VIC-1380, the backplane port of the IOM and VIC is no longer down. |
2.2(3a)B |
2.2(3j)B |
CSCuw59409 |
The DME crash issue that you may experience when you upgrade a directly connected C-Series rack server without decommissioning, and connect the server to FI port, is resolved. |
2.2(3h)A |
2.2(3j)A, 2.2(6e)A |
CSCuw84010 |
Integrated C-Series rack servers with Seagate drives no longer fail association when using the host firmware policy in a service profile. |
2.2(3h)A |
2.2(3j)A, 2.2(6e)A |
CSCux10203 |
When you decommission a C-Series server after it was discovered in direct attached configuration, and the direct attached switch port was changed from Ethernet to FC mode, the following error message no longer appears: Warning : if_index 0x1a01a000[Ethx/x] does not exists in VLAN database#ERROR |
2.2(3h)A |
2.2(3j)A, 2.2(6e)A |
CSCup95855 |
FSM tasks are no longer stuck in the throttled state in Cisco UCS Manager during Cisco UCS C240 M3 server upgrade. |
2.2(1d)A |
2.2(3j)A, 2.2(6c)A |
CSCur01185 |
The HA policy of Reset is no longer triggering the Cisco UCS 6296UP fabric interconnect to reset. |
2.2(1d)A |
2.2(3j)A |
CSCus32933 |
Cisco UCS Manager now displays an error message when a WILL_BOOT_FAULT event is raised because of an incorrect CPLD version. |
2.2(2c)B |
2.2(3j)B |
CSCus56140 |
Cisco UCS Manager now performs a successful failover if the primary out-of-band management port is detected as down for more than the Management Interface Monitoring default 5 minutes. |
1.4(2b)A |
2.2(3j)A |
CSCus73964 |
When you download an infrastructure software bundle onto a system where the same infrastructure software bundle was previously installed, but was subsequently deleted, the UCS Manager FIs, and IOMs no longer downgrade to that software bundle. |
2.1(3e)A |
2.2(3j)A |
CSCus93431 |
Adding other storage, such as a local disk or a USB to a SAN boot policy no longer deletes the SAN boot policy from Cisco UCS Manager. |
2.2(3c)A |
2.2(3j)A, 2.2(6c)A |
CSCut10525 |
The FlexFlash firmware version is now updating and the FFCH_ERROR_OLD_FIRMWARE_RUNNING is not longer displaying in the fault summary after you update the UCS B200 M4 server firmware using 2.2(4b). |
2.2(3a)B |
2.2(3j)B |
CSCut28278 |
After upgrading the infrastructure and the Cisco UCS Manager image, the subordinate fabric interconnect no longer fails the pre-upgrade check because of insufficient free space in the /var/sysmgr directory. |
2.2(1d)A |
2.2(3j)A |
CSCuv31912 |
UCS Manager iptables are no longer duplicating rules in the FORWARD table. |
2.2(3d)A |
2.2(3j)A, 2.2(6c)A, 2.2(8a)A |
CSCux71937 |
The CPU utilization always displayed 100 percent for the kernel in the output of the show system resources command. This could happen if the system had been up for a very long time (more than 200 days, but this time-frame could vary): FI(nx-os)# show system resourcesLoad average: 1 minute: 0.50 5 minutes: 0.71 15 minutes: 1.04Processes : 563 total, 3 runningCPU states : 0.0% user, 100.0% kernel, 0.0% idleMemory usage: 3490164K total, 3140304K used, 349860K freeThis has now been resolved. The output of this command now indicates the correct CPU utilization levels. |
2.2(3b)A |
2.2(3j)A, 2.2(6f)A |
Resolved Caveats in Release 2.2 (3h)
The following caveats are resolved in Release 2.2 (3h)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCus64439 |
Cisco UCS Manager Mezz logs and VMware vmkernel logs no longer indicate storage latency and numerous FNIC aborts. |
2.2(1d)B |
2.2(3h)B |
CSCuu15465 |
If the version of board controller on a UCS B200 M4 server is higher than the version in the Host Firmware Pack, Cisco UCS Manager no longer tries to downgrade firmware of board controllers on the servers. While running Cisco UCS Manager Releases 2.2(3b) to 2.2(3g), you can use catalog version 2.2(4b)T or later versions to get this fix. |
2.2(3b)A |
2.2(3h)A |
Resolved Caveats in Release 2.2 (3g)
The following caveats are resolved in Release 2.2 (3g)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
||
---|---|---|---|---|---|
CSCus74206 |
After disconnecting and re-connecting a cable between the FI and IOM, the VFC interfaces on the chassis will not flap and cause any disruption in the FC traffic. |
2.2(1d)A |
2.2(3g)A |
||
CSCur66094 |
Servers will not be stuck in discovery state. The locked CIMC connection issue causing bladeAG network thread lock up is resolved. |
2.2(2c)A |
2.2(3g)A |
||
CSCur96296 |
FEX will not be online and offline in quick succession under scaled setups. |
2.2(3a)A |
2.2(3g)A |
||
CSCus91342 |
You will not be prompted to reboot the blade server when adding a vLAN to a vNIC template. |
2.2(1b)A |
2.2(3g)A |
||
CSCut28626 |
When you import a backup file with multiple vLANs, the B200 M2 server association will not be stuck at 86%. |
2.2(3e)A |
2.2(3g)A |
||
CSCut45598 |
6296 FI will not reboot with kernel panic. |
2.2(3c)A |
2.2(3g)A |
||
CSCut54264 |
Server connectivity issue relative to non-reuse of connection slots is resolved.
|
2.2(1c)B |
2.2(3g)B |
||
CSCur19358 |
The firmware update on K2 NVIDIA adapter will not fail with the error message “FI unreachable”. |
2.2(2e) |
2.2(3g)A |
||
CSCut13146 |
Chassis Discovery and service profile association no longer fail during downgrade to a UCSM version 2.2(2x) or earlier, when isolated Vlans are allowed on appliance ports or vNIC service profiles. |
2.2(1g)A |
2.2(3g)A |
||
CSCut61527 and CSCus42584 |
The Cisco B200M4 blade server will not reboot unexpectedly.
|
2.2(3a) and 2.2(1b)A |
2.2(3g)A |
||
CSCus89837 |
The excessive logging of the error “error:Invalid argument” in chassis pwrmgr tech support log will not happen anymore. |
2.1(3b)A |
2.2(3g)A |
||
CSCut45721 |
FI running BladeAG will no longer need rebooting due to low kernel memory |
2.1(1a)A |
2.2(3g)A |
||
CSCus97608 |
Faults in Cisco UCS Manager such as “error accessing shared-storage” and timeout/failover warning within the “show cluster extended-state” are no longer displayed when several devices in several chassis are reporting EBUSY within the I2C logs. |
2.2(3b)B |
2.2(3g)A |
||
CSCut02769 |
dbsync between Cisco UCS Fabric Interconnects will share only the required files and will not fail when copying the files from peer FI /opt/db/flash. |
2.2(3b)A |
2.2(3g)A |
||
CSCur21496 |
After a successful firmware update, the NVIDIA GPU cards no longer display the incorrect version number. |
2.2(2e)A |
2.2(3g)A |
||
CSCur83866 |
All overlapping IP addresses are appropriately removed during deletion and deployed at creation. |
2.2(1b)A |
2.2(3g)A |
||
CSCut69252 |
Service profile disassociation no longer fails with the flexflash scrub policy with no SD cards on C220 M4 servers. |
2.2(3c)A |
2.2(3g)A |
Resolved Caveats in Release 2.2 (3f)
The following caveats are resolved in Release 2.2 (3f)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCus61659 |
After an IOM is reset, priority flow control on the IOM interface to a blade no longer becomes disabled. |
2.1(3c)A |
2.2(3f)A |
CSCuq95926 |
Fabric Interconnect failover status is no longer stuck in Switchover In Progress when the management cable is unplugged. |
2.2(2c)A |
2.2(3f)A |
CSCut11027 |
When using a maintenance policy with user acknowledgment, a server with a third-party adapter will not reboot without asking for user acknowledgment after a SAN boot change in the boot policy. |
2.2(3c)A |
2.2(3f)A |
CSCuq51890 |
Entity physical description returns correct getnext values during SNMPwalk on Entity MIB. |
2.2(2c)A |
2.2(3f)A |
Resolved Caveats in Release 2.2 (3e)
The following caveats are resolved in Release 2.2 (3e)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCus69458 |
The heap-based buffer overflow vulnerability in the GNU C library, documented in Common Vulnerability and Exposures (CVE) CVE-2015-0235 is addressed. |
1.0(1e) |
2.2(3e)A |
CSCur70034 |
Service Profiles with a common VLAN name configured on one of the vNICs no longer fail with the following error: “Incorrect VLAN configuration on one of the VNICs. |
2.2(3c)A |
2.2(3e)A |
CSCuh78503 |
iSCSI reboot loop no longer fails with Oprom initialize error 1. |
2.1(2a)B |
2.2(3e)B |
CSCur83235 |
KVM login no longer fails in UCS Manager Release 2.2(3e) over Cisco AnyConnect VPN. |
2.2(2c)A |
2.2(3e)A |
CSCus55072 |
When C460-M4 servers are unassociated, firmware upgrade FSM no longer restarts after the BIOS POST FSM stage. |
2.2(3a)A |
2.2(3e)A |
CSCus51733 |
Toshiba HDD firmware version 5706 is now packaged in UCS Manager. Downgrades to version 5705 can change the status of the Toshiba HDD to Unconfigured Bad and should be avoided. |
2.2(3a)B |
2.2(3e)B |
CSCur99740 |
Fabric Interconnect image upgrade no longer fails when you run the reload all command from the Fabric Interconnect. |
2.2(3d)A |
2.2(3e)A |
Resolved Caveats in Release 2.2 (3d)
The following caveats are resolved in Release 2.2 (3d)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCur32075 |
The following new microcode for the Haswell-EP processor was added to release 2.2(3d):
|
2.2(3a)B |
2.2(3d)B |
CSCur42086 |
Blade AG no longer cores constantly and prevents assigning a service profile. |
2.2(1d)A |
2.2(3d)A |
CSCur77716 |
Call Home Config FSM error no longer occurs when upgrading from 2.2(1f). |
2.2(3c)A |
2.2(3d)A |
CSCuq17289 |
‘Failed to allocate exchange’ messages are no longer observed when vNICS with different COS values are used. |
2.2(3c)A |
2.2(3d)A |
CSCuq74472 |
Unnecessary thermal events on IOM stating that the thermal sensor reading is not available no longer occur. |
2.1(3c)A |
2.2(3d)A |
CSCur05013 |
Messages.log file on a Cisco UCS B200 M2 blade no longer fills with messages including ‘364:BMC lost control of the bus.[0xd 0x0]’. |
2.2(2c)B |
2.2(3d)B |
CSCur29264 |
The security vulnerability identified by Common Vulnerability and Exposures (CVE) CVE-2014-3566 is addressed. |
2.2(3a)A |
2.2(3d)A |
CSCur38408 |
Fabric interconnect HA failover no longer causes the attached Cisco UCS C460 M4 servers to reboot when a PCIe card is present in slot 2 and riser 2 is missing. |
2.2(2c)A |
2.2(3d)A |
CSCur48661 |
Global service profile association no longer fails with a ‘failed to copy images’ error. |
2.2(3b)A |
2.2(3d)A |
CSCun23603 |
UCS Manager now properly upgrades the power sequencer software. |
2.2(3c)A |
2.2(3d)A |
CSCur37260 |
FI upgrade or downgrade no longer fails due to lack of disk space in /mnt/pss. |
2.1(3b)A |
2.2(3d)A |
CSCuq52499 |
Cisco UCS Manager no longer raises a unnecessary fault on the IOM when the CPU on a blade in the chassis crosses the UNC/UC threshold. |
2.1(3b)A |
2.2(3d)A |
Resolved Caveats in Release 2.2 (3c)
The following caveats are resolved in Release 2.2 (3c)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuq35685 |
IGMPv2 traffic no longer causes MAC flapping on upstream switches when the FI has multiple uplinks connecting to different switches. |
2.2(1b)A |
2.2(3c)A |
CSCuq46105 |
UCS Manager now uses power sequencer version 3.0 to address the rare issue of an unexpected reboot to the Cisco UCS 6248 FI. |
2.2(1c)A |
2.2(3c)A |
CSCuq63086 |
Cisco B200 M3 no longer fails with a ‘Controller 1 on server x/y is inoperable’ error. |
2.2(1e)B |
2.2(3c)B |
CSCur08722 |
Firmware upgrade FSM no longer fails on the Cisco UCS C240 M3 server with the following error: IVY Bridge Processor is installed on this server, cannot downgrade to unsupported CIMC version. |
2.2(3a)A |
2.2(3c)A |
CSCup45930 |
When upgrading the Cisco UCS B230 M2 server from Cisco UCS Manager Release 2.2(1x) to Cisco UCS Manager Release 2.2(2x) or from Cisco UCS Manager Release 2.2(2x) to Cisco UCS Manager Release 2.2(3x), or when upgrading the Cisco UCS C460 M4 server from Cisco UCS Manager Release 2.2(2x) to Cisco UCS Manager Release 2.2(3x), association no longer fails. |
2.2(1e)A |
2.2(3c)A |
Resolved Caveats in Release 2.2 (3b)
The following caveats are resolved in Release 2.2 (3b)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuq63592 |
Blade association no longer fails on servers with Cisco UCS VIC 1340 or VIC 1380 adapters when some vHBAs manually configured in the service profile on Host Port 1 or Host Port 2 while other vHBAs are placed systematically by setting Desired Host Port to ‘ANY.’ |
2.2(3a)A |
2.2(3b)A |
CSCuq64931 |
Blades with Cisco UCS VIC 1340 or VIC 1380 adapters no longer fail to PXE boot / iSCSI boot/ SAN boot when SRIOV vNICs (PF and VF) are placed on first host port and PXE vNIC/ iSCSI vNIC / SAN boot vHBA are placed on second host port. |
2.2(3a)A |
2.2(3b)A |
CSCuq70724 |
DIMM I2C controller is automatically reset if there are invalid I2C transactions that prevent the chassis from obtaining temperature readings from blades (which can cause fan speeds to spin at 100%). |
2.2(2d)B |
2.2(3b)B |
CSCuq81262 |
Cisco UCS Manager no longer becomes unresponsive (after seven days when VM-related data collection begins) if anonymous reporting (AR) is enabled when upgrading to Cisco UCS Manager release 2.2(3b) in an environment specifically configured with VMs that use VM-FEX on any hypervisor. |
2.2(3a)A |
2.2(3b)A |
CSCuq92477 |
Infra bundle upgrades from Cisco UCS Manager release 2.2(3a) no longer fail if performed from Cisco UCS Central. |
2.2(3a)A |
2.2(3b)A |
CSCur01379 |
The security vulnerabilities identified by Common Vulnerability and Exposures (CVE) CVE-2014-7169, CVE-2014-6271, CVE-2014-6277, CVE-2014-7186, CVE-2014-7187, and CVE-2014-6278 are addressed. |
2.0(1q)A |
2.2(3b)A |
Resolved Caveats in Release 2.2 (3a)
The following caveats are resolved in Release 2.2 (3a)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
||
---|---|---|---|---|---|
CSCuo60330 |
IOMs are no longer unreachable after upgrading the FI when upgrading to Cisco UCS Manager, Release 2.2(2) or later. |
2.2(1d)A |
2.2(3a)A |
||
CSCue93518 |
Cisco UCS Manager now displays an alert when users are close to reaching the VLAN port count limit. |
2.1(1a)A |
2.2(3a)A |
||
CSCug73260 |
The UCS Manager DME process no longer crashes on the subordinate FI during an upgrade or power outage. |
2.1(1a)A |
2.2(3a)A |
||
CSCui12868 |
Some conditions that result in the chassis displaying a thermal sensor reading error due to third-party applications accessing the PCH SMBus or CPU SMBus controller have been fixed.
|
2.0(4b)B |
2.2(3a)B |
||
CSCui53234 |
Call Home alerts now include alert customization and service profile information. |
2.0(3a)A |
2.2(3a)A |
||
CSCul69513 |
Interface (error) counters for the fabric ports on the IOM can now be monitored using the UCS Manager GUI and CLI. |
2.1(1a)A |
2.2(3a)A |
||
CSCum48026 |
Local vMedia mounts in progress can now be cancelled by the user instead of waiting for a timeout. |
2.2(2c)B |
2.2(3a)B |
||
CSCun00368 |
A fault is now raised if the FI has less memory than expected. |
2.1(3b)A |
2.2(3a)A |
||
CSCun00720 |
The UCS 6296 FI no longer fails to boot after a software upgrade, reload, or power cycle. |
2.0(2m)A |
2.2(3a)A |
||
CSCun66874 |
DIMM blacklisting no longer prevents the host from accessing the DIMM bus. |
2.2(2c)A |
2.2(3a)A |
||
CSCun84951 |
MCA and MCE errors are now logged when a Cisco UCS blade server reboots due to a CPU CATERR fault. |
2.2(1b)B |
2.2(3a)B |
||
CSCuo09991 |
The primary FI and secondary FI in a HA cluster no longer fail to sync after rebooting. |
2.2(1b)A |
2.2(3a)A |
||
CSCuo34760 |
vEthernet interfaces and VIFs no longer remain in down state if the primary FI in a HA cluster is rebooted and comes up as the secondary FI. |
2.1(2d)A |
2.2(3a)A |
||
CSCuo48978 |
Cisco UCS Manager now prevents downgrading the BIOS to an unsupported version on Cisco UCS C22, C24, C220, and C240 M3 servers with E5-2600 or E5-2400 v2 series CPUs. |
2.1(2a)C |
2.2(3a)C |
||
CSCuo51708 |
Cisco UCS Manager downgrade no longer fails during autoinstall. |
2.2(1d)A |
2.2(3a)A |
||
CSCuo76425 |
Ingress CRC errors are no longer seen over TwinA.x cables with rapid link-flaps on the 6248 and 6296 platforms |
2.2(1c)A |
2.2(3a)A |
||
CSCuo80898 |
When upgrading an environment from Release 2.1(1a) to newer releases, the SAN port-channels that have member ports with different max speed will not be configured and a fault is raised to indicate this. |
2.1(2a)A |
2.2(3a)A |
||
CSCup05019 |
Status of FlexFlash controller no longer shows as ‘Disconnected Partition From Host” and SD cards are now visible in the local disks option after inserting those cards into a blade with Flexflash enabled in local storage policy. |
2.2(1d)A |
2.2(3a)A |
||
CSCup47504 |
Cisco UCS VIC 1240 adapter no longer fails to complete the PXE boot process due to missing DHCP offer on a Cisco UCS 6200 FI using an ASA as the DHCP relay. |
2.2(1d)B |
2.2(3a)B |
||
CSCup61601 |
FI no longer crashes upon executing the show platform software fcoe_mgr info global command when there are too many noncontiguous VLANs configured. |
2.2(1d)A |
2.2(3a)A |
||
CSCup61947 |
MAC learning no longer fails after adding 1,000 or more VLANs with a large PV count with 120 or more virtual interfaces each with 1,000 VLANs. |
2.2(1d)A |
2.2(3a)A |
||
CSCup82677 |
Line rate is no longer limited to 10GB even when QoS line rate is set to 20GB or 40GB. |
2.1(3b)A |
2.2(3a)A |
||
CSCup88087 |
Cisco UCS B200 M3 server with a single CPU no longer reports faults for a second CPU not present in the hardware. |
2.1(3a)A |
2.2(3a)A |
||
CSCuo87059 |
After a chassis decommission and recommission, backplane ports on an IOM are no longer missing due to a NULL serial number being sent to the Cisco UCS Manager. |
2.2(2c)B |
2.2(3a)B |
Resolved Caveats in Release 2.2 (2e)
The following caveats are resolved in Release 2.2 (2e)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCur01379 |
The security vulnerabilities identified by Common Vulnerability and Exposures (CVE) CVE-2014-7169, CVE-2014-6271, CVE-2014-6277, CVE-2014-7186, CVE-2014-7187, and CVE-2014-6278 are addressed. |
2.0(1q)A |
2.2(2e)A |
CSCur16493 |
The UCSC-GPU-VGXK2 GPU adapter firmware has been updated to version 80.04.F5.00.03_2055.0552.01.08. |
2.2(2a)B |
2.2(2e)B |
CSCup45930 |
When upgrading the Cisco UCS B230 M2 server from Cisco UCS Manager Release 2.2(1x) to Cisco UCS Manager Release 2.2(2x) or from Cisco UCS Manager Release 2.2(2x) to Cisco UCS Manager Release 2.2(3x), or when upgrading the Cisco UCS C460 M4 server from Cisco UCS Manager Release 2.2(2x) to Cisco UCS Manager Release 2.2(3x), association no longer fails. |
2.2(1e)A |
2.2(2e)A |
Resolved Caveats in Release 2.2 (2d)
The following caveats are resolved in Release 2.2 (2d)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCui12868 |
Some conditions that result in the chassis displaying a thermal sensor reading error due to third-party applications accessing the PCH SMBus or CPU SMBus controller have been fixed. |
2.0(4b)B |
2.2(2d)B |
CSCun25692 |
M71KR-Q no longer runs out of heap and causes SAN boot failure while allocating memory to critical data structure. |
2.2(1b)B |
2.2(2d)B |
CSCun79973 |
vNIC no longer hangs when QoS policy on a vNIC is changed while a Netflow session with transmit monitoring is active on that vNIC. |
2.2(2c)A |
2.2(2d)A |
CSCuo34760 |
Veths/VIFs no longer remain in down state on a Primary FI that gets rebooted and comes back up as subordinate FI. |
2.1(2d)A |
2.2(2d)A |
CSCuo79500 |
A vNIC with a usNIC connection policy no longer falsely shows as a Dynamic vNIC after a second vNIC with a usNIC policy is added. |
2.2(1c)A |
2.2(2d)A |
CSCuo98011 |
Service dcosag no longer crashes during Infra firmware upgrade (ucs-k9-bundle-infra.2.2.2c.A.bin) if upgrade is initiated from Cisco UCS Central, when Cisco UCS Manager is registered to Cisco UCS Central using IPv4 address and image bundles are not present in Cisco UCS Manager. |
2.2(2c)A |
2.2(2d)A |
CSCup07488 |
ECC sensors no longer read or report invalid “Upper Non-Recoverable” data when there are existing failed PECI transactions on a blade. |
2.2(2c)B |
2.2(2d)B |
CSCup61601 |
FCOE_MGR no longer crashes when FI is configured with too many noncontiguous VLANs. |
2.2(1d)A |
2.2(2d)A |
CSCup61947 |
MAC learning no longer fails after adding 1000 or more VLANs with a large PV count with 120 or more virtual interfaces each with 1000 VLANs. |
2.2(1d)A |
2.2(2d)A |
CSCup82677 |
A Cisco UCS system with ESXi OS is no longer limited to 10Gb speed when QoS is configured with line-rate of 20Gb or 40Gb. |
2.2(1d)A |
2.2(2d)A |
Resolved Caveats in Release 2.2 (2c)
The following caveats are resolved in Release 2.2 (2c)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCtf73879 |
Cisco UCS Manager (GUI or CLI) no longer fails to report the local disk failures, faults, alarms, status, or disk errors/error codes from MegaRAID controller. |
1.4(1) |
2.2(2c) |
CSCuh89441 |
RHEL6.3 SAN boot on M73KR-E no longer fails. |
2.2(1b) |
2.2(2c) |
CSCuh92027 |
The cluster no longer gets stuck in switchover in progress mode when unplugging the primary FI's management port. |
2.1(1a)A |
2.2(2c)A |
CSCuh99542 |
New SNMP user configured via Cisco UCS Manager now shows up in UCS NX-OS CLI. |
2.1(1e)A |
2.2(2c)A |
CSCuj74570 |
B420 M3 with UCSB-MLOM-PT-01 installed no longer reboots for discovery when first IOM is upgraded to 2204XP. |
2.1(2a)B |
2.2(2c)B |
CSCuj81245 |
OS kernel and adapter logs no longer report multiple FNIC aborts when user starts a heavy write operation to SAN disk. |
2.2(1b)B |
2.2(2c)B |
CSCuj81385 |
GUI no longer returns PSUs have failed, please check input fault. |
2.1(3a)B |
2.2(2c)B |
CSCuj84543 |
IOM no longer incorrectly reports that grid redundancy is lost while all PSUs are in Active PS state. |
2.1(3a)A |
2.2(2c)A |
CSCul03508 |
Kernel memory no longer runs out and causes FI to reboot when running CA AIM tool with Cisco UCS Manager. |
2.1(1d)A |
2.2(2c)A |
CSCul15865 |
Remote user logged in as admin with valid locales is now able to create, modify, and delete in other organizations apart from the locales downloaded so long as locales restriction is not applied to the admin profile. |
2.2(1b)A |
2.2(2c)A |
CSCul44421 |
Error no longer encountered when accessing shared-storage during FI reboot, upgrade, or IOM reset. |
2.1(2d)A |
2.2(2c)A |
CSCul74278 |
The server no longer fails to boot from the local disk in cases where the boot policy was initially configured only for SAN devices and is later modified to add local disk or local HDD device. |
2.2(1b)A |
2.2(2c)A |
CSCul87625 |
FI no longer reports PSU failure when there is no real outage. |
2.1(3a)A |
2.2(2c)A |
CSCul95341 |
Server no longer becomes unreachable after vNIC failover/failback. |
2.2(1b)A |
2.2(2c)A |
CSCum10869 |
IO throttle count option on the FC adapter policy is now 256 by default and range changed to ‘256 to 1024’ to remove confusion caused by default value of 16, which was interpreted by driver to mean 2048. |
2.1(1f)A |
2.2(2c)A |
CSCum18805 |
Error message no longer received when pinging from peer FI's local-mgmt. |
2.2(1b) |
2.2(2c)A |
CSCum19106 |
HDDs are displayed appropriately now in both Cisco UCS Manager and in BIOS for B200 M3. |
2.2(1b)B |
2.2(2c)B |
CSCum19132 |
httpd_cimc.sh crash no longer seen when changing switch mode from End-Host to Switch mode and vice versa. |
2.2(1b)A |
2.2(2c)A |
CSCum20965 |
Service profile now correctly disassociates from the blade when selecting “Disassociate Service Profile” from Cisco UCS Manager GUI. |
2.2(1b) |
2.2(2c)A |
CSCum51302 |
User no longer receives 'switchport trunk allowed vlan none' configuration error on vEthernet configuration for VLAN change. |
2.2(1b)A |
2.2(2c)A |
CSCum57954 |
Ping requests no longer timeout when configuring a B200 M3 with Cisco UCS VIC 1240 and Cisco UCS VIC 1280 with VM-FEX on the ESXi DVS while vMotioning a VM between two blades. |
2.2(1b) |
2.2(2c)A |
CSCum60793 |
Cisco UCS Manager no longer reports ‘mount suspend success’ to operations manager errors when UCS becomes unreachable or unregistered with Cisco UCS Central. |
2.1(2c) |
2.2(2c)A |
CSCum63448 |
A Cisco UCS compute blade no longer requests a reboot for minor changes when a component firmware in an Activating state after an upgrade is completed. |
2.1(2c)A |
2.2(2c)A |
CSCum82385 |
Allowed VLANs in vNIC now matches the allowed VLANs in vEthernet in NX-OS and vNICs no longer get updated when the service-profile is renamed. |
2.1(3a)A |
2.2(2c)A |
CSCum84239 |
No longer have to be logged in as admin to be able to connect adapter. |
2.2(1b)A |
2.2(2c)A |
CSCum84618 |
Installation of Win2008R2 no longer fails to reload after loading the disk.sys driver, preventing final installation steps to be completed. |
2.1(3a)B |
2.2(2c)B |
CSCum87525 |
The httpd.sh process on the subordinate FI no longer crashes after upgrading to 2.2(2c) from 2.1(3a) via auto install. |
2.2(1b)A |
2.2(2c)A |
CSCum95778 |
Incorrect sorting results are no longer displayed when attempting to sort a listing of service profiles and ORGs. |
2.2(1b)A |
2.2(2c)A |
CSCum98771 |
User no longer receives config failure message ‘Flexflash controller error, probably not supported, not equipped or inoperable’ when Cisco UCS Manager is updated from 2.1(2a) or above to 2.2(1) with FlexFlash State enabled. |
2.2(1b)A |
2.2(2c)A |
CSCun13327 |
A Cisco UCS system with a high number of blade or rack-servers no longer experiences a high number of messages collected in the bladeAG logs, causing logs to overflow and prevent user from collecting necessary data for troubleshooting purposes. |
2.1(3a)A |
2.2(2c)A |
CSCun14140 |
UCSB-B200-M3 Kernel no longer panics or hangs. |
2.1(3b)B |
2.2(2c)B |
CSCun19372 |
User is no longer prevented from adding interface from both fabrics to the VLAN when launching the LAN Uplink Manager from the Equipment > Interconnects > Fabric Interconnect A (or B) path. |
2.2(1b)A |
2.2(2c)A |
CSCun24381 |
Customers using the Cisco UCS PowerTool will no longer experience problems when scraping the Java log file for XML parsing of config changes when running Java version 7 update 45. |
2.2(1b)A |
2.2(2c)A |
CSCun25187 |
Cisco UCS Manager no longer becomes Lost-Visibility in Cisco UCS Central when keyring with certificate chain is configured for https communication if third-party certificates are signed by subordinate CA instead of root CA. |
2.1(2a)A |
2.2(2c)A |
CSCun42280 |
Messages log no longer overfilled with BMC is suspecting that palo is in boot block. Leaving I2C bus alone. messages. |
2.1(2a)B |
2.2(2c)B |
CSCun43320 |
Linux PXE server no longer fails to boot from gPXE server. |
2.1(2a)B |
2.2(2c)A |
CSCun46196 |
A Cisco UCS running 2.2(2c) that has a M1 or M2 blade no longer reports a minor fault related to Inband configuration when there is actually no Inband configuration intended for that blade. |
2.2(1b) |
2.2(2c)A |
CSCun94906 |
The Cisco UCS Manager DME no longer crashes when a SP is referring to a SP template and Cisco UCS Manager is connected to Cisco UCS Central during policy ownership conflict checks. |
2.2(1b)B |
2.2(2c)B |
CSCun95096 |
During association, the service profile no longer fails with an error stating that the RAID configuration is invalid due to an attempt to mix different drive technologies simply because one drive has an incorrect capability catalog technology field (set to HDD when it should be set to SSD). |
2.2(1b)T |
2.2(2c)T |
CSCuo06886 |
Cisco UCS Manager no longer populates the Created at field with a strange number in the wrong format instead of the date when exporting events in CSV format. |
2.2(1b)A |
2.2(2c)A |
CSCuo09527 |
A blade running on a 2-socket B420 M3 no longer boots to the BIOS screen after an update if the boot order is configured in the Cisco UCS Manager and the BIOS is set to strict mode. |
2.2(1b)A |
2.2(2c)A |
CSCuo12965 |
KVM console no longer fails to launch when user tries to launch from the Equipment tab in Cisco UCS Manager or from the KVM Launch Manager due to erroneous ‘No management IP address set’ error message when server has no management IP addresses assigned but the associated service profile does. |
2.2(1b)A |
2.2(2c)A |
CSCuo23630 |
User no longer receives “There are uncommitted changes” prompt after applying a port license to FI and, then, trying to move to another screen. |
2.2(1c)A |
2.2(2c)A |
CSCuo30572 |
Intel v2 processors no longer cause PSOD with Microsoft Windows 2008 R2 VM guests. |
2.1(3a)A |
2.2(2c)A |
CSCuo36008 |
User no longer receives the ‘peer connectivity: disconnected’ warning after re-seating the IOM(A). |
2.2(1c)A |
2.2(2c)A |
CSCuo78883 |
Cisco UCS Manager and KVM users or admins using JRE version 1.7 update >= 40 no longer encounter a pop-up window with the 'Application Blocked by Security Settings' dialog. |
2.0(1m)A |
2.2(2c)A |
Resolved Caveats in Release 2.2 (1h)
The following caveats are resolved in Release 2.2 (1h)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCut63966 |
Switch will not stop at loader prompt upon reboot due to incorrect boot variables or /opt corruption. |
2.2(1b)A |
2.2(1h)A, 2.2(3g)A |
CSCur88952 |
svc_sam_dme core is no longer found after upgrading from or downgrading to Cisco UCS Manager Release 2.1(1b). |
2.1(3g)A |
2.2(1h)A, 2.2(3f)A |
CSCus83447 |
Cisco UCS Fabric Interconnect reload or switchover due to a leap second update no longer occurs. |
2.2(1b)A |
2.2(1h)A,2.2(3e)A |
CSCus85186 |
After activating Cisco Trusted Platform Module (TPM), the enable and active statuses will not remain as disabled and deactivated. |
2.2(1d)B |
2.2(1h)B, 2.2(3j)B, 2.2(4b)B |
CSCut03086 |
In a VM-FEX scale set up with over 100 servers, when you use auto install infrastructure firmware bundle and UCS Manager FI upgrades, DME core will not happen. |
2.2(2c)A |
2.2(1h)A, 2.2(3g)A |
CSCur54705 |
Cisco UCS Manager will no longer send UCS Manager username and password hashes to the configured SYSLOG server every 12 hours. |
2.1(1a)A |
2.2(1h)A,2.2(3e)A |
CSCut09151, CSCut21914 and CSCut08605 |
Traffic from the host and CIMC will no longer collide on the shared System Management BUS(SMBUS). As a result, certain system failures such as false thermal alarms will not happen. |
2.1(3a)B |
2.2(1h)A, 2.2(3f)B |
CSCuo50049 |
Cisco UCS Manager will not experience HA cluster failover after upgrading from Release 1.4. |
2.0(5g)A |
2.2(1h)A, 2.2(3d)A |
Resolved Caveats in Release 2.2 (1g)
The following caveats are resolved in Release 2.2 (1g)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuo51708 |
UCSM autoinstall downgrade no longer fails while reverting firmware during autoinstall process. |
2.1(1f)A |
2.2(1g)A |
CSCuq70724 |
DIMM I2C controller is automatically reset if there are invalid I2C transactions that prevent the chassis from obtaining temperature readings from blades (which can cause fan speeds to spin at 100%). |
2.1(1a)B |
2.2(1g)B |
CSCuq20755 |
Race conditions no longer occur due to DME crashing and restarting. |
2.0(1q)A |
2.2(1g)A |
CSCuq74472 |
Unnecessary thermal events on IOM stating that the thermal sensor reading is not available no longer occur. |
2.1(3c)A |
2.2(1g)A |
CSCur37260 |
FI upgrade or downgrade no longer fails due to lack of disk space in /mnt/pss. |
2.1(3b)A |
2.2(1g)A |
Resolved Caveats in Release 2.2 (1f)
The following caveats are resolved in Release 2.2 (1f)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCuq35685 |
IGMPv2 traffic no longer causes MAC flapping on upstream switches when the FI has multiple uplinks connecting to different switches. |
2.2(1b)A |
2.2(1f)A |
CSCur01379 |
The security vulnerabilities identified by Common Vulnerability and Exposures (CVE) CVE-2014-7169, CVE-2014-6271, CVE-2014-6277, CVE-2014-7186, CVE-2014-7187, and CVE-2014-6278 are addressed. |
2.0(1q)A |
2.2(1f)A |
CSCuo34760 |
vEthernet interfaces and VIFs no longer remain in down state if the primary FI in a HA cluster is rebooted and comes up as the secondary FI. |
2.1(2d)A |
2.2(1f)A |
CSCuq63086 |
Cisco B200 M3 no longer fails with a ‘Controller 1 on server x/y is inoperable’ error. |
2.2(1e)B |
2.2(1f)B |
Resolved Caveats in Release 2.2 (1e)
The following caveats are resolved in Release 2.2 (1e)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCup61947 |
MAC learning no longer fails after adding 1000 or more VLANs with a large PV count with 120 or more virtual interfaces each with 1000 VLANs. |
2.2(1d)A |
2.2(1e)A, 2.2(2d)A |
CSCul44421 |
Error no longer encountered when accessing shared-storage during FI reboot, upgrade, or IOM reset. |
2.0(5f)B |
2.2(1e)B |
CSCum98771 |
User no longer receives config failure message ‘Flexflash controller error, probably not supported, not equipped or inoperable’ when Cisco UCS Manager is updated from 2.1(2a) or above to 2.2(1) with FlexFlash State enabled. |
2.2(1b)A |
2.2(1e)A |
CSCun24381 |
Customers using the Cisco UCS PowerTool will no longer experience problems when scraping the Java log file for XML parsing of config changes when running Java version 7 update 45. |
2.2(1b)A |
2.2(1e)A |
CSCun25187 |
Cisco UCS Manager no longer becomes Lost-Visibility in Cisco UCS Central when keyring with certificate chain is configured for https communication if third-party certificates are signed by subordinate CA instead of root CA. |
2.1(2a)A |
2.2(1e)A |
CSCun25692 |
M71KR-Q no longer runs out of heap and causes SAN boot failure while allocating memory to critical data structure. |
2.2(1b)B |
2.2(1e)B, 2.2(2d)B |
CSCun83328 |
vNIC PCI addresses no longer get changed when downgrading from release 2.2(1e) to 2.0(5). |
2.2(1d)B |
2.2(1e)B |
CSCun84897 |
Server reboots are no longer triggered when vNIC template is used with global service profile and customer changes MTU setting. |
2.1(3a)A |
2.2(1e)A |
CSCuo78883 |
Cisco UCS Manager and KVM users or admins using JRE version 1.7 update >= 40 no longer encounter a pop-up window with the 'Application Blocked by Security Settings' dialog. |
2.0(1m)A |
2.2(1e)A |
CSCuo79500 |
Cisco UCS Manager no longer falsely displays information that indicates a vNIC with a usNIC connection policy was automatically changed to dynamic vNIC when a customer adds a second vNIC with a usNIC policy. |
2.2(1c)A |
2.2(1e)A |
Resolved Caveats in Release 2.2 (1d)
The following caveats are resolved in Release 2.2 (1d)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCui31011 |
VIFs and vNICs on the subordinate no longer fail to come up after FI failover. |
2.1(2a)A |
2.2(1d)A |
CSCul38768 |
“Management services are unresponsive” fault no longer displayed in Cisco UCS Manager unless there is actually an HA condition failure. |
2.1(1e)A |
2.2(1d)A |
CSCul96021 |
Frequent crashing of dcosAG process no longer occurs after Cisco UCS Manager upgrade. |
2.2(1b)A |
2.2(1d)A |
CSCum02561 |
Server no longer reboots after infra-only upgrade that is followed by a service profile change. |
2.2(1b)A |
2.2(1d)A |
CSCum04646 |
FI no longer reboots while doing SNMP Walk with LDAP configuration enabled. |
2.2(1b)A |
2.2(1d)A |
CSCum09954 |
Erroneous minor faults “FCoE” or “FC uplink is down” are no longer displayed in Cisco UCS Manager when FC uplink interfaces are admin shut. |
2.2(1b)A |
2.2(1d)A |
CSCum75266 |
FIs no longer go to bash prompt during upgrade to 2.2 release. |
2.2(1b)A |
2.2(1d)A |
CSCum82888 |
Access to Cisco UCS Manager, FIs, and Virtual IP is no longer blocked after upgrade or reboot if default keyring was deleted. |
2.2(1b)A |
2.2(1d)A |
CSCun01514 |
Boot Order change via CLI or XML API no longer fails between SAN and other devices. |
2.2(1b)A |
2.2(1d)A |
CSCun19289 |
The mgmt0 interface on an FI no longer drops traffic coming from blades behind that FI. |
2.2(1b)B |
2.2(1d)B |
CSCun21077 |
Blades running ESXi OS will no longer hit a speed cap of 10GB when running on hardware that allows for higher speeds. |
2.2(1b)A |
2.2(1d)A |
CSCun59192 |
Secure properties, such as authentication passwords and community strings, are no longer reset when importing a backup configuration that was created while being registered to Cisco UCS Central with admin policies managed globally. |
2.2(1c)A |
2.2(1d)A |
Resolved Caveats in Release 2.2 (1c)
The following caveats are resolved in Release 2.2 (1c)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCum43435 |
The Cisco UCS VIC 1280 adapter on a Cisco UCS B440 M2 blade no longer hangs during PXE boot. |
2.2(1b)B |
2.2(1c)B |
CSCul44120 |
Cisco UCS blade servers performing a PXE boot from a Citrix PVS system no longer fail after the initial bootloader initialization with a “No API found” error. |
2.1(2a)B |
2.2(1c)B |
CSCum51025 |
Cisco UCS Manager domains registered in Cisco UCS Central no longer fail during scheduled backups. |
2.2(1b)A |
2.2(1c)A |
CSCum25003 |
Associated local and global service profile inventory information is no longer sent to Cisco UCS Central when no changes are made. |
2.2(1b)A |
2.2(1c)A |
Resolved Caveats in Release 2.2 (1b)
The following caveats are resolved in Release 2.2 (1b)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
||
---|---|---|---|---|---|
CSCug93342 |
After rebooting the FI during an upgrade, the FI no longer boots to the Loader prompt.
|
2.1(3a)A |
2.2(1b)A |
||
CSCuc19701 |
The 2204 IOM no longer reboots when the FI is reset. |
2.1(1a)A |
2.2(1b)A |
||
CSCuf90470 |
When Call Home is enabled, Online Insertion and Removal (OIR) or failure of hardware modules in the FI no longer causes the FI to reboot. |
2.1(1b)A |
2.2(1b)A |
||
CSCui45963 |
Some of the text and controls are no longer truncated when you create a service profile or service profile template using the wizard.The edit option for storage settings is enabled. |
2.1(2a)A |
2.2(1b)A |
||
CSCuj84421 |
Installing Java 7 update 45 no longer causes UCS Manager GUI failures. |
2.1(1f)A |
2.2(1b)A |
||
CSCuc38783 |
Firmware upgrade no longer fails on BRCM 57712 adapter. |
2.1(1a)A |
2.2(1b)A |
||
CSCuj77813 |
Associating service profile to a C-series server integrated with Cisco UCS Manager no longer fails. |
2.1(3a)C |
2.2(1b)A |
||
CSCui43905 |
When you try to create an iSCSI NIC on a service profile, UCS Manager no longer displays any warning messages. |
2.1(2a)B |
2.2(1b)A |
||
CSCuj32124 |
During normal operation IOM no longer unexpectedly reboots with CPU reset. |
1.4(2b)A |
2.2(1b)A |
||
CSCui41165 |
Cisco UCS Manager no longer displays “error accessing shared-storage”error or have the following issues:
|
1.4(2b)A |
2.2(1b)A |
||
CSCuj78099 |
FC traffic between a Cisco UCS FI and a Cisco MDS switch is no longer disrupted when the FI is in switch mode. |
2.1(3a)A |
2.2(1b)A |
||
CSCuj61839 |
With the 2.2(1b)B bundle, Cisco UCS Blade servers on a Cisco M81KR VIC adapter no longer encounter ASSERT FAILED @ mips/ecpu_pani.c:138 errors. |
2.1(2a)A |
2.2(1b)A |
||
CSCuj10564 |
Discard TX on a FC trunk port are no longer seen after hot-swapping the Cisco UCS-FI-E16UP expansion module on the Cisco UCS 6248UP FI. |
2.1(1f)A |
2.2(1b)A |
||
CSCuf77316 |
Windows 2012 installed on a FlexFlash card no longer fails Microsoft certification. |
2.1(2a)B |
2.2(1b)A |
||
CSCui87195 |
The FLS process on Cisco CNA M72KR-E no longer cores with the following message: 130820-19:06:33.645547 fls.fc vnic 15: Local port down for lif 4. |
2.0(5c)C |
2.2(1b)A |
||
CSCuj99958 |
During heavy FC traffic, the server no longer stops responding with an ASSERT FAILED (Exception 2 triggered!) @ mips/ecpu_panic.c:138 error. |
2.1(1f)A |
2.2(1b)A |
||
CSCug89448 |
The tech support collection no longer fails on the Cisco UCS Manager GUI. |
2.0(1s)A |
2.2(1b)A |
||
CSCug63368 |
PXE boot no longer fails in vPC environments if the DHCP relay agent is installed as the gateway IP address during a PXE boot instead of the HSRP IP address. |
2.1(1d)B |
2.2(1b)A |
||
CSCui82679 |
FlexFlash storage is no longer disconnected from a Cisco B200 M3 server after booting ESX or ESXi from a FlexFlash card. |
2.1(2a)A |
2.2(1b)A |
||
CSCuc52981 |
Downloaded license files for FIs continue to be displayed in the downloads area after installation. |
2.0(3a)A |
2.2(1b)A |
||
CSCti39470 |
RAID 50 and RAID 60 configurations can now be created and managed by Cisco UCS Manager. |
1.4(1i)A |
2.2(1b)A |
Open Caveats
The open bugs for a release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains up-to-date information about bugs and vulnerabilities in this product and other Cisco hardware and software products.
Note |
You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, you can register for an account. |
For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.
Open Caveats in Release 2.2(8g)
The following caveats are open in Release 2.2(8g)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCvb48577 |
UCS Manager includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2016-6304 CVE-2016-6305 CVE-2016-2183 CVE-2016-6303 CVE-2016-6302 CVE-2016-2182 CVE-2016-2180 CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2181 CVE-2016-6306 CVE-2016-6307 CVE-2016-6308 CVE-2016-6309 CVE-2016-7052 |
There is no known workaround. |
2.2(8g)B Resolved in 2.2(8i)B |
CSCvb61637 |
A vulnerability in the CLI of the Cisco Unified Computing System Manager could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation for the affected command. An authenticated local attacker could exploit this vulnerability by injecting crafted command arguments into a redirect of a vulnerable CLI command. An exploit could allow the attacker to execute arbitrary system commands with the privileges of the authenticated user. UCS Manager is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2017-6600 |
There is no known workaround. |
2.2(8g)A Resolved in 2.2(8i)A |
CSCvb86764 |
A vulnerability in the CLI of the Cisco UCS Manager could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. UCS Manager is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2017-6601 |
There is no known workaround. |
2.2(8g)A Resolved in 2.2(8i)A |
CSCvb86775 |
A vulnerability in CLI of the Cisco Unified Computing System Manager could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to read or write arbitrary files at the user?s privilege level outside the expected path and gain access to other devices. The vulnerability is identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE ID CVE-2017-6602 |
There is no known workaround. |
2.2(8g)A Resolved in 2.2(8i)A |
CSCvb86797 |
A vulnerability in the debug plugin functionality of the Cisco Unified Computing System Manager could allow an authenticated, local attacker to execute arbitrary commands. The vulnerability is due to inadequate integrity checks for the debug plugin. An attacker could exploit this vulnerability by crafting a debug plugin and load it using elevated privileges. An exploit could allow the attacker to run malicious code that would allow for the execution of arbitrary commands as root. The vulnerability is identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE ID CVE-2017-6598 |
There is no known workaround. |
2.2(8g)A Resolved in 2.2(8i)A |
CSCvb86816 |
A vulnerability in local-mgmt CLI of the Cisco Unified Computing System Manager could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation for the affected command. An authenticated local attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to execute arbitrary system commands with the privileges of the authenticated user. The vulnerability is identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE ID CVE-2017-6597 |
There is no known workaround. |
2.2(8g)A Resolved in 2.2(8i)A |
CSCvc37931 |
Unvalidated redirects and forwards may be possible when UCS Manager accepts untrusted input that could cause it to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Unvalidated redirect and forward attacks can also be used to maliciously craft a URL that would pass the application�s access control check and then forward the attacker to privileged functions that they would normally not be able to access. The vulnerability is identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE ID CVE-2017-6604 Impacted Unified Computing System (UCS) B-Series M3 and M4 Blade Servers Affects any of the 2.2(8) and 3.1(2) blade bundle versions. None of the 3.0 or 3.1(1) blade bundle versions. Impacted Unified Computing System (UCS) C-Series M3 and M4 Rack Servers Affects 3.0(1c) CIMC versions. None of the 1.5 or 2.0 CIMC versions. |
There is no known workaround. |
2.2(8g)A Resolved in 2.2(8i)A |
CSCvc58789 |
A port may get a disabled error from 10 consecutive DFE tuning failures. |
If this is encountered, try the following steps:
|
2.2(8g)A Resolved in 2.2(8i)A |
CSCvc94686 |
UCS Manager includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2017-3731 - Truncated packet could crash via OOB read. This product is not affected by the following vulnerabilities: CVE-2017-3730 - DHE parameters cause a client crash CVE-2017-3732 - BN_mod_exp may produce incorrect results on x86_64 |
There is no known workaround. |
2.2(8g)A Resolved in 2.2(8i)A |
CSCvc96103 |
UCS Manager includes a version of OpenSSL that is affected by the vulnerability identified by one or more of the following Common Vulnerability and Exposures (CVE) IDs: CVE-2017-3731 CVE-2017-3730 CVE-2017-3732 And disclosed in https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170130-openssl |
There is no known workaround. |
2.2(8g)A Resolved in 2.2(8i)A |
CSCve19522 |
UCS Domains running version 3.1(3a) may move to a state of lost visibility after a certificate is regenerated on UCS Central and could fail to recover. In some cases, the UCS 3.1(3a) domain registration may also get stuck in a registering state. |
Use one of the following workarounds to recover the system:
|
2.2(8g)A Resolved in 2.2(8i)A |
Open Caveats in Release 2.2(8d)
Open Caveats in Release 2.2(8d)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCvb11667 |
Server with UEFI BIOS enabled, may fails to SAN boot from a target LUN with an ID other than 0 and using T10 DIF protection. |
When this issue occurs, set the BIOS to legacy mode or use LUN ID 0. |
2.2(8d)B Resolved in 2.2(8f)B |
CSCvb82862 |
EUI-64 bit addresses were invalid for storage connection policies or SAN boot targets. |
There is no known workaround. |
2.2(8d)A Resolved in 2.2(8f)A |
CSCvb95978 |
On C460 M4 servers, TPM version 1.2 may fail to initialize after installing ESXi OS, and enabling and activating TPM and TXT. |
There is no known workaround. |
2.2(8d)B Resolved in 2.2(8f)B |
Open Caveats in Release 2.2(8c)
Open Caveats in Release 2.2(8c)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCvd54116 |
Setting a custom cipher suite for UCS Manager HTTPS to remove the usage of TLS v1.0 and 1.1, may result in a ""handshake failure"" error message when attempting to open a Java login to UCS Manager or a KVM session to a blade server. |
Explicitly allow AES128-SHA in the custom cipher to allow logins to UCS Manager. This does not affect UCS Manager versions that have the HTML5 login higher than 3.1, as the custom suite is adhered to. However, if a KVM session is opened then the failure will be seen as well, as this is still uses Java. |
2.2(8c)A Resolved in 2.2(8i)A |
CSCvb85331 |
The following fault may occur after a UCS Manager software upgrade. Code: F1781 Description: Management database version mismatch detected failover may not complete Affected Object: sys/mgmt-entity-B Name: Mgmt Entity Mgmt Db Version Mismatch Cause: Replication Failure Type: Management |
Restart the process monitor on the subordinate FI with the following commands:
|
2.2(8c)A Resolved in 2.2(8g)A |
CSCvb47285 |
In the process of rebooting the fabric interconnect and collection of tech support logs, a core file was generated. |
There is no known workaround. |
2.2(8c) |
Open Caveats in Release 2.2(8b)
Open Caveats in Release 2.2(8b)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCvb00303 |
During a Server discovery, Rack servers may get stuck and may not discover due to a lost connection status from B side while only A side is appearing. This may occur after upgrading to 2.2(8b) and performing an Erase Samdb operation and then enabling all required server ports to bring the server up. |
There is no known workaround. |
2.2(8b)A Resolved in 2.2(8h)A |
CSCvc60876 |
The 6248, 6296, and 6332 Series Fabric Interconnects may send Smart Call Home messages in the wrong format. |
Contact the Smart Call Home support team to fix the XML file and reprocess the message. |
2.2(8b)A Resolved in 2.2(8g)A |
CSCva96740 |
Changes in adapter policy from UCS Manager did not trigger a server redeploy. |
Manually schedule a reboot for the Service Profile for the FC Adaptor policies to be reflected. |
2.2(8b)A Resolved in 2.2(8c)A |
Open Caveats in Release 2.2(8a)
Open Caveats in Release 2.2(8a)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||
---|---|---|---|---|---|
CSCvf32853 |
Blade upgrades may fail to boot and get stuck at "Waiting for BIOS POST completion" during a firmware update for storage controllers. |
Create two host firmware packages: Create a Host Firmware Package for your target version that Excludes "Storage Adapters". This is only possible in UCSM 2.2(7b) and later. In previous versions you will have to create an Advanced Host Firmware Package and select all components except the Storage Adapters. Create a second Host Firmware Package that ONLY includes the Storage Adapters and select the versions that you are looking to upgrade to. You can do this by Excluding all other components, or by making an Advanced Host Firmware Package. How to upgrade the servers: To upgrade the servers, first upgrade all the components EXCEPT the Storage Adapter. So we will use the first Host Firmware Package created. Update the RAID Controller by itself by selecting the second Host Firmware Package created. You can now assign the Service Profile back to the original Host Firmware Package. Since all components have been upgraded, no further changes will be made. |
3.1(3a)B 2.2(8a)B |
||
CSCuz52483 |
UCS Manager includes a version of OpenSSL that may be affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2016-2108 CVE-2016-2107 CVE-2016-2105 CVE-2016-2106 CVE-2016-2109 CVE-2016-2176 |
There is no known workaround. |
2.2(8a)A Resolved in 2.2(8i)A |
||
CSCvc31867 |
When upgrading the SSD to firmware 32F3Q, the firmware may be truncated and written as 2F3Q, which may cause a second request for the reboot of the server. |
Exclude the Local Disk Firmware update from the Host Firmware Package (HFP) in the associated Service Profile. |
2.2(8a)A Resolved in 2.2(8g)A |
||
CSCuy81688 |
From Cisco UCS Manager tech-support, running /var/sysmgr/sam_logs/httpd_cimc.log on the affected fabric interconnect may show the exceeded max time without restart error. From Cisco UCS Manager tech-support, running /ls_l.out on the affected fabric interconnect may show the existence of a 'cimcrestart' file under /isan/apache/conf/. The modified date is now updated. |
If this issue occurs, do the following:
|
2.2(8a)A Resolved in 2.2(8f)A |
||
CSCvb16804 |
Booting from SAN to 4K UEFI target may fail. |
There is no known workaround. |
2.2(8a)B Resolved in 2.2(8f)B |
||
CSCuy65407 |
The VIC adapter may go into an inaccessible state while flapping RNICs that run high block size read/write workloads. |
When this issue occurs, power cycle the server to reboot the VIC. |
2.2(8a)B, 2.2(8a)C |
||
CSCuz41121 |
When booting to RHEL or running system stress tests, Cisco UCS B420 M4 servers with certain Intel ® E5 v3 CPUs may report QPI Correctable System Event Logs with the following error message: Link Layer CRC successful reset with no degradation These System Event Logs are benign and do not impact system operation. |
There is no known workaround. |
2.2(8a)B Resolved in 2.2(8c)B |
||
CSCuz76717 |
The ESX host reboot hangs while loading the ENIC module with NetFlow enabled. |
If this issue occurs, do the following:
|
2.2(8a)B, 2.2(8a)C |
||
CSCuz79138 |
The host becomes unresponsive when using second generation VIC adapters while running FCOE traffic and Ethernet traffic on the same side of the fabric with NetFlow enabled. |
No known workaround for second generation VIC adapters. You can enable NetFlow with third generation VIC adapters or later generation adapters. |
2.2(8a)B, 2.2(8a)C |
||
CSCva36835 |
When using Cisco B460 M4 or B260 M4 blade servers, a warm boot does not reset the LSI controller. |
There is no known workaround. |
2.2(8a)B Resolved in 2.2(8b)B |
||
CSCva38325 |
C460 M4 systems under heavy CPU/memory load can report Machine Check Exceptions in Linux syslog and/or correctable QPI errors in the System Event Log. These MCE and SEL are benign and do not impact system operation. |
There is no known workaround. |
2.2(8a)C |
||
CSCva67159 |
Cisco UCS Manager httpd failed to start when the default keyring was deleted. |
If this issue occurs, do the following:
|
2.2(8a)A Resolved in 2.2(8b) |
||
CSCva71801 |
UCS Manager may fail to synchronize with an IPv6 NTP server. |
If possible, drop into the debug plugin and restart the ntpd process by using the command: killall ntpd Or change the IPv6 NTP server to a IPv4 NTP server. |
2.2(8a)A Resolved in 2.2(8c)A |
||
CSCva87230 |
Temporary loss in server connectivity may be experienced when performing a Cisco UCS Manager upgrade to release 2.2(8a) from a build that does not contain the fix for CSCuq57142. |
Upgrade Cisco UCS Manager software to a release that has the fix for CSCuq57142 before upgrading to release 2.2(8a). See the Software Advisory.
|
2.2(8a)A Resolved in 2.2(8b |
||
CSCvb35827 |
Upgrade failure occurs when the Cisco UCS system is configured with more than 128 LDAP groups and upgrade is performed either from Cisco UCS Manager Release 2.2.8 to Cisco UCS Manager Release 3.1(2b) or from Cisco UCS Manager Release 3.1(2b) to a later release. The following error message is displayed: Error: Update failed: [System has more than 128 LDAP groups set, Downgrade will cause ldapd crash, Delete the additional groups] |
If this issue occurs, do the following:
|
2.2(8a)A Resolved in 2.2(8c)A |
Open Caveats in Release 2.2(7c)T
Open Caveats in Release 2.2(7c)T
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCva53726 |
UCS Manager allows downgrade of firmware for the following rack servers installed with v4 CPU models to a version less than the minimum required version of CIMC / BIOS firmware:
After a downgrade, servers may fail during the BIOS post. |
If the service profile is using the host firmware package policy with an older version, remove the older version from the policy. If UCS Manager is configured with auto-sync firmware policy, remove the older version from the auto-sync policy. After making the above changes, upgrade and activate the CIMC and BIOS to a minimum required version or via host firmware policy. Minimum CIMC / BIOS version required for v4 CPU model can be found in the following documents:
|
2.2(7c)T Resolved in 2.2(8d)T |
Open Caveats in Release 2.2(7c)
Open Caveats in Release 2.2(7c)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCvc17769 |
The fabric interconnect may crash when the bound interface of a Veth is in the Not Initialized State during a VLAN configuration change. |
If the bound interface of Veth is not initialized, then do not perform a VLAN configuration change on the Veth. |
2.2(7c)A Resolved in 2.2(8f)A |
CSCva34426 |
Cisco UCS 3X60 Server failed to boot from the LSI RAID controller managed disk slots 1 or 2, when the disks were in JBOD mode. |
If this issue occurs remove the internal riser based SSDs and reacknowledge the server. |
2.2(7c)A Resolved in 2.2(8b)A |
CSCva53726 |
UCS Manager allows downgrade of firmware for the following rack servers installed with v4 CPU models to a version less than the minimum required version of CIMC / BIOS firmware:
After a downgrade, servers may fail during the BIOS post. |
If the service profile is using the host firmware package policy with an older version, remove the older version from the policy. If UCS Manager is configured with auto-sync firmware policy, remove the older version from the auto-sync policy. After making above changes, upgrade and activate the CIMC and BIOS to minimum required version or via host firmware policy. Minimum CIMC / BIOS version required for v4 CPU model can be found in the following documents:
|
2.2(7c)T Resolved in 2.2(8d)T |
CSCux11611 |
Seagate hard drives left spinning idle without an operating system installed or setup with the JBOD configuration without read or write activity were prone to failure. Impacted hard drives are listed here:
|
Do not leave idle systems powered on for extended periods of time. Either install an OS with all drives formatted or configure drives in a RAID configuration other than JBOD or JBOD equivalent and fully initialize the Virtual Drive(s). |
2.2(7c)B Resolved in 2.2(8c)B |
CSCux53224 |
A fatal error may be observed when you create or remove virtual drives with RAID 5 and RAID 6 controller combination. |
No known workaround. |
2.2(7c)C Resolved in 2.2(7d)C |
Open Caveats in Release 2.2(7b)
Open Caveats in Release 2.2(7b)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||
---|---|---|---|---|---|
CSCuz98957 |
UCS Manager may incorrectly report the amount of drive slots on B200-M2 blade servers. |
There is no known workaround. |
2.2(7b)A Resolved in 2.2(8i)A |
||
CSCvc39322 |
For B260 M4 Blades, BIOS v3.1.2.2 may intermittently fail Windows HLK and HCK Trusted Platform Module (TPM) tests on Windows Server 2016 and Windows Server 2012 R2. |
Toggle the BIOS "TXT Support" setting to disable. |
2.2(7b)B Resolved in 2.2(8g)B |
||
CSCva35757 |
Latency between the UCS Manager Client and fabric interconnect may cause the firmware page to load slowly. |
Use the CLI to complete upgrade or downgrade procedures. |
2.2(7b)A Resolved in 2.2(8f)A |
||
CSCvb05762 |
UCS Manager GUI and CLI may fail to respond when the Data Management Engine (DME) hangs with a WaitOnLimit log message. |
Restarting the process monitor on the primary node resolves the issue. |
2.2(7b)A Resolved in 2.2(8d)A |
||
CSCva08256 |
Cisco CIMC and BIOS no longer get stuck updating or activating with the host firmware pack when the new host firmware pack has the same name and version as the system being updated. |
Create a host firmware pack with a different name than the one already in the organization or the sub-organization levels. |
2.2(7b)A Resolved in 2.2(8b)A |
||
CSCva38476 |
An infrastructure software upgrade to UCS Manager 2.2(7b) or higher can fail when both fabric interconnects are incompatible or when one of the fabric interconnects are unresponsive. |
Contact TAC to apply a workaround. |
2.2(7b)A Resolved in 2.2(8c)A |
||
CSCuy93451 |
When you create a vNIC from an updating vNIC template, and then delete vLANs from the updating vNIC template, these VLANs are not deleted from the vNIC. |
When this issue occurs, do the following:
|
2.2(7b)A Resolved in 2.2(7c)A |
||
CSCuz54661 |
Cisco B200 M3 Server failed to post if NUMA is disabled. |
Enable NUMA optimization in the BIOS policy. Then perform a reset CMOS from the Recover Server options. This reboots the server and must be done to recover and stop the errors.
|
2.2(6g)B Resolved in 2.2(8b)B |
||
CSCuz08759 |
The vniccfgd process no longer crashes when upgrading the VIC firmware contained in the server bundle to version 2.2(7b)B or 2.2(7b)C. |
When this issue occurs, revert back to the previous firmware version before the downgrade occurred. |
2.2(7b)B 2.2(7b)C Resolved in 2.2(7c)B 2.2(7c)C |
||
CSCuz69373 |
During Cisco UCS Manager upgrade to release 3.1(1), you will see CATERR faults due to unresponsive eCPUs. This issue happens when the eCPUs fall into diagnostic code (debug loop) after the DINT CPU input is asserted. |
No known workaround. |
2.2(7b)B Resolved in 2.2(7c)B |
||
CSCuy74364 |
When the CIMC version in the server is earlier than the 2.2(7) C Series bundle CIMC version, or, when the BIOS version in the server is later than the 2.2(6) C Series BIOS version, the host reboot is triggered along with a BIOS upgrade even for any unrelated service profile modification. |
To avoid this issue, ensure that the server has BIOS and CIMC versions from the same C Series bundle. |
2.2(7b)C |
||
CSCva29365 |
Enabling stateless offloads for NVGRE in a 3rd generation Cisco VIC adapters’ configuration with UCSM/CIMC leads to inaccessible vNIC interfaces in the host OS for the following 3rd generation VIC adapters:
This affects only the managed UCS deployments and standalone NIV mode deployments. Classical Ethernet operation is unaffected. |
Disable stateless offloads for NVGRE in a 3rd generation Cisco VIC adapters. |
2.2(7b)B Resolved in 2.2(7d)B |
||
CSCuz69100 |
Disk Firmware update fails on a C240 rack server with a UCSC-SAS12GHBA storage controller in one of the following scenarios:
This issue occurs if Cisco UCS Manager fails to map the local disk to its native SCSI device name because of a mismatched serial number between them. |
No known workaround. |
2.2(7b)A Resolved in 2.2(7d)A |
||
CSCuz65286 |
Cisco UCS Manager firmware upgrade fails with the following message UCSM upgrade validation failed if the default value for IO throttle count in the FC adapter policy has a value of 16. |
Before starting the upgrade, change the following:
|
2.2(3a)A Resolved in 2.2(7d)A |
Open Caveats in Release 2.2(6f)
Open Caveats in Release 2.2(6f)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCux21413 |
When you remove and reinsert a drive in the same slot, the Locator Storage Locator LED may remain on all the time. |
There is no known workaround. |
2.2(6f)B Resolved in 2.2(7b)A |
CSCux07578 |
Cisco UCS Blade servers B400 M1 or B400 M2 running on firmware version 4.10 with SATA drives, may experience data consistency failures. |
There is no known workaround. |
2.2(6f)B Resolved in 2.2(7b)A |
CSCuw46478 |
The Local disk Locator LED remains OFF, although enabled in Cisco UCS Manager. |
There is no known workaround. |
2.2(6f)B Resolved in 2.2(7b)B |
CSCuv45574 |
On C220/C240 M3 systems with LSI 9271-8i controller, after downgrading the firmware to Release 2.0(3f) or lower with HUU update all, the virtual machines running on the ESXi OS become inaccessible. SUSE operating systems are also impacted and will not boot after upgrade. |
See the following VMware knowledge base: http://kb.vmware.com/kb/1011387 (vSphere handling of LUNs detected as snapshot LUNs (1011387)) |
2.2(6f)A Resolved in 2.2(7d)A |
Open Caveats in Release 2.2(6d)
The following caveats are open in Release 2.2(6d)
Defect ID |
Description |
First Bundle Affected |
Resolved in Release |
---|---|---|---|
CSCux49157 |
UCS Manager now has a user configurable option to select the TLS version. |
This is an enhancement request for a feature to explicitly allow the selection of the TLS Version. Custom Cipher Suites can be used to force the Client side to use a higher version. |
2.2(6d)A Resolved in 2.2(8i)A |
Open Caveats in Release 2.2(6e)
Open Caveats in Release 2.2(6e)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCvc92275 |
A kernel panic may occur on the Fabric Interconnect and could cause a reboot. The command:
shows that the panic may occur in the process usd_mts_kthread. The call trace can be reviewed for a full match to this defect. |
Apply rate limiting or other QOS policies upstream to prevent large amounts of traffic from hitting the mgmt interfaces of the fabric interconnects. Apply ACL on upstream devices to only allow connectivity to mgmt interfaces from approved or identified bastion hosts. |
2.2(6e)A Resolved in 2.2(8i)A |
CSCux96072 |
During heavy I/O traffic, the Cisco 12G Modular RAID controller may go offline with the Storage Controller SLOT HBA inoperable error logged in the CIMC event logs. |
A fix is available in UCS Manager 2.0.10e and 2.0.13. Upgrade the Storage controller firmware and its corresponding driver. |
2.2(6e)C Resolved in 2.2(8g)C |
CSCvc89242 |
The Fabric Interconnect may reboot due to a CDP process crash. |
If CDP still crashes immediately after the fabric interconnect reboot, execute the following commands to avoid another FI reboot.
Contact TAC with the CDP core dump files if the reboot occurs again. |
2.2(6e)A Resolved in 2.2(8g)A |
CSCuv43349 |
During server discovery, Cisco UCS Blade server association or disassociation, the following failures may be reported:
|
When this issue occurs, do the following:
|
2.2(6e)B Resolved in 2.2(7b)B |
CSCuz96855 |
UCS M71KR cards could crash with the error “E4194871”. |
Reduce the number of targets zoned with the initiator. |
2.2(6e)A Resolved in 2.2(8c)B |
CSCva34343 |
The P0V75_STBY sensor may throw an alert incorrectly on Cisco B200M4 servers. |
There is no known workaround. |
2.2(6e)B Resolved in 2.2(8c)B |
CSCux47667 |
Service profile association to a server fails if the service profile was previously associated to a different server, and a LUN was deployed. |
Delete the LUN configuration of the service profile before associating to a different server. |
2.2(6e)A Resolved in 2.2(6f)A |
CSCva01733 |
PXE in Legacy Boot mode fails if there is an excessive unicast or multicast high background traffic with a packet size larger than MTU directed to the client server. This was seen with ESXi Autodeploy on a specific setup which likely had unusually high multicast traffic directed at the client server. This traffic was not from the PXE server for file transfer, but from some other source. |
Reduce excessive unicast or multicast background traffic directed to the client server. |
2.2(6e)B Resolved in 2.2(6j)B 2.2(7d)B |
Open Caveats in Release 2.2(6c)
Open Caveats in Release 2.2(6c)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||
---|---|---|---|---|---|
CSCvg06830 |
After adding a secondary fabric interconnect to a standalone setup and converting it to clustered setup, the VLAN 1 may not be added to the uplink port-channel, and could cause vEth on the B side to fail pinning and render the subordinate FI unusable. |
If vNIC uplink pinning is not occurring on the subordinate fabric interconnect, consider removing the VLAN (in this case VLAN 1) configuration from the vNIC to allow uplink pinning and high availability. |
2.2(6c)A Resolved in 2.2(8i)A |
||
CSCvc88543 |
Cisco UCS Manager includes a version of the Apache HTTP Server software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2016-0736, CVE-2016-2161, CVE-2016-5387,CVE-2016-8740, CVE-2016-8743 |
There is no known workaround. |
2.2(6c)A Resolved in 2.2(8i)A |
||
CSCuw19082 |
During Cisco UCS Manager initial setup, while configuring the fabric interconnect, setup will assume the GUI configuration method if a DHCP lease is obtained for the mgmt interface. In addition, an url will be provided for the setup of the fabric interconnect. |
There is no known workaround. |
2.2(6c)A Resolved in 2.2(7b)A |
||
CSCux66675 |
Rebooting a Cisco UCS 6296UP FI causes all physical interfaces to connect incorrectly with the Cisco UCS C460 M4 servers. |
Reacknowledge the servers to resolve this issue. |
2.2(6c)A Resolved in 2.2(7b)A |
||
CSCux98751 |
Anytime a new blade is inserted into the chassis, or a blade CIMC controller reboots, a chassis thermal fault may get generated because of the long time taken to reconnect from the IOM to the CIMC. This issue is caused by added time for BIOS Power Capping and SMBUS protection abilities. |
This fault will clear by itself, and has no known workaround. |
2.2(6c)B Resolved in 2.2(6g)B |
||
CSCuw44524 |
Server reboot with 'Uncorrectable error ECC errors' may occur when you initiate a 'clear CMOS' operation in Cisco UCS Manager Release 2.2(5a), 2.2(5b), 2.2(5c) or 2.2(6c) for E7 v2 processors on the C460 M4, B260 M4, and B460 M4 servers. |
Use the HUU or IMC interfaces to upgrade the BIOS again to any version, activate the BIOS, then reboot the system. |
2.2(6c)A Resolved in 2.2(6e)A |
||
CSCuv45173 |
When you upgrade C-series server firmware for C220-M4, C240-M4 to Cisco UCS Manager 2.2(6c), you will see the following critical alarm: Board controller upgraded, manual a/c power cycle required on server x. |
The alarm seen is mistakenly categorized as a critical alarm. It does not impact the functionality of the server and can be ignored. |
2.2(6d)C |
||
CSCuw13352 |
If you set the Processor C6 Report to enabled in the BIOS policy, the system hangs during the OS boot process. |
When configuring the Processor C6 Report in the BIOS policy, accept the default value of disabled. |
2.2(6c)A |
||
CSCuu78398 |
All blades running with the Storage Controller Firmware that does not support 4K native drives are showing the wrong virtual drive block size. |
This issue has no known workaround. |
2.2(6c)A |
||
CSCuv18630 |
Cisco UCS B420 M3 servers with the firmware for UCSB-MRAID12G installed reports a nonfunctional Toshiba hard drive as Missing in Cisco UCS Manager. |
This issue has no known workaround. |
2.2(6c)A |
||
CSCuv25760 |
On CPU 4830 and 4850, the P-state is not changing when running the linpack benchmark on Redhat, which results in the frequency not increasing. |
This issue has no known workaround. |
2.2(6c)A |
||
CSCuv27475 |
The UCS B-Series Blade Servers include a version of Unified Extensible Firmware Interface (UEFI) that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2014-8274. |
This issue has no known workaround. |
2.2(6c)A |
||
CSCuv27587 |
The import configuration fails when call home is not configured while performing a backup operation.
|
Configure call home before taking a backup. |
2.2(6c)A |
||
CSCuv38136 |
The platform might hang if there are any errors during the boot loader phase when in UEFI boot mode and using a Fibre Channel (FC) boot. Error conditions that require re-discovery/login for the FC LUN path during the BIOS boot phase, until the OS takes over, are currently not handled by VIC Oprom UEFI Driver. This results in a hang when the OS is being loaded by the BIOS using a VIC UEFI driver. |
Shutdown and reboot the server. |
2.2(6c)A |
||
CSCuv59487 |
SPAN does not capture broadcast packets when you add vNIC as source. |
Use the HIF port where the Virtual Network Interface (vEth) is bound as the SPAN source. |
2.2(6c)A |
||
CSCuv62162 |
The Power Technology token in UCS Manager BIOS policy has no effect on relevant CPU power performance option, such as EIST, Turbo Mode, P-States, and C-States. |
Each setup option that is meant to be controlled by the Power Technology token should be set manually in UCS Manager. |
2.2(6c)A |
||
CSCuv76884 |
The Adaptor policies of dynamic vNICs created for a Global Service Profile (GSP) vNIC on UCS Manager are incorrect when there are two Dynamic vNIC policies with the same name created in different organization levels. |
Change the Global Service Profile label to update the service profile vNICs.
|
2.2(6c)A |
||
CSCuv88433 |
UCS Manager displays a different sets of I2C data based on whether the data is from the master IOM or the slave IOM that is connected to the primary fabric.
|
There is no workaround for this issue. |
2.2(6c)A |
||
CSCuw10623 |
SBR firmware updates for servers with LSI9271-8i adapter appear to have a loss of datastore in the ESXi host. |
There is no workaround for this issue. |
2.2(6c)A |
||
CSCuy98678 |
Cisco UCS 6296 fabric interconnect may crash unexpectedly with kernel panic, and impact any devices connected the fabric interconnect. |
Reboot the fabric interconnect to restore connectivity. |
2.2(6c)A Resolved in 2.2(8a)A |
||
CSCuw55142 |
Cisco UCS B420M4 server with the UCSB-MRAID12G-HE no longer reports the following critical fault: Controller 1 on server is inoperable. Reason: Device non-responsive |
There is no workaround for this issue. |
2.2(6c)B Resolved in 2.2(6f)B, 2.2(7b)B |
Open Caveats in Release 2.2(5c)
Open Caveats in Release 2.2(5c)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCva27558 |
In scenarios such as traffic loops in external networks, a series of MAC add or delete operations may cause a missing MAC address in the software table, or in the hardware table for all the ASICs. |
Avoid traffic loops in the external network. Once the problem is encountered, the MAC address can be manually cleared from the CLI to fix the issue. Example: ESC-POD-OO25-A(nxos)# clear mac address-table dynamic address 0050.56b2.4db2 vlan 205 |
2.2(5c)A Resolved in 2.2(8c)A |
CSCux59912 |
A Cisco UCS system with servers connected to a Cisco Nexus 2232 FEX experiences bladeAG cores that are displayed in the switch logs. |
If this issue occurs, restart bladeAG through dplug or restart PMON. |
2.2(5c)C Resolved in 2.2(8a)C |
CSCuw13170 |
When auto-deploying the installation of ESX on Ivy Bridge-EX platforms, some platforms that enforce ACS violations strictly will generate a non-maskable interrupt (NMI), and the host OS may crash. |
There is no known workaround. |
2.2(5c)B Resolved in 2.2(5d)B |
Open Caveats in Release 2.2(5b)
Open Caveats in Release 2.2(5b)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCuy01645 |
DIMM temperature readings are reported as NA when the temperature is 16 degree Celsius more than the previous reading. This results in missed temperature readings, which in turn results in Cisco UCS Manager generating thermal alerts. |
This issue has no known workaround. |
2.2(5b)B Resolved in 2.2(6i)B, 2.2(7c)B |
CSCux96432 |
Discovery fails on UCS B420 M4 servers with a 2-CPU configuration and a Fusion IO card in adapter slot 3. |
To resolve this issue, update the BIOS to version 2.2.6d.0 or later versions. |
Resolved in 2.2(6g)B 2.2(5b)B |
CSCux40478 |
When installing a Cisco B200 M3 blade server with a UCSB-MLOM-40G-01 40G VIC and either a UCSB-F-FIO-1300MP or a UCSB-F-1600MS ioMemory PCIe flash Mezzanine card, in a chassis with an N20-I6584 IOM, blade discovery fails with an “Invalid adapter-iocard combination” error. |
When this issue occurs, remove the flash Mezzanine card to be able to continue installation. |
2.2(5b)B Resolved in 2.2(6f)B |
Open Caveats in Release 2.2(5a)
Open Caveats in Release 2.2(5a)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||||
---|---|---|---|---|---|---|---|
CSCvb08928 |
A fabric interconnect may reboot from a VLAN deletion due to a FWM hap reset. |
Avoid deleting a VLAN. |
2.2(5a)A Resolved in 2.2(8f)A |
||||
CSCuw44524 |
When using Cisco UCS Manager Release 2.2(5a), 2.2(5b), 2.2(5c) or 2.2(6c) for E7 v2 processors on the C460 M4, B260 M4, and B460 M4 servers, while you perform a clear CMOS BIOS operation, the following error may occur, which eventually causes the server to reboot or crash: System Software event: Memory sensor, Uncorrectable ECC error, DIMM socket 1, Channel A, Memory Riser 2, Processor Socket 1. was asserted
|
When this issue occurs, downgrade to Cisco UCS Manager Release 2.2(4c).
|
2.2(5a)B 2.2(5a)C Resolved in 2.2(6e) |
||||
CSCuv04436 |
Cisco UCS B200 M4 servers with the following CPUs may experience performance degradation:
|
There is no workaround for this issue. See the Software Advisory. A patch will be released in July, 2015. |
2.2(4b)B |
||||
CSCuu38206 |
If you disable and enable TXT several times, the state of TXT in the Cisco UCS Manager BIOS policy and the actual tboot state may get out of sync. |
When this occurs, do the following:
|
2.2(5a)B |
||||
CSCuu58282 |
In Cisco UCS B420 M4 servers with UCSB-MRAID12G and UCSB-LSTOR-PT RAID controllers, in the rare event that Online Controller Reset (OCR) is triggered during normal I/Os on JBOD drives, excessive Fast Path IO failures may be seen after the controller is reset. |
When this occurs, reboot the host. |
2.2(5a)B Resolved in 2.2(5b)B |
||||
CSCuu35687 |
In Cisco UCS B420 M4 servers with UCSB-MRAID12G and UCSB-LSTOR-PT RAID controllers, the Fault/Locator LEDs for disks 3 and 4 are swapped. |
This issue has no known workaround. |
2.2(5a)B Resolved in 2.2(5b)B |
||||
CSCuu49909 |
If you disable TXT in the Cisco UCS Manager BIOS policy after installing ESX with TXT enabled, ESX becomes unresponsive and displays the following message: Relocating modules and starting up the kernel.... |
When this issue occurs, do one of the following:
|
2.2(5a)B |
||||
CSCuu61885 CSCuu71563 |
When UCS C460 M4 servers with Intel® Haswell processors are in UCSM mode, if the boot order policy is configured to boot from SAN, and the network adapter connected to it is installed on any PCIe slot other than PCIe slot 4, the BIOS may not show the SAN boot device in the boot order, and the system may fail to boot from SAN. As a result of SAN boot failure, the system may become unresponsive at the end of the BIOS POST, or attempt to boot from other boot devices configured in the boot order policy. If the system is booted from some other boot device, for example, Local HDD, the SAN LUN will still be accessible and usable. |
When this issue occurs, do the following:
|
2.2(5a)C |
Open Caveats in Release 2.2(4b)
Open Caveats in Release 2.2(4b)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||||
---|---|---|---|---|---|---|---|
CSCvg44307 |
Communication between two end hosts may fail within the same VLAN and fabric interconnect. |
Reboot the IOM to recover from this condition. |
2.2(4b)A Resolved in 2.2(8i)A |
||||
CSCvc46313 |
Remote operation from UCS Central no longer fails with the error message: Global Service profile [org-root/org-GKDC/org-<name>/ls-SP_3260_03] can not be modified from UCS domain. Please make the changes
from UCS Central that you are registered with. |
There is no known workaround. Contact TAC for assistance. |
2.2(4b)A Resolved in 2.2(8g)A |
||||
CSCuu29425 |
Prior to RHEL 7.0, packets received on the native VLAN were properly processed by the driver and the OS. RHEL 7.0 and 7.1 introduced a regression that does not allow the ENIC driver to properly handle packets received on the native VLAN. These packets are reported by the ENIC driver as received on VLAN 0 and will not be properly processed by the network stack. In particular by software devices such as a bridge. RHEL 7.2 fixes this regression. |
Go to https://access.redhat.com/announcements/2058583 to download and apply the RHEL 7.2 upstream patch. You can also apply the following two patches that RedHat applied to RHEL 7.2 to fix the issue. http://lists.openwall.net/netdev/2013/09/10/30 https://lists.linuxfoundation.org/pipermail/bridge/2015-July/009630.html |
2.2(4b)B Resolved in 2.2(8c)B |
||||
CSCuw50361 |
While collecting IOM tech-support by using the show platform software satctrl global output from the IOM, the HIF/NIF interfaces of an IOM may flap due to SDP heartbeat timeout. |
If you have encountered this SDP timeout during tech-support collection, take the following actions for any subsequent tech-support on the chassis that had been impacted:
|
2.2(4b)A Resolved in 2.2(8c)A |
||||
CSCuv32417 |
Cisco B200 M4 and B420 M4 blade servers that run on UEFI OS may reboot unexpectedly when BIOS POST is not marked as complete. |
There is no workaround for this issue. |
2.2(4b)B Resolved in 2.2(6e)B |
||||
CSCuw23829 |
When inserting a HDD into the final disk slot of a C240 M4 server with 8 supported slots for disks, Cisco UCS Manager may displays a additional disk in the 9th slot, which is non-existent. |
This error has no workaround. It does not affect any functionality. All the HDD operations can still be performed on the HDD shown on the final slot. However, any operation or configuration attempted on the invalid HDD will result in an error. |
2.2(4b)A Resolved in 2.2(6e)A |
||||
CSCuv20999 |
When Cisco UCS Manager is managed by Cisco UCS Central, and there is a global service profile associated with a blade server, global VLANs cannot be assigned to a particular uplink interface through Cisco UCS Manager ( ), and the following error message is displayed:Global Service Profile[xxxxx] cannot be modified from UCS domain. Please make the changes from UCS Central that you are registered with. |
When this error occurs, do the following:
|
2.2(4b)A Resolved in 2.2(5d)A |
||||
CSCuw50417 |
After upgrading the BIOS of Cisco UCS B200 M3 servers to any release between 2.2(4b) and 2.2(5c), the OS may randomly report the following messages in the /var/log/boot.gz file of the OS if the OS boot time is exceptionally slow: Initializing Power Management ... Power: 2568: No supported CPU power management technology detected Intel Enhanced SpeedStep is supported but disabled in BIOS |
When this error occurs, it disables the OS PM capability, but has no known workaround to resolve it. |
2.2(4b)B Resolved in 2.2(5d)B |
||||
CSCuu89283 |
Service profile association fails and displays the following message: Controller does not support non-default virtual drive properties This happens when you modify virtual drive policy attributes, such as read-policy, write-policy, and cache-policy, for a rack server with a UCSC-MRAID12G storage controller that has LUNS managed through storage profiles. |
There is no known workaround for this issue. |
2.2(4b)A Resolved in 2.2(5c)A |
||||
CSCuv00089 |
After upgrading the Fabric Interconnect to Cisco UCS Manager Release 2.2(4) or 2.2(5), systems that have OS-based NIC teaming configured as Active-Standby will experience network connectivity issues. This is because the MAC addresses of teamed interfaces are learned statically on both FI server ports.
|
When this issue occurs, do one of the following:
|
2.2(4b)A Resolved in 2.2(5c)A |
||||
CSCuv13545 |
If Cisco UCS Manager is registered with Cisco UCS Central, and the service profile refers to a global host firmware pack policy, UCSM downloads images instead of skipping it during shallow discovery. |
There is no known workaround for this issue. |
2.2(4b)A Resolved in 2.2(5c)A |
||||
CSCuv29668 |
When using Cisco UCS 6100 Series Fabric Interconnects with Cisco UCS 2100 IOMs, some blade servers with two Cisco UCS M81KR VIC adapters fail discovery after updating Cisco UCS Manager to Release 2.2.(4b) and later releases, or to Release 2.2(5a). The second adapter causes the discovery failure. UCS Manager could display several errors including the following: sendsamedmeadapterinfo: identify failed adapter: repo lookup failed |
Downgrade UCS Manager to a release earlier than Release 2.2(4b). |
2.2(4b)A Resolved in 2.2(5b)A |
||||
CSCuv04436 |
Cisco UCS B200 M4 servers with the following CPUs may experience performance degradation:
|
There is no workaround for this issue. See the Software Advisory. A patch will be released in July, 2015. |
2.2(4b)B |
||||
CSCut54652 |
If the rack server is using UCSC-PCIE-C10T-02 or UCSC-MLOM-C10T-02 adapters, during service profile association, firmware upgrade on any third-party Converged Network Adapter (CNA) fails with the following error: Unable to find VNIC Device |
When this occurs, do the following:
|
2.2(4b)A Resolved in 2.2(5a)A |
||||
CSCuu53920 |
In a Cisco UCS B460 M4 server, service profile association fails when virtual drive creation is attempted by using a storage profile on a slave RAID controller. |
This issue has no known workaround. |
2.2(4b)A Resolved in 2.2(5a)A |
||||
CSCut53878 |
When port profiles do not have any VLANs and both Fabric Interconnects are rebooted, STP cores are observed. |
To avoid this, during port profile creation, ensure that each port profile has at least one VLAN. |
2.2(4b)A |
||||
CSCuu52001 |
In a C-Series rack server with an external RAID controller, service profile association fails at 78% with the following error message: cannot support multiple scsi controllers |
Remove the external RAID controller, and the service profile association will complete successfully. |
2.2(4b)C Resolved in 2.2(5a)A |
||||
CSCuu37369 |
A storage profile can be created in the main organization within Cisco UCS Manager, but it cannot be created through a sub-organization. |
Use the Cisco UCS Manager CLI to create a storage profile in a sub-organization:
You can also create a storage profile within the sub-organization service profile during service profile creation. |
2.2(4b)A Resolved in 2.2(5a)A |
||||
CSCuu42945 |
Service profiles created from service profile templates with local storage profiles fail association with the following error: Server unavailable, there are not enough resources overall, incomplete LUN configuration. |
When this occurs, modify the description of service profile template. |
2.2(4b)A Resolved in 2.2(5a)A |
||||
CSCuu65128 |
If you configure more than 64 vNICs (excluding dynamic vNICs) on a single server, the Fabric Interconnect reboots continuously due to an LLDP core. |
Do not configure more than 64 static vNICs on a single server (excluding dynamic vNICs) |
2.2(4b)A Resolved in 2.2(5a)A |
||||
CSCus73395 |
If the discovery policy is configured as Platform-Max, and all links are not connected and acknowledged, servers are not discovered on first installation with import all backup configuration. |
When this occurs, reacknowledge the chassis to start discovering the servers. |
2.2(4b)A |
||||
CSCuo62019 |
When adding or deleting multiple VLANs for a large number of port profiles as part of a single operation, the DME might restart. |
When this occurs, apply each addition or deletion as separate operations instead of as a bulk operation. |
2.2(1b)A |
||||
CSCut72773 |
Installation of ESXi 5.5 U2 fails through PXE boot on Cisco UCS M4 servers in UEFI boot mode. |
This issue has no known workaround. Alternate options include:
|
2.2(4b)B |
||||
CSCut35123 |
After high availability failover, you may see chassis-seeprom local IO failure with the following message: Warning: there are pending SEEPROM errors on one or more devices, failover may not complete. |
When this occurs, reset the power supply unit. |
2.2(4b)A Resolved in 2.2(6c)A |
||||
CSCus71522 |
Changes made to the user-defined flow record definitions for NetFlow are not updated and propagated to the vNIC that is already using the existing flow record definition. |
When this occurs, remove the policy from the interface and reapply. |
2.2(4b)A |
||||
CSCut96983 |
For LUNs that are created by using the local disk configuration policy, the option to add UEFI boot parameters is not enabled. Hence, local LUN boot fails for UEFI after service profile migration. |
For UEFI boot from local LUN, use LUNs that are created by using storage profiles. |
2.2(4b)A |
||||
CSCup43526 |
On a scale Cisco UCS system, creation and download of the technical support file from the Cisco UCS Manager GUI times out with a timeout message. |
Even though the timeout message appears in the Cisco UCS Manager GUI, the technical support file is created and saved locally. |
2.2(1b)A |
||||
CSCut78943 |
When a service profile is associated to a server with a Cisco UCS VIC 1340 or VIC 1380 adapter, the actual order of vNICs and vHBAs does not reflect the configured order. |
In Cisco UCS Manager, specify the vNIC/vHBA placement order manually using the following steps: |
2.2(3c)A Resolved in 2.2(6c)A |
||||
|
|||||||
CSCva72096 |
Cisco UCS servers running Intel E5 Xeon v4 CPUs crashed with a signature pointing to internal parity errors, page fault, general detect, or undefined opcode exceptions. |
This issue has no known workaround. |
2.2(4b)B Resolved in 2.2(7e)B, 2.2(8b)B |
Open Caveats in Release 2.2(3k)
Open Caveats in Release 2.2(3k)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCvb78971 |
When attempting the auto-install of UCS Manager, the fabric interconnect upgrade may fail when the /var/tmp usage exceeds 10%. |
There is no workaround for this issue. |
2.2(3k)A Resolved in 2.2(3l)A, 2.2(8f)A |
Open Caveats in Release 2.2(3j)
Open Caveats in Release 2.2(3j)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCuv97713 |
After upgrading Cisco UCS Manager, in rare cases, the IOM may core in the sysmgr process leading to IOM reboot. |
There is no workaround for this issue. |
2.2(3j)A Resolved in 2.2(3k)A, 2.2(6g)A |
Open Caveats in Release 2.2(3h)
Open Caveats in Release 2.2(3h)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCux10203 |
When you decommission a C-Series server after it was discovered in direct attached configuration, and the direct attached switch port was changed from Ethernet to FC mode, the following error message may appear: Warning : if_index 0x1a01a000[Ethx/x] does not exists in VLAN database#ERROR |
When this issue occurs, switch the ports back to Ethernet mode from FC mode and allow the server decommission to complete. |
2.2(3h)A Resolved in 2.2(3j)A, 2.2(6e)A |
CSCuw59409 |
When you upgrade a directly connected C-Series rack server without decommissioning, and connect the server to FI port, you may experience a DME crash issue. |
Contact TAC to decommission the rack server from the back end. |
2.2(3h)A Resolved in 2.2(3j)A, 2.2(6e)A |
CSCuw84010 |
Integrated C-Series rack servers with Seagate drives fail association when using the host firmware policy in a service profile. |
Do one of the following:
|
2.2(3h)A Resolved in 2.2(3j)A, 2.2(6e)A |
Open Caveats in Release 2.2(3g)
Open Caveats in Release 2.2(3g)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||
---|---|---|---|---|---|
CSCuv46749 |
When using Cisco B200 M4 blade servers with the UCSB-MRAID12G storage controller, the following random transient alerts or faults are incorrectly reported, and these alerts or faults get cleared in 30 to 40 secs:
|
No known workaround. |
2.2(3g)B Resolved in 2.2(6f)B |
||
CSCuv51214 |
Messages log overfilled with BMC is suspecting that palo is in boot block. Leaving I2C bus alone. messages. |
No known workaround. |
2.2(3g) Resolved in 2.2 (6c) |
||
CSCuv28540 |
When you run Cisco UCS Manager Releases between 2.2(1) and 2.2(3) with catalog versions 2.2(4b)T or 2.2(5a)T, SAN boot fails on servers where the boot vHBAs are placed on a VIC. This is because the VIC PCI slot ID displays N/A in the UCSM inventory.
|
Downgrade the catalog version to the corresponding Cisco UCS Manager release and re-acknowledge the rack server. |
2.2(3g)A Resolved in 2.2(5c)A with catalog version 2.2(5b)T |
Open Caveats in Release 2.2(3f)
Open Caveats in Release 2.2(3f)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCva14937 |
M4 blades installed with SD cards instead of a hard disk may halt at 'Local Drive' for automated deployments with the following boot policy: Boot Policy
|
There is no known workaround. |
2.2(3f)B Resolved in 2.2(8g)B |
CSCuu66595 |
An error prevented multiple backups to the same host. |
Delete the previously created configuration entry from Backup operations table. |
2.2(3f)A Resolved in 2.2(3l)A |
CSCuy79306 |
When Cisco UCS C-Series servers with VIC 1225 or VIC 1227 are directly connected to Cisco Nexus 9000 switches, after making a large change on a switch, ports may flap or show as down on the switch but up on the server. |
When this issue occurs, do one of the following:
Another workaround is to change the debounce timer to 3 seconds: conf ; interface eth x/y ; link debounce timer 3000 |
2.2(3f)C Resolved in 2.2(8c)B |
CSCux05389 |
Occasional VSAN misconfiguration occurs after upgrading to release 2.2(3f) and rebooting the subordinate fabric interconnect. |
When this issue occurs, do one of the following:
|
2.2(3f)A Resolved in 2.2(7b)A |
CSCuv89839 |
When the fabric interconnect is in switch mode with direct attached storage, and its FC uplinks to the direct attached storage are up, these FC uplinks do not allow traffic to pass. |
When this issue occurs, run the shut and no shut commands on the affected ports, for example, vfc or FC uplink. |
2.2(3f)A Resolved in 2.2(6g)A |
CSCuu16791 |
The Firmware Auto Sync Server Policy is Auto Acknowledge by default. This setting attempts to push the default Host Firmware Package firmware in to newly attached blades/rack-servers. |
Change the Auto Sync Server Policy option to No actions. |
2.2(3f)A |
CSCuu60867 |
Unable to discover UCS C240 M3 servers with dual RAID controllers through Cisco UCS Manager. |
When this issue occurs, remove one of the two RAID controllers and re-discover the server. |
2.2(3f)A Resolved in 2.2(5c)A |
Open Caveats in Release 2.2(3d)
Open Caveats in Release 2.2(3d)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||||
---|---|---|---|---|---|---|---|
CSCva31113 |
After a Fabric Interconnect reboot, the FI does not fully boot and become network accessible. The Serial Console connection to the FI may show a "loader" prompt or show initial configuration prompts. |
In most cases the underlying file system corruption can be fixed by booting into the kickstart image and running a file system check. There is no guaranteed preventative workaround. Although corruption may still occur, it is recommended to use the pre-upgrade package to send proper SSD shutdown commands prior to reboot. A pre-upgrade package containing a script and a kernel module was developed for 62xx Fabric Interconnects running 2.2(x) firmware to ensure proper SSD shutdown prior to the reboot required during the upgrade process. With this deployed, the risk to run into a file system corruption issue during reboot is reduced, however not eliminated. Please contact Cisco TAC for assistance with recovery or the pre-upgrade script.
|
2.2(3d)A Resolved in 2.2(8i)A |
||||
CSCva04106 |
Removing a SAN port channel member may cause SAN ports to go down. |
When this issue occurs, do the following:
|
2.2(3d)A Resolved in 2.2(8a)A |
||||
CSCuu40978 |
If a large number of syslog messages are generated, the syslog file may fill the Fabric Interconnect file system and prevent it from being written into. |
If you are unable to write to the filesystem, use the following commands on the Fabric Interconnect to verify whether the issue is caused by the syslog messages file: connect nxos a | b show system internal flash | grep root
show system internal dir /var/log/external
|
2.2(3d)A Resolved in 2.2(3k)A, 2.2(6i)A, 2.2(7d)A, 2.2(8b)A |
||||
If the file is close to 100 MB: From , reduce the size of the local syslog file. You can increase the size of this file later.Longer term workaround: Ensure that the severity for the local file is set to Critical. If you still see significant growth of the file even after reducing the size of the local syslog file once, you either will need to repeat the steps or disable the syslog file entirely and use a remote destination. |
|||||||
CSCuv31912 |
Cisco UCS Manager iptables are duplicating rules in the FORWARD table. |
Reboot the fabric interconnect to clear the entries. If the duplicate entries are in the thousands, or if there are connectivity issues to Cisco UCS Manager because of missing rules in the INPUT tables, contact TAC for help with the workaround. |
2.2(3d)A Resolved in 2.2(3j)A, 2.2(6c)A, 2.2(8a)A |
||||
CSCuv06504 |
The svc_sam_dme process crashes during steady state of operation when a database(db) corruption is detected primarily on the subordinate fabric interconnect. When the subordinate fabric interconnect detects a nvram or flash db corruption, it initiates a self-healing mechanism to rectify the sqlite db. After the sqlite db on the subordinate is rectified, the svc_sam_dme reloads the db and during this reload it sometimes crashes. |
There is no workaround. The system recovers on its own after svc_sam_dme restarts. |
2.2(3d)A Resolved in 2.2(3j)A, 2.2(6c)A |
||||
CSCus73196 |
Installation of ESXi 5.5 Update 2 and later updates, or ESXi 6.0 and later updates on the FlexFlash of a Cisco UCS B200 M4 server fails with the following error: partedUtil failed with message: Error: Can't have a partition outside the disk! Unable to read partition table for device |
To avoid this issue, disk scrub the FlexFlash before installing an Operating System. |
2.2(3d)B |
||||
CSCur99740 |
While upgrading or downgrading the Fabric Interconnect image on the Cisco 6100 series, you may see the following symptoms:
|
To recover from upgrade or downgrade failure, reboot using the Cisco UCS Manager CLI, or power cycle the Cisco 6100 series FI: Example: UCS-A# connect local-mgmt UCS-A(local-mgmt)# reboot To recover from Auto-install failure:
|
2.2(3d)A Resolved in 2.2(3e)A. |
||||
CSCus76125 |
Global service profile will not resolve the LAN ping group even when the ping group is created in Cisco UCS Manager. |
This isssue has no workaround. Please contact Cisco TAC for help with this issue. |
Resolved in 2.2(3k)A |
||||
CSCuz67284 |
When installing the ESXi 5.5 U2 custom ISO to FlexFLash, the partedUtil fails with the following error message: “Can't have a partition outside the disk! Unable to read partition table for device. |
Scrub the FlexFlash drives to install the ISO without any issues. |
2.2(3d) |
Open Caveats in Release 2.2(3c)
Open Caveats in Release 2.2(3c)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCus93431 |
Adding other storage, such as a local disk or a USB to a SAN boot only policy deletes the SAN boot policy from Cisco UCS Manager. |
Modify the boot policy description, and save the boot policy again to Cisco UCS Manager. |
2.2(3c)A Resolved in 2.2(3j)A, 2.2(6c)A |
CSCus81832 |
When a Cisco UCS VIC 1340 or VIC 1380 adapter is used with a Sandy Bridge CPU in a Cisco UCS B420 or UCS B200 M3 server, the server hangs. This causes the KVM console window to become unresponsive and the installation of Red Hat Enterprise Linux 6.5 or 7.0 is not completed. |
When this issue occurs, change the adapter to Cisco UCS VIC 1240 or VIC 1280. |
2.2(3c)B Resolved in 2.2(4b)B. |
CSCur70034 |
Service Profiles with a common VLAN name configured on one of the vNICs fail with the following error: Incorrect VLAN configuration on one of the VNICs. |
To resolve this issue, either delete the local-vlan with the same vlan-ID on Fabric A, or modify the service-profile vNIC to point to the Fabric-A vlan name. |
2.2(3c)A Resolved in 2.2(3e)A. |
CSCut45598 |
Kernel Panic on Fabric Interconnect. |
None. |
2.2(3c)A Resolved in 2.2(3g)A |
Open Caveats in Release 2.2(3b)
Open Caveats in Release 2.2(3b)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||
---|---|---|---|---|---|
CSCuz74973 |
When you use a B200 M4 server with a UCSB-MRAID12G SAS RAID controller and a CPLD firmware version earlier than version 05D, the B200 M4 server powers off unexpectedly. The OBFL displays the following log message: [platform_power_state_irq_handler]: 18: VDD_PWR_GOOD: Deasserted |
If this issue occurs, upgrade the infrastructure and server firmware to Cisco UCS Manager Release 2.2(7b) or later releases.
If the server firmware is upgraded to a fixed release earlier than the infrastructure firmware, do one of the following after the infrastructure firmware is upgraded to the fixed release.
This is required for the correct server firmware component to upgrade and prevent the issue. |
2.2(3b)B Resolved in 2.2(7b)B |
||
CSCuw16950 |
The FSM does not handle failure scenarios such as domain name resolution failures. FSM failure in such scenarios can trigger the addition of duplicate entries in IP tables. The longer the uptime after a trigger condition, the more the duplicate entries. |
To prevent known triggers for this issue, resolve any Cisco UCS Manager faults or issues that are related to external hosts or services such as NTP and DNS. When this issue occurs, contact TAC to perform the workaround described in CSCuv31912. After the temporary workaround has been deployed, it is still highly advised to resolve Cisco UCS Manager faults or issues that are related to external hosts or services. If this is not done, the issue may reoccur. |
2.2(3b)A Resolved in 2.2(8a)A |
||
CSCux85580 |
Fabric Interconnect cores will be seen on IGMP. |
This issue has no known workarounds. |
2.2(3b)A Resolved in 2.2(7b)A |
||
CSCux71937 |
The CPU utilization always displays 100 percent for the kernel in the output of the show system resources command. This could happen if the system had been up for a very long time (more than 200 days, but this time-frame could vary): FI(nx-os)# show system resources Load average: 1 minute: 0.50 5 minutes: 0.71 15 minutes: 1.04 Processes : 563 total, 3 running CPU states : 0.0% user, 100.0% kernel, 0.0% idle Memory usage: 3490164K total, 3140304K used, 349860K free |
If this issue occurs, reload to reset the memory. |
2.2(3b)A Resolved in 2.2(3j)A, 2.2(6f)A |
||
CSCuu33864 |
When upgrading to a Cisco UCS Manager 2.2 release earlier than Release 2.2(6c), the fabric interconnect may become unresponsive at the loader prompt and not boot correctly. Various error messages may also be displayed. |
Load a kickstart image either from the bootflash or through tftp. If the drive is still accessible, copy the debug plugin to it and load it. If the drive is no longer accessible, run the 'init system' command to re-initialize the SSD. If the drive is still accessible it may be possible to repair the file system corruption from the Linux shell as follows:
It is recommended to copy critical data back to the SSD because data on disk could still be corrupted even after file system corruption has been fixed. Alternatively, you can run the init-system script to reinitialize the SSD.
|
2.2(3b)A Resolved in 2.2(6c)A, 3.1(1e), 3.1(2b) |
||
CSCut88909 |
When trying to map a Virtual Media, KVM becomes unresponsive. Map CD/DVD, Map Removable Disk, and Map Floppy Options are not displayed. |
Do one of the following:
|
2.2(3b) Resolved in 2.2(6c) |
||
CSCuu15465 |
If the version of board controller on a UCS B200 M4 server is higher than the version in the Host Firmware Pack, Cisco UCS Manager tries to downgrade firmware of board controllers on the servers. This power cycles the servers. |
This issue has no known workaround. |
2.2(3b)A Resolved in 2.2(3h)A |
||
CSCuq74763 |
On Windows 2012 hypervisors, vmNICs configured with NVGRE network virtualization fail to initiate network traffic when NVGRE NIC task offloads is enabled.
|
To use NVGRE NIC task offload feature, upgrade the hypervisor to Windows 2012 R2. Alternatively, disable the NVGRE task offload feature using Cisco UCS Manager or in the hypervisor while using Windows 2012. |
2.2(3a)A |
||
CSCuq88436 |
XML Parsing Error due to multiple jbod diskState attributes is incorrectly specified when a server with two or more local disks is configured with No RAID disk config policy. |
This issue has no known workaround. |
2.2(3b)A |
||
CSCuq95926 |
If you unplug the primary management cable when the HA is not complete, the Cisco UCS FI HA status remains in “switchover in progress”. |
Restart the primary DME using the pkill dme command, or reboot the FI. |
2.2(2c)B |
||
CSCup46033 |
On a FI with a GEM module installed, the total default quantity of licenses does not match the total quantity of licenses available by default. |
This issue has no known workaround. |
2.1(1f)A |
||
CSCuq51890 |
entPhysicalDescr is returning the wrong getnext values during SNMPwalk. |
Perform an SNMPwalk of 1.3.6.1.2.1.47.1.1.1.1.2.1 followed by 1.3.6.1.2.1.47.1.1.1.1.2.24 to get the remaining information. |
2.2(2c)A |
||
CSCus97608 |
Faults in Cisco UCS Manager such as “error accessing shared-storage” and timeout/failover warning within the “show cluster extended-state” are displayed when several devices in several chassis are reporting EBUSY within the I2C logs. |
This issue has no known workaround. |
Resolved in 2.2(3g)A |
||
CSCut02769 |
While performing a dbsync between Cisco UCS Fabric Interconnects, the Cisco UCS database copies all the files, and just copies the required files. |
This issue has no workaround. |
Resolved in 2.2(3g)A |
Open Caveats in Release 2.2(3a)
Open Caveats in Release 2.2(3a)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||
---|---|---|---|---|---|
CSCux41398 |
UCS Manager includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2015-3193, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196 and CVE-2015-1794 |
There is no known workaround. |
2.2(3a)B Resolved in 2.2(8i)B |
||
CSCuq57142 |
In a port channel universe, the following may occur:
|
If this issue occurs:
|
2.2(3a)A Resolved in 2.2(3k)A, 2.2(6i)A, 2.2(7c)A |
||
CSCuy62783 |
In a UCS setup with a VIC 13xx adapter on blade servers or rack-mount servers with Microsoft Windows OS, the server or VIC adapter may become unresponsive after running IO across network file systems. As a result, the vNICs are disconnected from the OS, which leads to connectivity loss until server reboot. In the case of iSCSI booted systems, this may result in a 0x7B INACCESSIBLE_BOOT_DEVICE BSOD. |
If this issue occurs, do the following:
|
2.2(3a)B Resolved in 2.2(6i)B, 2.2(7c)B |
||
CSCuw44595 |
DIMMs with correctable ECC errors are marked Inoperable or Degraded even though correctable errors do not affect normal system operation. |
For Cisco UCS Manager Release 2.2(1a) and later versions, clear the error messages with the following CLI commands: scope server x/y reset-all-memory-errors For Cisco UCS Manager Release 2.1(x), this example shows how to enter the DIMM mode for server 1/1 to reset-errors on a DIMM module 2 in memory-array 1:
|
2.2(3a)A Resolved in 2.2(3k)A, 2.2(6i)A |
||
CSCux68679 |
When a UCS B460 M4 server is configured with Fusion IO cards installed in same mezzanine slot of the master and slave blades, actions such as Cisco UCS Manager upgrade, cluster failover, fabric interconnect reboot trigger server reboot. |
To avoid this issue, install the Fusion IO card only in the master blade. |
2.2(3a)A Resolved in 2.2(3k)A, 2.2(6g)A |
||
CSCut10525 |
The FlexFlash firmware version is not updating and the FFCH_ERROR_OLD_ FIRMWARE_RUNNING is displaying in the fault summary after you update the UCS B200 M4 server firmware using Cisco UCS Manager Release 2.2(4b). |
Reset the FlexFlash Controller manually to remove the error. |
2.2(3a)B Resolved 2.2(3j)B |
||
CSCuv72975 |
When upgrading the Cisco UCS Manager infrastructure bundle and using VIC-1340 or VIC-1380, the backplane port of the IOM and VIC goes down. |
There is no known workaround. |
2.2(3a)B Resolved in 2.2(3j)B |
||
CSCuw78688 |
When the FI is rebooted or UCS Manager is activated to a new version and the DME database has a corrupted entry, you may see one of the following issues:
|
There is no known workaround. If UCS Manager has lost configuration, you can reimport the configuration using the all-config backup file. Contact Cisco TAC for more assistance. |
2.2(3a)A Resolved in 2.2(6e)A, 2.2(3j)A |
||
CSCus55944 |
In a Cisco UCS Manager configuration with a C260 rack-mount server and two adapters, adding a VLAN to a vNIC on an service profile template immediately reboots the rack server that is associated with the inherited service profile. |
The activation status of both adapters displays Ready. Any subsequent service profile configuration change will not result in a reboot unless the configuration itself requires a reboot. |
2.2(3a)A Resolved in 2.2(3j)A, 2.2(4b)A |
||
CSCur79257 |
When Cisco UCS Manager is configured as fc-uplink port-channel, and is being upgraded, the FSM fails and the vLANs are not added to FI B uplinks. |
When this issue occurs, reboot the fabric interconnect. |
|||
CSCut37134 |
Cisco UCS B200 M4 servers running ESXi 5.5 will crash intermittently when booting locally. |
|
|||
CSCup45804 |
VXLAN offload is enabled. Throughput is reduced because of two-way traffic between VMs. |
This issue has no known workaround. |
2.2(3a)A |
||
CSCuo11544 |
In some cases, NicAG gets stuck when getting events from adapter when that adapter is busy performing other tasks. |
To work around this issue, perform one of the following options:
|
2.2(3a)B |
||
CSCuq09577 |
In some cases, a system running a 6100 FI setup with a large number of rack servers becomes unresponsive due to a high number of error messages overfilling the Cisco UCS Manager log file when an insufficient number of FEX/IOM uplinks are configured. |
Make sure a sufficient number of IOM/FEX uplinks are configured so that vNICs configured on each service profile do not exceed the limit. |
2.2(2c)A |
||
CSCuq14172 |
Windows 2012 and Windows 2012R2 systems hang (boot and installation) when TXT is enabled via BIOS setup. |
This issue has no known workaround. Disable TXT and reboot. |
2.2(2a)B |
||
CSCuq28367 |
Host continuously reboots if scriptable vMedia mount fails and the same device type is also configured in boot policy. |
Uncheck to disable the “Retry on mount fail” option in scriptable vMedia policy. |
2.2(3a)A |
||
CSCuq33306 |
SAN boot with Emulex adapter fails with the first vHBA created when creating a Cisco UCS Manager service profile boot policy to boot from SAN LUN from the first vHBA. |
Use the second vHBA for booting and map boot targets to the second vHBA in the Emulex adapter. |
2.2(3a)A |
||
CSCuq44049 |
In rare cases, when adding SD cards dynamically (without powering down server) to a server without SD cards or when dynamically adding one SD card to a server with only one SD card, the server gets stuck in sync mode and disconnects existing drives accessed by host from an SD card. |
To avoid potential data loss, first disable HOST VD access (from WEB UI or CLI) if VD access is enabled. Then, after confirming each SD card is plugged in properly, execute reset of the flex flash controller (from WEB UI or CLI). |
2.0(3b)A |
||
CSCuq63592 |
In some cases, blade association fails on servers with Cisco UCS VIC 1340 or Cisco UCS VIC 1380 adapters when some vHBAs are placed manually on Host Port 1 or Host Port 2 and some are placed by system when Desired Host Port is set to ‘ANY.’ |
Place all vHBAs manually on host ports 1/2 or allow system to place all vHBAs. |
2.2(3a)A |
||
CSCuq64931 |
Blades with Cisco UCS VIC 1340 or Cisco UCS VIC 1380 adapters fail remote OS boots when SRIOV vNICs are placed on first host port and static vNICs (PXE, iSCSI, or vHBA) are placed on second host port. |
Place the SRIOV vNICs on the second host port manually via GUI or CLI options to set host port when configuring service profile. |
2.2(3a)A |
||
CSCuq81262 |
If anonymous reporting (AR) is enabled after upgrading Cisco UCS Manager to release 2.2(3a) in an environment specifically configured with VMs that use VM-FEX on any hypervisor, then Cisco UCS Manager becomes unresponsive after seven days when VM-related data collection begins. |
Disable AR feature in Cisco UCS Manager if running any VMs that use VM-FEX on any hypervisor. (The AR feature is disabled by default.) If this issue (with AR enabled) is encountered, contact Cisco TAC for solution. |
2.2(3a)A |
||
CSCuq92477 |
Infra bundle upgrades from Cisco UCS Manager release 2.2(3a) fail if performed from Cisco UCS Central when upgrade process becomes unresponsive during 'PollActivateOfUCSM' stage if Cisco UCS Manager does not already contain the management image. |
Manually download the Cisco UCS management image or the complete infra bundle to Cisco UCS Manager before triggering the infra upgrade from Cisco UCS Central. |
2.2(3a)A Resolved in 2.2(3b)A. |
||
CSCut61527 |
The Cisco B200M4 blade server reboots unexpectedly when BMC returns invalid FRU information. |
This issue does not have a workaround. |
Resolved in 2.2(3g)A |
||
CSCur96296 |
FEX goes online and offline in quick succession under scaled setups. |
Avoid IOM/FEX to come back online quickly after it goes offline. |
Resolved in 2.2(3g)A |
||
CSCuv53399 |
After IOM firmware upgrade, or after an IOM reset while running effected firmware, Cisco UCS Manager will no longer show Major fault F0481 indicating the IOM encountered a POST failure. |
If this issue is encountered, upgrade to a resolved firmware version. |
Resolved in 2.2(3k)A |
||
CSCur01379 |
Cisco UCS fabric interconnects (FI) include a version of bash that is affected by vulnerabilities through CGI scripts and CLI commands while authentication is not required for unauthorized users. |
Protect the domain and restrict the access to the management IP address of FIs to block potential exploitation of the vulnerability. |
2.0(1q)A Resolved in 2.2(1f)A,2.2(2e)A, 2.2(3b)A |
||
CSCut46044 |
Cisco Unified Computing Server Management Software (UCSM) includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:
|
This issue has no known workaround |
2.2(3a)A Resolved in 3.1(1e)A |
||
CSCup58725 |
Cisco Unified Computing Server Management Software (UCSM) includes a version of SBLIM-SFCB that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
|
This issue has no known workaround |
2.2(3a)A Resolved in 3.1(1e)A |
||
CSCva43666 |
When the chassis IOM is reset, one of the connected FI server ports gets into the Error disable state at sometimes and all the servers associated with that port are not accessible. |
Use the FI port channel or flap the FI fabric port which is in Error disable state. |
2.2(3a)A Resolved in 2.2(4b)A |
||
CSCuz20650 |
When syslog messages are generated continuously, the syslog suspend timer does not recover. Thus, no events are sent to the remote syslog server. |
There is no known workaround. |
2.2(3a)A Resolved in 2.2(3k)A, 2.2(6i)A, 2.2(7d)A |
||
CSCuu40291 |
When debug logging is enabled, Cisco UCS Manager tech-support shows that syslogd_debug files are present, but the show debug logfile syslogd_debugs CLI command fails with the following error: Logfile(syslogd_debugs) does not exist |
Use Cisco UCS Manager tech-support to get syslogd_debug logs. |
2.2(3a)A Resolved in 2.2(3k)A, 2.2(6i)A, 2.2(7d)A |
||
CSCux45723 |
UCS SNMP memory leaks occur when polling FC interfaces and SNMP processes (Walk/Get/Get Bulk) that parse any of the following SNMP MIBs:
|
If SNMP memory leaks occur, avoid polling the SNMP MIBs on FC interfaces. |
2.2(3a)A Resolved in 2.2(3k)A, 2.2(6i)A |
Open Caveats in Release 2.2(2e)
Open Caveats in Release 2.2(2e)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCur19358 |
The firmware upgrade of Nvidia GPUs fails with the error message "FI unreachable". This happens only when Broadcom adapters are used and its firmware is updated along with the firmware of Nvidia GPUs. |
Upgrade the firmware for Broadcom adapters first. After the firmware update FSM is complete, another update FSM is triggered with the HFP meant for Nvidia GPU cards. |
2.2(2e)A |
Open Caveats in Release 2.2(2d)
Open Caveats in Release 2.2(2d)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||
---|---|---|---|---|---|
CSCur21496 |
Even after the firmware update of the K2 Nvidia GPU adapter is successful, it does not display the version correctly. It displays the older version instead of new version. |
This is a cosmetic issue and does not impact the functionality of the GPU cards. |
2.2(2d)A Resolved in 2.2(3g)A |
||
CSCup00833 |
In rare cases, B440 M1 and M2 servers may fail discovery after CIMC activation during upgrade from release 2.0(2q). |
In Cisco UCS Manager CLI, use reset slot x/y where x/y designates the B-series server. |
2.1(3c)B |
||
CSCup05598 |
SNMP Community string shows blank text field even after adding and saving the string. |
This issue has no known workaround. This is a different convention than previously used but running a simple snmpget or snmpwalk against Cisco UCS Manager VIP with the string just saved should confirm that SNMP is functional.
|
2.2(1d)A |
||
CSCup20961 |
Unable to add VIFs to a service profile or make modifications that require a new VIF on an existing interface, such as when adding fabric failover. |
Restart svc_sam_dme process. |
2.2(1d)A |
||
CSCup38317 |
In some rare instances, typically during host power on, a board fails to discover and one of the following errors is displayed: Reason: CIMC did not detect storage controller or CIMC storage subsystem not yet initialized. |
Decommission and reacknowledge the server. |
2.2(2c)B |
||
CSCup40056 |
In some rare cases, if hypervisor and VM storage traffic are sharing the same fNIC(s) and FI is in switching mode and configured with Cisco VIC 1240 and with NPIV on Windows 2012R2, live migrations may fail. |
Assign separate fNICs for hypervisor and VM storage traffic.
|
2.2(1d)B |
||
CSCup40441 |
In some cases, attempts to remove a service profile that contains two vNICs and two vHBAs from a B200 M3 server with a 61xx FI and a M73KR-Q adapter running release 2.1(3b) will fail with the following error: Unconfigure server from service profile pre-boot environment (FSM-STAGE:sam:dme:ComputePhysicalDisassociate:PnuOSUnconfig) Error 4106 - Unable to find FC Device. and Discovery fails with this error: Discovery Fail Error: Unable to get Fibre Channel Device Information from the system (sam:dme:ComputeBladeDiscover:PnuOSInventory) |
This issue is caused by an unsupported WWPN in the service profile. If WWPN has the multicast bit set (Ex.20:01:01:01:31:00:00:23), then Qlogic flags the WWPN as invalid. To avoid this issue, always use WWPN with multicast bit turned off (Ex. 20:01:00:01:31:00:00:23/20:01: 00:00:31:00:00:23).
Once the problem occurs, the solution requires an RMA for the card. |
2.1(3b)B |
||
CSCup45930 |
When upgrading Cisco UCS B230 M2 server from release 2.2(1x) to 2.2(2x) or from 2.2(2x) to 2.2(3x), or when upgrading Cisco UCS C460 M4 server from release 2.2(2x) to 2.2(3x), association fails with “Unable to find storage controller” error. |
Reacknowledge the server. |
2.2(1e)A Resolved in 2.2(2e)A, 2.2(3c)A |
||
CSCup88161 |
In certain race conditions when running 2.2(1d) or later firmware, if a memory location which was freed is being used, the 6248 FI kernel crashes with no core. |
This issue has no known workaround. If this condition occurs, the system will auto-reboot to a stable condition. |
2.1(1d)A Resolved in 2.2(4b)A, |
||
CSCuq14172 |
Windows 2012 and Windows 2012R2 systems hang (boot and installation) when TXT is enabled via BIOS setup. |
This issue has no known workaround. Disable TXT and reboot. |
2.2(2a)B |
||
CSCuq22707 |
In some cases, vMotion of multiple VMs at the same time causes stale MAC addresses after VM migration, which results in traffic loss between blades attached to the same FI. |
This issue has no known workaround. The stale MAC addresses will eventually age out. |
2.2(2c)A |
||
CSCuq46105 |
In some rare cases, the Cisco UCS 6248 FI will unexpectedly reboot with following FI OBFL log in show tech:
|
This issue has no known workaround. |
2.2(1c)A Resolved in 2.2(3c)A. |
||
CSCuq53385 |
In some cases, when attempting to regenerate expired self-signed Cisco UCS Manager certificate, Cisco UCS Manager will return the following regarding regeneration of default Key Ring:
|
To work around this issue, try the following:
|
2.1(3d)A |
Open Caveats in Release 2.2(2c)
Open Caveats in Release 2.2(2c)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||
---|---|---|---|---|---|
CSCuq77241 |
Inventory scanning software such as Snow Inventory on Windows OS, CIMC, host OS or a remote KVM session may go into unresponsive state. |
If the connection to CIMC is alive, resetting the blade power will recover it. If the CIMC is in an unresponsive state or reseting blade power doesn't resolve the issue, resetting the slot will help recover the blade. |
2.2(2c)B Resolved in 2.2(6c)B |
||
CSCuz53730 |
UCSM httpd process may experience high memory usage or crash with a core file showing indications of memory allocation failure. |
There is no known workaround. |
2.2(2c)A Resolved in 2.2(8f)A |
||
CSCuw02439 |
When using Cisco UCS M81KR VIC adapters on a system running Cisco UCS Manager Release 2.2(2c), the adapters crash and generate core files. VIC adapter log files display the following error before the adapter crashes: ecpumgr.main ERROR: ecpu 1 panic: ASSERT FAILED (Exception 2 triggered!) @ mips/ecpu_panic.c:138 |
This issue has no known workaround. |
2.2(2c)B Resolved 2.2(3k)A, 2.2(6i)B |
||
CSCux59298 |
When using UCS B200 M3 servers with VIC 1240 on a system running Cisco UCSM Release 2.2(2c), network and SAN lose connectivity. |
When this issue occurs, reboot the server. |
2.2(2c)B Resolved 2.2(3k)A, 2.2(6i)B |
||
CSCus32933 |
Cisco UCS Manager does not display an error message when a WILL_BOOT_FAULT event is raised because of an incorrect CPLD version. |
- Issue the following commands;
- Reset CIMC. You might see the following messages in a var/log/messages file in CIMC show tech.
|
2.2(2c)B Resolved 2.2(3j)B |
||
CSCur66094 |
You may see the following symptoms:
|
Contact Cisco TAC to manually restart the bladeAG process as needed on both Fabric Interconnects. |
2.2(2c)A Resolved in 2.2(3g) |
||
CSCur05013 |
Messages.log file on a Cisco UCS B200 M2 blade fails when the log file fills with messages including: 364:BMC lost control of the bus.[0xd 0x0]. |
This issue has no known workaround. |
2.2(2c)B Resolved in 2.2(3d)B. |
||
CSCur38408 |
When a PCIe card is present in slot 2 and riser 2 is missing, fabric interconnect HA failover can cause the attached Cisco UCS C460 M4 servers to reboot. |
To work around this issue, try one of the following: Move the card in slot 2 to a different slot. Add PCIe riser 2. |
2.2(2c)A Resolved in 2.2(3d)A. |
||
CSCuj09403 |
When installing RHEL 6.3 in UEFI mode with M73KR-Q or M73KR-E adapters, the system hangs with a ‘cannot exit boot services’ message. |
This issue has no known workaround with M73KR-Q or M73KR-E adapters. Use VIC1240 adapter or use legacy boot. |
2.2(1b)B |
||
CSCuj63232 |
In some instances, most commonly after doing a CIMC upgrade, certain long running operation data may indicate that an operation is currently running when it isn't. For example, the consistency check operation may report 0% progress and be stuck in that status. |
This issue has no known workaround. To verify that the data is erroneous, use an LSI tool, such as WebBios or MegaCli, to confirm the operation is still in progress. |
2.2(1b)A |
||
CSCul85363 |
Redhat 6.x installation fails on a B200 M3 that uses a Seagate ST300MM0006 single drive JBOD configuration with the No RAID policy. |
To work around this issue: Install the OS using custom layout by selecting Create custom layout” when prompted for installation type. Create custom layout and swap partition. |
2.2(1b)A |
||
CSCum91845 |
Server reboots on changing any management policy when Service Profile is derived from update Service Profile Template that has no vNICs. |
This issue has no known workaround. |
2.2(2c)A |
||
CSCun16169 |
Ethernet uplink port channel member interfaces are permanently down on primary FI after 20 iterations of port channel flap from Cisco UCS Manager. |
Remove and add port channel. |
2.2(2c)A |
||
CSCun22459 |
In some cases when the port is in trunk mode containing more than one isolated-primary VLAN pair, the VM comes up with vNIC configured with two isolated-primary pairs and does not get dynamic IP address. |
Use one of the following two options to resolve this issue:
|
2.2(2c)A |
||
CSCun29274 |
In rare cases and only if blade is already discovered with a network adapter and user replaces it with storage adapter, the association or disassociation of that blade server may fail with error reported as “Invalid adapter connectivity, no adapter found.” |
Decommission and recommission the affected blade. |
2.2(2c)A |
||
CSCun79973 |
In some conditions, when a Cisco UCS Manager user changes the QoS policy on a vNIC where Netflow session is actively enabled on a vNIC with transmit monitoring, the vNIC will hang. |
To workaround this issue:
|
2.2(2c)A |
||
CSCun82594 |
DIMMS are mapped out during MRC (BIOS POST) when lockstep or mirroring are enabled in configurations with Ivy Bridge or Sandy Bridge CPU and with the following DIMM configurations:
|
The fix is provided via the Intel Memory Reference Code update. |
2.2(2c)B |
||
CSCuo12665 |
In some cases, when user sets SAN boot for boot policy in service profile, the configured boot policy is not reflected on a blade equipped with a M71KR-Q adapter after association so the blade will not boot from SAN. |
One of the following workarounds may resolve this issue:
|
2.2(1d)A 2.1(3b)B |
||
CSCuo34760 |
In some rare cases, if primary FI gets rebooted and comes back up as subordinate FI, some vEthernet interfaces will remain in down state on the newly subordinate FI (while previous subordinate FI becomes primary). |
One of the following workarounds will recover the affected servers:
|
2.1(2d)A |
||
CSCuo38990 |
In some rare conditions, servers lose network connectivity during failover. |
Reboot subordinate FI to recover. |
2.1(3b)A |
||
CSCuo41491 |
If boot policy has PXE boot listed prior to local disk / HBA, a blade my sometimes boot to pnuos instead of following normal boot policy when rebooted. |
Re-associate Service Profile. |
2.2(1b)A |
||
CSCuo51708 |
In some cases when attempting downgrade in middle of autoinstall upgrade, Cisco UCS Manager autoinstall downgrade will fail. |
Manually activate UCSM version to the higher revision, and then let auto-install downgrade it. |
2.2(1d)A Resolved in 2.2(1g)A. |
||
CSCuo55182 |
IPMITool version 14 or 14rc2 cannot obtain any IPMI information on the slave blade in a B460-M4 configuration four-socket configuration. |
Use ipmitool version 13. |
2.2(2c)B |
||
CSCuo65728 |
In some instances, a MAC move is not learned by the Cisco UCS FI after a VM is vMotioned between blades when the Cisco UCS FI is enabled with vNIC Fabric Failover and hypervisor is configured to utilize active/standby for vNICs.
|
Reset the vEthernet interface on the target vMotion host to force a MAC relearn. |
2.2(1c)A |
||
CSCuo87059 |
In rare cases, backplane ports on an IOM that is providing a NULL serial number to Cisco UCS Manager may be missing after chassis decommission and recommission. |
Perform an additional decommission and recommission cycle. |
2.2(2c)B Resolved in 2.2(3a)B |
||
CSCuo98011 |
Cisco UCS Manager can crash (dump core) during Infra firmware upgrade (ucs-k9-bundle-infra.2.2.2c.A.bin) when upgrade is initiated from Cisco UCS Central if Cisco UCS Manager is registered to Cisco UCS Central using IPv4 address and image bundles are not present in Cisco UCS Manager.
|
Avoid this issue by using either of two workarounds:
CLI in UCSM
GUI in UCSM Go to |
2.2(2c)A Resolved in 2.2(2d)A |
||
CSCuo68579 |
In some cases after a firmware upgrade, FC traffic stops working on fabric interconnect. However, blades in those chassis have successful flogi into the fabric. On the upstream fabric switch fc4 feature types are missing when checking show fcns database detail for the affected blades. |
Reboot affected Fabric Interconnect |
2.1(3b)A |
||
CSCuo81734 |
In some cases, FNIC driver bundled with driver disk does not load when installing on a standalone C-series server and does not return error to indicate failure. |
Perform RPM installation after system is up using the inbox FNIC driver. |
2.2(1b)A |
||
CSCup07488 |
ECC sensors report invalid “Upper Non-Recoverable” data when there are existing failed PECI transactions on a blade. |
Restart the ipmi stack while the host is up and running and BIOS_POST_COMPLETE is asserted. However, if PECI failures persist on the blade, this task will need to be repeated. |
2.2(2c)B Resolved in 2.2(2d)B |
||
CSCut03086 |
When you auto install infrastructure firmware bundle and UCS Manager FI upgrades, in a VM-FEX scale set up with over 100 servers, DME core will happen. |
Restart the DME by doing one of the following:
|
Resolved in 2.2(1h)A |
Open Caveats in Release 2.2(2a)
Open Caveats in Release 2.2(2a)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCvh22485 |
After vMotion/VM migration, VMs are unable to receive broadcast/multicast packets including ARP packets. This happens because the adapter is not removing the VLAN tags from the packets due to incorrect configuration received from the FI. This issue occurs under the following setup:
|
|
2.2(2a)A Resolved in 2.2(8j). |
CSCuq63868 |
When creating a vNIC in a LAN connectivity policy, the show configuration command generates a software error. |
No known workaround. |
|
CSCur16493 |
Customers with the UCSC-GPU-VGXK2 GPU adapter should update to release 2.2(3f) to receive updated firmware. |
Upgrade to release 2.2(2e) and verify that the UCSC-GPU-VGXK2 firmware has been updated to version 80.04.F5.00.03_2055.0552.01.08. |
2.2(2a)B Resolved in 2.2(2e)B. |
CSCuo89748 |
Under rare conditions in a scale deployment, the Cisco UCS Manager GUI may crash with the following error message: Fatal Error: Event sequencing is skewed, Would you like to login again or exit? |
When this issue occurs, exit the GUI and log in to it again. You may continue to see the error message until the underlying triggering condition is resolved. |
2.2(2a)A |
Open Caveats in Release 2.2(1f)
Open Caveats in Release 2.2(1f)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCur37260 |
FI upgrade or downgrade may fail due to lack of disk space in /mnt/pss. The following error may be seen: PL20-B %SYSMGR-2-NON_VOLATILE_DB_FULL: System non-volatile storage usage is unexpectedly high at 99% |
Contact Cisco TAC to recover from this issue. |
2.1(3c)A Resolved in 2.2(3d)A. |
Open Caveats in Release 2.2(1e)
Open Caveats in Release 2.2(1e)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCuo97907 |
Blades using a BIOS policy that utilizes the core multi- processing option do not honor changes made to the policy. |
Disable the cores using the operating system. |
2.1(3b)A |
Open Caveats in Release 2.2(1d)
Open Caveats in Release 2.2(1d)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||
---|---|---|---|---|---|
CSCus03683 |
The Cisco UCS 6200 series primary and subordinate FIs may reboot unexpectedly due to high volume traffic impacting the management interface. |
When this issue occurs, do one of the following:
|
2.2(1d)A Resolved in 2.2(4b)A, 2.2(5a)A |
||
CSCuw36128 |
Under rare conditions, there may be statsAG mts q leaks, and the following fault may be raised:
(It could be for either A or B side, or even both) The error messages shown in the statsAG log file may include the following:
|
When this issue occurs, restart UCSM processes through the CLI:
|
2.2(1d)A Resolved in 2.2(3k)A, 2.2(6i)A, 2.2(7b)A |
||
CSCut28278 |
After upgrading the infrastructure and the Cisco UCS Manager image, the subordinate fabric interconnect fails the pre-upgrade check because of insufficient free space in the /var/sysmgr directory. |
Contact TAC to verify whether discovery related log files filled the /var/sysmgr directory. |
2.2(1d)A Resolved in 2.2(3j)A |
||
CSCur01185 |
The HA policy of Reset triggers the Cisco UCS 6296UP fabric interconnect to reset. |
Check whether NPM is leaking memory by running the show npv internal mem-stats detail command on the fabric interconnect To determine which adapter is causing the issue, view the output using the show npv internal errors command. The error message will list the VFC causing the issue. |
2.2(1d)A Resolved in 2.2(3j)A |
||
CSCup95855 |
Cisco UCS C240 M3 server upgrades fail because FSM tasks are stuck in the throttled state in Cisco UCS Manager. |
-Verify that all CIMCs are accessible from the UCSM CLI (connect cimc X/Y for blades and connect cimc X for racks) -Resolve all communication issues between UCSM and any inaccessible CIMC. -Verify that netstat -anop output does not show receive queues filling up -Before running the restart dme command to recover from this scenario, take a core dump of the dme to analyze this situation further. Use the kill -s SIGABRT <dme pid> command to generate the core of the svc_sam_dme_process. -Copy the generated core and attach it to SR or the bug for further analysis |
2.2(1d)A Resolved in 2.2(3j)A, 2.2(6c)A |
||
CSCuu15250 |
Toggling the Fabric Interconnect (FI) locator LED in UCSM fails with the following symptoms:
|
When this occurs, contact TAC to toggle the FI locator LED by using the debug plug-in access to NXOS. |
2.2(1d)A Resolved in 2.2(5c)A. |
||
CSCus64439 |
Cisco UCS Manager Mezz logs and VMware vmkernel logs indicate storage latency and numerous FNIC aborts. |
Reboot blade servers where the PGS and PFC features are not in the right order. To avoid this issue, first upgrade any Cisco UCS 1240, Cisco UCS 1280, and Cisco M81KR adapter firmware before updating the Cisco UCS infrastructure components—Cisco UCS Manager, IOM, and FI. |
2.2(1d)B resolved in 2.2(3h)B |
||
CSCus11782 |
After rebooting a Cisco UCS 6248UP Fabric Interconnect (FI) that is operating in the FC end-host mode, some member links of the SAN port channel do not come up. Running the show interface brief command on the FI displays the notConnected status. On the Cisco Nexus switch, the corresponding ports show as invalidCfg. |
When this issue occurs, do one of the following:
|
2.2(1d)A Resolved in 2.2(5b)A, 2.2(3j)A |
||
CSCus12019 |
MAC address table on the FI not updated immediately after a MAC move or change. |
There are two possible workarounds:
|
2.2(1d)A |
||
CSCuo11700 |
In rare cases, a context switch while applying a new sam.config triggers a race condition that causes the httpd.sh or ucssh process to crash. |
The httpd.sh process will recover after the crash. To fix the ucssh process crash, re-launch the Cisco UCS Manager CLI. |
2.2(1d)A |
||
CSCuo60330 |
After upgrading the fabric interconnect to release 2.2(2) or later, the IOMs are unreachable, HA is not ready, and previous server interfaces show no configuration. |
Contact Cisco TAC to recover from this issue. |
2.2(1d)A |
||
CSCul44421 |
You may see the “error accessing shared-storage” fault in Cisco UCS Manager. This message may appear any time but is seen more often during an FI reboot, upgrade, or IOM reset when running release 2.x of Cisco UCS Manager. |
This issue has no known workaround. This fault is auto-cleared and transient so should not persist. The HA framework remains INTACT as long as show cluster extended output reports state as PRIMARY_OK. |
2.1(2d)A Resolved in 2.2(1e)A and 2.2(2c)A |
||
CSCum98771 |
Upgrading from Cisco UCS Manager 2.1(2a) or higher to release 2.2(1x) with FlexFlash State enabled in local disk policy of service profiles on servers causes the “FlexFlash controller error, probably not supported, not equipped or inoperable” config-failure. This condition prevents updates to Blade and Rack firmware package bundles using auto-install or host firmware pack. |
Avoid this error using either of two workarounds:
|
2.2(1b)A Resolved in 2.2(1e)A and 2.2(2c)A |
||
CSCun25187 |
When using third-party certificates with Cisco UCS Central, status of Cisco UCS Manager might be displayed in Cisco UCS Central as 'Lost-Visibility' if a keyring with a certificate chain is configured to use https communication. This occurs when certificates are signed by subordinate CA instead of root CA. |
Use third-party certificates that are signed directly by root CA for UCS Central https communication. |
2.1(2a)A Resolved in 2.2(1e)A and 2.2(2c)A |
||
CSCun86873 |
In some cases, during initial discovery or following upgrade-initiated discovery, B230 M2 shows only 8 of 10 cores available. |
Reacknowledge the blade. |
2.2(1c)A |
||
CSCuo12230 |
When vNIC of a service profile is configured to allow a VLAN defined in appliances cloud in the LAN configuration, the show run interface vethernet <x> and show interface vethernet <x> switchport command outputs report different VLANs allowed on the virtual Ethernet interface. |
Check the outputs listed in the symptoms to confirm the problem. If the output shows the problem, then move the VLAN from the appliance cloud to the LAN cloud. |
2.2(1c)A |
||
CSCus74206 |
After disconnecting then re-connecting a cable between Fabric Interconnect and IOM, all VFC interfaces on the chassis are flapped once. |
Remove the Pin Group setting in vHBA to use Dynamic Pinning instead of Static Pinning. |
2.2(1d)A Resolved in 2.2(3g) |
||
CSCuo78883 |
‘Application Blocked by Security Settings’ error when starting the Cisco UCS Manager GUI or KVM Console application. Because the Java Code Signing Certificate expired, users on Java 7 update 40 or higher might see the following message: Application Blocked by Security Settings. Your security settings have blocked an application signed with an expired or not-yet-valid certificate from running. |
To fix this issue, you can either temporarily lower your Java security settings to add Cisco UCS Manager as an exception or, if you are using Java 7 update 51 or higher, you can add the Cisco UCS Manager host IP address to the Exception Site list. To perform one of these workarounds, perform the corresponding steps below: To temporarily lower your security settings:
To add the IP address to the exception site list (for Java 7 version 51 and higher):
|
2.2(1b)A Resolved in 2.2(1e)A and 2.2(2c)A |
||
CSCup61601 |
FCOE_MGR crashes if FI is configured with too many noncontiguous VLANs. |
Decrease the number of noncontiguous VLANs on the FI. |
2.2(1d)A Resolved in 2.2(2d)A |
||
CSCup61947 |
In some cases, MAC learning fails after adding 1000 or more VLANs with a large PV count with 120 or more virtual interfaces each with 1000 VLANs. |
To account for this issue, monitor the dleft_lif_vlan_mbr table to ensure total VLANs does not exceed 16,000. If VLAN total approaches or exceeds this limit, reduce VLAN count and then reboot the FI as needed to recover from a MAC learning failure state. |
2.2(1d)A Resolved in 2.2(2d)A |
||
CSCup82677 |
A Cisco UCS system with ESXi OS will not exceed 10Gb speed even when QoS is configured with line-rate of 20Gb or 40Gb. |
To resolve this issue, set the Rate(Kbps) value in the QoS policy to be the desired value above 10000000. The value must be numeric, such as 20000000 or 40000000. |
2.2(1d)A Resolved in 2.2(2d)A |
||
CSCus85186 |
After activating Cisco Trusted Platform Module (TPM), the enable and active statuses remain as disabled and deactivated. |
This issue has no known workaround. |
2.2(1d)B Resolved in 2.2(1h)B, 2.2(3j)B, 2.2(4b)B |
||
CSCut09151, CSCut21914 and CSCut08605 |
System Management BUS (SMBUS) traffic will collide on the SMBUS shared by the host and CIMC. As a result, certain system failures such as false thermal alarms may happen. |
Avoid running OS applications that access the host SMBUS. |
Resolved in 2.2(1h)A |
||
CSCuo50049 |
Cisco UCS Manager will experience HA cluster failover after upgrading from Release 1.4. |
This issue has no known workaround. |
Resolved in 2.2(1h)A |
Open Caveats in Release 2.2(1c)
Open Caveats in Release 2.2(1c)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCum82888 |
After upgrading to Release 2.2(1b), you may see the following errors:
This occurs when the default keyring is deleted before upgrade, or if the default keyring is deleted after the upgrade and the system is rebooted. |
To avoid this issue, do not delete the default keyring. If this issue occurs, stop the bladeAG process. |
2.2(1b)B Resolved in 2.2(1d)B |
CSCum09954 |
If an FC uplink interface is set to administratively shut, after upgrading to Release 2.2(1b) you may see a “FCoE or FC uplink is down on Vsan 202” error. |
This issue is cosmetic and the error message can be safely ignored. |
2.2(1b)A Resolved in 2.2(1d)A |
CSCum60793 |
You may see the following fault in Cisco UCS Manager: [FSM:STAGE:RETRY:]: Report mount suspend success to operations manager errors This occurs if Cisco UCS Central is not reachable or the domain has been unregistered. |
Restore connectivity to Cisco UCS Central, or register the domain again. |
2.1(2c)A |
CSCuo79500 |
Service dcosag falsely displays information that indicates a vNIC with a usNIC connection policy was automatically changed to dynamic vNIC when a customer adds a second vNIC with a usNIC policy. |
This issue does not effect functionality. The usNIC policies are properly set; the radio button selection falsely displays the selection of dynamic vNIC policy. Saved changes can be seen by clicking on the usNIC radio button. |
2.2(1c)A Resolved in 2.2(2d)A |
CSCut54264 |
CIMC internal linux iptables deny additional mcserver connections between the CIMC and Fabric Interconnect. |
Reset CIMC of the impacted servers. |
2.2(1c)A Resolved in 2.2(3g)B |
Open Caveats in Release 2.2(1b)
Open Caveats in Release 2.2(1b)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCvm02934 |
Cisco UCS B-Series M2 servers and C-Series M2 servers are based on Intel® processors that are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).
|
The fix for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM) requires applying the updated processor microcode from Intel® as well as the relevant Operating System and Hypervisor patches from the appropriate vendors. For more information, please see the Cisco Security Advisory available here: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 |
3.2(1d)B, 3.2(1d)C 3.1(1e)B, 3.1(1e)C 2.2(1b)B, 2.2(1b)C CSCvm02934 is resolved in 2.2(8l)B, 2.2(8l)C |
CSCvm03356 |
Cisco UCS B-Series M3 servers and C-Series M3 servers are based on Intel® processors that are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).
|
The fix for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM) requires applying the updated processor microcode from Intel® as well as the relevant Operating System and Hypervisor patches from the appropriate vendors. For more information, please see the Cisco Security Advisory available here: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 |
4.0(1a)B, 4.0(1a)C 3.2(1d)B, 3.2(1d)C 3.1(1e)B, 3.1(1e)C 2.2(1b)B, 2.2(1b)C CSCvm03356 is resolved in 2.2(8l)B, 2.2(8l)C |
CSCvm03351 |
Cisco UCS B-Series M4 servers, C-Series M4 servers, S3260 M4 storage servers, and HyperFlex M4 servers are vulnerable to exploits that use CPU speculative processing and data cache timing to potentially identify privileged information. These exploits are collectively known as L1 Terminal Fault (L1TF).
|
The fix for CVE-2018-3620 (OS/SMM) and CVE-2018-3646 (VMM) requires applying the updated processor microcode from Intel® as well as the relevant Operating System and Hypervisor patches from the appropriate vendors. For more information, please see the Cisco Security Advisory available here: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 |
4.0(1a)B, 4.0(1a)C 3.2(1d)B, 3.2(1d)C 3.1(1e)B, 3.1(1e)C 2.2(1b)B, 2.2(1b)C CSCvm03351 is resolved in 2.2(8l)B, 2.2(8l)C |
CSCvj59299 CSCvj59301 |
Cisco UCS B-Series and C-Series M2 servers are based on Intel® Xeon® 5500, 5600, and Ex series processors that are vulnerable to variants of an exploit that uses CPU speculative processing and data cache timing to efficiently leak information, known as Spectre. CVE-2018-3639 (Spectre/Variant #4) and CVE-2018-3640 (Spectre/Variant #3a) are addressed by relevant Operating System patches using an interface provided by updated processor microcode included in the server firmware bundle. |
The fix for CVE-2018-3639 (Spectre/Variant #4) and CVE-2018-3640 (Spectre/Variant #3a) requires applying the updated microcode from Intel as well as the relevant Operating System and Hypervisor patches from the appropriate vendors. For more information, see the Cisco Software Advisory at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel |
3.1(1e)B, 3.1(1e)C 3.2(1d)B, 3.2(1d)C 2.2(1b)B, 2.2(1b)C |
CSCvj54880 CSCvj54847 CSCvj54187 |
Cisco UCS M3 and M4 servers, and Hyperflex M4 servers are based on Intel® processors that are vulnerable to variants of an exploit that uses CPU speculative processing and data cache timing to efficiently leak information, known as Spectre. CVE-2018-3639 (Spectre/Variant #4) and CVE-2018-3640 (Spectre/Variant #3a) are addressed by relevant Operating System patches using an interface provided by updated processor microcode included in the server firmware bundle. |
The fix for CVE-2018-3639 (Spectre/Variant #4) and CVE-2018-3640 (Spectre/Variant #3a) requires applying the updated microcode from Intel as well as the relevant Operating System and Hypervisor patches from the appropriate vendors. For more information, see the Cisco Software Advisory at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel |
3.1(1e)B, 3.1(1e)C 3.2(1d)B, 3.2(1d)C 2.2(1b)B, 2.2(1b)C 3.0(1c)B, 3.0(1c)C - Only for M3, M4 EP |
CSCuu83383 |
UCS Manager includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2015-4000, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, CVE-2015-1791, CVE-2014-8176 |
There is no known workaround. |
1.1(1j)A Resolved in 2.2(8i)A |
CSCvd02546 |
During a UCS Manager upgrade from 2.2(3l) to 3.1(2) only the secondary Fabric Interconnect may be upgraded. |
There is no known workaround. |
2.2(1b)A Resolved in 2.2(8i)A |
CSCuz55693 |
When you attempt to reset memory errors using the following commands: ucs-fi chassis/server # reset-all-memory-errors Cisco UCS Manager may generate a 'Managed object does not exist' error. |
The command will work after you perform a de-commission of the new blade and then re-acknowledge it. |
2.2(1b)A Resolved in 2.2(3l)A |
CSCuv20324 |
The FCoE storage, in rare cases, becomes unavailable or performs very poorly. This can occur after a reset of either host-attached switch in the case of standalone systems, or after the reset of an IOM or FI in UCS-managed systems when the IOM or FI sends configuration information to the adapter later than 5 seconds after link-up. |
Reboot the affected host after switch or IOM reset is completed. |
2.2(1b)B Resolved in 2.2(6g)B |
CSCum50468 |
After upgrading the UCS Manager to version 2.2(6c) or higher, false faults for Fabric VSAN Membership Down are not clearing. |
This issue has no known workaround. |
2.2(1b)A |
CSCuj63448 |
When upgrading to a catalog that supports new DIMMs, some of the DIMM information is not displayed. |
Reacknowledge the blade server. |
1.4(4k)A |
CSCui67824 |
When you disable port security from a network control policy with Hyper-V port profile, security is disabled on the nested port-profile, but security remains enabled on a few interfaces. |
This issue has no known workaround. |
2.2(1b)A |
CSCuj26767 |
Attempting to install UEFI OS second time sets incorrect boot order and stops installation. |
Clean initial installation in the disk and restart installation. |
2.2(1b)A |
CSCui52680 |
When the blade appears to be in normal operation state, Cisco UCS Manager SEL message list might display the following error: EFI Load Image Security Violation |
If all blade functions appear to be normal, ignore this error message. |
2.2(1b)A |
CSCud75506 |
The UUID is translated incorrectly when you upgrade ESXi from version 4.1 or 5.1 on the Cisco UCS B200 M3, B220 M3, or B440 M3 blade servers. |
This is a display issue only, and does not affect the service profiles associated with the blades. This issue has no known workaround. |
2.0(2r)A |
CSCug25894 |
During Cisco 2100 Series IOM boot and chassis reacknowledgment, sysmgr cores are seen. |
The system resumes normal behavior after process restart. This should take approximately three minutes. |
2.0(4a)A |
CSCul74278 |
In some cases, if the boot policy is initially configured only for SAN devices and the policy is later modified to add local disk or local HDD device, the server fails to boot from the local disk. |
Reacknowledge the server. |
2.2(1b)A Resolved in 2.2(2c)A |
CSCum02561 |
When upgrading to 2.2(1b) from 2.1(3a), if you upgrade the infrastructure (A bundle) before the host firmware (B and C bundles), and then modify the service profile you may experience one or more of the following issues:
|
|
2.2(1b)A Resolved in 2.2(1d)A |
CSCuj74570 |
A Cisco UCS B420 M3 blade with a VIC 1240 and a port expander is successfully discovered in a chassis with a 2104XP IOM, even though it is unsupported. When upgrading to the 2204XP IOM, the blade reboots for discovery. |
This issue has no known workaround. The B420 M3 blade with port expander is not supported with the 2104XP IOM. |
2.1(2a)B |
CSCul72408 |
During upgrade, the following issues occured:
|
Reboot the IOM in the affected chassis. |
2.1(3a)A |
CSCul95501 |
IOM FSM failed after downgrading from 2.2(1b). Connectivity between the IOM and the FI could not be established. |
Reboot the FI. |
2.1(3a)A |
CSCuh89441 |
On B420 M3, the installed OS fails to boot from SAN LUN with Gen-3 E. |
Enable EDD 3.0 using the Emulex M73KR-E FCoE option ROM. |
2.2(1b)A |
CSCuj89557 |
In some rare conditions, it is observed during Cisco UCS Manager upgrade, downgrade, or FI reload in a cluster setup that Cisco UCS Manager may fail on the secondary FI due to database corruption. |
If you detect a db corruption in the secondary FI, erase the database from the FI and reconnect it to the cluster. The secondary syncs up with the primary FI and recreates the db. |
2.2(1b)A |
CSCtl04654 |
Changing native VLAN on uplink ports will cause the ports state to change and traffic disruption. |
If native VLAN changes are required on uplink ports, we recommend that they be performed during a maintenance window. |
2.1(1a)A |
CSCuj78615 |
The EFI Shell boot option is disabled in the BIOS Setup Utility > Boot Options page. Shell Boot option is not automatically launched by the BIOS. |
Boot UEFI shell by using either one of the following two options:
|
2.2(1b)A |
CSCuh13333 |
When you install ESXi in UEFI mode, the OS fails to boot-up. Even when you seem to have a smooth installation, the server does not boot the ESXi OS. |
Do the following:
|
2.2(1b)A |
CSCuj31559 |
Installing Windows EFI PXE using UEFI is slow when compared to the installation using vNIC on MLOM. |
This issue has no known workaround. |
2.2(1b)A |
CSCuh34516 |
Installing Linux PXE using UEFI fails with the following message: Trying to allocate 971 pages for VMLINUZ. |
This issue has no known workaround. |
2.2(1b)A |
CSCuj34520 |
TFM information in UCS Manager inventory contains invalid characters. |
This issue has no known workaround. |
2.1(2a)A |
CSCuj81245 |
Multiple FNIC aborts in OS kernel and adapter logs when user starts a heavy write operation to SAN disk. |
Change IO throttle count from 16 to 256. |
2.2(1b)A Resolved in 2.2(2c)B |
CSCun25692 |
Under certain timing conditions while allocating memory to critical data structure, M71KR-Q could run out of heap resulting in SAN boot failure. |
To restore expected CNA behavior, downgrade to 2.1(3a) release or upgrade to version where this issue has been resolved. |
2.2(1b)B Resolved in 2.2(1e)B and 2.2(2d)B |
CSCus42584 |
The Cisco B200 M4 server unexpectedly reboots after replacing the IOM cables. |
This issue does not have a workaround. |
Resolved in 2.2(3g)A |
CSCut03052 |
IP QoS core may happen in a VM-FEX scale set up, when you reboot Fabric Interconnects back to back. |
Do the following:
|
Resolved in 2.2(4b)A |
CSCut63966 |
Switch will stop at loader prompt upon reboot due to incorrect boot variables or /opt corruption. |
A workaround for this issue is to modify a script file, which is called before any reboots occur. This modification can limit the chances of experiencing this issue during an upgrade to firmware versions in which this issue is resolved. Contact Cisco TAC for more information regarding this workaround, and to recover from this issue. |
Resolved in 2.2(1h)A, 2.2(3g)A |
CSCus83447 |
A leap second update causes Cisco UCS Fabric Interconnect to reload or switchover. |
Do the following:
|
Resolved in 2.2(1h)A, 2.2(3e)A |
CScur54705 |
Cisco UCS Manager sends the UCS Manager username and password hashes to the configured SYSLOG server every 12 hours. |
This issue does not have a workaround. |
Resolved in 2.2(1h)A |
CSCur88952 |
svc_dam_dme core will happen after upgrading or downgrading to Cisco UCS Manager Release 2.1(b). |
This issue does not have a workaround. |
Resolved in 2.2(1h)A |
CSCva54957 |
A reboot is triggered without a “user -ack” when modifying a service profile that requires a reboot while shallow association is failing. |
This issue does not have a workaround. |
2.1(3a)A Resolved in 2.2(8b)A |
Open Caveats in Release 2.2(1a)
Open Caveats in Release 2.2(1a)
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
---|---|---|---|
CSCvc48423 |
Downloading a bundle more than 1GB in size from a local desktop may fail. |
Use remote download rather than local download. |
2.1(1a)A Resolved in 2.2(8g)A |
CSCuz91263 |
A vulnerability in the command-line interface (CLI) of the Cisco Unified Computing System (UCS) Manager and UCS 6200 Series Fabric Interconnects could allow an authenticated, local attacker to access the underlying operating system with the privileges of the root user. |
This issue has no known workaround. |
2.2(1a)A Resolved in 2.2(8c)A |
CSCuz92668 |
Versions of Network Time Protocol daemon (ntpd) package are affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or modify the time being advertised by a device acting as a Network Time Protocol (NTP) server. These DoS vulnerabilities and logic issues may allow an attacker to shift a system's time. |
This issue has no known workaround. |
2.2(1a)A |
CSCuj84274 |
When Cisco UCS B-Series servers are configured with the IPMI interface enabled, a vulnerability in the Cisco Integrated Management Controller (CIMC) on the Cisco Unified Computing System Series Platforms may allow an unauthenticated, remote attacker to obtain the password hashes residing on the affected device. The vulnerability is due to the implementation of an insecure authentication protocol. An attacker may exploit this vulnerability by sending a crafted packet to the CIMC of an affected device. An exploit may allow the attacker to receive a response from the CIMC that contains an RKMP message that will allow an attacker to obtain the password hashes for the system, which can then be used in an offline cracking attack. |
Disable the IPMI interface on the CIMC running on the UCS system. |
2.1(3A) Resolved in 3.1(1e)A |
CSCul97240 |
When a UCS rack server is present in a UCS setup, DHCP renewal occurs frequently and Error level syslog messages are continuously sent to the syslog server configured through Cisco UCS Manager. However, these are false alarms because they do not affect the system. Sample syslog message: 0555 2016 Dec 12 12:07:55 UCS-A-1-A %DAEMON-3-SYSTEM_MSG: uid lease 127.5.99.2 for client 2c:2e:10:10:10:10 is duplicate on 10.1.0.0/10 - dhcpd |
Change the logging level to higher than Error(3). However, this may lead to some critical information not being logged. |
2.2(1a)A Resolved in 2.2(7c)A |
CSCuv55823 |
Faults like the following may occur when incompatible combinations of CIMC firmware and UCS Manager firmware are installed at the same time: Controller 1 on server 1/2 is inoperable: Reason: CIMC did not detect storage controller |
Use the same bundle version of CIMC firmware and UCS Manager firmware. |
2.2(1a)A Resolved in 2.2(6e)A |
CSCus20526 |
Adaptor firmware update fails in a high availability UCS set up with a single IOM connected to a FI. |
Establish the connectivity between both the IOMs and FIs for UCS high availability. |
2.0(1a)A |
CSCuv49345 |
When the server is discovered from only one Fabric Interconnect (FI), and the DME primary instance is the other FI, disassociation of the associated service profile fails with the following message: No connection to MC endpoint The show fsm state command under server scope will show that the FSM failure is at ResetSecureBootConfiguration |
Decommission the server, then recommission it. |
2.2(1a) Resolved in 2.2(5c)A |
CSCus91342 |
The blade server needs to reboot after adding a VLAN to a vNIC template. |
Reboot the blades for the change to take effect. |
Resolved in 2.2(3g)A. |
CSCus69458 |
A heap-based buffer overflow vulnerability in the GNU C library may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in Common Vulnerability and Exposures (CVE) CVE-2015-0235. |
This issue has no known workaround. |
1.0(2k)A Resolved in 2.2(3e)A |
CSCur29264 |
The HTTPS interface of Cisco UCS Manager supports SSLv3 by default, and is vulnerable when using SSLv3 clients to connect. This vulnerability is documented in Common Vulnerability and Exposures (CVE) CVE-2014-3566. |
Disable SSLv3 from web clients when connecting to UCSM or when launching KVM using direct access. |
2.2(3a)A Resolved in 2.2(3d)A |
CSCuj71400 |
Cisco UCS Manager displays the ’FCoE or FC uplink is down on VSAN X' fault when the member ports for the VSAN are up. |
If this error occurs, do the following:
|
Resolved in 2.2(3k)A, 2.2(6i)A |
CSCuo93591 |
For a fabric interconnect in end-host mode, the MAC address table aging time can get stuck at 300. When this happens, the value cannot be changed through UCSM GUI or CLI. |
No known workaround. |
Resolved in 2.2(3k)A |
CSCux95107 |
Network Time Protocol configuration on a Cisco UCS blade server includes a version of ntpd package that is affected due to security issues with Network Time Protocol Zero Origin Timestamp Bypass. |
This issue has no known workaround. |
Resolved in 2.2(7c) A |
CSCuz86450 |
The order property on the adaptorHostIf (adpatorHostEthIf / adaptorHostFcIf) is user-modifiable. The property can be mistakenly set with a value that is different from what it was already set, and can cause the server reboot. |
It is strongly recommended that you do not change the order property value because it is internally maintained by Cisco UCS, however for this issue, you can fix the order property to the actual operorder set on the corresponding vnicEther/vnicFc with power tool scripts. |
1.4(1j)A Resolved in 2.2(7d)A, 2.2(8b)A |
CSCus20526 |
Adaptor firmware update fails in a high availability UCS set up with a single IOM connected to a FI. |
Establish the connectivity between both the IOMs and FIs for UCS high availability. |
2.0(1a)A |
CSCuv49345 |
When the server is discovered from only one Fabric Interconnect (FI), and the DME primary instance is the other FI, disassociation of the associated service profile fails with the following message: No connection to MC endpoint The show fsm state command under server scope will show that the FSM failure is at ResetSecureBootConfiguration |
Decommission the server, then recommission it. |
2.2(1a) Resolved in 2.2(5c)A |
CSCus91342 |
The blade server needs to reboot after adding a VLAN to a vNIC template. |
Reboot the blades for the change to take effect. |
Resolved in 2.2(3g)A. |
CSCus69458 |
A heap-based buffer overflow vulnerability in the GNU C library may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in Common Vulnerability and Exposures (CVE) CVE-2015-0235. |
This issue has no known workaround. |
1.0(2k)A Resolved in 2.2(3e)A |
CSCur29264 |
The HTTPS interface of Cisco UCS Manager supports SSLv3 by default, and is vulnerable when using SSLv3 clients to connect. This vulnerability is documented in Common Vulnerability and Exposures (CVE) CVE-2014-3566. |
Disable SSLv3 from web clients when connecting to UCSM or when launching KVM using direct access. |
2.2(3a)A Resolved in 2.2(3d)A |
CSCuj71400 |
Cisco UCS Manager displays the ’FCoE or FC uplink is down on VSAN X' fault when the member ports for the VSAN are up. |
If this error occurs, do the following:
|
Resolved in 2.2(3k)A, 2.2(6i)A |
CSCuo93591 |
For a fabric interconnect in end-host mode, the MAC address table aging time can get stuck at 300. When this happens, the value cannot be changed through UCSM GUI or CLI. |
No known workaround. |
Resolved in 2.2(3k)A |
CSCux95107 |
Network Time Protocol configuration on a Cisco UCS blade server includes a version of ntpd package that is affected due to security issues with Network Time Protocol Zero Origin Timestamp Bypass. |
This issue has no known workaround. |
Resolved in 2.2(7c) A |
CSCuz86450 |
The order property on the adaptorHostIf (adpatorHostEthIf / adaptorHostFcIf) is user-modifiable. The property can be mistakenly set with a value that is different from what it was already set, and can cause the server reboot. |
It is strongly recommended that you do not change the order property value because it is internally maintained by Cisco UCS, however for this issue, you can fix the order property to the actual operorder set on the corresponding vnicEther/vnicFc with power tool scripts. |
1.4(1j)A Resolved in 2.2(7d)A, 2.2(8b)A |
CSCus20526 |
Adaptor firmware update fails in a high availability UCS set up with a single IOM connected to a FI. |
Establish the connectivity between both the IOMs and FIs for UCS high availability. |
2.0(1a)A |
CSCux63909 |
FC abort is observed while running uplink port flap test on uplink Ethernet port-channel from an FI to a Cisco Nexus 7000 switch. |
No known workaround. |
2.0(2m)B Resolved in 2.2(6j)B, 2.2(7c)B, 2.2(8a)B |
Behavior Changes
Release 2.2(8a) introduces the following behavior changes:
-
CSCux87408—Initializing the chassis seeprom takes too long to complete.
-
Old behavior: In a new chassis, if the chassis seeprom is not initialized, IOMs are not discovered on certain slots. The chassis seeprom takes too long to initialize. IOM behavior is as follows:
-
A new IOM that has never reached a stable state, and that is running any version of Cisco UCS Manager Release 2.2(6) will be stuck in uboot after 4 attempts of booting each Release 2.2(6) image.
-
An IOM that has previously reached a stable state, and that is running any version of Cisco UCS Manager Release 2.2(6) will go into an infinite reboot loop.
-
-
New behavior: In a new chassis, if the chassis seeprom is not initialized, IOMs that are running any version of Cisco UCS Manager Release 2.2(x) except Release 2.2(6) can now be discovered on all slots. The chassis seeprom now initializes in the expected time. IOMs running on Release 2.2(6) are discovered if the chassis seeprom is already initialized.
-
Impact: The chassis seeprom now initializes in the expected time.
-
-
CSCtx87011—TPM details are inconsistent in Cisco UCS Manager GUI and CLI.
-
Old behavior: The following TPM details were displayed in the Cisco UCS Manager GUI, but were missing from the output of the show tpm detail command—Presence State, and Type.
-
New behavior: The TPM details shown in the output of the show tpm detail command and the Cisco UCS Manager GUI are now consistent.
-
Impact: Customers can now list all TPM details through the Cisco UCS Manager CLI as well as the Cisco UCS Manager GUI.
-
Release 2.2(7b) introduces the following behavior changes:
-
CSCtx87011—Cisco UCS backup should preserve identities by default.
-
Old behavior: By default, Preserve Identities is not selected in the GUI when the backup operation is initiated.
-
New behavior: By default, Preserve Identities is now selected in the GUI when the backup operation is initiated.
-
Impact: With Preserve Identities selected by default, allocated identities such MAC addresses, UUIDs, WWxNs and server assignments will be preserved in the backup file. This will allow the system be restored with the exact same identity assignments. To perform a backup of the logical configuration that can be re-used in other systems, customers must clear this selection when performing the backup operation.
-
Release 2.2(6c) introduces the following behavior changes:
-
CSCuu16791—The Firmware Auto Sync Server Policy is now set to No Actions by default.
-
Old behavior: The Firmware Auto Sync Server Policy was set to Auto Acknowledge by default, which attempted to push the default Host Firmware Package into blades/rack-servers during discovery.
-
New behavior: Withe the Firmware Auto Sync Server Policy set to No Actions by default, you not longer have to manually clear the server information from the database, and re-attempt the discovery/integration.
-
Impact: The customer can now run mixed firmware environments and manage the firmware directly.
-
-
During the creation of a host firmware package, Cisco UCS Manager no longer allows checking or clearing individual components of a blade package or rack package.
-
Old behavior: During creation of a host firmware package, if the customer selects the blade package, or rack package, or both, they can check or clear check boxes associated with any components, but they cannot modify the components of these packages. When they click Save Changes, Cisco UCS Manager displays the following error message:
Blade Package and/or Rack package is set. Individual PackImage modification is not allowed for this Host Firmware Package.
-
New behavior: Starting with Cisco UCS Manager Release 2.2(6c), during creation of a host firmware package, if the customer selects the blade package, or rack package, or both, all components listed under these packages are grayed out and cannot be selected or cleared. They cannot modify the components of these packages.
-
Impact: The customer will now not be able to check or clear individual components listed under blade or rack packages, if the blade package, or rack package, or both, are selected during creation of a host firmware package.
-
Release 2.2(5a) introduces the following behavior changes:
-
CSCut47053—Support all VIC slots (1,2,4,5) for UCSM-managed single wire management of UCS C240 M4 rack-mount servers.
-
Old behavior: In UCSM mode, single wire management of UCS C240 M4 servers was only supported in Riser 1 slot 2.
-
New behavior: In UCSM mode, single wire management of UCS C240 M4 servers is now supported in Riser 1 (slots 1 and 2) and Riser 2 (slots 4 and 5).
-
Impact: The customer can now insert the VIC in Riser 1 (slots 1 and 2) and Riser 2 (slots 4 and 5) for single wire management of UCS C240 M4 rack servers.
-
Release 2.2(4b) introduces the following behavior changes:
-
Cisco UCS B200 M4, B260 M4, and B460 M4 blade servers no longer support QLogic (UCSB-MEZ-QLG-03) and Emulex (UCSB-MEZ-ELX-03) mezzanine adapter cards.
-
Old behavior: Cisco UCS B200, B260, and B460 M4 servers supported QLogic (UCSB-MEZ-QLG-03) and Emulex (UCSB-MEZ-ELX-03) mezzanine adapter cards with Cisco UCS Manager Release 2.2(3).
-
New behavior: Starting with Cisco UCSM Release 2.2(4b), Cisco UCS B200 M4, B260 M4, and B460 M4 blade servers no longer support QLogic (UCSB-MEZ-QLG-03) and Emulex (UCSB-MEZ-ELX-03) mezzanine adapter cards.
-
Impact: These servers will fail to complete the discovery process if upgraded to Cisco UCS Manager Release 2.2(4b) and later releases.
-
-
CSCus73964—Infrastructure bundle download causes environment to downgrade.
-
Old behavior: Manual upgrade or activation of Cisco UCS Manager, Fabric Interconnects, and IOM was allowed even if the startup version of the default infrastructure bundle was set.
-
New behavior: If the startup version of the default infrastructure bundle is set, manual upgrade or activation of Cisco UCS Manager, Fabric Interconnects, and IOM is not allowed.
-
Impact: To successfully complete a manual upgrade or activation of Cisco UCS Manager, Fabric Interconnects, and IOM, the customer has to make sure that the startup version is cleared before starting manual upgrade or activation. This can be done through the Cisco UCS Manager CLI or the Cisco UCS Manager GUI.
-
-
CSCuq78417—Change reserved VLAN range from 4030 to 4047.
-
Old behavior: The range of reserved VLAN IDs was from 3968 to 4047.
-
New behavior: The range of reserved VLAN IDs is now from 4030 to 4047.
-
Impact: Before downgrading from Cisco UCS Manager Release 2.2(4b), the customer has to make sure that the VLAN IDs from 3968 to 4030 are not user-configured. VLAN IDs from 3968 to 4030 are system-reserved VLAN IDs in earlier releases.
-
Release 2.2(3a) introduces the following behavior changes:
-
CSCup09981—Server reboot was required on FlexFlash disable in Local Disk Configuration Policy.
-
Old behavior: Server reboot was required on FlexFlash disable in Local Disk Configuration Policy.
-
New behavior: Server reboot is no longer required when FlexFlash is disabled in Local Disk Configuration Policy.
-
Impact: Customer has to make sure that the FlexFlash SD cards are not being used by the server before disabling.
-
Release 2.2(2c) introduces the following behavior changes:
-
CSCul74278—Adding or deleting a local storage device in boot policy will cause PNUOS boot irrespective of "Reboot on Update" flag settings.
-
Old behavior: PNUOS boot occurs only when local device is added and SAN device is removed (or vice versa) in boot policy.
-
New behavior: PNUOS boot always occurs after a local storage device is added or removed in boot policy.
-
Impact: This change allows enabling or disabling of the boot BIOS on local storage controller even in the presence of SAN boot devices in boot policy.
-
-
CSCuj81638—The system no longer returns "empty-pool" faults for empty default pools under the root org.
-
Old behavior: When a new system comes online for the first time, "empty-pool " faults get raised for all empty default pools (compute-pool-default, ip-pool-ext-mgmt, ip-pool-iscsi-initiator-pool, mac-pool-default, uuid-pool-default, wwn-pool-default, and wwn-pool-node-default) under the root org. (These fault IDs include F0463, F0464, F0465, F0466, and F0476.)
-
New behavior: An "empty-pool" fault will no longer be raised for any empty default pool under the root org. Instead, the "empty-pool" fault will only be raised for user-generated empty pools.
-
Impact: This change allows default pools to remain empty when user has pools under a created org.
-
Known Limitations
Known limitations for Cisco UCS Manager 2.2 releases are described in the following sections.
BIOS and BMC Firmware Downgrade
When a new UCS B200 M4 server with the Intel® Xeon® Processor E5-2600 v4 Product Family pre-installed with Cisco UCS Manager Release 2.2(7) firmware is inserted into an existing Cisco UCSM deployment running the Release 2.2(3) infrastructure version, the firmware sync policy, if enabled, will downgrade the BIOS and BMC versions.
The server will fail discovery after the BIOS and BMC versions are downgraded. To recover from this issue, upgrade the BIOS and BMC versions back to the Cisco UCS Manager Release 2.2(7) firmware.
Board Controller Firmware in C-Series Servers
Upgrading board controller firmware in C-Series servers requires a power cycle for the upgrade to take effect.
Cisco UCS Manager Discovery with a QLogic QLE8362 Adapter
The firmware running version on a QLogic QLE8362 adapter that is managed through Cisco UCS Manager must be version 3.50.14 or later. If the firmware running version is earlier than version 3.50.14, discovery will fail. Firmware upgrade must be done out of a standalone Cisco UCS Manager setup.
BIOS and CIMC Firmware Downgrade Restrictions
The following BIOS and CIMC firmware downgrade restrictions were introduced in Cisco UCS Manager Release 2.2(5a):
-
For UCS C460 M4 servers with Intel® Haswell processors installed, Cisco UCS Manager prevents the BIOS and CIMC firmware from downgrading to versions earlier than Release 2.2(5a).
The following BIOS and CIMC firmware downgrade restrictions were introduced in Cisco UCS Manager Release 2.2(3a):
-
For UCS C22 and C24 M3 servers with Intel® Ivy Bridge processors installed, Cisco UCS Manager prevents the BIOS and CIMC firmware from downgrading to versions earlier than Release 2.2(2a).
-
For UCS C220 and C240 M3 servers with Intel® Ivy Bridge processors installed:
-
Cisco UCS Manager prevents the BIOS firmware from downgrading to versions earlier than Release 2.1(3a).
-
Cisco UCS Manager prevents the CIMC firmware from downgrading to versions earlier than Release 2.2(2a).
-
LAN and SAN Topology Information Limitation
LAN and SAN topology information is available only through XML and CLI. This information is not exposed in the Cisco UCS Manager GUI.
Default Zoning Not Supported in Cisco UCS, Release 2.1(1a) and Later Releases
Default zoning has been deprecated in Cisco UCS, Release 2.1(1a). Cisco has not supported default zoning in Cisco UCS since Cisco UCS, Release 1.4 in April 2011. Fibre Channel zoning, a more secure form of zoning, is available in Cisco UCS, Release 2.1(1a) and later releases. For more information about Fibre Channel zoning, see the Cisco UCS Manager configuration guides for the release to which you are planning to upgrade.
Caution |
All storage connectivity that relies on default zoning in your current configuration will be lost when you upgrade to Cisco UCS, Release 2.1(1a) or a later release. We recommend that you review the Fibre Channel zoning configuration documentation carefully to prepare your migration before you upgrade to Cisco UCS, Release 2.1(1a) or later. If you have questions or need further assistance, contact Cisco TAC |
Cisco UCS Manager Downgrade
Before performing any upgrade or downgrade operation, make sure to perform an all configuration backup of your system. The backup will ensure a seamless downgrade or upgrade, if required.
The following defects are related to downgrade issues:
-
CSCul55683 - When downgrading the Cisco UCS Manager image from Release 2.2 to any prior version, you must downgrade Cisco UCS Manager before you downgrade the infrastructure firmware on the FI. If you downgrade the FI first, some FI processes will crash.
Contact Cisco TAC to recover from this issue.
-
CSCuj87553 - If you downgrade the Cisco UCS Manager image from Release 2.2 to any version prior to Release 2.0(4) before the fabric interconnect images are downgraded, the Cisco UCS Manager GUI may not work.
To recover from this issue, downgrade the kickstart and sytem images on the FI to the same version as the downgraded Cisco UCS Manager image. The Cisco UCS Manager GUI will be able to reconnect successfully after the FI is running the same version as Cisco UCS Manager.
-
CSCul54029 - When you downgrade a B22 board controller to 2.1(2) version using auto-install, the activate status shows as failed. Also if you initiate individual board activation, the board control firmware downgrade is blocked.
To recover from this status, use “force” option to activate the board controller to the same version as the active one. This clears the fault and brings activate status to “Ready”.
Known Limitations and Behaviors
The following known limitations and behaviors are not otherwise documented:
Defect ID |
Symptom |
Workaround |
First Bundle Affected |
||
---|---|---|---|---|---|
CSCus53389 |
A Cisco UCS B200 M3 blade server running a Cisco UCS Manager version earlier than Release 2.2(3a) with a 32-GB SD memory card (UCS-SD-32G-S) will be able to use only 16 GB memory. |
To use the entire capacity of the 32 GB SD memory card, do the following:
|
2.2(1b)B |
||
CSCuu02813 |
When the network control policy is configured to include all host VLANs, and the number of MAC addresses exceeds 20,000, server discovery fails. |
Change the network control policy to include only native VLANs, or reduce the range of allowed VLANs to keep the number of MAC addresses below 20,000. |
2.2(4b)A |
||
CSCtq79496 |
FCoE traffic may experience momentary disruption when system QoS policy is being modified. |
This issue has no known work around. To avoid this issue, all QoS policy changes should be made during a maintenance window. |
2.0(1m)A |
||
CSCui95113 |
Blade discovery fails with the following error:
|
This issue is found when adapters are in DIAG mode. |
2.1(2a)B |
||
CSCun25132 |
On platforms with OOB storage controller, Cisco UCS Manager displays usable (coerced) value in disk inventory section, which is different than the raw 'NumberOfBlocks' value displayed in catalog section. |
This is a non-issue; Cisco UCS Manager is designed to report the coerced, or usable, size as reported by the LSI controller. Both the host and OOB interfaces report this same value. |
2.2(1b)T |
||
CSCuo14624 |
When FlexFlash member of dual SD card setup fails and needs to be replaced, the OS needs to be reinstalled, as well. |
This issue has no workaround. |
2.1(2a)B |
||
CSCup18983 |
MAC address changes after upgrade from 2.1 to 2.2.
|
Update MAC security on port with new MAC address. From local-mgmt for each FI, use show mgmt-ip-debug command to find mac address. |
2.2(1b)A |
Related Documentation
For more information, you can access related documents from the following links:
Cisco UCS C-Series Rack Mount Server Integration with Cisco UCS Manager
For more information, refer to the related documents available at the following links: