SIOC Management

SIOC Management in Cisco UCS Manager

You can manage and monitor all System Input/Output Controllers (SIOC) in a Cisco UCS domain through Cisco UCS Manager.

SIOC Removal or Replacement

You can remove or replace an SIOC from a chassis. Removal or replacement of an SIOC is a service-affecting operation, which requires you to power down the entire chassis.

Guidelines for SIOC Removal

  • To remove the active SIOC, or both SIOCs, shut down and remove power from the entire chassis. You must disconnect all power cords to completely remove power.

  • Removal of SIOCs from a chassis results in the entire chassis being disconnected from Cisco UCS Manager.

SIOC Removal

Do the following to remove an SIOC from the system:

  1. Shut down and remove power from the entire chassis. You must disconnect all power cords to completely remove power.

  2. Disconnect the cables connecting the SIOC to the system.

  3. Remove the SIOC from the system.

SIOC Replacement

Do the following to remove an SIOC from the system and replace it with another SIOC:

  1. Shut down and remove power from the entire chassis. You must disconnect all power cords to completely remove power.

  2. Disconnect the cables connecting the SIOC to the system.

  3. Remove the SIOC from the system.

  4. Connect the new SIOC to the system.

  5. Connect the cables to the SIOC.

  6. Connect power cords and then power on the system.

  7. Acknowledge the new SIOC.

    The server connected to the replaced SIOC is rediscovered.


    Note


    If the firmware of the replaced SIOC is not the same version as the peer SIOC, then it is recommended to update the firmware of the replaced SIOC by re-triggering chassis profile association.


Acknowledging an SIOC

Cisco UCS Manager has the ability to acknowledge a specific SIOC in a chassis. Perform the following procedure when you replace an SIOC in a chassis.


Caution


This operation rebuilds the network connectivity between the SIOC and the fabric interconnects to which it is connected. The server corresponding to this SIOC becomes unreachable, and traffic is disrupted.

NVMe slot-1 in SIOC is mapped to server 1 and NVMe slot-2 to server 2. Cisco UCS Manager triggers rediscovery on both the servers since SIOC has NVMe mapped to both the servers.


Procedure


Step 1

In the Navigation pane, click Equipment.

Step 2

Expand Equipment > Chassis > Chassis Number > SIOC

Step 3

Choose the SIOC that you want to acknowledge.

Step 4

In the Work pane, click the General tab.

Step 5

In the Actions area, click Acknowledge SIOC.

Step 6

In the Acknowledge SIOC confirmation box, click Yes.


Migrating to SIOC with PCIe Support

Before you begin

Ensure that the Cisco UCS Manager is at release 4.0(1a) or higher.

Procedure


Step 1

Update the chassis and server firmware to 4.0(1) release.

Step 2

Decommission the chassis.

Step 3

Shut down and remove power from the entire chassis. You must disconnect all power cords to completely remove power.

Step 4

Disconnect the cables connecting the SIOC to the system.

Step 5

Remove the SIOC from the system.

Step 6

Connect the new SIOC to the system.

Step 7

Connect the cables to the SIOC.

Step 8

Connect power cords and then power on the system.

Step 9

Acknowledge the new SIOC.


Resetting the CMC

Procedure


Step 1

In the Navigation pane, click Equipment.

Step 2

Expand Equipment > Chassis > Chassis Number > SIOC > SIOC Number

Step 3

In the Work pane, click the Chassis Management Controller tab.

Step 4

In the Actions area, click Reset CMC.

Step 5

In the Reset CMC confirmation box, click Yes.


CMC Secure Boot

With Chassis Management Controller (CMC) secure boot, only Cisco-signed firmware images can be installed and run on the CMC. When the CMC is updated, the image is certified before the firmware is flashed. If certification fails, the firmware is not flashed. This prevents unauthorized access to the CMC firmware.

Guidelines and Limitations for CMC Secure Boot

  • CMC secure boot is supported only on the Cisco UCS S3260 chassis.

  • When chassis association is in progress, enabling secure boot on one of the SIOCs will result in a failed operation.

  • After CMC secure boot is enabled, it cannot be disabled.

  • CMC secure boot is specific to the SIOC on which it is enabled. If you replace the SIOC on which CMC secure boot is enabled, the Secure boot operational state field will now display the secure boot status of the new SIOC.

  • After CMC secure boot is enabled on a chassis, you cannot move the chassis back to non-cluster setup and downgrade the firmware to a CMC firmware image earlier than Cisco IMC Release 2.0(13).

  • The Secure boot operational state field shows the secure boot status. This can be one of the following:

    • Disabled—When CMC secure boot is not enabled. This is the default state.

    • Enabling—When CMC secure boot is being enabled.

    • Enabled—When CMC secure boot is enabled.

  • Beginning with 4.0(1), Secure boot operational state is Enabled by default and is not user configurable. The option is grayed out.

Enabling CMC Secure Boot

Procedure


Step 1

In the Navigation pane, click Equipment.

Step 2

Expand Equipment > Chassis > Chassis Number > SIOC

Step 3

Choose the SIOC on which you want to enable CMC secure boot.

Step 4

In the Work pane, click the Chassis Management Controller tab.

Step 5

In the Actions area, click Enable Secure Boot.

The Enable Secure Boot confirmation box appears with the following warning:

When committed, CMC secure boot and installation will be enabled. This is an irreversible operation. Are you sure you want to enable secure boot.

Step 6

Click Yes.