Professional Documents
Culture Documents
Release 4.0(4)
First Published: 2019-04-26
Last Modified: 2021-03-18
Note We sometimes update the documentation after original publication. Therefore, you should also refer to the
documentation on Cisco.com for any updates.
Deprecation Notice
Revision History
Revision Date Description
• UCS S3260 M5
Table 1: Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.0(4) Release
Cisco IMC Release Cisco UCS Manager Release Rack Mount Servers
Table 2: Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.0(3) Release
Cisco IMC Release Cisco UCS Manager Release Rack Mount Servers
Table 3: Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.0(2) Release
Cisco IMC Release Cisco UCS Manager Release Rack Mount Servers
Cisco IMC Release Cisco UCS Manager Release Rack Mount Servers
Table 4: Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.0(1) Release
Cisco IMC Release Cisco UCS Manager Release Rack Mount Servers
Table 5: Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 3.1(3) Release
Cisco IMC Release Cisco UCS Manager Release Rack Mount Servers
Cisco IMC Release Cisco UCS Manager Release Rack Mount Servers
Table 6: Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 3.1(2) Release
Cisco IMC Release Cisco UCS Manager Release Rack Mount Servers
Table 7: Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 3.1(1) Release
Table 8: Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 3.0(4) Release
Table 9: Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 3.0(3) Release
Table 10: Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 3.0(2) Release
Table 11: Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 3.0(1) Release
Note If the management client is launched using an unsupported browser, check the
help information from the For best results use supported browsers option
available in the login window for the supported browser versions.
Note Connectivity is tested between the server and the first connected device. Further connections, such as to storage
arrays after a switch are not listed in the Cisco UCS Hardware Compatibility List though they may be
highlighted in the vendor support matrix for those devices.
For details about transceivers and cables that are supported on VIC cards, see the Transceiver Modules
Compatibility Matrix
You can also see the VIC data sheets for more compatibility information: Cisco UCS Virtual Interface Card
Data Sheets
For all M4 servers for 4.0 Follow these steps to upgrade from releases greater
releases greater than 3.0(3a) than 3.0(3a) to 4.0:
• You can use Interactive HUU or NIHUU
script to update the server.
• While updating the firmware using the
NIHUU tool, use the Python scripts that are
released with version 4.0.
• Use OpenSSL 1.0.1e-fips on the client side
(where the NIHUU python scripts are
running).
• If you wish to secure Cimc Boot, set flag
use_cimc_secure as yes in
multiserver_config file present with python
script.
• Download HUU iso from here.
• Download NIHUU script from here.
For all M4 servers for 4.0 Follow these steps to upgrade from releases less
release lesser than 3.0(3a) than 3.0(3a) to 4.0:
except C460 M4
Upgrade from version less than 3.0(3a) to 3.0(3a)
For C460 M4 servers for
• You can use Interactive HUU or NIHUU
release 2.0(4c) to 3.0(3a)
script to update the server.
• While updating the firmware using the
Non-Interactive HUU (NIHUU) tool, use the
Python scripts that are released with version
3.0(3a).
• Use OpenSSL 1.0.1e-fips on the client side
(where the NIHUU python scripts are
running).
• Download HUU iso from here.
• Download NIHUU script from here.
Note Always upgrade the BIOS, the Cisco IMC and CMC from the HUU ISO. Do not upgrade individual components
(only BIOS or only Cisco IMC), since this could lead to unexpected behavior. If you choose to upgrade BIOS,
and the Cisco IMC individually and not from the HUU ISO, make sure to upgrade both Cisco IMC, and BIOS
to the same container release. If the BIOS and the Cisco IMC versions are from different container releases,
it could result in unexpected behavior. Cisco recommends that you use the Update All option from the Host
Upgrade Utility to update the firmware versions of Cisco IMC, BIOS, and all other server components (VIC,
RAID Controllers, PCI devices, and LOM) together.
For detailed information about the components available in a server for each release, see: Cisco UCS C-Series
Integrated Management Controller Firmware Files
All firmware should be upgraded together to ensure proper operation of your server.
Note We recommend that you use the Update All option from the Host Upgrade Utility to update the firmware
versions of Cisco IMC, BIOS and all other server components (VIC, RAID Controllers, PCI devices, and
LOM) together. Click Exit once you deploy the firmware.
For more information on how to upgrade the firmware using the utility, see:
Cisco Host Upgrade Utility User Guide
• Panic and High Watermark BIOS token is added for Cisco UCS C220 M5, C240 M5, C480 M5, and
S3260 M5 servers. For more information, see Cisco UCS C-Series Integrated Management Controller
GUI Configuration Guide, Release 4.0 or Cisco UCS C-Series Servers Integrated Management Controller
CLI Configuration Guide, Release 4.0 at Configuration Guides.
• Memory Refresh Rate BIOS token is added for Cisco UCS C220 M5, C240 M5, C480 M5, and S3260
M5 servers. Default value is set to 1x Refresh. For more information, see Cisco UCS C-Series Integrated
Management Controller GUI Configuration Guide, Release 4.0 or Cisco UCS C-Series Servers Integrated
Management Controller CLI Configuration Guide, Release 4.0 at Configuration Guides.
Fault ID
Fault ID is included in the Cisco IMC logs.
Ensure that the above options are disabled before enabling Physical NIC Mode.
ADDDC Sparing
Added the ADDDC Sparing option to the Select Memory RAS Configuration BIOS token for all M5
servers except C125 M5. This is now the new default value of this token.
ADDDC RAS Changes - Adaptive Double Device Data Correction (ADDDC) is a memory RAS feature that
enables dynamic mapping of failing DRAM by monitoring corrected errors and taking action before uncorrected
errors can occur and cause an outage. It is now enabled by default.
Once ADDDC sparing remaps a memory region the system could incur marginal memory latency and bandwidth
penalties on memory bandwidth intense workloads that target the impacted region. Cisco recommends
scheduling proactive maintenance to replace a failed DIMM once an ADDDC RAS fault is reported.
®
Intel VMD Enhancements to NVME
Support for Volume Management Devices (VMD) in NVMe. Optional VMD drivers are available on the
Cisco download site. VMD is supported on the following Operating Systems:
• RHEL 7.3, 7.4, 7.5, 7.6
• CENTOS 7.3, 7.4, 7.5, 7.6
• SLES-15, SLES-15 v4
• Windows 2016, Windows 2019
• ESXi 6.5U2, 6.7U1, 6.7U2
• Ubuntu 18.04.1
Enhanced features provided by VMD provide support for hot-plugging of PCIe Solid State Drives (SSD), as
well as the ability to use a command line interface to configure blinking patterns to indicate drive status.
Account Lockout
Added support to configure the maximum number of failed login attempts (due to incorrect password) for
local users. You can also set the time period for which the user will be locked out.
Redfish
Redfish schema was updated.
Note If you boot in Legacy Boot mode, the Linux kernel displays a warning similar to the following when loading
the Cisco-signed driver modules:
Request for unknown module key 'Cisco UCS Driver Signing REL Cert:...
This warning means that a key is not present to validate the driver signature. However, Linux kernel can still
proceed with loading the Cisco drivers. This warning is displayed in Legacy Boot mode because the Cisco
cryptographic keys that are used to validate the driver signatures are only available when the UCS chassis is
booted in Secure Boot mode.
Peripherals
Support for NVIDIA T4 16GB GPU cards (UCSC-GPU-T4-16) on the following servers:
• UCS C240 M5
• UCS C220 M5
• UCS C480 M5
Support for Support for the QLogic QL45611HLCU single port 100GbE PCIe NIC (UCSC-PCIE-QS100GF)
on all UCS M5 servers supported in this release.
Support for Mellanox MCX4121A-ACAT Dual Port 10/25G SFP28 NIC (UCSC-P-M4D25GF)
New Features
Software Utilities
The following standard utilities are available:
• Host Update Utility (HUU)
• BIOS and Cisco IMC Firmware Update utilities
SNMP
The supported MIB definition for this release and later releases can be found at the following link:
ftp://ftp.cisco.com/pub/mibs/supportlists/ucs/ucs-C-supportlist.html
Security Fixes
4.0(4c) CSCvp34806 • CVE-2018-12126 Cisco UCS M5 servers are based on Intel® Xeon®
Scalable processors that are vulnerable to variants
• CVE-2018-12127 of exploits that use Microarchitectural Data Sampling
• CVE-2018-12130 (MDS) to gain access to data being processed in the
CPU by other applications.
• CVE-2019-11091
• CVE-2018-12126 (Microarchitectural Store
Buffer Data Sampling) affects store buffers in
the CPU, and is addressed by applying the
updated microcode included in the UCS Cisco
IMC release as well as the relevant Operating
System and Hypervisor patches from the
appropriate vendors.
• CVE-2018-12127 (Microarchitectural Load
Port Data Sampling) affects load buffers in the
CPU, and is addressed by applying the updated
microcode included in the UCS Cisco IMC
release as well as the relevant Operating System
and Hypervisor patches from the appropriate
vendors.
• CVE-2018-12130 (Microarchitectural Fill
Buffer Data Sampling) affects line fill buffers
in the CPU, and is addressed by applying the
updated microcode included in the UCS Cisco
IMC release as well as the relevant Operating
System and Hypervisor patches from the
appropriate vendors.
• CVE-2019-11091 (Microarchitectural
Uncacheable Data Sampling) affects the
uncacheable memory buffers in the CPU, and
is addressed by applying the updated microcode
included in the UCS Cisco IMC release as well
as the relevant Operating System and
Hypervisor patches from the appropriate
vendors.
Resolved Caveats
The following section lists resolved caveats.
Release 4.0(4n)
The following caveats were resolved in Release 4.0(4n):
Release 4.0(4m)
The following caveats were resolved in Release 4.0(4m):
Release 4.0(4l)
The following caveats were resolved in Release 4.0(4l):
OR
Communication to
peer CMC remote
manager. Internal
Error. Please
retry
Release 4.0(4k)
The following caveats were resolved in Release 4.0(4k):
Release 4.0(4j)
There are no resolved caveats in 4.0(4j).
Release 4.0(4i)
The following caveats were resolved in Release 4.0(4i):
Release 4.0(4h)
The following caveat was resolved in Release 4.0(4h):
Release 4.0(4f)
The following caveats were resolved in Release 4.0(4f):
CSCvq26149 M5 server fans run at MAX speed after PECI 4.0(4c) 4.0(4f)
temperature read failure. The fan speed
continues to remain at MAX speed until you
perform a power cycle of the server.
®
CSCvq93258 The Product IDs (PID) of the new Intel 4.0(4d) 4.0(4f)
™
Optane Data Center Persistent Memory
Modules parts are displayed as UNKNOWN
in version 4.0(4d).
Upgrading the PID catalog to 4.0(4e)
displays the correct PID numbers.
Release 4.0(4e)
The following caveats were resolved in Release 4.0(4e):
CSCvo55902 Network link activity LED does not display 4.0(4b) 4.0(4e)
the correct LOM port and LED status.
CSCvp43280 When two or more Intel PCI Adapters are 4.0(2c) 4.0(4e)
populated in the UCS C-Series and S-Series
M5 servers, upgrading the firmware using
HUU may fail for the PCI cards.
CSCvo93353 The StorCLI command storcli /cX show all 4.0(2f) 4.0(4e)
does not display the World Wide Number
(WWN) of the drives. This happens when
you use StorCLI version 7.0813 or earlier.
® ™
Table 34: Intel Optane Data Center Persistent Memory Modules - Intel Resolved Caveats
Release 4.0(4d)
The following caveat was resolved in Release 4.0(4d):
Release 4.0(4b)
The following caveat was resolved in Release 4.0(4b):
Release 4.0(2q)
The following defect was resolved in release 4.0(2q):
Release 4.0(2o)
The following defect was resolved in release 4.0(2o):
Release 4.0(2n)
The following defect was resolved in release 4.0(2n):
Release 4.0(2m)
The following defect was resolved in release 4.0(2m):
Release 4.0(2l)
There are no resolved caveats in release 4.0(2l).
Release 4.0(2k)
The following defect was resolved in release 4.0(2k):
Release 4.0(2i)
The following defects were resolved in release 4.0(2i):
CSCvo77732 After upgrading the UCS C460 M4 with Intel 4.0(1c) 4.0(2i)
Xeon v2 CPUs to 4.0 firmware versions, the
server crashes (PSOD), becomes
unresponsive, or encounters a CATERR.
Release 4.0(2h)
The following defect was resolved in release 4.0(2h):
Release 4.0(2g)
The following defects were resolved in release 4.0(2g):
Release 4.0(2f)
The following defects were resolved in release 4.0(2f):
Release 4.0(2d)
The following defects were resolved in release 4.0(2d):
Release 4.0(2c)
The following defects were resolved in release 4.0(2c):
CSCvm12144 PSU input voltage lost assert issue seen 3.1(3b) 4.0(2c)
though there is no physical power loss.
CSCvj95793 The "show fault-entries" list does not display 4.0(1a) 4.0(2c)
the faults reported from the subordinate
CMC when logged in using the management
IP. It only reports the primary CMC faults.
Open Caveats
The following section lists open caveats.
Release 4.0(4l)
The following caveat was opened in Release 4.0(4l):
Release 4.0(4i)
The following caveat was opened in Release 4.0(4i):
Release 4.0(4f)
The following defect is open in release 4.0(4f):
CSCvq50290 Cisco IMC fails to recognize SATA disk If this issue occurs, do the 4.0(4b)
UCS-SD960G63X-EP. This happens following:
when you upgrade to 4.0(4) version from
1. Boot to 4.0.(2d) HUU
4.0(2c) or below versions.
2. Downgrade the storage
controller version to
00.00.00.58.
3. Reboot and discover the drive
and upgrade to version
SCV1CS07.
4. Boot to 4.0(4) release.
5. Upgrade storage controller to
the latest version available in
the 4.0(4) release.
CSCvr03037 Intel drives and few of the other SATA Perform Cisco IMC reboot. 4.0(4e)
drives are displayed as Unconfigured
bad in Cisco IMC Storage section after
upgrading the firmware from version
CS05 to version CS07.
This issue is seen only when Cisco 12G
Modular SAS HBA controller is
connected with Intel drives and SAS
drives. This is observed only in Cisco
IMC Out of Band Interface, wherein the
drives are shown as healthy in HII/Host
interface of the storage controller.
Note Sometimes it may take around
15 minutes to reflect the right
status of controller and drives
from Cisco IMC.
CSCvr03044 While upgrading Cisco IMC from Update the failed drives or all the 4.0(4e)
4.0(2c) to 4.0(4f), SAS drive firmware drives again for a successful
update may fail when the drives are update.
connected to Cisco 12G Modular SAS
HBA controller.
CSCvr03041 Slot numbers of the connected drives are There is no functional impact as the 4.0(4c)
displayed as NA in Host Update Utility drives are updated successfully.
even after updates are completed
successfully.
This issue is seen only in Software RAID
configurations.
Release 4.0(4e)
The following defects are open in release 4.0(4e):
CSCvq74492 System becomes unresponsive during If this issue occurs, do one of the 4.0(4e)
BIOS post when the Intel X520 PCIe following:
adapter is present on the system and
• Switch to UEFI boot mode.
iSCSI mode is enabled for Intel X550
LOMs. This happens only when boot
Or
mode is set to legacy.
1. When system is hung, set the
LOM Option to disable using
the CIMC feature to set the
BIOS tokens.
2. Reboot the server to the UEFI
shell.
3. Use the Intel bootutil and
enable iSCSI for X520 adapter
and reboot the server (Intel
bootutil along with its
userguide is part of the driver
iso).
4. On next boot, during BIOS post
enter into Intel OPROM
Utility(Ctrl +D), enable the
ISCSI mode for X550 LOM.
Save and restart.
5. LOM ISCSI LUN will boot
without any issue.
Release 4.0(4b)
The following defects are open in release 4.0(4b):
® ™
Table 70: Intel Optane Data Center Persistent Memory Modules - Intel Open Caveats
CSCvn77341 Namespaces created under Red Hat No known workaround. The 4.0(4b)
Enterprise Linux 7.6 by using the namespaces are healthy, and their
in-box ndctl tool, may be seen in functionality is not affected.
"Critical" health state when
examined in the BIOS Setup or the
UEFI IPMCTL tool. However, the
namespaces are healthy, and their
functionality is not affected.
®
This is an issue with the Intel
™
Optane Data Center persistent
memory module HII and UEFI
IPMCTL tool.
Intel IPS case filed.
® ™
CSCvn81521 On systems with Intel Optane Examine the MCAOut files to 4.0(4b)
Data Center persistent memory identify the actual failed DIMM
modules in 2LM (memory mode), location.
uncorrectable errors get logged on
the persistent memory modules
when errors occur on DDR4
DIMMs (configured as near
memory) on the same channel.
Intel IPS case filed.
® ™
CSCvp08356, When Intel Optane Data Center Clear errors by using Reset all 4.0(4b)
CSCvo72182 persistent memory modules are Memory errors in Cisco UCS
populated in the system, and the Manager.
system is operational, occasionally
false uncorrectable errors are
reported on DIMM A1. This has no
functional impact.
Intel IPS case filed.
®
CSCvp38564 Intel Intelligent Power Technology If persistent memory modules are 4.0(4b)
Node Manager (NM) PTU does not detected in a system, the BIOS will
® ™
work with Intel Optane DC not load NMPTU to prevent
persistent memory modules in App unresponsiveness or an infinite
Direct mode. Hence, the power loop.
characterization accuracy is
reduced.
Intel IPS case filed.
® ™
Table 71: Intel Optane Data Center Persistent Memory Modules - Cisco Open Caveats
CSCvt31090 For Cisco UCS S3260 M5 servers, Create Namespace using Cisco 4.0(4b)
Cisco IMC GUI does not display IMC CLI or XML API.
the list of Local DIMM numbers,
OR
to create Namespace, after a
DCPMM factory reset. As a result, Perform the following steps:
Namespace creation fails.
1. Create a new Namespace using
Name, Socket ID, Capacity
and Mode fields.
2. Save the settings but do not
reboot the host to apply the
settings.
3. From Create Memory Usage,
delete the pending Namespace
entry, which was created
without the DIMM number in
Step 2.
4. Now you can create a new
Namespace with local DIMM
number and other fields.
5. Save the settings and reboot
the host to apply the settings.
CSCvo46953 Unable to initiate iPXE boot from LOM port Use LOM port 2. 4.0(4b)
1.
CSCvp21118 Precision boot order (L2 boot order) feature You can use BIOS F6 to boot 4.0(4b)
of Cisco UCS C480 M5 servers may not list from the required device.
the external physical USB drives in the boot
order.
CSCvp43349 After upgrading the BIOS firmware to You can add the iSCSI attempt 4.0(4b)
4.0(4b), Cisco UCS M5 servers may lose the from the BIOS setup for third
previously configured (before the upgrade) party Adapters and using the
iSCSI attempts. Cisco IMC GUI for VIC cards.
CSCvp36893 When you run the PTU TDP test on the None. 4.0(4b)
Cisco UCS M5 servers with some CPU
SKUs, CPU domain max power limit reaches
only half the actual CPU TDP.
CSCvp11474 While updating firmware on multiple drives Manually update the firmware 4.0(4b)
using HUU, an error indicating that the drive of the drive reported by HUU
update for a particular drive has "Failed" is or ignore the error and continue
displayed even though the firmware is with the reboot step as
updated. firmware is already updated.
CSCvp30283 On servers with QL45412H card, iSCSI 1. Enter the F2 BIOS setup 4.0(4b)
configuration restores to default settings after menu and access the
updating the adapter firmware. This happens Advanced tab of iSCSI
when you configure iSCSI using the Qlogic configuration.
HII configuration utility from the BIOS
menu. 2. Enter the iSCSI Initiator
Name and Target Name.
3. Save and Exit.
CSCvq81930 Firmware update of the following Intel drives Use HUU 4.0(2f) to update the 4.0(4b)
fail while upgrading from 4.0(2c) to 4.0(4b) drives.
OR 4.0(4e):
• SSDSC2KB038T7K : 3.8TB 2.5 inch
Enterprise Value 6G SATA SSD
• SSDSC2KB960G7K - 960GB 2.5-inch
Enterprise Value 6G SATA SSD
• SSDSC2KG019T7K - 1.9TB 2.5-inch
Enterprise performance 6G SATA SSD
SSDSC2KG480G7K - 480GB 2.5-inch
Enterprise performance 6GSATA SSD
• SSDSC2KG960G7K - 960GB 2.5-inch
Enterprise performance 6G SATA SSD
CSCvo39645 CATERR/IERR occurs on multiple reboots When this issue occurs, 4.0(4b)
and the system becomes unresponsive during perform a warm reboot.
POST. This issue occurs on servers with
NVMe drives on mSwitch connected
configuration.
Release 4.0(2c)
The following defects are open in release 4.0(2c):
CSCvn09309 While trying to boot to PXE by pressing the Press the F6 or F2 key and 4.0(2c)
F12 key during POST, F12 network boot select Cisco FastlinQ
will not work for Cisco FastlinQ QL45611HLCU 100GBE
QL45611HLCU 100GBE adapter. adapter for PXE boot.
CSCvm78419 ISCSI lun may not be able establish TCP/IP Use the following command on 4.0(2c)
connection with the Cisco Etherent switch:
Converged NIC X710-DA2, Intel X710-DA4 conf t
, and Intel XL710QDA2 PCIe cards after the no lldp tlv-select
firmware is updated to version 4.0(1a ). dcbxp
Release 4.0(1a)
The following defect is open in Release 4.0(1a):
CSCvk58997 On the M4 servers, booting IPv6 based UEFI Use IPv4 UEFI PXE. 4.0(1a)
PXE using Windows WDS application fails
with a server time out error. This happens
with all M4 servers in UEFI mode.
CSCvo77732 After upgrading the C460 M4 servers with Downgrade to 3.0(x) version. 4.0(1a)
Intel® Xeon® Processor v2 to 4.0(1a)
version, server encounters a CATERR fault
and the server becomes unresponsive.
CSCvq64055 Cisco VIC1455 and VIC 1457 interfaces take Use shorter copper passive 4.0(1a)
more than four minutes to recover to cables (SFP-25G-CU1M.
Link-Up state after the far end Switch SFP-25G-CU2M,
configuration is changed to no shut. This SFP-25G-CU3M).
happens when a 25G 5M copper passive
Or
cable (SFP-H25G-CU5M) cable is
connecting the VIC1455 or VIC 1457 and Use optical cables.
the N9K-C93180YC-EX switch.
Known Behaviors
The following section lists known behaviors.
Release 4.0(4m)
The following caveats are the known limitations in Release 4.0(4m):
Release 4.0(4i)
The following caveats are the known limitations in Release 4.0(4i):
CSCvo76406 Cisco IMC GUI does not There is no known workaround. 4.0(4a)
support editing the applied
namespaces for Cisco UCS
C-Series M5 servers. However,
the namespaces could be edited
using Cisco IMC CLI or XML
API, which caused loss of data
and configurations.
Editing the applied namespaces
through Cisco IMC CLI or
XML API is no longer
supported.
CSCvo27998 In Cisco UCS S3260 servers, • Export the configurations one at a time. For 4.0(4i)
exporting the technical support example: CMC, BMC, VIC and so on.
data using TFTP protocol to a
server with IPv6 IP address • Update the firmware using other shares.
fails.
Release 4.0(4e)
The following caveats are the known limitations in Release 4.0(4e):
CSCvp65147 Despite user account being Enable the Disable user on Lockout feature using 4.0(4c)
locked due to multiple the CLI or XML API or WebUI interface. This
incorrect login attempts, user will disable the locked user and IPMI commands
can execute IPMI commands will not work for the user.
after successful user
authentication through IPMI
during the account lockout
period.
CSCvq20893 All the supported SN200 series drives are None. 4.0(4e)
displayed as SN200 in device manager page
or Hardware info page of ESXi. Specific
version of the drive is not displayed.
Release 4.0(4b)
The following caveats are the known limitations in Release 4.0(4b):
® ™
Table 82: Intel Optane Data Center Persistent Memory Modules
CSCvo21859 You cannot scope into CLI Do not create namespaces with empty name from 4.0(4b)
when a namespace is host tools.
configured with an empty
name using the host tools (F2).
CSCvo59901 You cannot scope into CLI or Do not use special characters for namespace 4.0(4b)
delete a namespace using CLI names other than the following supported ones:
when you create a namespace #, - and _
(using the host tools (F2)) that
has special characters in the
name.
Release 4.0(2n)
The following caveats are known limitations in Release 4.0(2n):
Release 4.0(2m)
The following caveats are known limitations in Release 4.0(2m):
CSCvm36382 Storage Controller on Cisco UCS S3260 M4 Run HUU on the server node 4.0(2m)
servers display Invalid hardware after controller swap to update
configuration error, after swapping the Sub OEMID to correct values.
position from motherboard to IO Expander
or from the IO Expander to the motherboard.
Release 4.0(2c)
The following caveats are known limitations in Release 4.0(2c):
CSCvm92237 The nvidia-smi tool GPU slot To map lspci GPU slot nr/BusID to 4.0(2c)
mapping does not match with the nvidia-smi GPU slot nr/BusID, run the
lspci output and the C480-M5ML following command (see the example below):
Silkscreen slot numbering.
Search for Nvidia Devices with BusID 1b and 1c, for example;
the tree will display GPU PCI bridge BusID mapped to nvidia-smi GPU BusID:
lspci GPU PCI bridge BusID: 19:08.0 mapped with nvidia-smi GPU BusID: [1b]
(1B:00.0)
lspci GPU PCI bridge BusID: 19:0c.0 mapped with nvidia-smi GPU BusID: [1c]
(1C:00.0)
-[0000:17]-+-00.0-[18-1c]----00.0-[19-1c]--+-04.0-[1a]--
| | +-08.0-[1b]----00.0
NVIDIA Corporation Device 1db5
| | \-0c.0-[1c]----00.0
NVIDIA Corporation Device 1db5
CSCvj48637 HDD activity and locate LEDs are not None. 4.0(2c)
working for AHCI controller. This happens
when the Red Hat Enterprise Linux OS is
installed.
Release 4.0(1a)
The following caveat is a known limitation in Release 4.0(1a):
CSCvi46521 On the 3260 servers, when you You must enable the single server dual VIC 4.0(1a)
are using a dual VIC single feature to use the second VIC.
server configuration, you
cannot access the second VIC.
CSCvk11921 On the C125 servers with QL41232H 25G 1. Enter the BIOS setup. 4.0(1a)
OCP card, the link does not work. This
happens when OCP card is connected to the 2. Navigate to Advanced >
switch using a 5M SFP cable. The network Qlogic QL41232 Option
LED is not on and the network is not > Port Level
functional. configuration
3. Change the link Speed to
25Gbps.
4. Press F10.
5. Save and exit.
Related Documentation
Related Documentation
For configuration information for this release, refer to the following:
• Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide
• Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide
• Cisco UCS Rack-Mount Servers Cisco IMC API Programmer's Guide
For information about installation of the C-Series servers, refer to the following:
• Cisco UCS C-Series Rack Servers Install and Upgrade Guides
The following related documentation is available for the Cisco Unified Computing System:
• Cisco UCS C-Series Servers Documentation Roadmap
• Cisco UCS Site Preparation Guide
• Regulatory Compliance and Safety Information for Cisco UCS
• For information about supported firmware versions and supported UCS Manager versions for the rack
servers that are integrated with the UCS Manager for management, refer to Release Bundle Contents for
Cisco UCS Software.
Refer to the release notes for Cisco UCS Manager software and the Cisco UCS C Series Server Integration
with Cisco UCS Manager Guide at the following locations:
• Cisco UCS Manager Release Notes
• Cisco UCS C Series Server Integration with Cisco UCS Manager Guides