UCSM CLI Firmware Management Guide 3.1
UCSM CLI Firmware Management Guide 3.1
3.1
First Published: 2016-01-20
Last Modified: 2017-04-27
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
2016-2017 Cisco Systems, Inc. All rights reserved.
CONTENTS
Preface Preface ix
Audience ix
Conventions ix
Related Cisco UCS Documentation xi
Documentation Feedback xi
CHAPTER 2 Overview 3
Overview 3
What is New in Cisco UCS Manager Release 3.1 8
Cisco UCS Manager User CLI Documentation 9
Components That Support Firmware Upgrade 9
Firmware Version Terminology 11
Cross-Version Firmware Support 11
Server Pack 15
Light Weight Upgrades 16
Service Packs 16
Service Pack Versions 17
Service Pack Rollback 18
Guidelines and Restrictions for Service Packs 18
Firmware Auto Sync for FI Cluster 19
Options for Firmware Upgrades 19
Options for Service Pack Updates 21
Firmware Upgrades through Auto Install 21
Firmware Upgrades through Firmware Packages in Service Profiles 23
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
iii
Contents
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
iv
Contents
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
v
Contents
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
vi
Contents
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
vii
Contents
Recovering Fabric Interconnects From a Failed FSM During Upgrade With Auto
Install 133
Recovering IO Modules During Firmware Upgrade 134
Resetting an I/O Module from a Peer I/O Module 134
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
viii
Preface
Audience, page ix
Conventions, page ix
Related Cisco UCS Documentation, page xi
Documentation Feedback, page xi
Audience
This guide is intended primarily for data center administrators with responsibilities and expertise in one or
more of the following:
Server administration
Storage administration
Network administration
Network security
Conventions
Text Type Indication
GUI elements GUI elements such as tab titles, area names, and field labels appear in this font.
Main titles such as window, dialog box, and wizard titles appear in this font.
TUI elements In a Text-based User Interface, text the system displays appears in this font.
System output Terminal sessions and information that the system displays appear in this
font.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
ix
Preface
Conventions
string A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
!, # An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
document.
Tip Means the following information will help you solve a problem. The tips information might not be
troubleshooting or even an action, but could be useful information, similar to a Timesaver.
Timesaver Means the described action saves time. You can save time by performing the action described in the
paragraph.
Caution Means reader be careful. In this situation, you might perform an action that could result in equipment
damage or loss of data.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
x
Preface
Related Cisco UCS Documentation
Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments
to [email protected]. We appreciate your feedback.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
xi
Preface
Documentation Feedback
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
xii
CHAPTER 1
New and Changed Information
New and Changed Information for This Release, page 1
Table 1: New Features and Changed Behavior in Cisco UCS Manager, Release 3.1(3)
Fabric Evacuation with Auto You can now use fabric evacuation Fabric Interconnect Traffic
Install during Auto Install. If you use fabric Evacuation, on page 38
evacuation with Auto Install, and fabric
evacuation was enabled on the fabric
interconnect before Auto Install, fabric
evacuation is disabled after Auto Install
is complete.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
1
New and Changed Information
New and Changed Information for This Release
Table 2: New Features and Changed Behavior in Cisco UCS Manager, Release 3.1(2)
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
2
CHAPTER 2
Overview
This chapter includes the following sections:
Overview, page 3
Components That Support Firmware Upgrade, page 9
Firmware Version Terminology, page 11
Cross-Version Firmware Support, page 11
Server Pack, page 15
Light Weight Upgrades, page 16
Firmware Auto Sync for FI Cluster, page 19
Options for Firmware Upgrades, page 19
Firmware Upgrade While Migrating from Cisco UCS 6200 Series Fabric Interconnects to Cisco UCS
6300 Series Fabric Interconnects , page 25
Firmware Upgrade to Cisco UCS Manager Release 3.1, page 25
Firmware Upgrade to a Minor or a Patch Release, page 27
Firmware Downgrades, page 28
Firmware Management in Cisco UCS Central , page 29
Overview
Cisco UCS uses firmware obtained from and certified by Cisco to support the endpoints in a Cisco UCS
domain. Each endpoint is a component in the Cisco UCS domain, and requires firmware to function.
This guide explains how to obtain firmware and upgrade the endpoints in a Cisco UCS domain by using Cisco
UCS Manager. It also details the best practices to be followed while upgrading these endpoints.
Beginning with Cisco UCS Manager Release 3.1(1), Cisco is releasing unified Cisco UCS Manager software
and firmware upgrades for each of the following platforms with every release of Cisco UCS Manager:
Cisco UCS 6300 Series Fabric Interconnect with Cisco UCS B-Series, and C-Series Servers
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
3
Overview
Overview
Cisco UCS 6200 Series Fabric Interconnect with Cisco UCS B-Series, and C-Series Servers
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
4
Overview
Overview
Cisco UCS 6324 Fabric Interconnect with Cisco UCS B-Series Servers and C-Series Servers, which is
also known as UCS Mini
Figure 1: Cisco UCS 6300 Series Fabric Interconnect with Cisco UCS B-Series and C-Series Servers
Figure 2: Cisco UCS 6200 Series Fabric Interconnect with Cisco UCS B-Series, and C-Series Servers
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
5
Overview
Overview
Figure 3: Cisco UCS 6324 Fabric Interconnect with Cisco UCS B-Series Servers and C-Series Servers
These figures illustrate the various platforms and the firmware bundles supported by Cisco UCS Manager
Release 3.1.
Each release has the following firmware bundles:
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
6
Overview
Overview
Infrastructure software bundleThis bundle is also called the A bundle. It contains the firmware images
that the fabric interconnects, IO Modules, and Cisco UCS Manager require to function.
Cisco UCS Manager Release 3.1 and later releases will contain three separate infrastructure bundles:
Cisco UCS 6200 Series Fabric Interconnectucs-k9-bundle-infra.3.1.x.xxx.A.bin
Cisco UCS 6300 Series Fabric Interconnectucs-6300-k9-bundle-infra.3.1.x.xxx.A.bin
Cisco UCS 6324 Fabric Interconnectucs-mini-k9-bundle-infra.3.1.x.xxx.A.bin
B-Series server software bundleAlso called the B bundle, this bundle contains the firmware images
that the B-Series blade servers require to function, such as adapter, BIOS, CIMC, and board controller
firmware. Release Bundle Contents for Cisco UCS Manager, Release 3.1 provides details about the
contents of the B-Series server software bundle.
Note Starting with Cisco UCS Manager Release 3.1(2), the firmware for endpoints that are
common to both the B-Series and C-Series server software bundles, such as local disk,
is available in both the B-Series and C-Series server software bundles.
C-Series server software bundleAlso called the C bundle, this bundle contains the firmware images
that the C-Series rack-mount servers require to function, such as adapter, BIOS, CIMC, and board
controller firmware. The C bundle also contains the firmware images for Cisco UCS S3260 storage
servers. Release Bundle Contents for Cisco UCS Manager, Release 3.1 provides details about the contents
of the C-Series server software bundle.
Note Starting with Cisco UCS Manager Release 3.1(2), the firmware for endpoints that are
common to both the B-Series and C-Series server software bundles, such as local disk,
is available in both the B-Series and C-Series server software bundles.
Capability catalog software bundleAlso called the T bundle, this bundle specifies
implementation-specific tunable parameters, hardware specifics. and feature limits.
Cisco UCS Manager uses the capability catalog to update the display and configurability of server
components such as newly qualified DIMMs and disk drives. The Cisco UCS Manager Capability
Catalog is a single image, but it is also embedded in Cisco UCS Manager software. Cisco UCS Manager
Release 3.1 and later releases work with any 3.1 catalog file, but not with 2.2 catalog versions. If a server
component is not dependent on a specific BIOS version, using it and having it recognized by Cisco UCS
Manager is primarily a function of the catalog version. In addition to the catalog being bundled with
UCS infrastructure releases, it can, sometimes, also be released as a standalone image.
The upgrade order for the endpoints in a Cisco UCS domain depends upon the upgrade path.
See the required order of steps for your upgrade path to determine the appropriate order in which to upgrade
the endpoints in your Cisco UCS domain.
Cisco maintains a set of best practices for managing firmware images and updates in this document and in
the following technical note: Unified Computing System Firmware Management Best Practices.
This document uses the following definitions for managing firmware:
UpdateCopies the firmware image to the backup partition on an endpoint.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
7
Overview
What is New in Cisco UCS Manager Release 3.1
ActivateSets the firmware in the backup partition as the active firmware version on the endpoint.
Activation can require or cause the reboot of an endpoint.
Note For capability catalog upgrades, update and activate occur simultaneously. You only need to update or
activate those upgrades. You do not need to perform both steps.
Cisco UCS 6300 Series Fabric Interconnect with B-Series and C-Series Servers
This release introduces a new platform with support for the following:
Cisco UCS 6332 and Cisco UCS 6332-16 UP fabric interconnects with specific 40GbE ports that can
be broken out into groups of 4x10GbE ports. The Cisco UCS Manager Getting Started Guide provides
details about the specific ports and the breakout capability.
Cisco UCS-IOM-2304 with 40GbE per-port connectivity to the fabric interconnect.
Direct attached and FEX-based connectivity to C-Series servers.
Cisco N2K-C2348UPQ-10GE FEX with 40GbE uplink ports and 10GbE server ports.
Separate upgrade of power supply unit firmware for the chassis.
Display of outstanding data path faults when a firmware upgrade triggered FI reboot is acknowledged.
Cisco UCS 6200 Series Fabric Interconnect with B-Series and C-Series Servers
This release adds support for the following:
Separate upgrade of power-supply unit firmware for the chassis
Display of outstanding data path faults when a firmware upgrade-triggered FI reboot is acknowledged
Cisco UCS 6324 Fabric Interconnect with B-Series and C-Series Servers (Cisco UCS Mini)
This release adds support for the following to Cisco UCS Mini:
A secondary chassis
IOM on the secondary UCS 5108 blade server chassis
Separate upgrade of power-supply unit firmware for the secondary blade server chassis
Display of outstanding data path faults when a firmware upgrade-triggered FI reboot is acknowledged
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
8
Overview
Cisco UCS Manager User CLI Documentation
Guide Description
Cisco UCS Manager Getting Started Guide Discusses Cisco UCS architecture and Day 0
operations, including Cisco UCS Manager initial
configuration, and configuration best practices.
Cisco UCS Manager Administration Guide Discusses password management, role-based access
configuration, remote authentication, communication
services, CIMC session management, organizations,
backup and restore, scheduling options, BIOS tokens
and deferred deployments.
Cisco UCS Manager Infrastructure Management Discusses physical and virtual infrastructure
Guide components used and managed by Cisco UCS
Manager.
Cisco UCS Manager Firmware Management Guide Discusses downloading and managing firmware,
upgrading through Auto Install, upgrading through
service profiles, directly upgrading at endpoints using
firmware auto sync, managing the capability catalog,
deployment scenarios, and troubleshooting.
Cisco UCS Manager Server Management Guide Discusses the new licenses, registering Cisco UCS
domains with Cisco UCS Central, power capping,
server boot, server profiles and server-related policies.
Cisco UCS Manager Storage Management Guide Discusses all aspects of storage management such as
SAN and VSAN in Cisco UCS Manager.
Cisco UCS Manager Network Management Guide Discusses all aspects of network management such
as LAN and VLAN connectivity in Cisco UCS
Manager.
Cisco UCS Manager System Monitoring Guide Discusses all aspects of system and health monitoring
including system statistics in Cisco UCS Manager.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
9
Overview
Components That Support Firmware Upgrade
Chassis components:
Blade server chassis:
I/O Modules
Note I/O Modules are not supported on the primary Cisco UCS Mini chassis. However, they
are supported on the secondary Cisco UCS Mini chassis.
Server components:
Blade and Rack server:
Adapter
Cisco Integrated Management Controller (CIMC)
BIOS
Storage Controller
Note Storage controller is not a supported server component in Cisco UCS Mini.
Board Controller
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
10
Overview
Firmware Version Terminology
Storage Controller
Startup Version
The startup version is the firmware that will be used when the endpoint next boots up. Cisco UCS
Manager uses the activate operation to change the startup version.
Backup Version
The backup version is the firmware in the other slot and is not in use by the endpoint. This version can
be firmware that you have updated to the endpoint but have not yet activated, or it can be an older
firmware version that was replaced by a recently activated version. Cisco UCS Manager uses the update
operation to replace the image in the backup slot.
If the endpoint cannot boot from the startup version, it boots from the backup version.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
11
Overview
Cross-Version Firmware Support
The following table lists the mixed A, B, and C bundle versions that are supported on Cisco UCS 6200 and
6300 fabric interconnects:
Table 3: Mixed Cisco UCS Releases Supported on Cisco UCS 6200 and 6300 Fabric Interconnects
2.2(1) 6200 6200 6200 6200 6200 6200 6200 6200 6200 6200 6200
2.2(2) 6200 6200 6200 6200 6200 6200 6200 6200 6200 6200
2.2(3) 6200 6200 6200 6200 6200 6200 6200 6200 6200
1 Beginning with Cisco UCS Manager Release 2.2(4), and for M4 servers, a lower version of the infrastructure A bundle will be compatible with the previous
version and higher version of B and C server bundles. For example, the Cisco UCS Manager Release 2.2(4)A bundle will be supported with any of the following
B bundles for B200-M4 servers: 2.1(1)B, 2.1(2)B, 2.1(3)B, 2.2(1)B, 2.2(2)B, 2.2(3)B, 2.2(4)B, 2.2(5)B, 2.2(6)B, 2.2(7)B.
Note For M1, M2, M3 servers, only N, N-1 cross-version firmware is supported. For example, for B200 M3 servers, the
2.2(4)A bundle will be supported with 2.1(1)B, 2.1(2)B, 2.1(3)B, 2.2(1)B, 2.2(2)B, 2.2(3)B, and 2.2(4)B bundles).
The following table lists the mixed A, B, and C bundle versions that are supported on Cisco UCS Mini fabric
interconnects:
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
12
Overview
Cross-Version Firmware Support
Table 4: Mixed Cisco UCS Releases Supported on Cisco UCS Mini Fabric Interconnects
The following table lists the mixed B, C bundles that are supported on all platforms with 3.1 bundle:
Table 5: Mixed B, C, M Bundles Supported on All Platforms with the 3.1(1)A Bundle
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
13
Overview
Cross-Version Firmware Support
Table 6: Mixed B, C Bundles Supported on All Platforms with the 3.1(2)A Bundle
Table 7: Mixed B, C Bundles Supported on All Platforms with the 3.1(3)A Bundle
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
14
Overview
Server Pack
Important If you implement cross-version firmware, you must ensure that the configurations for the Cisco UCS
domain are supported by the firmware version on the server endpoints.
Server Pack
Server Pack allows you to dynamically support new server platforms2 on existing infrastructure without
requiring a complete firmware upgrade. This support is provided by a Cisco UCS Manager catalog image.
Through this model, new B-Series, or C-Series server bundles that enable the new servers are supported on
the previous infrastructure A bundle.
For example, in releases later than Release 3.1(1), B, or C server bundles will be supported with Release
3.1(1) infrastructure A bundle. However, B, or C server bundles in Release 3.1(1) and later releases are not
supported with the infrastructure A bundle of any release earlier than Release 3.1(1).
The Release Notes for Cisco UCS Manager for a particular release provides the complete matrix of cross-version
firmware support for that release. New features introduced in the B, or C server bundles may only become
available after upgrading the infrastructure A bundle to the respective version.
The following servers currently support Server Pack:
B-Series ServersUCS B200 M4, B260 M4, B420 M4, B460 M4
C-Series ServersUCS C220 M4, C240 M4, C460 M4
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
15
Overview
Light Weight Upgrades
If a peripheral is not supported by the existing infrastructure bundle, it will not be supported through the Server
Pack feature. You must upgrade the infrastructure bundle to support this peripheral. For example, if a server
is installed with new adapters that are not supported by the existing infrastructure bundle, support for these
adapters requires an upgrade to the infrastructure bundle. These adapters cannot be supported through the
Server Pack feature.
Because a new catalog image can be used without disrupting any hardware or software components, Server
Pack provides the additional flexibility of adding new server platforms to active UCS domains without incurring
the operational overhead of upgrading firmware across the whole domain.
Service Packs
Service packs are patches that you can use to apply security updates to Cisco UCS Manager infrastructure
and server components. Service packs are specific to a base release. You can apply a service pack on a base
release, but you cannot install the service pack independently.
A service pack is provided as a single bundle for infrastructure and server components. You can update all
relevant infrastructure and server components by applying the service pack through Infrastructure and Server
Auto Install. In Cisco UCS Manager Release 3.1(3), the service pack bundle provides non-disruptive updates
only for infrastructure components. Among the infrastructure components, the fabric interconnect update to
a service pack may require fabric interconnect rebooting in some specific scenarios such as OpenSSL fixes.The
updates for server components are disruptive and will involve application downtime.
Service packs are cumulative for a maintenance release. The latest service pack will contain all the fixes from
the previous service packs released for the specific maintenance release.
You can remove or update a previously applied service pack through the Cisco UCS Manager GUI and the
Cisco UCS Manager CLI. Consequently, the component firmware version will be from the base release bundle.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
16
Overview
Service Pack Versions
Service packs are not applicable to maintenance releases earlier than Cisco UCS Manager Release 3.1(3).
The following table illustrates the Release Version and Running Version Displayed in the different situations
that a service pack is applied.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
17
Overview
Service Pack Rollback
Downgrade Infrastructure Bundle Within the Same Maintenance Release, But with an Earlier Service Pack
Version
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
18
Overview
Firmware Auto Sync for FI Cluster
Implementation
With the earlier implementation, the user would compulsorily configure the replacement FI as standalone
mode if there was a mismatch in the version of software packages. The replacement FI is manually
upgraded/downgraded to the same version of software package on survivor FI through the usual
upgrade/downgrade process. Then the replacement FI is added to the cluster, since the upgrade/downgrade
of the replacement FI is a manual process.
You are now given an additional option of synchronization of the software packages of the replacement FI
with the survivor FI along with the current option. If the user decides to Auto Sync the firmware, the software
packages of the survivor FI are copied to the replacement FI. The software packages on the replacement FI
are then activated and the FI is added to the cluster. The sync-up of the Cisco UCSM database and the
configuration happens via the usual mechanisms once the HA cluster is formed successfully.
Note For the steps required to upgrade one or more Cisco UCS domains to a later release, see the appropriate
Cisco UCS upgrade guide. If no upgrade guide is provided, contact Cisco Technical Assistance Center.
A direct upgrade from that release may not be supported.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
19
Overview
Options for Firmware Upgrades
Upgrade infrastructure and servers with Auto InstallThis option enables you to upgrade all infrastructure
components in the first stage of upgrade by using Auto Install. Then you can upgrade all server endpoints
through host firmware packages in the second stage.
Upgrade servers through firmware packages in service profilesThis option enables you to upgrade all
server endpoints in a single step, reducing the amount of disruption caused by a server reboot. You can
combine this option with the deferred deployment of service profile updates to ensure that server reboots
occur during scheduled maintenance windows.
Direct upgrades of infrastructure and server endpointsThis option enables you to upgrade many
infrastructure and server endpoints directly, including the fabric interconnects, I/O modules, adapters,
and board controllers. However, direct upgrade is not available for all endpoints, including the storage
controller, HBA firmware, HBA option ROM and local disk. You must upgrade those endpoints through
the host firmware package included in the service profile associated with the server.
Upgrade chassis through chassis firmware packages in chassis profilesThis option enables you to
upgrade all S3260 Chassis endpoints in a single step.
Note Chassis profiles and chassis firmware packages are applicable only to S3260 Chassis.
Upgrading S3X60 Server Nodes in a Cisco UCS domain through Cisco UCS Manager
You can upgrade a Cisco UCS domain with a S3260 Chassis and servers through Cisco UCS Manager in the
following ways:
Upgrade infrastructure components through Auto InstallYou can upgrade the infrastructure components,
such as the Cisco UCS Manager software and the fabric interconnects, in a single step by using Auto
Install.
Upgrade chassis through chassis firmware packages in chassis profilesThis option enables you to
upgrade all chassis endpoints in a single step.
Cisco UCS S3260 Server Integration with Cisco UCS Manager provides detailed information about
chassis profiles and chassis firmware packages.
Upgrade servers through firmware packages in service profilesThis option enables you to upgrade all
server endpoints in a single step, reducing the amount of disruption caused by a server reboot. You can
combine this option with the deferred deployment of service profile updates to ensure that server reboots
occur during scheduled maintenance windows.
You can also directly upgrade the firmware at each infrastructure, chassis, and server endpoint. This option
enables you to upgrade many infrastructure, chassis, and server endpoints directly, including the fabric
interconnects, SAS expanders, CMCs, chassis adapters, storage controllers, and board controllers. However,
direct upgrade is not available for all endpoints, including the storage controller, HBA firmware, HBA option
ROM and local disk.
Cisco UCS S3260 Server Integration with Cisco UCS Manager provides detailed information about firmware
management for S3X60 Server Nodes
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
20
Overview
Options for Service Pack Updates
the control of firmware upgrades and ensure that all Cisco UCS domains in your data center are at the required
levels.
You can use Cisco UCS Central to upgrade the capability catalog, infrastructure, and server endpoints in all
registered Cisco UCS domains that are configured for global firmware management.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
21
Overview
Firmware Upgrades through Auto Install
Figure 4: Process Flow for Automatically Installing Infrastructure Firmware , on page 22, illustrates
the recommended process flow to automatically install infrastructure firmware.
Install Server FirmwareAs necessary, uses the Cisco UCS B-Series Blade Server Software Bundle to
upgrade all blade servers in the Cisco UCS domain; the Cisco UCS C-Series Rack-Mount UCS-Managed
Server Software Bundle to upgrade all rack servers.
These two stages are independent and can be run or scheduled to run at different times.
You can use Auto Install to upgrade the infrastructure components to one version of Cisco UCS and upgrade
the server components to a different version.
Cisco strongly recommends that you use Auto Install to upgrade a Cisco UCS domain.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
22
Overview
Firmware Upgrades through Firmware Packages in Service Profiles
Infrastructure UCS 5108 Chassis UCS Rack Server Cisco UCS S3260 Chassis
Note Directly upgrading firmware on server endpoints is possible only on discovered, unassociated servers and
Cisco adapters.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
23
Overview
Direct Firmware Upgrade at Endpoints
Figure 5: Process Flow for Manually Installing Infrastructure Firmware, on page 24, illustrates the
recommended process flow.
The adapter and board controller firmware can also be upgraded through the host firmware package in the
service profile. If you use a host firmware package to upgrade this firmware, you can reduce the number of
times a server needs to be rebooted during the firmware upgrade process.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
24
Overview
Firmware Upgrade While Migrating from Cisco UCS 6200 Series Fabric Interconnects to Cisco UCS 6300 Series Fabric
Interconnects
Note Upgrades of an adapter through a firmware package in the service profile associated with the server take
precedence over direct firmware upgrades. You cannot directly upgrade an endpoint if the service profile
associated with the server includes a firmware package. To perform a direct upgrade, you must remove
the firmware package from the service profile.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
25
Overview
Firmware Upgrade to Cisco UCS Manager Release 3.1
Important Upgrading from infrastructure bundles earlier than Cisco UCS Manager Release 2.2(1a)
is not supported. However, you can replace an FI in a cluster with an FI that runs on
Cisco UCS Manager Release 2.1(2) or later releases and upgrade this FI directly to a
3.x(x) release by using the Auto Sync feature. In such a scenario, you do not need to
first upgrade to a 2.2(x) release before upgrading to a 3.x(x) release.
Before upgrading to Cisco UCS Manager Release 3.1, ensure that the key ring in use has a modulus size
of 2048 bits or more by doing the following:
1 Verify the modulus size of the key ring in use by using the following commands:
UCS-A# scope security
UCS-A /security # scope keyring keyring-name
UCS-A /security/keyring # show detail
2 If the default key ring is in use, and has a modulus size less than 2048 bits, reconfigure the modulus
size to 2048 bit or more, and regenerate the certificate by using the following commands:
UCS-A# scope security
UCS-A /security # scope keyring default
UCS-A /security/keyring # set modulus mod2048
UCS-A /security/keyring # set regenerate yes
UCS-A /security/keyring # commit-buffer
UCS-A /security/keyring # show detail
3 If the key ring in use is not the default key ring, and has a modulus size less than 2048 bits, delete
the existing key ring and create a new one with a modulus value equal to or more than 2048 bits.
Note A key ring in use cannot be deleted. To delete a key ring that is in use, first configure
HTTPS to use another key ring.
Cisco UCS Manager Release 3.1 does not support key rings that have modulus size less than 2048 bits.
Conditions Under Which Upgrade to Cisco UCS Manager Release 3.1 Fails
Upgrading to Cisco UCS Manager Release 3.1 from an earlier release will fail in the following scenarios, and
Cisco UCS Manager will roll back to the earlier release:
Upgrade with deprecated hardware (Release Notes and Getting Started Guide provide a list of hardware
not supported in Cisco UCS Manager Release 3.1)
Upgrade with insufficient free space in fabric interconnect partitions:
Less than 20 percent free space in /var/sysmgr
Less than 30 percent free space in /mnt/pss
Less than 20 percent free space in /bootflash
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
26
Overview
Firmware Upgrade to a Minor or a Patch Release
Single IOM Issues During Upgrade to Cisco UCS Manager Release 3.1(2b)
If you have only a single IOM in your chassis from day one, the IOM will reboot in a loop when you perform
one of the following upgrades:
Upgrade from Cisco UCS Manager Release 2.2(8b) or earlier releases to Cisco UCS Manager Release
3.1(2b).
Upgrade from Cisco UCS Manager Release 3.1(1h) to Cisco UCS Manager Release 3.1(2b).
If this issue occurs, move the IOM to the other slot. https://tools.cisco.com/bugsearch/bug/CSCvb44879
provides detailed information.
Important Although the SNMP state is restored after Cisco UCS Manager is upgraded, you can run SNMP operations
only after both the fabric interconnects are upgraded.
VSAN ID Limit While Migrating from a Cisco UCS 6200 Series Fabric Interconnect Cluster to a Cisco UCS
6332-16UP Fabric Interconnect Cluster
Before migrating from a Cisco UCS 6200 Series fabric interconnect cluster to a Cisco UCS 6332-16UP fabric
interconnect cluster, ensure that the VSAN IDs do not exceed 15. If the VSAN IDs during migration exceed
15, you cannot correctly configure FC or FCoE ports on the UCS 6332-16UP fabric interconnect. If such a
situation occurs, reduce the number of VSAN IDs to 15 and then continue with the FC or FCoE port
configuration.
Note This VSAN ID limit is not relevant for the Cisco UCS 6324 fabric interconnect.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
27
Overview
Firmware Downgrades
Read together, it indicates the a patch of the first minor release of the 3.1 release train.
Firmware upgrade to maintenance releases and patches within a major release are done in exactly the same
way as for the major release.
For more information about what is in each maintenance release and patch, see the latest version of the Release
Notes.
Firmware Downgrades
You downgrade firmware in a Cisco UCS domain in the same way that you upgrade firmware. The package
or version that you select when you update the firmware determines whether you are performing an upgrade
or a downgrade.
Note The Cisco UCS Manager CLI does not allow you to downgrade hardware that is not supported in the
release to which you are downgrading, Cisco UCS Manager CLI displays an error message if you attempt
to downgrade hardware to an unsupported release.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
28
Overview
Firmware Management in Cisco UCS Central
Important Before downgrading from Cisco UCS Manager Release 3.1 to Release 2.5, Cisco recommends that
you decommission and remove any connected blade chassis, FEX, or rack server. Do not downgrade
from Cisco UCS Manager Release 3.1 to Release 2.5 with blade chassis, FEX or rack servers
connected.
Before downgrading from Cisco UCS Manager Release 3.1 to Release 3.0, Cisco recommends that
you decommission and remove the extended blade chassis. Do not downgrade from Cisco UCS
Manager Release 3.1 to Release 2.2 with an extended blade chassis connected.
Note Steps 5 and 6 are optional. Perform these steps only if the existing configuration becomes unusable. In
this case, import the configuration backup either from Step 1 or Step 3.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
29
Overview
Firmware Management in Cisco UCS Central
Note To manage Cisco UCS domains firmware from Cisco UCS Central, you must enable the global firmware
management option in Cisco UCS Manager. You can enable the global firmware management option
when you register Cisco UCS Manager with Cisco UCS Central. You can also turn the global management
option on or off, based on your management requirements.
Important Do not unregister a Cisco UCS domain from Cisco UCS Central.
The Cisco UCS domains are categorized into domain groups in Cisco UCS Central for management purposes.
You can manage firmware for each domain group separately at the domain group level or for all domain
groups from the domain group root. Cisco UCS Central provides you the option to manage the following
Cisco UCS domain firmware packages:
Capability Catalog One capability catalog per domain group. All Cisco UCS domains registered to
a particular domain group will use the capability catalog defined in the domain group.
Infrastructure Firmware One infrastructure firmware policy per domain group . All Cisco UCS
domains registered to a particular domain group will use the same Infrastructure firmware version defined
in the domain group.
Host Firmware You can have more than one host firmware policy for the different host firmware
components in a domain group. The Cisco UCS domains registered in the domain group will be able to
choose any defined host firmware policy in the group. Cisco UCS Central provides you the option to
upgrade the host firmware globally to all Cisco UCS domains in a domain group at the same time.
Note For more information on managing firmware in Cisco UCS Central, see the Firmware Management
chapters in the Cisco UCS Central Administration Guide and Cisco UCS Central CLI Reference Manual.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
30
CHAPTER 3
Firmware Upgrade Scenarios
Scenario A: Upgrading Cisco UCS 6300 Series Fabric Interconnect with a Blade Server Chassis, page
31
Scenario B: Upgrading Cisco UCS 6200 Series Fabric Interconnect with a Blade Server Chassis from
Release 2.2 to Release 3.1, page 32
Scenario C: Upgrading Cisco UCS 6324 Series Fabric Interconnect from Release 3.0 to Release 3.1,
page 32
Scenario D: Upgrading Cisco UCS 6324 Series Fabric Interconnect with a Secondary Chassis from
Release 3.0 to Release 3.1, page 33
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
31
Firmware Upgrade Scenarios
Scenario B: Upgrading Cisco UCS 6200 Series Fabric Interconnect with a Blade Server Chassis from Release 2.2 to
Release 3.1
Option Description
Automatic Synchronization Firmware Automatic Synchronization, on page 90 provides more
Server Policy information about using the firmware auto sync server policy available in
Cisco UCS manager to install server firmware.
If Firmware Auto-Sync Server Policy is set to No Action, use Auto Install
to install server firmware.
Auto Install Server Firmware You can install server firmware for B-Series servers, and C-Series servers
in parallel.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
32
Firmware Upgrade Scenarios
Scenario D: Upgrading Cisco UCS 6324 Series Fabric Interconnect with a Secondary Chassis from Release 3.0 to
Release 3.1
Step 1 Install the infrastructure firmware without connecting the second chassis.
Recommended Process for Upgrading Infrastructure Firmware Through Auto Install, on page 76, provides
detailed information about installing infrastructure firmware.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
33
Firmware Upgrade Scenarios
Scenario D: Upgrading Cisco UCS 6324 Series Fabric Interconnect with a Secondary Chassis from Release 3.0 to
Release 3.1
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
34
CHAPTER 4
Guidelines and Prerequisites
Guidelines, and Best Practices for Firmware Upgrades, page 35
Cautions, and Guidelines Limitations for Managing Firmware in Cisco UCS Central, page 47
Prerequisites for Upgrading and Downgrading Firmware, page 48
Pre-Upgrade Validation Checks, page 49
Verification that the Data Path is Ready, page 61
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
35
Guidelines and Prerequisites
Hardware-Related Guidelines for Firmware Upgrades
Overlapping FCoE VLAN IDs and Ethernet VLAN IDs Are No Longer Allowed with Cisco UCS Release 2.0 and
Higher
Caution In Cisco UCS 1.4 and earlier releases, Ethernet VLANs and FCoE VLANs could have overlapping VLAN
IDs. However, starting with Cisco UCS release 2.0, overlapping VLAN IDs are not allowed. If Cisco UCS
Manager detects overlapping VLAN IDs during an upgrade, it raises a critical fault. If you do not reconfigure
your VLAN IDs, Cisco UCS Manager raises a critical fault and drops Ethernet traffic from the overlapped
VLANs. Therefore, we recommend that you ensure there are no overlapping Ethernet and FCoE VLAN
IDs before you upgrade to Cisco UCS Release 3.1 and later releases.
Be aware that when an uplink trunk is configured with VLAN ID 1 defined and set as the native VLAN,
changing the Ethernet VLAN 1 ID to another value can cause network disruption and flapping on the
fabric interconnects, resulting in an HA event that introduces a large amount of traffic and makes services
temporarily unavailable.
For a new installation of Cisco UCS Release 3.1 and later releases, the default VLAN IDs are as follows:
The default Ethernet VLAN ID is 1.
The default FCoE VLAN ID is 4048.
Note If a Cisco UCS domain uses one of the default VLAN IDs, which results in overlapping VLANs, you can
change one or more of the default VLAN IDs to any VLAN ID that is not used or reserved. From release
2.0 and higher, VLANs with IDs from 4030 to 4047 are reserved.
If a VSAN has an ID in the reserved range, change that VSAN ID to any VSAN ID that is not used or reserved.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
36
Guidelines and Prerequisites
Firmware- and Software-Related Guidelines for Upgrades
Caution Do not remove the hardware that contains the endpoint or perform any maintenance on it until the update
process completes. If the hardware is removed or otherwise unavailable due to maintenance, the firmware
update fails. This failure might corrupt the backup partition. You cannot update the firmware on an endpoint
with a corrupted backup partition.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
37
Guidelines and Prerequisites
Firmware- and Software-Related Guidelines for Upgrades
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
38
Guidelines and Prerequisites
Firmware- and Software-Related Guidelines for Upgrades
Upgrading the subordinate fabric interconnect in a system disrupts the traffic that is active on the fabric
interconnect. This traffic fails over to the primary fabric interconnect. You can use fabric evacuation as follows
during the manual upgrade process:
1 Stop all the traffic that is active through a fabric interconnect by configuring Admin Evac Mode as On.
2 For vNICs configured with failover, verify that the traffic has failed over by using Cisco UCS Manager
or tools such as vCenter.
3 Upgrade the subordinate fabric interconnect.
4 Restart all the stopped traffic flows by configuring Admin Evac Mode as Off.
5 Change the cluster lead to the subordinate fabric interconnect.
6 Repeat steps 1 to 4 and upgrade the other fabric interconnect.
If you use fabric evacuation with Auto Install, and fabric evacuation was enabled on the fabric interconnect
before Auto Install, fabric evacuation is disabled after Auto Install is complete.
Ensure that you do not initiate Auto Install with fabric evacuation enabled on the primary fabric interconnect.
If fabric evacuation was manually enabled on the primary fabric interconnect before Auto Install, it must be
manually disabled before initiating Auto Install.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
39
Guidelines and Prerequisites
Firmware- and Software-Related Guidelines for Upgrades
Procedure
Step 2 UCS-A /fabric-interconnect # stop Stops all the traffic that is active through the specified
server traffic [force] Fabric Interconnect.
Use the force option to evacuate a Fabric Interconnect
irrespective of its current evacuation state.
This example shows how to stop all traffic that is active through Fabric Interconnect B:
UCS-A# scope fabric-interconnect b
UCS-A /fabric-interconnect # stop server traffic
Warning: Enabling fabric evacuation will stop all traffic through this Fabric Interconnect
from servers attached through IOM/FEX. The traffic will fail over to the Primary Fabric
Interconnect for fail over vnics.
UCS-A /fabric-interconnect # commit-buffer
Procedure
Step 2 UCS-A /fabric-interconnect # start server Restarts traffic through the specified Fabric
traffic Interconnect.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
40
Guidelines and Prerequisites
Firmware- and Software-Related Guidelines for Upgrades
Procedure
Note VIF at Fabric Interconnect A shows that traffic is initially active through the Fabric interconnect.
VIF at Fabric Interconnect B is passive before evacuation.
This example shows the VIF paths after Fabric Interconnect A is evacuated.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
41
Guidelines and Prerequisites
Firmware- and Software-Related Guidelines for Upgrades
Note After fail over, the VIF state at Fabric Interconnect A goes into error.
VIF at Fabric Interconnect B takes over as active.
Procedure
Step 2 UCS-A /fabric-interconnect # show detail Displays details about the specified Fabric
Interconnect.
This example shows how to display the detailed status of a Fabric Interconnect.
Note Admin Evacuation and Oper Evacuation show the status of evacuation at the Fabric Interconnect.
Fabric Interconnect:
ID: B
Product Name: Cisco UCS 6248UP
PID: UCS-FI-6248UP
VID: V01
Vendor: Cisco Systems, Inc.
Serial (SN): SSI171400HG
HW Revision: 0
Total Memory (MB): 16165
OOB IP Addr: 10.193.32.172
OOB Gateway: 10.193.32.1
OOB Netmask: 255.255.255.0
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
42
Guidelines and Prerequisites
Firmware- and Software-Related Guidelines for Upgrades
Storage Disks
UCS-PCI25-8003
UCS-PCI25-16003
UCS-PCI25-40010
UCS-PCI25-80010
Note Secure firmware update is not supported on a Cisco UCS B200 M4 server for the following:
NVMe disks with SAS storage controllers.
A combination of NVMe disks and HDDs present on a Cisco UCS B200 M4 server.
Network adapters.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
43
Guidelines and Prerequisites
Firmware- and Software-Related Guidelines for Upgrades
Network Adapters
UCSC-PCIE-IQ10GF
UCSC-PCIE-ID10GF
UCSC-PCIE-ID40GF
The following Intel NVMe storage disks support secure firmware update on the Cisco UCS C460 M4 server,
Cisco UCS C240 M4 Server, and Cisco UCS C220 M4 Server:
Important Ensure that CIMC is running Version 2.0(13) or later and Cisco UCS Manager is running Release 3.1(2)
or later releases. Secure firmware update cannot be done when the CIMC is running a version earlier than
2.0(13) and Cisco UCS Manager is running a release earlier than Release 3.1(2).
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
44
Guidelines and Prerequisites
Cautions, and Guidelines for Upgrading with Auto Install
Install the UCSB-LSTOR-PT storage controller and insert the NVMe disks on a Cisco UCS B200 M4
server .
Reacknowledge the Cisco UCS B200 M4 server . Refer to the Reacknowledging a Blade Server section
in the Cisco UCS Manager Infrastructure Management Guide, Release .
Note These guidelines are specific to Auto Install and are in addition to those listed in Guidelines, and Best
Practices for Firmware Upgrades, on page 35.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
45
Guidelines and Prerequisites
Cautions, and Guidelines for Upgrading with Auto Install
Every service profile that is assigned to the default host firmware policy reboots the associated server according
to the maintenance policy included in the service profile. If the maintenance policy is set to immediate reboot,
you cannot cancel the upgrade or prevent the servers from rebooting after you complete the configuration in
the Install Server Firmware wizard. We recommend that you verify the maintenance policy associated with
these service profiles to ensure that they are set for a timed reboot or for user acknowledgment.
Note If you are upgrading from a release prior to 2.1(2a), you may be impacted by CSCup57496. After manually
upgrading the CIMC and associating a service profile, remove the Management Firmware pack to activate
the firmware of CIMC. For more information, please refer to https://tools.cisco.com/bugsearch/bug/
CSCup57496. This is not applicable to Cisco UCS Mini.
Required Privileges
Users must have the following privileges to upgrade endpoints with Auto Install:
Service profile server policy (ls-server-policy) Add, delete, and modify host firmware packages
Service profile config policy (ls-config-policy) Add, delete, and modify host firmware packages
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
46
Guidelines and Prerequisites
Cautions, and Guidelines Limitations for Managing Firmware in Cisco UCS Central
Effect of Using Install Server Firmware on Servers Whose Service Profiles Do Not Include a Host Firmware
Package
If you use Install Server Firmware to upgrade server endpoints on servers that have associated service profiles
without host firmware packages, Install Server Firmware uses the default host firmware package to upgrade
the servers. You can only update the default host firmware package through Install Server Firmware.
If you want to upgrade the CIMC or adapters in a server with an associated service profile that has previously
been updated through the default host firmware package in Install Server Firmware, you must use one of the
following methods:
Use Install Server Firmware to modify the default host firmware package and then upgrade the server
through Install Server Firmware.
Create a new host firmware package policy, assign it to the service profile associated with the server,
and then upgrade the server through that host firmware package policy.
Disassociate the service profile from the server and then directly upgrade the server endpoints.
Note After you finish the upgrade, you can use the Firmware Auto Sync Server policy in Cisco UCS Manager
to automatically update newly discovered servers.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
47
Guidelines and Prerequisites
Prerequisites for Upgrading and Downgrading Firmware
The host firmware maintenance policies you define in Cisco UCS Central apply to the org-root in Cisco
UCS domains. You cannot define separate host maintenance policies for sub organizations in a Cisco
UCS Domain from Cisco UCS Central.
Any server with no service profile association will get upgraded to the default version of the host firmware
pack. Since these servers do not have a maintenance policy, they will reboot immediately.
If you specify a maintenance policy in Cisco UCS Central and enable user acknowledgment and do not
specify a schedule, you can acknowledge the pending task only from Cisco UCS Manager. To
acknowledge pending activities from Cisco UCS Central, you must schedule maintenance using global
schedulers and enable user acknowledgment.
When you schedule a maintenance policy in Cisco UCS Central and enable user acknowledgment, that
task will be displayed on the pending activities tab at the time specified in the schedule.
You can view the pending activity for a maintenance policy only from the domain group section.
Make sure to enable user acknowledgment for any firmware schedule to avoid any unexpected reboot
in the Cisco UCS domains.
Note For more information on managing firmware in Cisco UCS Central, see the Firmware Management
chapters in the Cisco UCS Central Administration Guide and Cisco UCS Central CLI Reference Manual.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
48
Guidelines and Prerequisites
Pre-Upgrade Validation Checks
Verify that the Cisco UCS domain does not include any critical or major faults. If such faults exist, you
must resolve them before you upgrade the system. A critical or major fault may cause the upgrade to
fail.
Verify that all servers have been discovered. They do not need to be powered on or associated with a
service profile.
If you want to integrate a rack-mount server into the Cisco UCS domain, follow the instructions in the
appropriate C-Series Rack-Mount Server Integration Guide for installing and integrating a rack-mount
server in a system managed by Cisco UCS Manager.
For Cisco UCS domains that are configured for iSCSI boot, do the following before you upgrade to
Cisco UCS, Release 3.1(1) or higher:
Ensure that all iSCSI vNICs used across multiple service profiles have unique initiator names.
If any iSCSI vNICs have the same initiator name within a service profile, Cisco UCS reconfigures
the service profile to have a single unique initiator name.
Make the corresponding IQN initiator name changes on any network storage devices to ensure that
the boot LUNs are visible to the new IQN.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
49
Guidelines and Prerequisites
Create Backup Files
Procedure
Step 2 UCS-A /system # create backup Creates an enabled All Configuration backup operation that
URL all-configuration enabled runs as soon as you enter the commit-buffer command. The
all-configuration option backs up the server, fabric, and
system related configuration. Specify the URL for the backup
file using one of the following syntax:
ftp:// username@hostname / path
scp:// username@hostname / path
sftp:// username@hostname / path
tftp:// hostname : port-num / path
The following example uses SCP to create an All Configuration backup file on the host named host35 and
commits the transaction:
UCS-A# scope system
UCS-A /system* # create backup scp://user@host35/backups/all-config.bak all-configuration
enabled
Password:
UCS-A /system* # commit-buffer
UCS-A /system #
Procedure
Step 2 UCS-A /org # scope Enters the all configuration export policy mode.
backup-policy default
Step 3 UCS-A /org/backup-policy # set Specifies the hostname, IPv4 or IPv6 address of the location
hostname {hostname | ip-addr | where the backup policy is stored. This can be a server, storage
ip6-addr} array, local drive, or any read/write media that the fabric
interconnect can access through the network.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
50
Guidelines and Prerequisites
Create Backup Files
Step 5 UCS-A /org/backup-policy # set Specifies the username the system should use to log in to the
user username remote server. This step does not apply if the TFTP protocol
is used.
Step 6 UCS-A /org/backup-policy # set After you press Enter, you are prompted to enter the password.
password Specifies the password for the remote server username. This
step does not apply if the TFTP protocol is used.
Step 7 UCS-A /org/backup-policy # set Specifies the full path to the backup file. This field can contain
remote-file filename the filename as well as the path. If you omit the filename, the
backup procedure assigns a name to the file.
Step 8 UCS-A /org/backup-policy # set Specifies the admin state for the policy. This can be one of
adminstate {disable | enable} the following:
enableCisco UCS Manager exports the backup file
using the schedule specified in the Schedule field.
disableCisco UCS Manager does not export the file.
Step 9 UCS-A /org/backup-policy # set Specifies the frequency with which Cisco UCS Manager
schedule {daily | weekly | exports the backup file.
bi-weekly}
Step 10 UCS-A /org/backup-policy # set Specifies a description for the backup policy.
descr description Enter up to 256 characters. You can use any characters or
spaces except ` (accent mark), \ (backslash), ^ (carat), "
(double quote), = (equal sign), > (greater than), < (less than),
or ' (single quote).
The following example shows how to configure the full state backup policy for a weekly backup and commit
the transaction:
UCS-A# scope org /
UCS-A /org # scope backup-policy default
UCS-A /org/backup-policy # set hostname host35
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
51
Guidelines and Prerequisites
Configure Cisco Smart Call Home for Firmware Upgrade
Procedure
Step 2 UCS-A /monitoring # scope callhome Enters monitoring call home mode.
The following example disables Smart Call Home and commits the transaction:
UCS-A# scope monitoring
UCS-A /monitoring # scope callhome
UCS-A /monitoring/callhome # disable
UCS-A /monitoring/callhome* # commit-buffer
UCS-A /monitoring/callhome #
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
52
Guidelines and Prerequisites
Faults Generated Due to Reboot During the Upgrade of a Fabric Interconnect
Faults remain suppressed until the time duration has expired, or the fault suppression tasks have been manually
stopped by the user. After the fault suppression has ended, Cisco UCS Manager will send notifications for
any outstanding suppressed faults that have not been cleared.
Enabling fault suppression for any component during firmware upgrade suppresses the faults related to that
component until the time duration has expired, or until the component comes back up after upgrade. For
example, if fabric interconnect faults are configured to be suppressed during firmware upgrade, no faults
triggered by the fabric interconnect going down during upgrade will be displayed.
Procedure
Step 2 UCS-A /monitoring # scope fault policy Enters monitoring fault policy mode.
Step 3 UCS-A /monitoring/fault-policy # show Displays the details of the fault policy.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
53
Guidelines and Prerequisites
Faults Generated Due to Reboot During the Upgrade of a Fabric Interconnect
This example shows how to modify the baseline expiration interval for faults:
UCS-A# scope monitoring
UCS-A /monitoring # scope fault policy
UCS-A /monitoring/fault-policy # show
Fault Policy:
Clear Action Clear Interval Retention Interval (dd:hh:mm:ss) Flap Interval (sec)
Baseline Expiration Interval (dd:hh:mm:ss)
------------ -------------- -------------------------------- -----------------------
------------------------------------------
Retain 00:00:20:00 00:01:00:00 10
10:00:00:12
Fault Policy:
Clear Action Clear Interval Retention Interval (dd:hh:mm:ss) Flap Interval (sec)
Baseline Expiration Interval (dd:hh:mm:ss)
------------ -------------- -------------------------------- -----------------------
------------------------------------------
Retain 10:00:00:00 01:01:01:01 10
00:02:24:00
UCS-A /monitoring/fault-policy #
Procedure
Step 2 UCS-A /monitoring # show new-faults Shows the faults generated after baselining and
because of the reboot of the fabric interconnect during
upgrade.
Step 3 UCS-A /monitoring # show Shows the faults baselined before the reboot of the
baseline-faults fabric interconnect during upgrade.
This example shows how to view faults generated at various stages of the upgrade process:
Faults before reboot of the primary fabric interconnect:
UCS-A# show fault
Severity Code Last Transition Time ID Description
--------- -------- ------------------------ -------- -----------
Major F0283 2015-06-17T21:08:09.301 57360 fc VIF 687 on server 1 / 6 of switch
A down, reason: NPV upstream port not available
Warning F0156 2015-06-17T21:07:44.114 53557 Server, vendor(Cisco Systems Inc),
model(N20-B6620-1), serial(QCI133400WR) in slot 1/3 presence: mismatch
Major F0283 2015-06-16T21:02:33.014 72467 fc VIF 688 on server 1 / 6 of switch
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
54
Guidelines and Prerequisites
Faults Generated Due to Reboot During the Upgrade of a Fabric Interconnect
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
55
Guidelines and Prerequisites
Verifying the Operability of a Fabric Interconnect
Procedure
The following example displays that the operability for both fabric interconnects is in the Operable state:
UCS-A# scope fabric-interconnect a
UCS-A /fabric-interconnect # show
Fabric Interconnect:
ID OOB IP Addr OOB Gateway OOB Netmask Operability
-- --------------- --------------- --------------- -----------
A 192.168.100.10 192.168.100.20 255.255.255.0 Operable
Procedure
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
56
Guidelines and Prerequisites
Configuring the Default Maintenance Policy
The following example displays that both fabric interconnects are in the Up state, HA is in the Ready state,
fabric interconnect A has the primary role, and fabric interconnect B has the subordinate role:
UCS-A# show cluster state
Cluster Id: 0x4432f72a371511de-0xb97c000de1b1ada4
A: UP, PRIMARY
B: UP, SUBORDINATE
HA READY
Procedure
Step 2 UCS-A /org # scope Enters the maintenance policy mode for the default maintenance
maint-policy default policy.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
57
Guidelines and Prerequisites
Disabling the Management Interface
The following example modifies the reboot policy of the default maintenance policy, and commits the
transaction:
UCS-A# scope org /
UCS-A /org # scope maint-policy default
UCS-A /org/maint-policy* # set reboot-policy user-ack
UCS-A /org/maint-policy* # commit-buffer
UCS-A /org/maint-policy #
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
58
Guidelines and Prerequisites
Verifying the Status of an I/O Module
Procedure
Step 4 Open a Telnet session to the upstream switch connected to the fabric interconnect.
Step 5 Verify the configuration of the interface to which the fabric interconnect management port is connected, and
disable it using the shut command on the switch.
Any KVM session that is open through this interface terminates.
Step 6 Reconnect KVM sessions to ensure that these sessions are not impacted by upgrade of the secondary fabric
interconnect.
The following example disables the monitoring interface management policy and commits the transaction:
UCS-A# scope monitoring
UCS-A /monitoring # set mgmt-if-mon-policy admin-state enabled
UCS-A /monitoring* # commit-buffer
UCS-A /monitoring #
Procedure
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
59
Guidelines and Prerequisites
Verifying the Status of a Server
The following example displays that the overall status for both I/O modules on chassis 1 is in the Operable
state:
UCS-A# scope chassis 1
UCS-A /chassis # scope iom 1
UCS-A /chassis/iom # show
IOM:
ID Side Fabric ID Overall Status
---------- ----- --------- --------------
1 Left A Operable
Step 2 UCS-A /chassis/server # show Shows the status detail of the server.
status detail Verify that the overall status of the server is Ok, Unavailable,
or any value that does not indicate a failure. If the overall status
is in a state that indicates a failure, such as Discovery Failed,
the endpoints on that server cannot be upgraded.
The following example displays that the overall status for server 7 on chassis 1 is in the Ok state:
UCS-A# scope server 1/7
UCS-A /chassis/server # show status detail
Server 1/7:
Slot Status: Equipped
Conn Path: A,B
Conn Status: A,B
Managing Instance: B
Availability: Unavailable
Admin State: In Service
Overall Status: Ok
Oper Qualifier: N/A
Discovery: Complete
Current Task:
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
60
Guidelines and Prerequisites
Verifying the Status of Adapters on Servers in a Chassis
The following example displays that the overall status for the adapter in server 7 on chassis 1 is in the Operable
state:
UCS-A# scope server 1/7
UCS-A /chassis/server # show adapter status
Server 1/1:
Overall Status
--------------
Operable
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
61
Guidelines and Prerequisites
Verifying the Ethernet Data Path
Procedure
Step 3 UCS-A(nxos)# show platform fwm Returns the total number of MAC addresses.
info hw-stm | grep '1.' | wc l Verify that this number matches the number of MAC
addresses prior to the upgrade.
The following example returns the number of active Ethernet interfaces and MAC addresses for subordinate
fabric interconnect A so that you can verify that the Ethernet data path for that fabric interconnect is up and
running:
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
62
Guidelines and Prerequisites
Verifying the Data Path for Fibre Channel Switch Mode
Procedure
Step 3 UCS-A(nxos)# show npv flogi-table | Returns the number of servers logged into the fabric
grep fc | wc -l interconnect.
The output should match the output you received when
you performed this verification prior to beginning the
upgrade.
The following example displays the flogi-table and number of servers logged into subordinate fabric interconnect
A so that you can verify that the Fibre Channel data path for that fabric interconnect in Fibre Channel End-Host
mode is up and running:
Procedure
Step 3 UCS-A(nxos)# show flogi database | Returns the number of servers logged into the fabric
grep I fc | wc 1 interconnect.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
63
Guidelines and Prerequisites
Verifying the Data Path for Fibre Channel Switch Mode
The following example displays the flogi-table and number of servers logged into subordinate fabric interconnect
A so that you can verify that the Fibre Channel data path for that fabric interconnect in Fibre Channel End-Host
mode is up and running:
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
64
CHAPTER 5
Manage Firmware through Cisco UCS Manager
Download and Manage Firmware in Cisco UCS Manager, page 65
Firmware Upgrades through Auto Install, page 73
Firmware Upgrades through Firmware Packages in Service Profiles , page 82
Firmware Automatic Synchronization, page 90
Direct Firmware Upgrade at Endpoints, page 93
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
65
Manage Firmware through Cisco UCS Manager
Firmware Image Management
Note The UCS infrastructure bundle for one platform cannot be used to activate
another platform. For example, the infrastructure bundle for the UCS 6200
Series fabric interconnect cannot be used to activate the UCS 6300 Series fabric
interconnect.
Note You cannot use this bundle for standalone C-series servers. The firmware
management system in those servers cannot interpret the header required by
Cisco UCS Manager. For information on how to upgrade standalone C-series
servers, see the C-series configuration guides.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
66
Manage Firmware through Cisco UCS Manager
Firmware Image Management
Cisco also provides release notes, which you can obtain on the same website from which you obtained the
bundles.
Images
The images view lists the component images available on the system. You cannot use this view to see
complete firmware bundles or to group the images by bundle. The information available about each
component image includes the name of the component, the image size, the image version, and the
vendor and model of the component.
You can use this view to identify the firmware updates available for each component. You can also use
this view to delete obsolete and unneeded images. After all the images in the package have been deleted,
Cisco UCS Manager deletes the package itself.
Tip Cisco UCS Manager stores the images in bootflash on the fabric interconnect. In a cluster system, space
usage in bootflash on both fabric interconnects is the same, because all images are synchronized between
them. Faults are raised when the bootflash partition exceeds 70 percent and total used space exceeds 90
percent. If Cisco UCS Manager generates such a fault, delete obsolete images to free up space.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
67
Manage Firmware through Cisco UCS Manager
Obtaining Software Bundles from Cisco
Procedure
Cisco UCS B-Series Blade Server Software Click UCS B-Series Blade Server Software > Unified
Bundle Computing System (UCS) Server Software Bundle.
Cisco UCS C-Series Rack-Mount Click UCS C-Series Rack-Mount UCS-Managed Server
UCS-Managed Server Software Bundle Software > Unified Computing System (UCS) Server
Software Bundle.
Tip The Unified Computing System (UCS) Documentation Roadmap Bundle, which is accessible through
these paths, is a downloadable ISO image of all Cisco UCS documentation.
Step 6 On the first page from which you download a software bundle, click the Release Notes link to download the
latest version of the Release Notes.
Step 7 For each software bundle that you want to download, do the following:
a) Click the link for the latest release software bundle.
The release number is followed by a number and a letter in parentheses. The number identifies the
maintenance release level, and the letter differentiates between patches of that maintenance release. For
more information about what is in each maintenance release and patch, see the latest version of the Release
Notes.
b) Click one of the following buttons and follow the instructions provided:
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
68
Manage Firmware through Cisco UCS Manager
Downloading Firmware Images to the Fabric Interconnect from a Remote Location
What to Do Next
Download the software bundles to the fabric interconnect.
Note In a cluster setup, the image file for the firmware bundle is downloaded to both fabric interconnects,
regardless of which fabric interconnect is used to initiate the download. Cisco UCS Manager maintains
all firmware packages and images in both fabric interconnects in sync. If one fabric interconnect is down,
the download finishes successfully. The images are synced to the other fabric interconnect when it comes
back online.
Procedure
Step 2 UCS-A /firmware # Downloads the firmware bundle. Using the download path provided
download image URL by Cisco, specify the URL with one of the following syntax:
ftp:// server-ip-addr / path
scp:// username@server-ip-addr / path
sftp:// username@server-ip-addr / path
tftp:// server-ip-addr : port-num / path
Note TFTP has a file size limitation of 32 MB. Because
firmware bundles can be much larger than that, we
recommend that you do not select TFTP for firmware
downloads.
usbA:/ path
usbB:/ path
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
69
Manage Firmware through Cisco UCS Manager
Displaying the Firmware Package Download Status
Step 4 UCS-A /firmware # show Displays the status for your download task. When your image is
download-task completely downloaded, the task state changes from Downloading
to Downloaded. The CLI does not automatically refresh, so you
may have to enter the show download-task command multiple
times until the task state displays Downloaded.
What to Do Next
After the image file for the firmware bundles download completes, update the firmware on the endpoints.
Procedure
Step 2 UCS-A /firmware # show Displays the status for your download task. When your image
download-task is completely downloaded, the task state changes from
Downloading to Downloaded. The CLI does not automatically
refresh, so you may have to enter the show download-task
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
70
Manage Firmware through Cisco UCS Manager
Canceling an Image Download
The following example displays the download status for the firmware package. The show download-task
command is entered multiple times until the download state indicates that the firmware package has been
downloaded:
Procedure
Step 2 UCS-A /firmware # delete download-task Deletes the specified image file.
image_filename
Step 3 UCS-A /firmware # commit-buffer Commits the transaction to the system
configuration.
Procedure
Step 2 UCS-A /firmware # show Displays all software images downloaded onto the fabric
image interconnect.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
71
Manage Firmware through Cisco UCS Manager
Displaying All Available Packages on the Fabric Interconnect
The following example displays all available software images on the fabric interconnect:
Procedure
Step 2 UCS-A /firmware # show Displays all software packages downloaded onto the fabric
package interconnect.
Note You must provide the software version number when
directly updating an endpoint. If you intend to directly
update firmware at an endpoint, note its version
number in the right column.
The following example displays all available software packages on the fabric interconnect:
Step 2 UCS-A /firmware # show package Displays the contents of the specified
package-name expand firmware package.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
72
Manage Firmware through Cisco UCS Manager
Checking the Available Space on a Fabric Interconnect
Procedure
The following example displays the available space for a fabric interconnect:
UCS-A# scope fabric-interconnect a
UCS-A /fabric-interconnect # show storage
Storage on local flash drive of fabric interconnect:
Partition Size (MBytes) Used Percentage
---------------- ---------------- ---------------
bootflash 8658 50
opt 1917 2
workspace 277 4
UCS-A /fabric-interconnect #
These two stages are independent and can be run or scheduled to run at different times.
You can use Auto Install to upgrade the infrastructure components to one version of Cisco UCS and upgrade
the server components to a different version.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
73
Manage Firmware through Cisco UCS Manager
Direct Upgrade After Auto Install
Note You cannot use Auto Install to upgrade either the infrastructure or the servers in a Cisco UCS domain if
Cisco UCS Manager in that domain is at a release prior to Cisco UCS 2.1(1). However, after you upgrade
Cisco UCS Manager to Release 2.1(1) or greater, you can use Auto Install to upgrade the remaining
components in a Cisco UCS domain that is at the minimum required firmware level. For more information,
see Cautions, and Guidelines for Upgrading with Auto Install, on page 45.
In Cisco UCS Manager Releases 3.1(1l), 3.1(2b), 3.1(2c), and 3.1(2e), activating the Cisco UCS Manager
software through Auto Install fails if the power policy is configured with Redundancy set to Grid and Power
Capping set to No Cap. In Cisco UCS Manager releases earlier than Cisco UCS Manager Release 3.1(2b)
and later than 3.1(2e), activating the Cisco UCS Manager software through Auto Install no longer fails based
on the configured power policy.
After the backup is successfully completed, the backup file, named as "bkp.timestamp.tgz", is stored within
the /workspace/backup directory of both the fabric interconnects. This location contains only the latest
backup file.
If the backup fails, a minor fault stating "internal backup failed" is logged. This fault is not logged in case
of downgrade to a release prior to Cisco UCS Manager Release 2.2(4).
Before restoring the configuration for a fabric interconnect from this backup file, copy it from the fabric
interconnect to a file server by using the copy command from local-mgmt.
This example shows how to copy the automatic internal backup file to a file server:
UCS-A# connect local-mgmt
UCS-A (local-mgmt) # copy workspace:/backup/bkp.1429690478.tgz
scp://[email protected]://home/builds/
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
74
Manage Firmware through Cisco UCS Manager
Install Infrastructure Firmware
Note You can cancel an infrastructure firmware upgrade if it is scheduled to occur at a future time. However,
you cannot cancel an infrastructure firmware upgrade after the upgrade has begun.
Note You cannot cancel a server firmware upgrade process after you complete the configuration in the Install
Server Firmware wizard. Cisco UCS Manager applies the changes immediately. However, the timing
of the actual reboot of servers occurs depends upon the maintenance policy in the service profile associated
with the server.
This order enables you to schedule the server firmware upgrades during a different maintenance window than
the infrastructure firmware upgrade.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
75
Manage Firmware through Cisco UCS Manager
Recommended Process for Upgrading Infrastructure Firmware Through Auto Install
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
76
Manage Firmware through Cisco UCS Manager
Upgrade the Infrastructure Firmware with Auto Install
Note You cannot use Auto Install to upgrade either the infrastructure or the servers in a Cisco UCS domain if
Cisco UCS Manager in that domain is at a release prior to Cisco UCS Manager 2.1(1). However, after
you upgrade Cisco UCS Manager to Release 2.1(1) or greater, you can use Auto Install to upgrade the
remaining components in a Cisco UCS domain that is at the minimum required firmware level. For more
information, see Cautions, and Guidelines for Upgrading with Auto Install, on page 45 and the appropriate
Cisco UCS upgrade guide.
Beginning with Cisco UCS Manager Release 3.1(3), you can use Auto Install to install a service pack on
Cisco UCS Manager and both fabric interconnects. You can apply a service pack on a base infrastructure
pack, but you cannot install the service pack independently.
You can install a compatible service pack through Auto Install without upgrading the infrastructure pack.
This will trigger service pack installation on both fabric interconnects. Certain service pack installations may
require the fabric interconnects to be reloaded.
Auto Install of infrastructure firmware using a service pack is supported only when all the infrastructure
components are at Cisco UCS Manager Release 3.1(3) or later releases.
Procedure
Step 2 UCS-A /firmware # scope Enters auto-install mode for infrastructure firmware upgrades.
auto-install
Step 3 UCS-A /firmware/auto-install Updates and activates the infrastructure firmware and the service
# install infra infra-vers pack bundle.
infrastructure-bundle-version You must use starttime to schedule the infrastructure firmware
servicepack-vers upgrade, if you do not want the upgrade to start immediately. If you
servicepack-bundle-version use starttime, enter the following information to specify when you
[starttime mon dd yyyy hh min want to schedule the upgrade:
sec] [force] [evacuate]
[skipvalidation] monThe first three letters of the desired month, such as jan
or feb.
ddThe number of the desired day of the month, from 1 to
31.
yyyyThe four numbers of the desired year, such as 2012.
hhThe hour when you want the upgrade to start, from 0 to
23.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
77
Manage Firmware through Cisco UCS Manager
Upgrade the Infrastructure Firmware with Auto Install
This example shows how to upgrade the infrastructure to the firmware in the Cisco UCS Infrastructure Software
Bundle:
This example shows how to upgrade the infrastructure to the firmware in the Cisco UCS Infrastructure Software
Bundle with the evacuate option enabled:
This example shows how to upgrade the infrastructure to a service pack version:
What to Do Next
Acknowledge the reboot of the primary fabric interconnect. If you do not acknowledge that reboot, Cisco
UCS Manager cannot complete the infrastructure upgrade and the upgrade remains pending indefinitely.
Certain service pack installations may require the fabric interconnects to be reloaded. In such scenarios, you
must acknowledge the reboot of the primary fabric interconnect to complete the service pack installation.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
78
Manage Firmware through Cisco UCS Manager
Acknowledging the Reboot of the Primary Fabric Interconnect
Caution To upgrade with minimal disruption, you must confirm the following:
Ensure that all the IOMs that are attached to the Fabric Interconnect are up before you acknowledge
the reboot of the Fabric Interconnect. If all IOMs are not up, all the servers connected to the Fabric
Interconnect will immediately be re-discovered and cause a major disruption.
Ensure that both of the Fabric Interconnects and the service profiles are configured for failover.
Verify that the data path has been successfully restored from the secondary Fabric Interconnect
before you acknowledge the reboot of the primary Fabric Interconnect. For more information, see
Verification that the Data Path is Ready, on page 61.
After you upgrade the infrastructure firmware, Install Infrastructure Firmware automatically reboots the
secondary fabric interconnect in a cluster configuration. However, you must acknowledge the reboot of
the primary fabric interconnect. If you do not acknowledge the reboot, Install Infrastructure Firmware
waits indefinitely for that acknowledgment rather than completing the upgrade.
Procedure
Step 2 UCS-A /firmware # scope auto-install Enters auto-install mode for infrastructure firmware
upgrades.
This example shows how to acknowledge the reboot of the primary fabric interconnect and commit the
transaction:
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
79
Manage Firmware through Cisco UCS Manager
Canceling an Infrastructure Firmware Upgrade
Note You can cancel an infrastructure firmware upgrade if it is scheduled to occur at a future time. However,
you cannot cancel an infrastructure firmware upgrade after the upgrade has begun.
Procedure
Step 2 UCS-A /firmware # scope auto-install Enters auto-install mode for infrastructure
firmware upgrades.
The following example cancels a scheduled infrastructure firmware upgrade and commits the transaction:
Clearing the Startup Version of the Default Infrastructure Pack and the Service
Pack
You must clear the startup version of the default infrastructure pack and service pack before directly upgrading
or activating Cisco UCS Manager, Fabric Interconnects, and IOMs.
Procedure
Step 2 UCS-A /org # scope fw-infra-pack name Enters the organization infrastructure firmware
policy mode.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
80
Manage Firmware through Cisco UCS Manager
Viewing the Status of the FSM During An Infrastructure Firmware Upgrade
This example shows how to clear the startup version of the default infrastructure pack.
UCS-A# scope org
UCS-A /org # scope fw-infra-pack default
UCS-A /org/fw-infra-pack # set infra-bundle-version ""
UCS-A /org/fw-infra-pack* # commit-buffer
Step 2 UCS-A /firmware # scope auto-install Enters auto-install mode for infrastructure
firmware upgrades.
Step 3 UCS-A /firmware/auto-install # show fsm Displays the status of the FSM.
status expand
FSM Status:
FSM Stage:
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
81
Manage Firmware through Cisco UCS Manager
Firmware Upgrades through Firmware Packages in Service Profiles
6 DeployCopyAllImagesToPeer Skip 0
7 DeployInternalBackup Skip 0
8 DeployPollInternalBackup Success 0
9 DeployActivateUCSM Skip 0
10 DeployPollActivateOfUCSM Success 0
11 DeployUpdateIOM Success 0
12 DeployPollUpdateOfIOM Success 0
13 DeployActivateIOM Success 0
14 DeployPollActivateOfIOM Success 0
15 DeployFabEvacOnRemoteFI Skip 0
16 DeployPollFabEvacOnRemoteFI Skip 0
17 DeployActivateRemoteFI Success 0
18 DeployPollActivateOfRemoteFI Success 0
19 DeployFabEvacOffRemoteFI Skip 0
20 DeployPollFabEvacOffRemoteFI Skip 0
21 DeployWaitForUserAck Skip 0
22 DeployPollWaitForUserAck Success 0
23 DeployFailOverToRemoteFI Skip 0
24 DeployPollFailOverToRemoteFI Skip 0
25 DeployActivateLocalFI Success 0
26 DeployPollActivateOfLocalFI Success 0
27 DeployActivateUCSMServicePack Skip 0
28 DeployPollActivateOfUCSMServicePack Success 0
Note For rack mount servers, if you exclude CIMC from the host firmware pack, and upgrade
or downgrade the board controller, the upgrade or downgrade may fail. This is because
the CIMC firmware version and board controller firmware version may be incompatible.
Board Controller
Flex Flash Controller
GPUs
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
82
Manage Firmware through Cisco UCS Manager
Host Firmware Package
FC Adapters
HBA Option ROM
Host NIC
Host NIC Option ROM
Local Disk
Note Local Disk is excluded by default from the host firmware pack.
In Cisco UCS Manager Release 3.1(1), to update local disk firmware, always include
the Blade Package in the host firmware package. The blade package contains the local
disk firmware for blade and rack servers. Starting with Cisco UCS Manager Release
3.1(2), the firmware for local disk and other common endpoints is available in both the
blade and rack packages.
PSU
SAS Expander
Storage Controller
Storage Controller Onboard Device
Storage Controller Onboard Device Cpld
Storage Device Bridge
Tip You can include more than one type of firmware in the same host firmware package. For example, a host
firmware package can include both BIOS firmware and storage controller firmware or adapter firmware
for two different models of adapters. However, you can only have one firmware version with the same
type, vendor, and model number. The system recognizes which firmware version is required for an endpoint
and ignores all other firmware versions.
You can also exclude firmware of specific components from a host firmware package either when creating a
new host firmware package or when modifying an existing host firmware package. For example, if you do
not want to upgrade BIOS firmware through the host firmware package, you can exclude BIOS firmware
from the list of firmware package components.
Important Each host firmware package is associated with one list of excluded components, which is common across
all firmware packagesBlade, and Rack. To configure a separate exclusion list for each type of firmware
package, use separate host firmware packages.
The firmware package is pushed to all servers associated with service profiles that include this policy.
This policy ensures that the host firmware is identical on all servers associated with service profiles that use
the same policy. Therefore, if you move the service profile from one server to another, the firmware versions
are maintained. Also, if you change the firmware version for an endpoint in the firmware package, new versions
are applied to all the affected service profiles immediately. This could cause server reboots.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
83
Manage Firmware through Cisco UCS Manager
Stages of a Firmware Upgrade through Firmware Packages in Service Profiles
You must include this policy in a service profile, and that service profile must be associated with a server for
it to take effect.
This policy is not dependent upon any other policies. However, you must ensure that the appropriate firmware
has been downloaded to the fabric interconnect. If the firmware image is not available when Cisco UCS
Manager is associating a server with a service profile, Cisco UCS Manager ignores the firmware upgrade and
completes the association.
Caution Unless you have configured and scheduled a maintenance window, if you modify a host firmware package
by adding an endpoint or changing firmware versions for an existing endpoint, Cisco UCS Manager
upgrades the endpoints and reboots all servers associated with that firmware package as soon as the changes
are saved, disrupting data traffic to and from the servers.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
84
Manage Firmware through Cisco UCS Manager
Effect of Updates to Firmware Packages in Service Profiles
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
85
Manage Firmware through Cisco UCS Manager
Effect of Updates to Firmware Packages in Service Profiles
The firmware package is Configured for user The following occurs when you update the
included in one or more service acknowledgment with firmware package:
profiles, and the service profiles On Next Boot option
1 Cisco UCS asks you to confirm your change
are associated with one or more
and advises that a user-acknowledged reboot
servers.
of the servers is required.
OR
2 To reboot and to apply the new firmware, do
The firmware package is one of the following:
included in an updating service
profile template, and the service Click the flashing Pending Activities
profiles created from that button to select the servers you want to
template are associated with reboot and apply the new firmware.
one or more servers.
Manually reboot the servers.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
86
Manage Firmware through Cisco UCS Manager
Creating or Updating a Host Firmware Package
Tip You can include more than one type of firmware in the same host firmware package. For example, a host
firmware package can include both BIOS firmware and storage controller firmware or adapter firmware
for two different models of adapters. However, you can only have one firmware version with the same
type, vendor, and model number. The system recognizes which firmware version is required for an endpoint
and ignores all other firmware versions.
You can also exclude firmware of specific components from a host firmware package either when creating a
new host firmware package or when modifying an existing host firmware package.
Important Each host firmware package is associated with one list of excluded components, which is common across
all firmware packagesBlade, and Rack. To configure a separate exclusion list for each type of firmware
package, use separate host firmware packages.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
87
Manage Firmware through Cisco UCS Manager
Creating or Updating a Host Firmware Package
Procedure
Step 2 UCS-A org/ # create fw-host-pack Creates a host firmware package with the specified package
pack-name name and enters organization firmware host package mode.
Step 5 UCS-A org/fw-host-pack # create Excludes the specified component from the host firmware
exclude-server-component {adapter package.
| board-controller | cimc | Note By default, all components are included in the host
flexflash-controller | graphics-card firmware package.
| host-hba | host-hba-optionrom |
host-nic | host-nic-optionrom |
local-disk | psu | raid-controller |
sas-expander | server-bios |
unspecified}
Step 6 UCS-A org/fw-host-pack # delete Includes the specified component from the host firmware
exclude-server-component {adapter package.
| board-controller | cimc |
flexflash-controller | graphics-card
| host-hba | host-hba-optionrom |
host-nic | host-nic-optionrom |
local-disk | psu | raid-controller |
sas-expander | server-bios |
unspecified}
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
88
Manage Firmware through Cisco UCS Manager
Creating or Updating a Host Firmware Package
The following example creates the app1 host firmware package, creates an adapter package image with version
02.00.77 firmware, and commits the transaction:
UCS-A# scope org
UCS-A /org # create fw-host-pack app1
UCS-A /org/fw-host-pack* # set descr "This is a host firmware package example."
UCS-A /org/fw-host-pack* # create pack-image "Cisco Systems Inc" "N20-AQ0102" adapter
"02.00.77"
UCS-A /org/fw-host-pack/pack-image* # commit-buffer
UCS-A /org/fw-host-pack/pack-image #
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
89
Manage Firmware through Cisco UCS Manager
Firmware Automatic Synchronization
The following example excludes the server BIOS component from the app1 host firmware package, and
commits the transaction:
UCS-A# scope org
UCS-A /org # enter fw-host-pack app1
UCS-A /org/fw-host-pack* # create exclude-server-component server-bios
UCS-A /org/fw-host-pack/exclude-server-component* # commit-buffer
UCS-A /org/fw-host-pack/exclude-server-component #
The following example adds a service pack to the app1 host firmware package, and commits the transaction:
UCS-A# scope org
UCS-A /org # scope fw-host-pack app1
UCS-A /org/fw-host-pack # set servicepack-vers 3.1(3)SP1
UCS-A /org/fw-host-pack* # commit-buffer
UCS-A /org/fw-host-pack #
The following example removes a service pack from the app1 host firmware package, and commits the
transaction:
UCS-A# scope org
UCS-A /org # scope fw-host-pack app1
UCS-A /org/fw-host-pack # set servicepack-vers ""
UCS-A /org/fw-host-pack* # commit-buffer
UCS-A /org/fw-host-pack #
What to Do Next
Include the policy in a service profile and/or template.
Important The firmware automatic synchronization is dependent on the default host firmware pack. If you delete the
default host firmware pack, a major fault is raised in Cisco UCS Manager. If you have configured a default
host firmware pack, but not specified or configured a blade or rack server firmware in it, then a minor
fault is raised. Irrespective of the severity of the fault raised, you must resolve these faults prior to setting
the Firmware Auto Sync Server policy.
Following are the values for the Firmware Auto Sync Server policy:
No ActionNo firmware upgrade is initiated on the server.
This value is selected by default.
User AcknowledgeFirmware on the server is not synchronized until the administrator acknowledges
the upgrade in the Pending Activities dialog box.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
90
Manage Firmware through Cisco UCS Manager
Setting the Firmware Auto-Sync Server Policy
You can set this policy either from the Cisco UCS Manager GUI or Cisco UCS Manager CLI. The firmware
for a server is automatically triggered when the following conditions occur:
The firmware version on a server or the endpoint on a server differs from the firmware version configured
in the default host firmware pack.
The value for the Firmware Auto Sync Server policy has been modified. For example, if you had
initially set it as User Ack and you change it to No Action.
Important If Cisco UCS Manager is registered as a Cisco UCS domain with Cisco UCS Central, then this policy
runs as a local policy. If the default host firmware pack is not defined in or is deleted from Cisco UCS
Manager, then this policy will not run.
Procedure
Step 2 UCS-A /org # scope Enters the firmware auto synchronization policy mode.
fw-autosync-policy
Step 3 UCS-A /org/fw-autosync-policy # Set one of the following values to set the policy:
set auto-sync{user-acknowledge|
no-actions} user-acknowledgeFirmware on the server is not
synchronized until the administrator acknowledges
the discovered server in the server command mode.
no-actionNo firmware upgrade is initiated on the
server.
This value is selected by default.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
91
Manage Firmware through Cisco UCS Manager
Acknowledging the Firmware Auto Synchronization for a Server
This example shows how to set the Firmware Auto Sync Server policy and commit the transaction to the
system:
UCS-A # scope org
UCS-A /org # scope fw-autosync-policy
UCS-A /org/fw-autosync-policy # set auto-sync user-acknowledge
UCS-A /org/fw-autosync-policy* # commit-buffer
UCS-A /org/fw-autosync-policy #
What to Do Next
If you set the value to user-acknowledge, then you must acknowledge pending activity for the server for the
firmware synchronization to occur.
Procedure
Step 2 UCS-A /chassis # scope server server ID Enters the server command mode.
This example shows how to acknowledge the pending firmware update for a server and commit the transaction:
UCS-A # scope chassis
UCS-A /chassis # scope server 1
UCS-A /chassis/server # fw-sync acknowledge
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
92
Manage Firmware through Cisco UCS Manager
Direct Firmware Upgrade at Endpoints
Infrastructure UCS 5108 Chassis UCS Rack Server Cisco UCS S3260 Chassis
For the Cisco UCS S3260 chassis, you can upgrade the CMC, chassis adapter, chassis board controller, SAS
expander, and local disk firmware through the chassis firmware package in the chassis profile. Cisco UCS
S3260 Server Integration with Cisco UCS Manager, Release provides detailed information about chassis
profiles and chassis firmware packages.
You can upgrade the adapter, board controller, CIMC, and BIOS firmware through the host firmware package
in the service profile. If you use a host firmware package to upgrade this firmware, you can reduce the number
of times a server needs to be rebooted during the firmware upgrade process.
Important All server components must be kept at the same release level. These components are tested together for
each release and a version mismatch may cause unpredictable system operation.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
93
Manage Firmware through Cisco UCS Manager
Stages of a Direct Firmware Upgrade
Update
During this stage, the system copies the selected firmware version from the primary fabric interconnect to the
backup partition in the endpoint and verifies that the firmware image is not corrupt. The update process always
overwrites the firmware in the backup slot.
The update stage applies only to the following endpoints in a UCS 5108 chassis:
Adapters
CIMCs
I/O modules
On a Cisco UCS S3260 dense storage rack server chassis, the update stage applies only to the following
endpoints:
Chassis Management Controller (CMC)
Shared adapter
SAS expander
Server:
BIOS
CIMC
Adapter
Caution Do not remove the hardware that contains the endpoint or perform any maintenance on it until the update
process completes. If the hardware is removed or otherwise unavailable due to maintenance, the firmware
update fails. This failure might corrupt the backup partition. You cannot update the firmware on an endpoint
with a corrupted backup partition.
Activate
During this stage, the system sets the specified image version (normally the backup version) as the startup
version and, if you do not specify Set Startup Version Only, immediately reboots the endpoint. When the
endpoint is rebooted, the backup partition becomes the active partition, and the active partition becomes the
backup partition. The firmware in the new active partition becomes the startup version and the running version.
The following endpoints only require activation because the specified firmware image already exists on the
endpoint:
Cisco UCS Manager
Fabric interconnects
Board controllers on those servers that support them
On a Cisco UCS S3260 dense storage rack server chassis:
CMC
Shared adapter
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
94
Manage Firmware through Cisco UCS Manager
Outage Impacts of Direct Firmware Upgrades
When the firmware is activated, the endpoint is rebooted and the new firmware becomes the active kernel
version and system version. If the endpoint cannot boot from the startup firmware, it defaults to the backup
version and raises a fault.
Caution When you configure Set Startup Version Only for an I/O module, the I/O module is rebooted when the
fabric interconnect in its data path is rebooted. If you do not configure Set Startup Version Only for an
I/O module, the I/O module reboots and disrupts traffic. In addition, if Cisco UCS Manager detects a
protocol and firmware version mismatch between the fabric interconnect and the I/O module, Cisco UCS
Manager automatically updates the I/O module with the firmware version that matches the firmware in
the fabric interconnect, and then activates the firmware and reboots the I/O module again.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
95
Manage Firmware through Cisco UCS Manager
Outage Impacts of Direct Firmware Upgrades
For a standalone configuration with a single fabric interconnect, data traffic is disrupted when the I/O
module reboots. For a cluster configuration with two fabric interconnects, data traffic fails over to the
other I/O module and the fabric interconnect in its data path.
If you activate the new firmware as the startup version only, the I/O module reboots when the
corresponding fabric interconnect is rebooted.
If you activate the new firmware as the running and startup version, the I/O module reboots immediately.
An I/O module can take up to 10 minutes to become available after a firmware upgrade.
Outage Impacts of Direct Firmware Upgrades on M-Series Chassis and Server Endpoints
Important Cisco UCS Manager Release 3.1(2) and later releases do not support Cisco UCS M-Series Servers.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
96
Manage Firmware through Cisco UCS Manager
Recommended Process for Directly Upgrading Infrastructure Firmware at Endpoints
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
97
Manage Firmware through Cisco UCS Manager
Recommended Process for Directly Upgrading Infrastructure Firmware at Endpoints
c Disable Smart Call Home. Disabling Smart Call Home, on page 52 provides detailed information.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
98
Manage Firmware through Cisco UCS Manager
Cisco UCS Manager Firmware
Upgrade Validation
Cisco UCS Manager validates the upgrade or downgrade process and displays all firmware upgrade validation
failures, such as deprecated hardware, in the Upgrade Validation tab. If there are upgrade validation failures,
the upgrade fails, and Cisco UCS Manager rolls back to the earlier version. You must resolve these faults and
then use the Force option to continue with the upgrade.
For example, because M1 and M2 blade servers are not supported on Release 3.1(1), if you have M1 or M2
blade servers in the configuration when upgrading from Release 2.2(x) to Release 3.1(1), these will be reported
as validation faults in the Upgrade Validation tab, and the upgrade will fail.
If you do not want Cisco UCS Manager to validate the upgrade or downgrade process, check the Skip
Validation check box.
Procedure
Step 2 UCS-A /system # show image Displays the available software images for Cisco UCS
Manager (system).
Step 3 UCS-A /system # activate Activates the selected firmware version on the system.
firmware version-num Note Activating Cisco UCS Manager does not require
rebooting the fabric interconnect; however,
management services will briefly go down and all
VSH shells will be terminated as part of the
activation.
Step 4 UCS-A /system # Commits the transaction.
commit-buffer
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
99
Manage Firmware through Cisco UCS Manager
Cisco UCS Manager Firmware
The following example upgrades Cisco UCS Manager and commits the transaction:
Procedure
Step 5 UCS-A /system # activate Activates the selected service -pack version on the
service-pack version-num module system.
security Cisco UCS Manager disconnects all active sessions, logs
out all users, and activates the software. When the
upgrade is complete, you are prompted to log back in.
If you are prompted to re-login immediately after being
disconnected, the login will fail. You must wait until the
activation of Cisco UCS Manager is completed, which
takes a few minutes.
The following example upgrades Cisco UCS Manager to version 3.1(3)SP2 and commits the transaction:
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
100
Manage Firmware through Cisco UCS Manager
IOM Firmware
UCS-A# /system #
Procedure
Step 2 UCS-A /system # remove service-pack Removes the activated service pack from the
system.
All CLI sessions are terminated while removing the
service pack from the system.
The following example removes the service pack from Cisco UCS Manager and commits the transaction:
UCS-A# scope system
UCS-A# /system # remove service-pack
As part of activation, all cli sessions will be terminated.
Continue with activation? (yes/no)yes
UCS-A# /system* # commit-buffer
IOM Firmware
Cisco UCS I/O modules (IOMs) bring the unified fabric into the blade server enclosure, thus providing multiple
10 Gigabit Ethernet connections between blade servers and the fabric interconnect, simplifying diagnostics,
cabling, and management. IOMs extend the I/O fabric between the fabric interconnects and blade server
chassis, and enable a lossless and deterministic Fibre Channel over Ethernet (FCoE) fabric to connect all
blades and chassis together.
Because the IOM is similar to a distributed line card, it does not perform any switching, and is managed as
an extension of the fabric interconnects. This approach removes switching from the chassis, reducing overall
infrastructure complexity, and enables Cisco UCS to scale to many chassis without multiplying the number
of switches needed. It allows all chassis to be managed as a single, highly available management domain.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
101
Manage Firmware through Cisco UCS Manager
IOM Firmware
The IOM also manages the chassis environment, which includes the power supply, fans, and blades, along
with the fabric interconnect. Therefore, separate chassis management modules are not required. It fits into the
back of the blade server chassis. Each blade chassis can support up to two IOMs, thus allowing increased
capacity and redundancy.
Caution Do not remove the hardware that contains the endpoint or perform any maintenance on it until the update
process completes. If the hardware is removed or otherwise unavailable due to maintenance, the firmware
update fails. This failure might corrupt the backup partition. You cannot update the firmware on an endpoint
with a corrupted backup partition.
Procedure
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
102
Manage Firmware through Cisco UCS Manager
IOM Firmware
Step 7 UCS-A /chassis/iom # Activates the selected firmware version on the I/O module.
activate firmware Use the set-startup-only keyword if you want to reboot the I/O
version-num module only when the fabric interconnect in its data path reboots.
[set-startup-only] If you do not use the set-startup-only keyword, the I/O module
reboots and disrupts traffic. In addition, if Cisco UCS Manager
detects a protocol and firmware version mismatch between it and
the I/O module, it updates the I/O module with the firmware version
that matches its own and then activates the firmware and reboots
the I/O module again.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
103
Manage Firmware through Cisco UCS Manager
Fabric Interconnect Firmware
The following example updates and activates the I/O module firmware in the same transaction, without
verifying that the firmware update and firmware activation completed successfully:
The following example updates the I/O module firmware, verifies that the firmware update completed
successfully before starting the firmware activation, activates the I/O module firmware, and verifies that the
firmware activation completed successfully:
Tip If you ever need to recover the password to the admin account that was created when you configured the
fabric interconnects for the Cisco UCS domain, you must know the running kernel version and the running
system version. If you do not plan to create additional accounts, Cisco recommends that you save the path
to these firmware versions in a text file so that you can access them if required.
Procedure
Step 2 UCS-A /fabric-interconnect # show Displays the available software images for the fabric
image interconnect.
Step 3 UCS-A /fabric-interconnect # activate Activates the selected firmware version on the fabric
firmware {kernel-version interconnect.
kernel-ver-num | system-version
system-ver-num}
Step 4 UCS-A /fabric-interconnect # Commits the transaction.
commit-buffer Cisco UCS Manager updates and activates the
firmware, and then reboots the fabric interconnect and
any I/O module in the data path to that fabric
interconnect, disrupting data traffic to and from that
fabric interconnect.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
104
Manage Firmware through Cisco UCS Manager
Fabric Interconnect Firmware
The following example upgrades the fabric interconnect to version 5.0(3)N2(3.10.123) and commits the
transaction:
Procedure
Step 2 UCS-A# connect local-mgmt Enters local management mode for the cluster.
Step 3 UCS-A (local-mgmt) # cluster Changes the subordinate fabric interconnect to primary
{force primary | lead {a | b}} using one of the following commands:
force
Forces local fabric interconnect to become the
primary.
lead
Makes the specified subordinate fabric interconnect
the primary.
A: UP, PRIMARY
B: UP, SUBORDINATE
HA READY
UCS-A# connect local-mgmt
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
105
Manage Firmware through Cisco UCS Manager
Fabric Interconnect Firmware
Procedure
The following example upgrades fabric interconnect a and commits the transaction:
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
106
Manage Firmware through Cisco UCS Manager
Adapter Firmware
Procedure
Step 2 UCS-A /fabric-interconnect # remove Removes the activated service pack from
service-pack security the fabric interconnect.
The following example removes the service pack from fabric interconnect a and commits the transaction:
Adapter Firmware
The Cisco Unified Computing System supports a broad set of converged network adapters (CNAs). CNAs
eliminate the need for multiple network interface cards (NICs) and host bus adapters (HBAs) by converging
LAN and SAN traffic in a single interface.
All Cisco UCS network adapters:
Allow for the reduction of the number of required network interface cards and host bus adapters
Are managed using Cisco UCS Manager software
Can be used in a redundant configuration with two fabric extenders and two fabric interconnects
Enable a "wire-once" architecture that allows cabling to be configured once, with features enabled and
configured using software
Support fibre channel multipathing
The Cisco Virtual Interface Card (VIC) delivers 256 virtual interfaces and supports Cisco VM-FEX technology.
The Cisco VIC provides I/O policy coherency and visibility to enable true workload mobility in virtualized
environments. The Cisco VIC is available in form factors for B-Series blade servers, and C-Series rack servers.
Caution Do not remove the hardware that contains the endpoint or perform any maintenance on it until the update
process completes. If the hardware is removed or otherwise unavailable due to maintenance, the firmware
update fails. This failure might corrupt the backup partition. You cannot update the firmware on an endpoint
with a corrupted backup partition.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
107
Manage Firmware through Cisco UCS Manager
Adapter Firmware
Procedure
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
108
Manage Firmware through Cisco UCS Manager
BIOS Firmware
The following example updates and activates the adapter firmware to version 4.1(0.123) in the same transaction,
without verifying that the firmware update and firmware activation completed successfully:
The following example updates the adapter firmware to version 4.1(0.123), verifies that the firmware update
completed successfully before starting the firmware activation, activates the adapter firmware, and verifies
that the firmware activation completed successfully:
BIOS Firmware
The Basic Input Output System (BIOS) tests and initializes the hardware components of a system and boots
the operating system from a storage device. In Cisco UCS, there are several BIOS settings that control the
systems behavior. You can update the BIOS firmware directly from Cisco UCS Manager.
Important You can update and activate BIOS firmware on a server using the Cisco UCS Manager CLI on all M3
generation servers. The earlier servers do not support BIOS firmware update using the Cisco UCS Manager
CLI.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
109
Manage Firmware through Cisco UCS Manager
BIOS Firmware
Caution Do not remove the hardware that contains the endpoint or perform any maintenance on it until the update
process completes. If the hardware is removed or otherwise unavailable due to maintenance, the firmware
update fails. This failure might corrupt the backup partition. You cannot update the firmware on an endpoint
with a corrupted backup partition.
Procedure
Step 7 UCS-A /chassis/server/bios # Activates the selected server BIOS firmware version.
activate firmware version-num
Step 8 UCS-A /chassis/server/bios # Commits the transaction.
commit-buffer
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
110
Manage Firmware through Cisco UCS Manager
CIMC Firmware
The following example updates and activates the BIOS firmware in the same transaction, without verifying
that the firmware update and activation completed successfully:
CIMC Firmware
Cisco Integrated Management Controller (CIMC) is used for the management and monitoring of servers in
Cisco UCS. CIMC provides options such as GUI, CLI, and IPMI for management and monitoring tasks. On
the C-Series servers, CIMC runs on a separate chip. Thus, it is able to provide services in case of any major
hardware failure or system crash. CIMC is also useful for initial configuration of the server and troubleshooting
any problems in server operation. You can update the CIMC firmware directly from Cisco UCS Manager.
Caution Do not remove the hardware that contains the endpoint or perform any maintenance on it until the update
process completes. If the hardware is removed or otherwise unavailable due to maintenance, the firmware
update fails. This failure might corrupt the backup partition. You cannot update the firmware on an endpoint
with a corrupted backup partition.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
111
Manage Firmware through Cisco UCS Manager
CIMC Firmware
Procedure
Step 7 UCS-A /chassis/server/cimc # Activates the selected firmware version on the CIMC in the
activate firmware version-num server.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
112
Manage Firmware through Cisco UCS Manager
PSU Firmware
The following example updates and activates the CIMC firmware in the same transaction, without verifying
that the firmware update and firmware activation completed successfully:
The following example updates the CIMC firmware, verifies that the firmware update completed successfully
before starting the firmware activation, activates the CIMC firmware, and verifies that the firmware activation
completed successfully:
PSU Firmware
You can update PSU firmware directly from Cisco UCS Manager.
Caution Do not remove the hardware that contains the endpoint or perform any maintenance on it until the update
process completes. If the hardware is removed or otherwise unavailable due to maintenance, the firmware
update fails. This failure might corrupt the backup partition. You cannot update the firmware on an endpoint
with a corrupted backup partition.
Procedure
Step 2 UCS-A /chassis # scope psu Enters PSU mode for the specified PSU.
psu-id
Step 3 UCS-A /chassis/psu # show Displays the available software images for the PSU.
detail
Step 4 UCS-A /chassis/psu # update Updates the selected firmware version on the PSU.
firmware version-num [force] You can use the optional force keyword to activate the
firmware regardless of any possible incompatibilities or
currently executing tasks.
Caution Review the checklist that displays and ensure you
have met all the requirements before you continue
with the upgrade.
Step 5 UCS-A /chassis/psu # (Optional)
commit-buffer Commits the transaction.
Cisco UCS Manager copies the selected firmware image to
the backup memory partition and verifies that image is not
corrupt. The image remains as the backup version until you
explicitly activate it.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
113
Manage Firmware through Cisco UCS Manager
PSU Firmware
The following example shows how to update the PSU firmware and commit the transaction:
Caution Do not remove the hardware that contains the endpoint or perform any maintenance on it until the update
process completes. If the hardware is removed or otherwise unavailable due to maintenance, the firmware
update fails. This failure might corrupt the backup partition. You cannot update the firmware on an endpoint
with a corrupted backup partition.
Procedure
Step 2 UCS-A /chassis # scope psu psu-id Enters PSU mode for the specified PSU.
Step 3 UCS-A /chassis/psu # activate firmware Activates the selected firmware version on the
version-num PSU.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
114
Manage Firmware through Cisco UCS Manager
Board Controller Firmware
The following example activates the PSU firmware and commits the transaction:
Guidelines for Activating Cisco UCS B-Series M3 and M4 Blade Server Board Controller Firmware
The following guidelines apply to Cisco UCS B-Series M3 and M4 blade-server board controller firmware:
You never need to downgrade the board controller firmware.
The board controller firmware version of the blade server should be the same as or later than the installed
software bundle version. Leaving the board controller firmware at a later version than the version that
is currently running in your existing Cisco UCS environment does not violate the software matrix or
TAC supportability.
Board controller firmware updates are backward compatible with the firmware of other components.
Some Cisco UCS B200 M4 blade servers running on releases prior to Release 2.2(4b) may generate a false
Cisco UCS Manager alert, documented in CSCuu15465. This false board controller mismatch alert was
resolved in Cisco UCS Manager Capability Catalogs 2.2(4c)T and 2.2(5b)T. You will not see this alert if you
use either the 2.2(4c)T or the 2.2(5b)T capability catalog.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
115
Manage Firmware through Cisco UCS Manager
Board Controller Firmware
5 Click Save.
6 Re-discover the blade server.
Guidelines for Activating Cisco UCS C-Series M3 and M4 Rack Server Board Controller Firmware
The following guidelines apply to Cisco UCS C-Series M3 and M4 rack-server board controller firmware:
The board controller firmware and the CIMC firmware must be of the same package version.
When you upgrade the C-Series server firmware for Cisco UCS C220 M4 or C240 M4 servers to Cisco
UCS Manager 2.2(6c), you will see the following critical alarm:
Board controller upgraded, manual a/c power cycle required on server x
This alarm, documented in CSCuv45173, is incorrectly categorized as a critical alarm. It does not impact
the functionality of the server, and can be ignored.
To avoid seeing this alarm, you can do one of the following:
Create a custom host firmware package in Cisco UCS Manager to exclude the board controller
firmware from the Cisco UCS Manager 2.2(6c) update and keep the older version.
Upgrade Cisco UCS Manager infrastructure (A Bundle) to Release 2.2(6c) and continue to run the
host firmware (C Bundle) on any Cisco UCS C220 M4 or C240 M4 server at a lower version,
according to the mixed firmware support matrix in Table 2 of the Release Notes for Cisco UCS
Manager, Release 2.2.
If the activation status of the board controller displays Pending Power Cycle after you upgrade the
board controller, a manual power cycle is required. A fault is also generated. After the power cycle is
complete, the fault is cleared and the board controller activation status displays Ready.
Activating the Board Controller Firmware on Cisco UCS B-Series M3 and Higher Blade Servers
The board controller firmware controls many of the server functions, including eUSBs, LEDs, and I/O
connectors.
Note This activation procedure causes the server to reboot. Depending upon whether the service profile associated
with the server includes a maintenance policy, the reboot can occur immediately. Cisco recommends that
you upgrade the board controller firmware through the host firmware package in the service profile as the
last step of upgrading a Cisco UCS domain, along with upgrading the server BIOS. This reduces the
number of times a server needs to reboot during the upgrade process.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
116
Manage Firmware through Cisco UCS Manager
Board Controller Firmware
Procedure
Step 2 UCS-A /chassis/server # scope Enters board controller mode for the server.
boardcontroller
Step 3 UCS-A /chassis/server/boardcontroller # (Optional)
show image Displays the available software images for the
board controller.
Activating the Board Controller Firmware on a Cisco UCS C-Series M3 and Higher Rack
Servers
The board controller firmware controls many of the server functions, including eUSBs, LEDs, and I/O
connectors.
Note This activation procedure causes the server to reboot. Depending upon whether the service profile associated
with the server includes a maintenance policy, the reboot can occur immediately. Cisco recommends that
you upgrade the board controller firmware through the host firmware package in the service profile as the
last step of upgrading a Cisco UCS domain, along with upgrading the server BIOS. This reduces the
number of times a server needs to reboot during the upgrade process.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
117
Manage Firmware through Cisco UCS Manager
Board Controller Firmware
Procedure
Step 2 UCS-A /server # scope boardcontroller Enters board controller mode for the server.
Step 5 UCS-A /server/boardcontroller # activate Activates the selected firmware version on the
firmware version-num board controller in the server.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
118
CHAPTER 6
Manage the Capability Catalog in Cisco UCS
Manager
Capability Catalog, page 119
Activating a Capability Catalog Update, page 121
Verifying that the Capability Catalog is Current, page 121
Restarting a Capability Catalog Update, page 121
Viewing a Capability Catalog Provider, page 122
Obtaining Capability Catalog Updates from Cisco, page 124
Updating the Capability Catalog from a Remote Location, page 124
Capability Catalog
The Capability Catalog is a set of tunable parameters, strings, and rules. Cisco UCS uses the catalog to update
the display and configurability of components such as newly qualified DIMMs and disk drives for servers.
The catalog is divided by hardware components, such as the chassis, CPU, local disk, and I/O module. You
can use the catalog to view the list of providers available for that component. There is one provider per
hardware component. Each provider is identified by the vendor, model (PID), and revision. For each provider,
you can also view details of the equipment manufacturer and the form factor.
For information about which hardware components are dependent upon a particular catalog release, see the
component support tables in the Service Notes for the B- Series servers. For information about which
components are introduced in a specific release, see the Cisco UCS Release Notes.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
119
Manage the Capability Catalog in Cisco UCS Manager
Updates to the Capability Catalog
Hardware-Specific Rules
Firmware compatibility for components such as the BIOS, CIMC, RAID controller, and adapters
Diagnostics
Hardware-specific reboot
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
120
Manage the Capability Catalog in Cisco UCS Manager
Activating a Capability Catalog Update
The following example activates a Capability Catalog update and commits the transaction:
Step 3 UCS-A /system/capability # show version Displays the current Capability Catalog
version.
Step 4 On Cisco.com, determine the most recent release For more information about the location of
of the Capability Catalog available. Capability Catalog updates, see Obtaining
Capability Catalog Updates from Cisco,
on page 124.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
121
Manage the Capability Catalog in Cisco UCS Manager
Viewing a Capability Catalog Provider
Procedure
Step 3 UCS-A /system/capability # show (Optional) Displays the update history for Capability
cat-updater [ filename ] Catalog file update operations.
Step 4 UCS-A /system/capability # scope Enters the command mode for the Capability Catalog
cat-updater filename file update operation.
Step 5 UCS-A /system/capability/cat-updater # (Optional) Specifies the username for the remote
set userid username server.
Step 6 UCS-A /system/capability/cat-updater # (Optional) Specifies the password for the remote
set password password server username.
If no password is configured, you are prompted for
a password when you start the update.
Step 7 UCS-A /system/capability/cat-updater # (Optional) Specifies the file transfer protocol for the
set protocol {ftp | scp | sftp | tftp | usbA remote server.
| usbB} Note TFTP has a file size limitation of 32 MB.
Because catalog images can be much larger
than that, we recommend that you do not
use TFTP for catalog image downloads.
Step 8 UCS-A /system/capability/cat-updater # (Optional) Specifies the hostname or IP address of
set server {hostname | ip-address} the remote server.
Step 9 UCS-A /system/capability/cat-updater # (Optional) Specifies the path and file name of the
set path pathname/filename Capability Catalog file on the remote server.
Step 10 UCS-A /system/capability/cat-updater # Restarts the Capability Catalog file update operation.
restart
The following example changes the server IP address and restarts the Capability Catalog file update operation:
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
122
Manage the Capability Catalog in Cisco UCS Manager
Viewing a Capability Catalog Provider
Step 3 UCS-A /system/capability # show Displays vendor, model, and revision information for
{chassis | cpu | disk | fan | fru | iom | all components in the specified component category.
memory | psu | server} [vendor model To view manufacturing and form factor details for a
revision] [detail | expand] specific component, specify the vendor , model , and
revision with the expand keyword. If any of these
fields contains spaces, you must enclose the field with
quotation marks.
Note If the server contains one or more SATA devices, such as a hard disk drive or solid state drive, the show
disk command displays ATA in the Vendor field. Use the expand keyword to display additional vendor
information.
The following example lists the installed fans and displays detailed information from the Capability Catalog
about a specific fan:
UCS-A# scope system
UCS-A /system # scope capability
UCS-A /system/capability # show fan
Fan Module:
Vendor Model HW Revision
------------------------ ------------------------ ------------
Cisco Systems, Inc. N20-FAN5 0
Cisco Systems, Inc. N10-FAN1 0
Cisco Systems, Inc. N10-FAN2 0
Cisco Systems, Inc. N5K-C5548P-FAN 0
Cisco Systems, Inc. N5K-C5596P-FAN 0
Cisco Systems, Inc. UCS-FAN-6248UP 0
Cisco Systems, Inc. UCS-FAN-6296UP 0
Fan Module:
Vendor: Cisco Systems, Inc.
Model: N10-FAN1
Revision: 0
Equipment Manufacturing:
Name: Fan Module for UCS 6140 Fabric Interconnect
PID: N10-FAN1
VID: NA
Caption: Fan Module for UCS 6140 Fabric Interconnect
Part Number: N10-FAN1
SKU: N10-FAN1
CLEI:
Equipment Type:
Form Factor:
Depth (C): 6.700000
Height (C): 1.600000
Width (C): 4.900000
Weight (C): 1.500000
UCS-A /system/capability #
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
123
Manage the Capability Catalog in Cisco UCS Manager
Obtaining Capability Catalog Updates from Cisco
Step 8 Follow the prompts to complete your download of the catalog update.
What to Do Next
Update the Capability Catalog.
Procedure
Step 3 UCS-A /system/capability # Imports and applies the specified Capability Catalog file.
update catalog URL Specify the URL for the operation using one of the
following syntax:
ftp:// username@hostname / path
scp:// username@hostname / path
sftp:// username@hostname / path
tftp:// hostname : port-num / path
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
124
Manage the Capability Catalog in Cisco UCS Manager
Updating the Capability Catalog from a Remote Location
Step 4 UCS-A /system/capability # show (Optional) Displays the catalog update version.
version
Step 5 UCS-A /system/capability # show (Optional) Displays the update history for a Capability
cat-updater [ filename ] Catalog file, if specified, or for all Capability Catalog file
update operations.
Cisco UCS Manager downloads the image and updates the Capability Catalog. You do not need to reboot any
hardware components.
The following example uses SCP to import a Capability Catalog file:
UCS-A# scope system
UCS-A /system # scope capability
UCS-A /system/capability # update catalog
scp://[email protected]/catalogs/ucs-catalog.3.1.1a.T.bin
Password:
UCS-A /system/capability # show version
Catalog:
Update Version: 3.1(1a)T
Catalog Updater:
File Name Protocol Server Userid Status
--------- -------- --------------- --------------- ------
ucs-catalog.3.1.1a.T.bin Scp 192.0.2.111 user1 Success
UCS-A /system/capability #
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
125
Manage the Capability Catalog in Cisco UCS Manager
Updating the Capability Catalog from a Remote Location
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
126
CHAPTER 7
Troubleshoot Firmware
Recovering Fabric Interconnect During Upgrade, page 127
Recovering IO Modules During Firmware Upgrade, page 134
Procedure
Step 1 Reboot the switch, and in the console, press Ctrl+L as it boots to get the loader prompt.
Note You may need to press the selected key combination multiple times before your screen displays the
loader prompt.
Example:
loader>
Step 2 Configure the interface to receive the kickstart image through TFTP.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
127
Troubleshoot Firmware
Recovering Fabric Interconnects When You Do Not Have Working Images on The Fabric Interconnect or The Bootflash
a) Enter the local IP address and subnet mask for the system at the loader> prompt, and press Enter.
Example:
loader> set ip 10.104.105.136 255.255.255.0
Example:
loader> set gw 10.104.105.1
Example:
loader> boot
tftp://10.104.105.22/tftpboot/Images.3.0.2/ucs-6300-k9-kickstart.5.0.2.N1.3.02d56.bin
switch(boot)#
Note You do not need to do this step if you already have a kickstart image in the bootflash.
Example:
switch(boot)# init system
Example:
switch(boot)# config t
switch(boot)(config)# interface mgmt0
b) Enter the ip address command to configure the local IP address and the subnet mask for the system.
Example:
switch(boot)(config-if)# ip address 10.104.105.136 255.255.255.0
c) Enter the no shutdown command to enable the mgmt0 interface on the system.
Example:
switch(boot)(config-if)# no shutdown
d) Enter the ip default-gateway command to configure the IP address of the default gateway.
Example:
switch(boot)(config-if)# exit
switch(boot)(config)# ip default-gateway 10.104.105.1
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
128
Troubleshoot Firmware
Recovering Fabric Interconnects When You Do Not Have Working Images on The Fabric Interconnect or The Bootflash
Example:
switch(boot)(config)# exit
Step 5 Copy the kickstart, system, and Cisco UCS Manager management images from the TFTP server to the bootflash.
Example:
switch(boot)# copy
scp://<username>@10.104.105.22/tftpboot/Images.3.0.2/ucs-6300-k9-kickstart.5.0.2.N1.3.02d56.bin
bootflash://
switch(boot)# copy
scp://<username>@10.104.105.22/tftpboot/Images.3.0.2/ucs-6300-k9-system.5.0.2.N1.3.02d56.bin
bootflash://
switch(boot)# copy
scp://<username>@10.104.105.22/tftpboot/Images.3.0.2/ucs-manager-k9.3.0.2d56.bin bootflash://
Step 6 Create separate directories for installables and installables/switch in the bootflash.
Example:
switch(boot)# mkdir bootflash:installables
switch(boot)# mkdir bootflash:installables/switch
Step 7 Copy the kickstart, system, and Cisco UCS Manager images to the installables/switch directory.
Example:
switch(boot)# copy ucs-6300-k9-kickstart.5.0.2.N1.3.02d56.bin bootflash:installables/switch/
switch(boot)# copy ucs-6300-k9-system.5.0.2.N1.3.02d56.bin bootflash:installables/switch/
switch(boot)# copy ucs-manager-k9.3.02d56.bin bootflash:installables/switch/
Example:
switch(boot)# copy bootflash:installables/switch/ucs-manager-k9.3.02d56.bin
nuova-sim-mgmt-nsg.0.1.0.001.bin
Example:
switch(boot)# reload
This command will reboot this supervisor module. (y/n) ? y
Example:
loader> dir
nuova-sim-mgmt-nsg.0.1.0.001.bin
ucs-6300-k9-kickstart.5.0.2.N1.3.02d56.bin
ucs-6300-k9-system.5.0.2.N1.3.02d56.bin
ucs-manager-k9.3.02d56.bin
loader> boot ucs-6300-k9-kickstart.5.0.2.N1.3.02d56.bin
switch(boot)#
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
129
Troubleshoot Firmware
Recovering Fabric Interconnects When You Do Not Have Working Images on The Fabric Interconnect or The Bootflash
The Basic System Configuration Dialog wizard appears after the system image is completely loaded. Use
this wizard to configure the fabric interconnect.
Example:
switch(boot)# load ucs-6300-k9-system.5.0.2.N1.3.02d56.bin
Uncompressing system image: bootflash:/ucs-6300-k9-system.5.0.2.N1.3.02d56.bin
...
This setup utility will guide you through the basic configuration of
the system. Only minimal configuration including IP connectivity to
the Fabric interconnect and its clustering mode is performed through these steps.
...
Apply and save the configuration (select 'no' if you want to re-enter)? (yes/no): yes
Applying configuration. Please wait.
Configuration file - Ok
Example:
UCS-A# scope firmware
UCS-A /firmware # download image scp://<username>@<server ip>//<downloaded image
location>/<infra bundle name>
Password:
UCS-A /firmware # download image scp://<username>@<server ip>//<downloaded image
location>/<b-series bundle name>
Password:
UCS-A /firmware # download image scp://<username>@<server ip>//<downloaded image
location>/<c-series bundle name>
Password:
UCS-A /firmware # show download-task
Download task:
File Name Protocol Server Userid State
--------- -------- --------------- --------------- -----
ucs-k9-bundle-b-series.3.0.2.B.bin
Scp 10.104.105.22 abcdefgh Downloading
ucs-k9-bundle-c-series.3.0.2.C.bin
Scp 10.104.105.22 abcdefgh Downloading
ucs-k9-bundle-infra.3.0.2.A.bin
Scp 10.104.105.22 abcdefgh Downloading
UCS-A /firmware #
Step 13 After the firmware download is complete, activate the fabric interconnect firmware and Cisco UCS Manager
firmware.
This step updates Cisco UCS Manager and the fabric interconnects to the version you want, and then reboots
them.
Example:
UCS-A# scope fabric-interconnect a
UCS-A /fabric-interconnect* # activate firmware kernel-version 5.0(2)N1(3.02d56)
ignorecompcheck
Warning: When committed this command will reset the end-point
UCS-A /fabric-interconnect* # activate firmware system-version 5.0(2)N1(3.02d56)
ignorecompcheck
Warning: When committed this command will reset the end-point
UCS-A /fabric-interconnect* # commit-buffer
UCS-A /fabric-interconnect # exit
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
130
Troubleshoot Firmware
Recovering Fabric Interconnect During Upgrade When You have Working Images on the Bootflash
Procedure
Step 1 Reboot the switch, and in the console, press Ctrl+L as it boots to get the loader prompt.
Note You may need to press the selected key combination multiple times before your screen displays the
loader prompt.
Example:
loader>
Example:
loader> dir
nuova-sim-mgmt-nsg.0.1.0.001.bin
ucs-6300-k9-kickstart.5.0.2.N1.3.02d56.bin
ucs-6300-k9-system.5.0.2.N1.3.02d56.bin
ucs-manager-k9.3.02d56.bin
Example:
loader> boot ucs-6300-k9-kickstart.5.0.2.N1.3.02d56.bin
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
131
Troubleshoot Firmware
Recovering Unresponsive Fabric Interconnects During Upgrade or Failover
Example:
switch(boot)# copy ucs-manager-k9.1.4.1k.bin nuova-sim-mgmt-nsg.0.1.0.001.bin
Example:
switch(boot)# load ucs-6300-k9-system.5.0.2.N1.3.02d56.bin
Step 6 Log in to Cisco UCS Manager and update your fabric interconnect and Cisco UCS Manager software to the
version that you want.
Procedure
Step 1 If the httpd_cimc.sh process is lost, as documented in CSCup70756, you lose access to the KVM. Continue
with the failover or contact Cisco Technical Assistance.
Step 2 If you lose access to the KVM on the primary side, continue with the failover to resolve the issue.
Step 3 If KVM is needed or is down on the subordinate side, start only that service using the debug plugin. Contact
TAC to run the debug image.
Step 4 If the /dev/null issue is encountered, as documented in CSCuo50049, fix the rights to 666 with the debug-plugin
at both steps if required. Contact Cisco Technical Assistance to run debug commands.
Step 5 If both CSCup70756 and CSCuo50049 are encountered, it can cause VIP loss. If the VIP is lost, do the
following:
1 Access the primary physical address through the GUI and use the GUI to verify all IO Module backplane
ports recovered.
2 If the GUI is down, verify IO Module backplane ports with the NXOS show fex detail command.
3 Perform the workaround and verify that the cluster state is UP on both fabric interconnects.
4 If the cluster state is UP on both fabric interconnects, continue the upgrade by reacknowledging the primary
fabric interconnect reboot using the SSH CLI syntax:
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
132
Troubleshoot Firmware
Recovering Fabric Interconnects From a Failed FSM During Upgrade With Auto Install
UCS-A /firmware/auto-install #
Procedure
Step 1 When the FSM fails, or when multiple retries are observed in the DeployPollActivate stage of the FSM on
the subordinate fabric interconnect, do the following:
a) Clear the startup version of the default infrastructure pack and the service pack.
Example:
UCS-A# scope org
UCS-A /org # scope fw-infra-pack default
UCS-A /org/fw-infra-pack # set infra-bundle-version ""
UCS-A /org/fw-infra-pack* # commit-buffer
b) Remove the service pack from the subordinate fabric interconnect.
Example:
UCS-A# scope fabric-interconnect b
UCS-A# /fabric-interconnect # remove service-pack security
UCS-A# /fabric-interconnect* # commit-buffer
Step 2 Upgrade the infrastructure firmware using the force option through Auto Install.
Example:
UCS-A# scope firmware
UCS-A /firmware # scope auto-install
UCS-A /firmware/auto-install # install infra infra-vers 3.1(3a)A force
This operation upgrades firmware on UCS Infrastructure Components
(UCS manager, Fabric Interconnects and IOMs).
Here is the checklist of things that are recommended before starting Auto-Install
(1) Review current critical/major faults
(2) Initiate a configuration backup
(3) Check if Management Interface Monitoring Policy is enabled
(4) Check if there is a pending Fabric Interconnect Reboot activitiy
(5) Ensure NTP is configured
(6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is
unsupported in the target release
Do you want to proceed? (yes/no): yes
Triggering Install-Infra with:
Infrastructure Pack Version: 3.1(3a)A
Step 3 Acknowledge the reboot of the primary fabric interconnect.
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
133
Troubleshoot Firmware
Recovering IO Modules During Firmware Upgrade
Example:
UCS-A /firmware/auto-install # acknowledge primary fabric-interconnect reboot
UCS-A /firmware/auto-install* # commit-buffer
UCS-A /firmware/auto-install #
Step 4 When the FSM fails, or when multiple retries are observed in the DeployPollActivate stage of the FSM on
the current subordinate fabric interconnect, do the following:
a) Clear the startup version of the default infrastructure pack and the service pack.
Example:
UCS-A# scope org
UCS-A /org # scope fw-infra-pack default
UCS-A /org/fw-infra-pack # set infra-bundle-version ""
UCS-A /org/fw-infra-pack* # commit-buffer
b) Remove the service pack from the current subordinate fabric interconnect.
Example:
UCS-A# scope fabric-interconnect a
UCS-A# /fabric-interconnect # remove service-pack security
UCS-A# /fabric-interconnect* # commit-buffer
Both fabric interconnects will now reflect Release 3.1(3) firmware and the default service pack for Running
and Startup versions.
Procedure
Cisco UCS Manager Firmware Management Using the CLI, Release 3.1
134