<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.fnord.greeley.co.us/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adj</id>
	<title>FnordWiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.fnord.greeley.co.us/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adj"/>
	<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php/Special:Contributions/Adj"/>
	<updated>2026-05-06T13:17:32Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.17</generator>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1611</id>
		<title>Mellanox Infiniband HCA and/or Ethernet adapters</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1611"/>
		<updated>2026-04-13T21:35:30Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Set card mode */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I have a number of servers with ConnectX-3 cards to connect to various network infrastructure bits and bobs.  Recently (today) installed on in a Cisco UCS C220 M5 server and realized that I have made no notes about things that have been done to make the cards work.  Ooops.&lt;br /&gt;
&lt;br /&gt;
== ConnectX-3 cards ==&lt;br /&gt;
Several of these are deployed around the home network.  There are various models (pretty much all are ConnectX-3, though.)&lt;br /&gt;
&lt;br /&gt;
=== Finding card info ===&lt;br /&gt;
List out all Mellanox cards in a machine.  &amp;quot;15b3&amp;quot; is Mellanox&#039;s PCI vendor ID.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;lspci -d 15b3:&#039;&#039;&#039;&lt;br /&gt;
 d8:00.0 Network controller: Mellanox Technologies MT27520 Family [ConnectX-3 Pro]&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
First column of output is the PCI bus ID of the card.  This is used in the next bunch of commands.  Running with elevated privileges (under sudo) allows reading to the capabilities info.  That isn&#039;t really necessary for this step, but causes no harm.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo lspci -s d8:00.0 -vv&#039;&#039;&#039;&lt;br /&gt;
 d8:00.0 Network controller: Mellanox Technologies MT27520 Family [ConnectX-3 Pro]&lt;br /&gt;
         Subsystem: Mellanox Technologies Device 0003&lt;br /&gt;
         Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+&lt;br /&gt;
         Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast &amp;gt;TAbort- &amp;lt;TAbort- &amp;lt;MAbort- &amp;gt;SERR- &amp;lt;PERR- INTx-&lt;br /&gt;
         Latency: 0, Cache Line Size: 32 bytes&lt;br /&gt;
         Interrupt: pin A routed to IRQ 83&lt;br /&gt;
         NUMA node: 1&lt;br /&gt;
         IOMMU group: 20&lt;br /&gt;
         Region 0: Memory at fbe00000 (64-bit, non-prefetchable) [size=1M]&lt;br /&gt;
         Region 2: Memory at 4ffff800000 (64-bit, prefetchable) [size=8M]&lt;br /&gt;
         Expansion ROM at fbd00000 [disabled] [size=1M]&lt;br /&gt;
         Capabilities: [40] Power Management version 3&lt;br /&gt;
         Capabilities: [48] Vital Product Data&lt;br /&gt;
         Capabilities: [9c] MSI-X: Enable+ Count=128 Masked-&lt;br /&gt;
         Capabilities: [60] Express Endpoint, IntMsgNum 0&lt;br /&gt;
         Capabilities: [c0] Vendor Specific Information: Len=18 &amp;lt;?&amp;gt;&lt;br /&gt;
         Capabilities: [100] Alternative Routing-ID Interpretation (ARI)&lt;br /&gt;
         Capabilities: [148] Device Serial Number f4-52-14-03-00-2c-5e-00&lt;br /&gt;
         Capabilities: [108] Single Root I/O Virtualization (SR-IOV)&lt;br /&gt;
         Capabilities: [154] Advanced Error Reporting&lt;br /&gt;
         Capabilities: [18c] Secondary PCI Express&lt;br /&gt;
         Kernel driver in use: mlx4_core&lt;br /&gt;
         Kernel modules: mlx4_core&lt;br /&gt;
 &lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
Query the card to find out its code revision, Ethernet MAC address(es), Infiniband GUID(s), and the Mellanox Parameter Set ID (PSID).  This does need the elevated privileges provided by sudo:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.36.5000&lt;br /&gt;
 FW Release Date:       26.1.2016&lt;br /&gt;
 MIC Version:           1.5.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 Product Version:       02.36.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
&lt;br /&gt;
=== Where to get firmware images ===&lt;br /&gt;
See that PSID in the output from the &amp;lt;code&amp;gt;mstflint&amp;lt;/code&amp;gt; query operation?  We are running relase 2.36.5000 of the code in the ConnectX-3 chip on this card.  There are also code blobs for BIOS/UEFI that can be installed.&lt;br /&gt;
&lt;br /&gt;
nVidia bought Mellanox some years ago.  With that purchase, firmware images for switches and adapter cards can be found at https://network.nvidia.com/support/firmware/firmware-downloads/.  If it is not there in the future, try Duck-Duck-Going for something like &amp;quot;nVidia adapter card firmware download&amp;quot; until you find the right thing.  Today&#039;s card is a &amp;quot;ConnectX-3 Pro&amp;quot; (as seen in the output of &amp;lt;code&amp;gt;lspci -d 15b3:&amp;lt;/code&amp;gt;).  These cards came in Infiniband only and Ethernet+Infiniband (and maybe just Ethernet, too?) varieties.  Navigating through nVidia firmware download, I found a card with a matching PSID under the ConnectX-3 Pro Infiniband link.  PSID MT_1090111019 looks to go with a Mellanox MCX354A-FCCT (dual port) or MCX353A-FCCT (single port) adapter.  Download the corresponding ZIP archive from nVidia&#039;s site.  As this is written, that is https://www.mellanox.com/downloads/firmware/fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin.zip.&lt;br /&gt;
&lt;br /&gt;
=== Burning new firmwares ===&lt;br /&gt;
Unpack the just-downloaded ZIP file and find a .bin file inside.  And compare what is currently on the card with what is in the .bin file:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;diff -u --color &amp;lt;(sudo mstflint -d d8:00.0 q full) &amp;lt;(mstflint -i fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin q full) &#039;&#039;&#039;&lt;br /&gt;
 --- /dev/fd/63	2026-04-13 19:15:20.421912090 +0000&lt;br /&gt;
 +++ /dev/fd/62	2026-04-13 19:15:20.421912090 +0000&lt;br /&gt;
 @@ -1,13 +1,14 @@&lt;br /&gt;
  Image type:            FS2&lt;br /&gt;
 -FW Version:            2.36.5000&lt;br /&gt;
 -FW Release Date:       26.1.2016&lt;br /&gt;
 -MIC Version:           1.5.0&lt;br /&gt;
 +FW Version:            2.42.5000&lt;br /&gt;
 +FW Release Date:       5.9.2017&lt;br /&gt;
 +MIC Version:           2.0.0&lt;br /&gt;
  Config Sectors:        2&lt;br /&gt;
 -Product Version:       02.36.50.00&lt;br /&gt;
 -Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 +PRS Name:              cx3pro_MCX354A_fdr_09v.prs&lt;br /&gt;
 +Product Version:       02.42.50.00&lt;br /&gt;
 +Rom Info:              type=PXE version=3.4.752&lt;br /&gt;
  Device ID:             4103&lt;br /&gt;
  Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 -GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 -MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 -VSD:                   &lt;br /&gt;
 +GUIDs:                 0002c9000100d050 0002c9000100d051 0002c9000100d052 0002c9000100d050 &lt;br /&gt;
 +MACs:                                       0002c9000001     0002c9000002&lt;br /&gt;
 +VSD:                   n/a&lt;br /&gt;
  PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
Along with the firmware version numbers, we can see that the Infiniband GUIDs and Ethernet MAC addresses are different.  It would probably be good to keep those even after the new firmware image is flashed.  Note that the PSID stays the same.  I believe it is possible to change an adapter card from a ConnectX-3 to a ConnectX-3 Pro by flashing different images into it.  But we do not need to do that here.&lt;br /&gt;
&lt;br /&gt;
Now, let&#039;s make a backup of what is in the card:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 ri backup_$(date -Iseconds)_2.36.5000.bin&#039;&#039;&#039;&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;mstflint -i backup_2026-04-13T19\:58\:45+00\:00_2.36.5000.bin q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.36.5000&lt;br /&gt;
 FW Release Date:       26.1.2016&lt;br /&gt;
 MIC Version:           1.5.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 Product Version:       02.36.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
&lt;br /&gt;
Remove drivers from the running kernel and flash the new firmware image:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;lsmod | grep mlx&#039;&#039;&#039;&lt;br /&gt;
 mlx4_ib               262144  0&lt;br /&gt;
 ib_uverbs             204800  1 mlx4_ib&lt;br /&gt;
 mlx4_en               167936  0&lt;br /&gt;
 mlx4_core             442368  2 mlx4_ib,mlx4_en&lt;br /&gt;
 ib_core               524288  2 mlx4_ib,ib_uverbs&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo modprobe -rv mlx4_ib mlx4_en mlx4_core&#039;&#039;&#039;&lt;br /&gt;
 rmmod mlx4_ib&lt;br /&gt;
 rmmod ib_uverbs&lt;br /&gt;
 rmmod mlx4_en&lt;br /&gt;
 rmmod mlx4_core&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 --guids f4521403002c5e00,f4521403002c5e01,f4521403002c5e02,f4521403002c5e03 --macs f452142c5e01,f452142c5e02 --image fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin burn&#039;&#039;&#039;&lt;br /&gt;
     You are about to change the Guids/Macs/Uids on the device:&lt;br /&gt;
 &lt;br /&gt;
                         New Values              Current Values&lt;br /&gt;
         Node  GUID:     f4521403002c5e00        f4521403002c5e00&lt;br /&gt;
         Port1 GUID:     f4521403002c5e01        f4521403002c5e01&lt;br /&gt;
         Port2 GUID:     f4521403002c5e02        f4521403002c5e02&lt;br /&gt;
         Sys.Image GUID: f4521403002c5e03        f4521403002c5e03&lt;br /&gt;
         Port1 MAC:          f452142c5e01            f452142c5e01&lt;br /&gt;
         Port2 MAC:          f452142c5e02            f452142c5e02&lt;br /&gt;
 &lt;br /&gt;
  Do you want to continue ? (y/n) [n] : &#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
     Current FW version on flash:  2.36.5000&lt;br /&gt;
     New FW version:               2.42.5000&lt;br /&gt;
 &lt;br /&gt;
 Burning FS2 FW image without signatures - OK  &lt;br /&gt;
 Restoring signature                     - OK&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
And query the card to check on the flashing:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.42.5000&lt;br /&gt;
 FW Version(Running):   2.36.5000&lt;br /&gt;
 FW Release Date:       5.9.2017&lt;br /&gt;
 MIC Version:           2.0.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 PRS Name:              cx3pro_MCX354A_fdr_09v.prs&lt;br /&gt;
 Product Version:       02.42.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.752&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
New code isn&#039;t running right now.  But there is an &amp;quot;image reactivate&amp;quot; operation that could have been performed along with the flashing.  Let&#039;s give that a go here:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 ir&#039;&#039;&#039;&lt;br /&gt;
 -E- Failed to execute image reactivation on device d8:00.0. Error: Operation not supported..&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &lt;br /&gt;
Hmmm.  A different tool, maybe?&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstfwreset -d d8:00.0 query&#039;&#039;&#039;&lt;br /&gt;
 -E- Unsupported Device: d8:00.0 (ConnectX3Pro).&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &lt;br /&gt;
Fine, be that way.  Halt the OS and power cycle the machine.  Grrrr.  Fast forward a bit (power cycle, OS start done) and we can check again:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 query full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.42.5000&lt;br /&gt;
 FW Release Date:       5.9.2017&lt;br /&gt;
 MIC Version:           2.0.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 PRS Name:              cx3pro_MCX354A_fdr_09v.prs&lt;br /&gt;
 Product Version:       02.42.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.752&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
So that is looking correct.  Yay!&lt;br /&gt;
&lt;br /&gt;
=== Set card mode ===&lt;br /&gt;
This server has a 2 port card installed.  And that card only has one Ethernet port right now.  At last as listed by &amp;lt;code&amp;gt;ip link list&amp;lt;/code&amp;gt;.  This seems to be a Linux kernel driver thing more than a hardware configuration thing, though:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstconfig -d d8:00.0 query&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Device #1:&lt;br /&gt;
 ----------&lt;br /&gt;
 &lt;br /&gt;
 Device type:    ConnectX3Pro    &lt;br /&gt;
 Device:         d8:00.0         &lt;br /&gt;
 &lt;br /&gt;
 Configurations:                              Next Boot&lt;br /&gt;
          SRIOV_EN                            True(1)         &lt;br /&gt;
          NUM_OF_VFS                          8               &lt;br /&gt;
          LINK_TYPE_P1                        VPI(3)          &lt;br /&gt;
          LINK_TYPE_P2                        VPI(3)          &lt;br /&gt;
          LOG_BAR_SIZE                        3               &lt;br /&gt;
          BOOT_PKEY_P1                        0               &lt;br /&gt;
          BOOT_PKEY_P2                        0               &lt;br /&gt;
          BOOT_OPTION_ROM_EN_P1               True(1)         &lt;br /&gt;
          BOOT_VLAN_EN_P1                     False(0)        &lt;br /&gt;
          BOOT_RETRY_CNT_P1                   0               &lt;br /&gt;
          LEGACY_BOOT_PROTOCOL_P1             PXE(1)          &lt;br /&gt;
          BOOT_VLAN_P1                        1               &lt;br /&gt;
          BOOT_OPTION_ROM_EN_P2               True(1)         &lt;br /&gt;
          BOOT_VLAN_EN_P2                     False(0)        &lt;br /&gt;
          BOOT_RETRY_CNT_P2                   0               &lt;br /&gt;
          LEGACY_BOOT_PROTOCOL_P2             PXE(1)          &lt;br /&gt;
          BOOT_VLAN_P2                        1               &lt;br /&gt;
          IP_VER_P1                           IPv4(0)         &lt;br /&gt;
          IP_VER_P2                           IPv4(0)         &lt;br /&gt;
          CQ_TIMESTAMP                        True(1)         &lt;br /&gt;
 itops@syadasti:~$&lt;br /&gt;
Note that both LINK_TYPEs are &amp;quot;VPI&amp;quot; which is Mellanox speak for &amp;quot;I&#039;m bilingual.  I will speak both Infiniband &#039;&#039;&#039;and&#039;&#039;&#039; Ethernet.&amp;quot;  But there&#039;s only one.  Let&#039;s set them both to Ethernet mode, reload the kernel drivers, and see what happens:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstconfig -d d8:00.0 --enable_verbosity set LINK_TYPE_P1=2 LINK_TYPE_P2=2&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Device #1:&lt;br /&gt;
 ----------&lt;br /&gt;
 &lt;br /&gt;
 Device type:    ConnectX3Pro    &lt;br /&gt;
 Device:         d8:00.0         &lt;br /&gt;
 &lt;br /&gt;
 Configurations:                              Default         Next Boot       New&lt;br /&gt;
          LINK_TYPE_P1                        VPI(3)          VPI(3)          ETH(2)          &lt;br /&gt;
          LINK_TYPE_P2                        VPI(3)          VPI(3)          ETH(2)          &lt;br /&gt;
 Device Firmware does not support reading current configurations&lt;br /&gt;
 &lt;br /&gt;
  Apply new Configuration? (y/n) [n] : &#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
 Applying... Done!&lt;br /&gt;
 -I- Please reboot machine to load new configurations.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo modprobe -rv mlx4_ib mlx4_en mlx4_core&#039;&#039;&#039;&lt;br /&gt;
 rmmod mlx4_ib&lt;br /&gt;
 rmmod ib_uverbs&lt;br /&gt;
 rmmod mlx4_en&lt;br /&gt;
 rmmod mlx4_core&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo modprobe -v mlx4_core&#039;&#039;&#039;&lt;br /&gt;
 insmod /lib/modules/6.12.73+deb13-amd64/kernel/drivers/net/ethernet/mellanox/mlx4/mlx4_core.ko.xz &lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
And now?  Well, we can see two Ethernet adapters in that PCI slot.  And their MAC addresses match what was set in the firmware flashing operation above, too:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;ip link list | grep ^[0-9]&#039;&#039;&#039;&lt;br /&gt;
 1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 2: eno5: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 3: eno6: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 4: ens1f0np0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 5: ens1f1np1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 6: ens1f2np2: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 7: ens1f3np3: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 8: eno1: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000&lt;br /&gt;
 9: eno2: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 12: enp216s0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 13: enp216s0d1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;ip link list dev enp216s0; ip link list dev enp216s0d1&#039;&#039;&#039;&lt;br /&gt;
 12: enp216s0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
     link/ether f4:52:14:2c:5e:01 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
     altname enxf452142c5e01&lt;br /&gt;
 13: enp216s0d1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
     link/ether f4:52:14:2c:5e:02 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
     altname enxf452142c5e02&lt;br /&gt;
 itops@syadasti:~$&lt;br /&gt;
Set link up, see what&#039;s on the other end:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo ip link set up enp216s0&#039;&#039;&#039;&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sleep 180&#039;&#039;&#039;&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo lldpcli show neighbors ports enp216s0&#039;&#039;&#039;&lt;br /&gt;
 -------------------------------------------------------------------------------&lt;br /&gt;
 LLDP neighbors:&lt;br /&gt;
 -------------------------------------------------------------------------------&lt;br /&gt;
 Interface:    enp216s0, via: LLDP, RID: 2, Time: 0 day, 00:05:43&lt;br /&gt;
   Chassis:     &lt;br /&gt;
     ChassisID:    mac 00:02:c9:6d:4f:30&lt;br /&gt;
     SysName:      mellanox-sx6036-rack-2&lt;br /&gt;
     SysDescr:     SX6036,MLNX-OS,SWv3.6.8012&lt;br /&gt;
     Capability:   Bridge, on&lt;br /&gt;
     Capability:   Router, off&lt;br /&gt;
   Port:        &lt;br /&gt;
     PortID:       ifname Eth1/4&lt;br /&gt;
     PortDescr:     &lt;br /&gt;
     TTL:          120&lt;br /&gt;
   Unknown TLVs:&lt;br /&gt;
     TLV:          OUI: 00,80,C2, SubType: 9, Len: 21 04,00,11,22,33,19,19,19,19,00,00,00,00,02,02,02,02,00,00,00,00&lt;br /&gt;
     TLV:          OUI: 00,80,C2, SubType: 10, Len: 21 00,00,11,22,33,19,19,19,19,00,00,00,00,02,02,02,02,00,00,00,00&lt;br /&gt;
     TLV:          OUI: 00,80,C2, SubType: 12, Len: 1 00&lt;br /&gt;
 -------------------------------------------------------------------------------&lt;br /&gt;
 itops@syadasti:~$&lt;br /&gt;
== Now what? ==&lt;br /&gt;
Now, it is an Ethernet card.  Treat it like any other.  Make bond interfaces.  And VLANed sub-interfaces.  Copy bits across it.  Have fun!&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1610</id>
		<title>Mellanox Infiniband HCA and/or Ethernet adapters</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1610"/>
		<updated>2026-04-13T21:32:50Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Set card mode */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I have a number of servers with ConnectX-3 cards to connect to various network infrastructure bits and bobs.  Recently (today) installed on in a Cisco UCS C220 M5 server and realized that I have made no notes about things that have been done to make the cards work.  Ooops.&lt;br /&gt;
&lt;br /&gt;
== ConnectX-3 cards ==&lt;br /&gt;
Several of these are deployed around the home network.  There are various models (pretty much all are ConnectX-3, though.)&lt;br /&gt;
&lt;br /&gt;
=== Finding card info ===&lt;br /&gt;
List out all Mellanox cards in a machine.  &amp;quot;15b3&amp;quot; is Mellanox&#039;s PCI vendor ID.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;lspci -d 15b3:&#039;&#039;&#039;&lt;br /&gt;
 d8:00.0 Network controller: Mellanox Technologies MT27520 Family [ConnectX-3 Pro]&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
First column of output is the PCI bus ID of the card.  This is used in the next bunch of commands.  Running with elevated privileges (under sudo) allows reading to the capabilities info.  That isn&#039;t really necessary for this step, but causes no harm.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo lspci -s d8:00.0 -vv&#039;&#039;&#039;&lt;br /&gt;
 d8:00.0 Network controller: Mellanox Technologies MT27520 Family [ConnectX-3 Pro]&lt;br /&gt;
         Subsystem: Mellanox Technologies Device 0003&lt;br /&gt;
         Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+&lt;br /&gt;
         Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast &amp;gt;TAbort- &amp;lt;TAbort- &amp;lt;MAbort- &amp;gt;SERR- &amp;lt;PERR- INTx-&lt;br /&gt;
         Latency: 0, Cache Line Size: 32 bytes&lt;br /&gt;
         Interrupt: pin A routed to IRQ 83&lt;br /&gt;
         NUMA node: 1&lt;br /&gt;
         IOMMU group: 20&lt;br /&gt;
         Region 0: Memory at fbe00000 (64-bit, non-prefetchable) [size=1M]&lt;br /&gt;
         Region 2: Memory at 4ffff800000 (64-bit, prefetchable) [size=8M]&lt;br /&gt;
         Expansion ROM at fbd00000 [disabled] [size=1M]&lt;br /&gt;
         Capabilities: [40] Power Management version 3&lt;br /&gt;
         Capabilities: [48] Vital Product Data&lt;br /&gt;
         Capabilities: [9c] MSI-X: Enable+ Count=128 Masked-&lt;br /&gt;
         Capabilities: [60] Express Endpoint, IntMsgNum 0&lt;br /&gt;
         Capabilities: [c0] Vendor Specific Information: Len=18 &amp;lt;?&amp;gt;&lt;br /&gt;
         Capabilities: [100] Alternative Routing-ID Interpretation (ARI)&lt;br /&gt;
         Capabilities: [148] Device Serial Number f4-52-14-03-00-2c-5e-00&lt;br /&gt;
         Capabilities: [108] Single Root I/O Virtualization (SR-IOV)&lt;br /&gt;
         Capabilities: [154] Advanced Error Reporting&lt;br /&gt;
         Capabilities: [18c] Secondary PCI Express&lt;br /&gt;
         Kernel driver in use: mlx4_core&lt;br /&gt;
         Kernel modules: mlx4_core&lt;br /&gt;
 &lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
Query the card to find out its code revision, Ethernet MAC address(es), Infiniband GUID(s), and the Mellanox Parameter Set ID (PSID).  This does need the elevated privileges provided by sudo:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.36.5000&lt;br /&gt;
 FW Release Date:       26.1.2016&lt;br /&gt;
 MIC Version:           1.5.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 Product Version:       02.36.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
&lt;br /&gt;
=== Where to get firmware images ===&lt;br /&gt;
See that PSID in the output from the &amp;lt;code&amp;gt;mstflint&amp;lt;/code&amp;gt; query operation?  We are running relase 2.36.5000 of the code in the ConnectX-3 chip on this card.  There are also code blobs for BIOS/UEFI that can be installed.&lt;br /&gt;
&lt;br /&gt;
nVidia bought Mellanox some years ago.  With that purchase, firmware images for switches and adapter cards can be found at https://network.nvidia.com/support/firmware/firmware-downloads/.  If it is not there in the future, try Duck-Duck-Going for something like &amp;quot;nVidia adapter card firmware download&amp;quot; until you find the right thing.  Today&#039;s card is a &amp;quot;ConnectX-3 Pro&amp;quot; (as seen in the output of &amp;lt;code&amp;gt;lspci -d 15b3:&amp;lt;/code&amp;gt;).  These cards came in Infiniband only and Ethernet+Infiniband (and maybe just Ethernet, too?) varieties.  Navigating through nVidia firmware download, I found a card with a matching PSID under the ConnectX-3 Pro Infiniband link.  PSID MT_1090111019 looks to go with a Mellanox MCX354A-FCCT (dual port) or MCX353A-FCCT (single port) adapter.  Download the corresponding ZIP archive from nVidia&#039;s site.  As this is written, that is https://www.mellanox.com/downloads/firmware/fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin.zip.&lt;br /&gt;
&lt;br /&gt;
=== Burning new firmwares ===&lt;br /&gt;
Unpack the just-downloaded ZIP file and find a .bin file inside.  And compare what is currently on the card with what is in the .bin file:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;diff -u --color &amp;lt;(sudo mstflint -d d8:00.0 q full) &amp;lt;(mstflint -i fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin q full) &#039;&#039;&#039;&lt;br /&gt;
 --- /dev/fd/63	2026-04-13 19:15:20.421912090 +0000&lt;br /&gt;
 +++ /dev/fd/62	2026-04-13 19:15:20.421912090 +0000&lt;br /&gt;
 @@ -1,13 +1,14 @@&lt;br /&gt;
  Image type:            FS2&lt;br /&gt;
 -FW Version:            2.36.5000&lt;br /&gt;
 -FW Release Date:       26.1.2016&lt;br /&gt;
 -MIC Version:           1.5.0&lt;br /&gt;
 +FW Version:            2.42.5000&lt;br /&gt;
 +FW Release Date:       5.9.2017&lt;br /&gt;
 +MIC Version:           2.0.0&lt;br /&gt;
  Config Sectors:        2&lt;br /&gt;
 -Product Version:       02.36.50.00&lt;br /&gt;
 -Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 +PRS Name:              cx3pro_MCX354A_fdr_09v.prs&lt;br /&gt;
 +Product Version:       02.42.50.00&lt;br /&gt;
 +Rom Info:              type=PXE version=3.4.752&lt;br /&gt;
  Device ID:             4103&lt;br /&gt;
  Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 -GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 -MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 -VSD:                   &lt;br /&gt;
 +GUIDs:                 0002c9000100d050 0002c9000100d051 0002c9000100d052 0002c9000100d050 &lt;br /&gt;
 +MACs:                                       0002c9000001     0002c9000002&lt;br /&gt;
 +VSD:                   n/a&lt;br /&gt;
  PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
Along with the firmware version numbers, we can see that the Infiniband GUIDs and Ethernet MAC addresses are different.  It would probably be good to keep those even after the new firmware image is flashed.  Note that the PSID stays the same.  I believe it is possible to change an adapter card from a ConnectX-3 to a ConnectX-3 Pro by flashing different images into it.  But we do not need to do that here.&lt;br /&gt;
&lt;br /&gt;
Now, let&#039;s make a backup of what is in the card:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 ri backup_$(date -Iseconds)_2.36.5000.bin&#039;&#039;&#039;&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;mstflint -i backup_2026-04-13T19\:58\:45+00\:00_2.36.5000.bin q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.36.5000&lt;br /&gt;
 FW Release Date:       26.1.2016&lt;br /&gt;
 MIC Version:           1.5.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 Product Version:       02.36.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
&lt;br /&gt;
Remove drivers from the running kernel and flash the new firmware image:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;lsmod | grep mlx&#039;&#039;&#039;&lt;br /&gt;
 mlx4_ib               262144  0&lt;br /&gt;
 ib_uverbs             204800  1 mlx4_ib&lt;br /&gt;
 mlx4_en               167936  0&lt;br /&gt;
 mlx4_core             442368  2 mlx4_ib,mlx4_en&lt;br /&gt;
 ib_core               524288  2 mlx4_ib,ib_uverbs&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo modprobe -rv mlx4_ib mlx4_en mlx4_core&#039;&#039;&#039;&lt;br /&gt;
 rmmod mlx4_ib&lt;br /&gt;
 rmmod ib_uverbs&lt;br /&gt;
 rmmod mlx4_en&lt;br /&gt;
 rmmod mlx4_core&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 --guids f4521403002c5e00,f4521403002c5e01,f4521403002c5e02,f4521403002c5e03 --macs f452142c5e01,f452142c5e02 --image fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin burn&#039;&#039;&#039;&lt;br /&gt;
     You are about to change the Guids/Macs/Uids on the device:&lt;br /&gt;
 &lt;br /&gt;
                         New Values              Current Values&lt;br /&gt;
         Node  GUID:     f4521403002c5e00        f4521403002c5e00&lt;br /&gt;
         Port1 GUID:     f4521403002c5e01        f4521403002c5e01&lt;br /&gt;
         Port2 GUID:     f4521403002c5e02        f4521403002c5e02&lt;br /&gt;
         Sys.Image GUID: f4521403002c5e03        f4521403002c5e03&lt;br /&gt;
         Port1 MAC:          f452142c5e01            f452142c5e01&lt;br /&gt;
         Port2 MAC:          f452142c5e02            f452142c5e02&lt;br /&gt;
 &lt;br /&gt;
  Do you want to continue ? (y/n) [n] : &#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
     Current FW version on flash:  2.36.5000&lt;br /&gt;
     New FW version:               2.42.5000&lt;br /&gt;
 &lt;br /&gt;
 Burning FS2 FW image without signatures - OK  &lt;br /&gt;
 Restoring signature                     - OK&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
And query the card to check on the flashing:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.42.5000&lt;br /&gt;
 FW Version(Running):   2.36.5000&lt;br /&gt;
 FW Release Date:       5.9.2017&lt;br /&gt;
 MIC Version:           2.0.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 PRS Name:              cx3pro_MCX354A_fdr_09v.prs&lt;br /&gt;
 Product Version:       02.42.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.752&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
New code isn&#039;t running right now.  But there is an &amp;quot;image reactivate&amp;quot; operation that could have been performed along with the flashing.  Let&#039;s give that a go here:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 ir&#039;&#039;&#039;&lt;br /&gt;
 -E- Failed to execute image reactivation on device d8:00.0. Error: Operation not supported..&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &lt;br /&gt;
Hmmm.  A different tool, maybe?&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstfwreset -d d8:00.0 query&#039;&#039;&#039;&lt;br /&gt;
 -E- Unsupported Device: d8:00.0 (ConnectX3Pro).&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &lt;br /&gt;
Fine, be that way.  Halt the OS and power cycle the machine.  Grrrr.  Fast forward a bit (power cycle, OS start done) and we can check again:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 query full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.42.5000&lt;br /&gt;
 FW Release Date:       5.9.2017&lt;br /&gt;
 MIC Version:           2.0.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 PRS Name:              cx3pro_MCX354A_fdr_09v.prs&lt;br /&gt;
 Product Version:       02.42.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.752&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
So that is looking correct.  Yay!&lt;br /&gt;
&lt;br /&gt;
=== Set card mode ===&lt;br /&gt;
This server has a 2 port card installed.  And that card only has one Ethernet port right now.  At last as listed by &amp;lt;code&amp;gt;ip link list&amp;lt;/code&amp;gt;.  This seems to be a Linux kernel driver thing more than a hardware configuration thing, though:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstconfig -d d8:00.0 query&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Device #1:&lt;br /&gt;
 ----------&lt;br /&gt;
 &lt;br /&gt;
 Device type:    ConnectX3Pro    &lt;br /&gt;
 Device:         d8:00.0         &lt;br /&gt;
 &lt;br /&gt;
 Configurations:                              Next Boot&lt;br /&gt;
          SRIOV_EN                            True(1)         &lt;br /&gt;
          NUM_OF_VFS                          8               &lt;br /&gt;
          LINK_TYPE_P1                        VPI(3)          &lt;br /&gt;
          LINK_TYPE_P2                        VPI(3)          &lt;br /&gt;
          LOG_BAR_SIZE                        3               &lt;br /&gt;
          BOOT_PKEY_P1                        0               &lt;br /&gt;
          BOOT_PKEY_P2                        0               &lt;br /&gt;
          BOOT_OPTION_ROM_EN_P1               True(1)         &lt;br /&gt;
          BOOT_VLAN_EN_P1                     False(0)        &lt;br /&gt;
          BOOT_RETRY_CNT_P1                   0               &lt;br /&gt;
          LEGACY_BOOT_PROTOCOL_P1             PXE(1)          &lt;br /&gt;
          BOOT_VLAN_P1                        1               &lt;br /&gt;
          BOOT_OPTION_ROM_EN_P2               True(1)         &lt;br /&gt;
          BOOT_VLAN_EN_P2                     False(0)        &lt;br /&gt;
          BOOT_RETRY_CNT_P2                   0               &lt;br /&gt;
          LEGACY_BOOT_PROTOCOL_P2             PXE(1)          &lt;br /&gt;
          BOOT_VLAN_P2                        1               &lt;br /&gt;
          IP_VER_P1                           IPv4(0)         &lt;br /&gt;
          IP_VER_P2                           IPv4(0)         &lt;br /&gt;
          CQ_TIMESTAMP                        True(1)         &lt;br /&gt;
 itops@syadasti:~$&lt;br /&gt;
Note that both LINK_TYPEs are &amp;quot;VPI&amp;quot; which is Mellanox speak for &amp;quot;I&#039;m bilingual.  I will speak both Infiniband &#039;&#039;&#039;and&#039;&#039;&#039; Ethernet.&amp;quot;  But there&#039;s only one.  Let&#039;s set them both to Ethernet mode, reload the kernel drivers, and see what happens:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstconfig -d d8:00.0 --enable_verbosity set LINK_TYPE_P1=2 LINK_TYPE_P2=2&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Device #1:&lt;br /&gt;
 ----------&lt;br /&gt;
 &lt;br /&gt;
 Device type:    ConnectX3Pro    &lt;br /&gt;
 Device:         d8:00.0         &lt;br /&gt;
 &lt;br /&gt;
 Configurations:                              Default         Next Boot       New&lt;br /&gt;
          LINK_TYPE_P1                        VPI(3)          VPI(3)          ETH(2)          &lt;br /&gt;
          LINK_TYPE_P2                        VPI(3)          VPI(3)          ETH(2)          &lt;br /&gt;
 Device Firmware does not support reading current configurations&lt;br /&gt;
 &lt;br /&gt;
  Apply new Configuration? (y/n) [n] : &#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
 Applying... Done!&lt;br /&gt;
 -I- Please reboot machine to load new configurations.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo modprobe -rv mlx4_ib mlx4_en mlx4_core&#039;&#039;&#039;&lt;br /&gt;
 rmmod mlx4_ib&lt;br /&gt;
 rmmod ib_uverbs&lt;br /&gt;
 rmmod mlx4_en&lt;br /&gt;
 rmmod mlx4_core&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo modprobe -v mlx4_core&#039;&#039;&#039;&lt;br /&gt;
 insmod /lib/modules/6.12.73+deb13-amd64/kernel/drivers/net/ethernet/mellanox/mlx4/mlx4_core.ko.xz &lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
And now?  Well, we can see two Ethernet adapters in that PCI slot.  And their MAC addresses match what was set in the firmware flashing operation above, too:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;ip link list | grep ^[0-9]&#039;&#039;&#039;&lt;br /&gt;
 1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 2: eno5: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 3: eno6: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 4: ens1f0np0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 5: ens1f1np1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 6: ens1f2np2: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 7: ens1f3np3: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 8: eno1: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000&lt;br /&gt;
 9: eno2: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 12: enp216s0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 13: enp216s0d1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;ip link list dev enp216s0; ip link list dev enp216s0d1&#039;&#039;&#039;&lt;br /&gt;
 12: enp216s0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
     link/ether f4:52:14:2c:5e:01 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
     altname enxf452142c5e01&lt;br /&gt;
 13: enp216s0d1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
     link/ether f4:52:14:2c:5e:02 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
     altname enxf452142c5e02&lt;br /&gt;
 itops@syadasti:~$&lt;br /&gt;
Set link up, see what&#039;s on the other end:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo ip link set up enp216s0&#039;&#039;&#039;&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sleep 180&#039;&#039;&#039;&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo lldpcli show neighbors ports enp216s0&#039;&#039;&#039;&lt;br /&gt;
 -------------------------------------------------------------------------------&lt;br /&gt;
 LLDP neighbors:&lt;br /&gt;
 -------------------------------------------------------------------------------&lt;br /&gt;
 Interface:    enp216s0, via: LLDP, RID: 2, Time: 0 day, 00:05:43&lt;br /&gt;
   Chassis:     &lt;br /&gt;
     ChassisID:    mac 00:02:c9:6d:4f:30&lt;br /&gt;
     SysName:      mellanox-sx6036-rack-2&lt;br /&gt;
     SysDescr:     SX6036,MLNX-OS,SWv3.6.8012&lt;br /&gt;
     Capability:   Bridge, on&lt;br /&gt;
     Capability:   Router, off&lt;br /&gt;
   Port:        &lt;br /&gt;
     PortID:       ifname Eth1/4&lt;br /&gt;
     PortDescr:     &lt;br /&gt;
     TTL:          120&lt;br /&gt;
   Unknown TLVs:&lt;br /&gt;
     TLV:          OUI: 00,80,C2, SubType: 9, Len: 21 04,00,11,22,33,19,19,19,19,00,00,00,00,02,02,02,02,00,00,00,00&lt;br /&gt;
     TLV:          OUI: 00,80,C2, SubType: 10, Len: 21 00,00,11,22,33,19,19,19,19,00,00,00,00,02,02,02,02,00,00,00,00&lt;br /&gt;
     TLV:          OUI: 00,80,C2, SubType: 12, Len: 1 00&lt;br /&gt;
 -------------------------------------------------------------------------------&lt;br /&gt;
 itops@syadasti:~$&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1609</id>
		<title>Mellanox Infiniband HCA and/or Ethernet adapters</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1609"/>
		<updated>2026-04-13T21:23:49Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Set card mode */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I have a number of servers with ConnectX-3 cards to connect to various network infrastructure bits and bobs.  Recently (today) installed on in a Cisco UCS C220 M5 server and realized that I have made no notes about things that have been done to make the cards work.  Ooops.&lt;br /&gt;
&lt;br /&gt;
== ConnectX-3 cards ==&lt;br /&gt;
Several of these are deployed around the home network.  There are various models (pretty much all are ConnectX-3, though.)&lt;br /&gt;
&lt;br /&gt;
=== Finding card info ===&lt;br /&gt;
List out all Mellanox cards in a machine.  &amp;quot;15b3&amp;quot; is Mellanox&#039;s PCI vendor ID.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;lspci -d 15b3:&#039;&#039;&#039;&lt;br /&gt;
 d8:00.0 Network controller: Mellanox Technologies MT27520 Family [ConnectX-3 Pro]&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
First column of output is the PCI bus ID of the card.  This is used in the next bunch of commands.  Running with elevated privileges (under sudo) allows reading to the capabilities info.  That isn&#039;t really necessary for this step, but causes no harm.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo lspci -s d8:00.0 -vv&#039;&#039;&#039;&lt;br /&gt;
 d8:00.0 Network controller: Mellanox Technologies MT27520 Family [ConnectX-3 Pro]&lt;br /&gt;
         Subsystem: Mellanox Technologies Device 0003&lt;br /&gt;
         Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+&lt;br /&gt;
         Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast &amp;gt;TAbort- &amp;lt;TAbort- &amp;lt;MAbort- &amp;gt;SERR- &amp;lt;PERR- INTx-&lt;br /&gt;
         Latency: 0, Cache Line Size: 32 bytes&lt;br /&gt;
         Interrupt: pin A routed to IRQ 83&lt;br /&gt;
         NUMA node: 1&lt;br /&gt;
         IOMMU group: 20&lt;br /&gt;
         Region 0: Memory at fbe00000 (64-bit, non-prefetchable) [size=1M]&lt;br /&gt;
         Region 2: Memory at 4ffff800000 (64-bit, prefetchable) [size=8M]&lt;br /&gt;
         Expansion ROM at fbd00000 [disabled] [size=1M]&lt;br /&gt;
         Capabilities: [40] Power Management version 3&lt;br /&gt;
         Capabilities: [48] Vital Product Data&lt;br /&gt;
         Capabilities: [9c] MSI-X: Enable+ Count=128 Masked-&lt;br /&gt;
         Capabilities: [60] Express Endpoint, IntMsgNum 0&lt;br /&gt;
         Capabilities: [c0] Vendor Specific Information: Len=18 &amp;lt;?&amp;gt;&lt;br /&gt;
         Capabilities: [100] Alternative Routing-ID Interpretation (ARI)&lt;br /&gt;
         Capabilities: [148] Device Serial Number f4-52-14-03-00-2c-5e-00&lt;br /&gt;
         Capabilities: [108] Single Root I/O Virtualization (SR-IOV)&lt;br /&gt;
         Capabilities: [154] Advanced Error Reporting&lt;br /&gt;
         Capabilities: [18c] Secondary PCI Express&lt;br /&gt;
         Kernel driver in use: mlx4_core&lt;br /&gt;
         Kernel modules: mlx4_core&lt;br /&gt;
 &lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
Query the card to find out its code revision, Ethernet MAC address(es), Infiniband GUID(s), and the Mellanox Parameter Set ID (PSID).  This does need the elevated privileges provided by sudo:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.36.5000&lt;br /&gt;
 FW Release Date:       26.1.2016&lt;br /&gt;
 MIC Version:           1.5.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 Product Version:       02.36.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
&lt;br /&gt;
=== Where to get firmware images ===&lt;br /&gt;
See that PSID in the output from the &amp;lt;code&amp;gt;mstflint&amp;lt;/code&amp;gt; query operation?  We are running relase 2.36.5000 of the code in the ConnectX-3 chip on this card.  There are also code blobs for BIOS/UEFI that can be installed.&lt;br /&gt;
&lt;br /&gt;
nVidia bought Mellanox some years ago.  With that purchase, firmware images for switches and adapter cards can be found at https://network.nvidia.com/support/firmware/firmware-downloads/.  If it is not there in the future, try Duck-Duck-Going for something like &amp;quot;nVidia adapter card firmware download&amp;quot; until you find the right thing.  Today&#039;s card is a &amp;quot;ConnectX-3 Pro&amp;quot; (as seen in the output of &amp;lt;code&amp;gt;lspci -d 15b3:&amp;lt;/code&amp;gt;).  These cards came in Infiniband only and Ethernet+Infiniband (and maybe just Ethernet, too?) varieties.  Navigating through nVidia firmware download, I found a card with a matching PSID under the ConnectX-3 Pro Infiniband link.  PSID MT_1090111019 looks to go with a Mellanox MCX354A-FCCT (dual port) or MCX353A-FCCT (single port) adapter.  Download the corresponding ZIP archive from nVidia&#039;s site.  As this is written, that is https://www.mellanox.com/downloads/firmware/fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin.zip.&lt;br /&gt;
&lt;br /&gt;
=== Burning new firmwares ===&lt;br /&gt;
Unpack the just-downloaded ZIP file and find a .bin file inside.  And compare what is currently on the card with what is in the .bin file:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;diff -u --color &amp;lt;(sudo mstflint -d d8:00.0 q full) &amp;lt;(mstflint -i fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin q full) &#039;&#039;&#039;&lt;br /&gt;
 --- /dev/fd/63	2026-04-13 19:15:20.421912090 +0000&lt;br /&gt;
 +++ /dev/fd/62	2026-04-13 19:15:20.421912090 +0000&lt;br /&gt;
 @@ -1,13 +1,14 @@&lt;br /&gt;
  Image type:            FS2&lt;br /&gt;
 -FW Version:            2.36.5000&lt;br /&gt;
 -FW Release Date:       26.1.2016&lt;br /&gt;
 -MIC Version:           1.5.0&lt;br /&gt;
 +FW Version:            2.42.5000&lt;br /&gt;
 +FW Release Date:       5.9.2017&lt;br /&gt;
 +MIC Version:           2.0.0&lt;br /&gt;
  Config Sectors:        2&lt;br /&gt;
 -Product Version:       02.36.50.00&lt;br /&gt;
 -Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 +PRS Name:              cx3pro_MCX354A_fdr_09v.prs&lt;br /&gt;
 +Product Version:       02.42.50.00&lt;br /&gt;
 +Rom Info:              type=PXE version=3.4.752&lt;br /&gt;
  Device ID:             4103&lt;br /&gt;
  Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 -GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 -MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 -VSD:                   &lt;br /&gt;
 +GUIDs:                 0002c9000100d050 0002c9000100d051 0002c9000100d052 0002c9000100d050 &lt;br /&gt;
 +MACs:                                       0002c9000001     0002c9000002&lt;br /&gt;
 +VSD:                   n/a&lt;br /&gt;
  PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
Along with the firmware version numbers, we can see that the Infiniband GUIDs and Ethernet MAC addresses are different.  It would probably be good to keep those even after the new firmware image is flashed.  Note that the PSID stays the same.  I believe it is possible to change an adapter card from a ConnectX-3 to a ConnectX-3 Pro by flashing different images into it.  But we do not need to do that here.&lt;br /&gt;
&lt;br /&gt;
Now, let&#039;s make a backup of what is in the card:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 ri backup_$(date -Iseconds)_2.36.5000.bin&#039;&#039;&#039;&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;mstflint -i backup_2026-04-13T19\:58\:45+00\:00_2.36.5000.bin q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.36.5000&lt;br /&gt;
 FW Release Date:       26.1.2016&lt;br /&gt;
 MIC Version:           1.5.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 Product Version:       02.36.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
&lt;br /&gt;
Remove drivers from the running kernel and flash the new firmware image:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;lsmod | grep mlx&#039;&#039;&#039;&lt;br /&gt;
 mlx4_ib               262144  0&lt;br /&gt;
 ib_uverbs             204800  1 mlx4_ib&lt;br /&gt;
 mlx4_en               167936  0&lt;br /&gt;
 mlx4_core             442368  2 mlx4_ib,mlx4_en&lt;br /&gt;
 ib_core               524288  2 mlx4_ib,ib_uverbs&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo modprobe -rv mlx4_ib mlx4_en mlx4_core&#039;&#039;&#039;&lt;br /&gt;
 rmmod mlx4_ib&lt;br /&gt;
 rmmod ib_uverbs&lt;br /&gt;
 rmmod mlx4_en&lt;br /&gt;
 rmmod mlx4_core&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 --guids f4521403002c5e00,f4521403002c5e01,f4521403002c5e02,f4521403002c5e03 --macs f452142c5e01,f452142c5e02 --image fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin burn&#039;&#039;&#039;&lt;br /&gt;
     You are about to change the Guids/Macs/Uids on the device:&lt;br /&gt;
 &lt;br /&gt;
                         New Values              Current Values&lt;br /&gt;
         Node  GUID:     f4521403002c5e00        f4521403002c5e00&lt;br /&gt;
         Port1 GUID:     f4521403002c5e01        f4521403002c5e01&lt;br /&gt;
         Port2 GUID:     f4521403002c5e02        f4521403002c5e02&lt;br /&gt;
         Sys.Image GUID: f4521403002c5e03        f4521403002c5e03&lt;br /&gt;
         Port1 MAC:          f452142c5e01            f452142c5e01&lt;br /&gt;
         Port2 MAC:          f452142c5e02            f452142c5e02&lt;br /&gt;
 &lt;br /&gt;
  Do you want to continue ? (y/n) [n] : &#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
     Current FW version on flash:  2.36.5000&lt;br /&gt;
     New FW version:               2.42.5000&lt;br /&gt;
 &lt;br /&gt;
 Burning FS2 FW image without signatures - OK  &lt;br /&gt;
 Restoring signature                     - OK&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
And query the card to check on the flashing:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.42.5000&lt;br /&gt;
 FW Version(Running):   2.36.5000&lt;br /&gt;
 FW Release Date:       5.9.2017&lt;br /&gt;
 MIC Version:           2.0.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 PRS Name:              cx3pro_MCX354A_fdr_09v.prs&lt;br /&gt;
 Product Version:       02.42.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.752&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
New code isn&#039;t running right now.  But there is an &amp;quot;image reactivate&amp;quot; operation that could have been performed along with the flashing.  Let&#039;s give that a go here:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 ir&#039;&#039;&#039;&lt;br /&gt;
 -E- Failed to execute image reactivation on device d8:00.0. Error: Operation not supported..&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &lt;br /&gt;
Hmmm.  A different tool, maybe?&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstfwreset -d d8:00.0 query&#039;&#039;&#039;&lt;br /&gt;
 -E- Unsupported Device: d8:00.0 (ConnectX3Pro).&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &lt;br /&gt;
Fine, be that way.  Halt the OS and power cycle the machine.  Grrrr.  Fast forward a bit (power cycle, OS start done) and we can check again:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 query full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.42.5000&lt;br /&gt;
 FW Release Date:       5.9.2017&lt;br /&gt;
 MIC Version:           2.0.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 PRS Name:              cx3pro_MCX354A_fdr_09v.prs&lt;br /&gt;
 Product Version:       02.42.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.752&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
So that is looking correct.  Yay!&lt;br /&gt;
&lt;br /&gt;
=== Set card mode ===&lt;br /&gt;
This server has a 2 port card installed.  And that card only has one Ethernet port right now.  At last as listed by &amp;lt;code&amp;gt;ip link list&amp;lt;/code&amp;gt;.  This seems to be a Linux kernel driver thing more than a hardware configuration thing, though:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstconfig -d d8:00.0 query&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Device #1:&lt;br /&gt;
 ----------&lt;br /&gt;
 &lt;br /&gt;
 Device type:    ConnectX3Pro    &lt;br /&gt;
 Device:         d8:00.0         &lt;br /&gt;
 &lt;br /&gt;
 Configurations:                              Next Boot&lt;br /&gt;
          SRIOV_EN                            True(1)         &lt;br /&gt;
          NUM_OF_VFS                          8               &lt;br /&gt;
          LINK_TYPE_P1                        VPI(3)          &lt;br /&gt;
          LINK_TYPE_P2                        VPI(3)          &lt;br /&gt;
          LOG_BAR_SIZE                        3               &lt;br /&gt;
          BOOT_PKEY_P1                        0               &lt;br /&gt;
          BOOT_PKEY_P2                        0               &lt;br /&gt;
          BOOT_OPTION_ROM_EN_P1               True(1)         &lt;br /&gt;
          BOOT_VLAN_EN_P1                     False(0)        &lt;br /&gt;
          BOOT_RETRY_CNT_P1                   0               &lt;br /&gt;
          LEGACY_BOOT_PROTOCOL_P1             PXE(1)          &lt;br /&gt;
          BOOT_VLAN_P1                        1               &lt;br /&gt;
          BOOT_OPTION_ROM_EN_P2               True(1)         &lt;br /&gt;
          BOOT_VLAN_EN_P2                     False(0)        &lt;br /&gt;
          BOOT_RETRY_CNT_P2                   0               &lt;br /&gt;
          LEGACY_BOOT_PROTOCOL_P2             PXE(1)          &lt;br /&gt;
          BOOT_VLAN_P2                        1               &lt;br /&gt;
          IP_VER_P1                           IPv4(0)         &lt;br /&gt;
          IP_VER_P2                           IPv4(0)         &lt;br /&gt;
          CQ_TIMESTAMP                        True(1)         &lt;br /&gt;
 itops@syadasti:~$&lt;br /&gt;
Note that both LINK_TYPEs are &amp;quot;VPI&amp;quot; which is Mellanox speak for &amp;quot;I&#039;m bilingual.  I will speak both Infiniband &#039;&#039;&#039;and&#039;&#039;&#039; Ethernet.&amp;quot;  But there&#039;s only one.  Let&#039;s set them both to Ethernet mode, reload the kernel drivers, and see what happens:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstconfig -d d8:00.0 --enable_verbosity set LINK_TYPE_P1=2 LINK_TYPE_P2=2&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Device #1:&lt;br /&gt;
 ----------&lt;br /&gt;
 &lt;br /&gt;
 Device type:    ConnectX3Pro    &lt;br /&gt;
 Device:         d8:00.0         &lt;br /&gt;
 &lt;br /&gt;
 Configurations:                              Default         Next Boot       New&lt;br /&gt;
          LINK_TYPE_P1                        VPI(3)          VPI(3)          ETH(2)          &lt;br /&gt;
          LINK_TYPE_P2                        VPI(3)          VPI(3)          ETH(2)          &lt;br /&gt;
 Device Firmware does not support reading current configurations&lt;br /&gt;
 &lt;br /&gt;
  Apply new Configuration? (y/n) [n] : &#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
 Applying... Done!&lt;br /&gt;
 -I- Please reboot machine to load new configurations.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo modprobe -rv mlx4_ib mlx4_en mlx4_core&#039;&#039;&#039;&lt;br /&gt;
 rmmod mlx4_ib&lt;br /&gt;
 rmmod ib_uverbs&lt;br /&gt;
 rmmod mlx4_en&lt;br /&gt;
 rmmod mlx4_core&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo modprobe -v mlx4_core&#039;&#039;&#039;&lt;br /&gt;
 insmod /lib/modules/6.12.73+deb13-amd64/kernel/drivers/net/ethernet/mellanox/mlx4/mlx4_core.ko.xz &lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
And now?  Well, we can see two Ethernet adapters in that PCI slot.  And their MAC addresses match what was set in the firmware flashing operation above, too:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;ip link list | grep ^[0-9]&#039;&#039;&#039;&lt;br /&gt;
 1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 2: eno5: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 3: eno6: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 4: ens1f0np0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 5: ens1f1np1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 6: ens1f2np2: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 7: ens1f3np3: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 8: eno1: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000&lt;br /&gt;
 9: eno2: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 12: enp216s0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 13: enp216s0d1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;ip link list dev enp216s0; ip link list dev enp216s0d1&#039;&#039;&#039;&lt;br /&gt;
 12: enp216s0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
     link/ether f4:52:14:2c:5e:01 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
     altname enxf452142c5e01&lt;br /&gt;
 13: enp216s0d1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000&lt;br /&gt;
     link/ether f4:52:14:2c:5e:02 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
     altname enxf452142c5e02&lt;br /&gt;
 itops@syadasti:~$&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1608</id>
		<title>Mellanox Infiniband HCA and/or Ethernet adapters</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1608"/>
		<updated>2026-04-13T20:50:53Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Burning new firmwares */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I have a number of servers with ConnectX-3 cards to connect to various network infrastructure bits and bobs.  Recently (today) installed on in a Cisco UCS C220 M5 server and realized that I have made no notes about things that have been done to make the cards work.  Ooops.&lt;br /&gt;
&lt;br /&gt;
== ConnectX-3 cards ==&lt;br /&gt;
Several of these are deployed around the home network.  There are various models (pretty much all are ConnectX-3, though.)&lt;br /&gt;
&lt;br /&gt;
=== Finding card info ===&lt;br /&gt;
List out all Mellanox cards in a machine.  &amp;quot;15b3&amp;quot; is Mellanox&#039;s PCI vendor ID.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;lspci -d 15b3:&#039;&#039;&#039;&lt;br /&gt;
 d8:00.0 Network controller: Mellanox Technologies MT27520 Family [ConnectX-3 Pro]&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
First column of output is the PCI bus ID of the card.  This is used in the next bunch of commands.  Running with elevated privileges (under sudo) allows reading to the capabilities info.  That isn&#039;t really necessary for this step, but causes no harm.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo lspci -s d8:00.0 -vv&#039;&#039;&#039;&lt;br /&gt;
 d8:00.0 Network controller: Mellanox Technologies MT27520 Family [ConnectX-3 Pro]&lt;br /&gt;
         Subsystem: Mellanox Technologies Device 0003&lt;br /&gt;
         Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+&lt;br /&gt;
         Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast &amp;gt;TAbort- &amp;lt;TAbort- &amp;lt;MAbort- &amp;gt;SERR- &amp;lt;PERR- INTx-&lt;br /&gt;
         Latency: 0, Cache Line Size: 32 bytes&lt;br /&gt;
         Interrupt: pin A routed to IRQ 83&lt;br /&gt;
         NUMA node: 1&lt;br /&gt;
         IOMMU group: 20&lt;br /&gt;
         Region 0: Memory at fbe00000 (64-bit, non-prefetchable) [size=1M]&lt;br /&gt;
         Region 2: Memory at 4ffff800000 (64-bit, prefetchable) [size=8M]&lt;br /&gt;
         Expansion ROM at fbd00000 [disabled] [size=1M]&lt;br /&gt;
         Capabilities: [40] Power Management version 3&lt;br /&gt;
         Capabilities: [48] Vital Product Data&lt;br /&gt;
         Capabilities: [9c] MSI-X: Enable+ Count=128 Masked-&lt;br /&gt;
         Capabilities: [60] Express Endpoint, IntMsgNum 0&lt;br /&gt;
         Capabilities: [c0] Vendor Specific Information: Len=18 &amp;lt;?&amp;gt;&lt;br /&gt;
         Capabilities: [100] Alternative Routing-ID Interpretation (ARI)&lt;br /&gt;
         Capabilities: [148] Device Serial Number f4-52-14-03-00-2c-5e-00&lt;br /&gt;
         Capabilities: [108] Single Root I/O Virtualization (SR-IOV)&lt;br /&gt;
         Capabilities: [154] Advanced Error Reporting&lt;br /&gt;
         Capabilities: [18c] Secondary PCI Express&lt;br /&gt;
         Kernel driver in use: mlx4_core&lt;br /&gt;
         Kernel modules: mlx4_core&lt;br /&gt;
 &lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
Query the card to find out its code revision, Ethernet MAC address(es), Infiniband GUID(s), and the Mellanox Parameter Set ID (PSID).  This does need the elevated privileges provided by sudo:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.36.5000&lt;br /&gt;
 FW Release Date:       26.1.2016&lt;br /&gt;
 MIC Version:           1.5.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 Product Version:       02.36.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
&lt;br /&gt;
=== Where to get firmware images ===&lt;br /&gt;
See that PSID in the output from the &amp;lt;code&amp;gt;mstflint&amp;lt;/code&amp;gt; query operation?  We are running relase 2.36.5000 of the code in the ConnectX-3 chip on this card.  There are also code blobs for BIOS/UEFI that can be installed.&lt;br /&gt;
&lt;br /&gt;
nVidia bought Mellanox some years ago.  With that purchase, firmware images for switches and adapter cards can be found at https://network.nvidia.com/support/firmware/firmware-downloads/.  If it is not there in the future, try Duck-Duck-Going for something like &amp;quot;nVidia adapter card firmware download&amp;quot; until you find the right thing.  Today&#039;s card is a &amp;quot;ConnectX-3 Pro&amp;quot; (as seen in the output of &amp;lt;code&amp;gt;lspci -d 15b3:&amp;lt;/code&amp;gt;).  These cards came in Infiniband only and Ethernet+Infiniband (and maybe just Ethernet, too?) varieties.  Navigating through nVidia firmware download, I found a card with a matching PSID under the ConnectX-3 Pro Infiniband link.  PSID MT_1090111019 looks to go with a Mellanox MCX354A-FCCT (dual port) or MCX353A-FCCT (single port) adapter.  Download the corresponding ZIP archive from nVidia&#039;s site.  As this is written, that is https://www.mellanox.com/downloads/firmware/fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin.zip.&lt;br /&gt;
&lt;br /&gt;
=== Burning new firmwares ===&lt;br /&gt;
Unpack the just-downloaded ZIP file and find a .bin file inside.  And compare what is currently on the card with what is in the .bin file:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;diff -u --color &amp;lt;(sudo mstflint -d d8:00.0 q full) &amp;lt;(mstflint -i fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin q full) &#039;&#039;&#039;&lt;br /&gt;
 --- /dev/fd/63	2026-04-13 19:15:20.421912090 +0000&lt;br /&gt;
 +++ /dev/fd/62	2026-04-13 19:15:20.421912090 +0000&lt;br /&gt;
 @@ -1,13 +1,14 @@&lt;br /&gt;
  Image type:            FS2&lt;br /&gt;
 -FW Version:            2.36.5000&lt;br /&gt;
 -FW Release Date:       26.1.2016&lt;br /&gt;
 -MIC Version:           1.5.0&lt;br /&gt;
 +FW Version:            2.42.5000&lt;br /&gt;
 +FW Release Date:       5.9.2017&lt;br /&gt;
 +MIC Version:           2.0.0&lt;br /&gt;
  Config Sectors:        2&lt;br /&gt;
 -Product Version:       02.36.50.00&lt;br /&gt;
 -Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 +PRS Name:              cx3pro_MCX354A_fdr_09v.prs&lt;br /&gt;
 +Product Version:       02.42.50.00&lt;br /&gt;
 +Rom Info:              type=PXE version=3.4.752&lt;br /&gt;
  Device ID:             4103&lt;br /&gt;
  Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 -GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 -MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 -VSD:                   &lt;br /&gt;
 +GUIDs:                 0002c9000100d050 0002c9000100d051 0002c9000100d052 0002c9000100d050 &lt;br /&gt;
 +MACs:                                       0002c9000001     0002c9000002&lt;br /&gt;
 +VSD:                   n/a&lt;br /&gt;
  PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
Along with the firmware version numbers, we can see that the Infiniband GUIDs and Ethernet MAC addresses are different.  It would probably be good to keep those even after the new firmware image is flashed.  Note that the PSID stays the same.  I believe it is possible to change an adapter card from a ConnectX-3 to a ConnectX-3 Pro by flashing different images into it.  But we do not need to do that here.&lt;br /&gt;
&lt;br /&gt;
Now, let&#039;s make a backup of what is in the card:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 ri backup_$(date -Iseconds)_2.36.5000.bin&#039;&#039;&#039;&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;mstflint -i backup_2026-04-13T19\:58\:45+00\:00_2.36.5000.bin q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.36.5000&lt;br /&gt;
 FW Release Date:       26.1.2016&lt;br /&gt;
 MIC Version:           1.5.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 Product Version:       02.36.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
&lt;br /&gt;
Remove drivers from the running kernel and flash the new firmware image:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;lsmod | grep mlx&#039;&#039;&#039;&lt;br /&gt;
 mlx4_ib               262144  0&lt;br /&gt;
 ib_uverbs             204800  1 mlx4_ib&lt;br /&gt;
 mlx4_en               167936  0&lt;br /&gt;
 mlx4_core             442368  2 mlx4_ib,mlx4_en&lt;br /&gt;
 ib_core               524288  2 mlx4_ib,ib_uverbs&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo modprobe -rv mlx4_ib mlx4_en mlx4_core&#039;&#039;&#039;&lt;br /&gt;
 rmmod mlx4_ib&lt;br /&gt;
 rmmod ib_uverbs&lt;br /&gt;
 rmmod mlx4_en&lt;br /&gt;
 rmmod mlx4_core&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 --guids f4521403002c5e00,f4521403002c5e01,f4521403002c5e02,f4521403002c5e03 --macs f452142c5e01,f452142c5e02 --image fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin burn&#039;&#039;&#039;&lt;br /&gt;
     You are about to change the Guids/Macs/Uids on the device:&lt;br /&gt;
 &lt;br /&gt;
                         New Values              Current Values&lt;br /&gt;
         Node  GUID:     f4521403002c5e00        f4521403002c5e00&lt;br /&gt;
         Port1 GUID:     f4521403002c5e01        f4521403002c5e01&lt;br /&gt;
         Port2 GUID:     f4521403002c5e02        f4521403002c5e02&lt;br /&gt;
         Sys.Image GUID: f4521403002c5e03        f4521403002c5e03&lt;br /&gt;
         Port1 MAC:          f452142c5e01            f452142c5e01&lt;br /&gt;
         Port2 MAC:          f452142c5e02            f452142c5e02&lt;br /&gt;
 &lt;br /&gt;
  Do you want to continue ? (y/n) [n] : &#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
     Current FW version on flash:  2.36.5000&lt;br /&gt;
     New FW version:               2.42.5000&lt;br /&gt;
 &lt;br /&gt;
 Burning FS2 FW image without signatures - OK  &lt;br /&gt;
 Restoring signature                     - OK&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
And query the card to check on the flashing:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.42.5000&lt;br /&gt;
 FW Version(Running):   2.36.5000&lt;br /&gt;
 FW Release Date:       5.9.2017&lt;br /&gt;
 MIC Version:           2.0.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 PRS Name:              cx3pro_MCX354A_fdr_09v.prs&lt;br /&gt;
 Product Version:       02.42.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.752&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$&lt;br /&gt;
New code isn&#039;t running right now.  But there is an &amp;quot;image reactivate&amp;quot; operation that could have been performed along with the flashing.  Let&#039;s give that a go here:&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 ir&#039;&#039;&#039;&lt;br /&gt;
 -E- Failed to execute image reactivation on device d8:00.0. Error: Operation not supported..&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &lt;br /&gt;
Hmmm.  A different tool, maybe?&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &#039;&#039;&#039;sudo mstfwreset -d d8:00.0 query&#039;&#039;&#039;&lt;br /&gt;
 -E- Unsupported Device: d8:00.0 (ConnectX3Pro).&lt;br /&gt;
 itops@syadasti:~/Mlnx-HCA-Firmware$ &lt;br /&gt;
Fine, be that way.  Halt the OS and power cycle the machine.  Grrrr.  Fast forward a bit (power cycle, OS start done) and we can check again:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 query full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.42.5000&lt;br /&gt;
 FW Release Date:       5.9.2017&lt;br /&gt;
 MIC Version:           2.0.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 PRS Name:              cx3pro_MCX354A_fdr_09v.prs&lt;br /&gt;
 Product Version:       02.42.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.752&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
So that is looking correct.  Yay!&lt;br /&gt;
&lt;br /&gt;
=== Set card mode ===&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1607</id>
		<title>Mellanox Infiniband HCA and/or Ethernet adapters</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1607"/>
		<updated>2026-04-13T19:13:18Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Where to get firmware images */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I have a number of servers with ConnectX-3 cards to connect to various network infrastructure bits and bobs.  Recently (today) installed on in a Cisco UCS C220 M5 server and realized that I have made no notes about things that have been done to make the cards work.  Ooops.&lt;br /&gt;
&lt;br /&gt;
== ConnectX-3 cards ==&lt;br /&gt;
Several of these are deployed around the home network.  There are various models (pretty much all are ConnectX-3, though.)&lt;br /&gt;
&lt;br /&gt;
=== Finding card info ===&lt;br /&gt;
List out all Mellanox cards in a machine.  &amp;quot;15b3&amp;quot; is Mellanox&#039;s PCI vendor ID.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;lspci -d 15b3:&#039;&#039;&#039;&lt;br /&gt;
 d8:00.0 Network controller: Mellanox Technologies MT27520 Family [ConnectX-3 Pro]&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
First column of output is the PCI bus ID of the card.  This is used in the next bunch of commands.  Running with elevated privileges (under sudo) allows reading to the capabilities info.  That isn&#039;t really necessary for this step, but causes no harm.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo lspci -s d8:00.0 -vv&#039;&#039;&#039;&lt;br /&gt;
 d8:00.0 Network controller: Mellanox Technologies MT27520 Family [ConnectX-3 Pro]&lt;br /&gt;
         Subsystem: Mellanox Technologies Device 0003&lt;br /&gt;
         Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+&lt;br /&gt;
         Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast &amp;gt;TAbort- &amp;lt;TAbort- &amp;lt;MAbort- &amp;gt;SERR- &amp;lt;PERR- INTx-&lt;br /&gt;
         Latency: 0, Cache Line Size: 32 bytes&lt;br /&gt;
         Interrupt: pin A routed to IRQ 83&lt;br /&gt;
         NUMA node: 1&lt;br /&gt;
         IOMMU group: 20&lt;br /&gt;
         Region 0: Memory at fbe00000 (64-bit, non-prefetchable) [size=1M]&lt;br /&gt;
         Region 2: Memory at 4ffff800000 (64-bit, prefetchable) [size=8M]&lt;br /&gt;
         Expansion ROM at fbd00000 [disabled] [size=1M]&lt;br /&gt;
         Capabilities: [40] Power Management version 3&lt;br /&gt;
         Capabilities: [48] Vital Product Data&lt;br /&gt;
         Capabilities: [9c] MSI-X: Enable+ Count=128 Masked-&lt;br /&gt;
         Capabilities: [60] Express Endpoint, IntMsgNum 0&lt;br /&gt;
         Capabilities: [c0] Vendor Specific Information: Len=18 &amp;lt;?&amp;gt;&lt;br /&gt;
         Capabilities: [100] Alternative Routing-ID Interpretation (ARI)&lt;br /&gt;
         Capabilities: [148] Device Serial Number f4-52-14-03-00-2c-5e-00&lt;br /&gt;
         Capabilities: [108] Single Root I/O Virtualization (SR-IOV)&lt;br /&gt;
         Capabilities: [154] Advanced Error Reporting&lt;br /&gt;
         Capabilities: [18c] Secondary PCI Express&lt;br /&gt;
         Kernel driver in use: mlx4_core&lt;br /&gt;
         Kernel modules: mlx4_core&lt;br /&gt;
 &lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
Query the card to find out its code revision, Ethernet MAC address(es), Infiniband GUID(s), and the Mellanox Parameter Set ID (PSID).  This does need the elevated privileges provided by sudo:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.36.5000&lt;br /&gt;
 FW Release Date:       26.1.2016&lt;br /&gt;
 MIC Version:           1.5.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 Product Version:       02.36.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
&lt;br /&gt;
=== Where to get firmware images ===&lt;br /&gt;
See that PSID in the output from the &amp;lt;code&amp;gt;mstflint&amp;lt;/code&amp;gt; query operation?  We are running relase 2.36.5000 of the code in the ConnectX-3 chip on this card.  There are also code blobs for BIOS/UEFI that can be installed.&lt;br /&gt;
&lt;br /&gt;
nVidia bought Mellanox some years ago.  With that purchase, firmware images for switches and adapter cards can be found at https://network.nvidia.com/support/firmware/firmware-downloads/.  If it is not there in the future, try Duck-Duck-Going for something like &amp;quot;nVidia adapter card firmware download&amp;quot; until you find the right thing.  Today&#039;s card is a &amp;quot;ConnectX-3 Pro&amp;quot; (as seen in the output of &amp;lt;code&amp;gt;lspci -d 15b3:&amp;lt;/code&amp;gt;).  These cards came in Infiniband only and Ethernet+Infiniband (and maybe just Ethernet, too?) varieties.  Navigating through nVidia firmware download, I found a card with a matching PSID under the ConnectX-3 Pro Infiniband link.  PSID MT_1090111019 looks to go with a Mellanox MCX354A-FCCT (dual port) or MCX353A-FCCT (single port) adapter.  Download the corresponding ZIP archive from nVidia&#039;s site.  As this is written, that is https://www.mellanox.com/downloads/firmware/fw-ConnectX3Pro-rel-2_42_5000-MCX354A-FCC_Ax-FlexBoot-3.4.752.bin.zip.&lt;br /&gt;
&lt;br /&gt;
=== Burning new firmwares ===&lt;br /&gt;
=== Set card mode ===&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1606</id>
		<title>Mellanox Infiniband HCA and/or Ethernet adapters</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1606"/>
		<updated>2026-04-13T18:42:18Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* ConnectX-3 cards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I have a number of servers with ConnectX-3 cards to connect to various network infrastructure bits and bobs.  Recently (today) installed on in a Cisco UCS C220 M5 server and realized that I have made no notes about things that have been done to make the cards work.  Ooops.&lt;br /&gt;
&lt;br /&gt;
== ConnectX-3 cards ==&lt;br /&gt;
Several of these are deployed around the home network.  There are various models (pretty much all are ConnectX-3, though.)&lt;br /&gt;
&lt;br /&gt;
=== Finding card info ===&lt;br /&gt;
List out all Mellanox cards in a machine.  &amp;quot;15b3&amp;quot; is Mellanox&#039;s PCI vendor ID.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;lspci -d 15b3:&#039;&#039;&#039;&lt;br /&gt;
 d8:00.0 Network controller: Mellanox Technologies MT27520 Family [ConnectX-3 Pro]&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
First column of output is the PCI bus ID of the card.  This is used in the next bunch of commands.  Running with elevated privileges (under sudo) allows reading to the capabilities info.  That isn&#039;t really necessary for this step, but causes no harm.&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo lspci -s d8:00.0 -vv&#039;&#039;&#039;&lt;br /&gt;
 d8:00.0 Network controller: Mellanox Technologies MT27520 Family [ConnectX-3 Pro]&lt;br /&gt;
         Subsystem: Mellanox Technologies Device 0003&lt;br /&gt;
         Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+&lt;br /&gt;
         Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast &amp;gt;TAbort- &amp;lt;TAbort- &amp;lt;MAbort- &amp;gt;SERR- &amp;lt;PERR- INTx-&lt;br /&gt;
         Latency: 0, Cache Line Size: 32 bytes&lt;br /&gt;
         Interrupt: pin A routed to IRQ 83&lt;br /&gt;
         NUMA node: 1&lt;br /&gt;
         IOMMU group: 20&lt;br /&gt;
         Region 0: Memory at fbe00000 (64-bit, non-prefetchable) [size=1M]&lt;br /&gt;
         Region 2: Memory at 4ffff800000 (64-bit, prefetchable) [size=8M]&lt;br /&gt;
         Expansion ROM at fbd00000 [disabled] [size=1M]&lt;br /&gt;
         Capabilities: [40] Power Management version 3&lt;br /&gt;
         Capabilities: [48] Vital Product Data&lt;br /&gt;
         Capabilities: [9c] MSI-X: Enable+ Count=128 Masked-&lt;br /&gt;
         Capabilities: [60] Express Endpoint, IntMsgNum 0&lt;br /&gt;
         Capabilities: [c0] Vendor Specific Information: Len=18 &amp;lt;?&amp;gt;&lt;br /&gt;
         Capabilities: [100] Alternative Routing-ID Interpretation (ARI)&lt;br /&gt;
         Capabilities: [148] Device Serial Number f4-52-14-03-00-2c-5e-00&lt;br /&gt;
         Capabilities: [108] Single Root I/O Virtualization (SR-IOV)&lt;br /&gt;
         Capabilities: [154] Advanced Error Reporting&lt;br /&gt;
         Capabilities: [18c] Secondary PCI Express&lt;br /&gt;
         Kernel driver in use: mlx4_core&lt;br /&gt;
         Kernel modules: mlx4_core&lt;br /&gt;
 &lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
Query the card to find out its code revision, Ethernet MAC address(es), Infiniband GUID(s), and the Mellanox Parameter Set ID (PSID).  This does need the elevated privileges provided by sudo:&lt;br /&gt;
 itops@syadasti:~$ &#039;&#039;&#039;sudo mstflint -d d8:00.0 q full&#039;&#039;&#039;&lt;br /&gt;
 Image type:            FS2&lt;br /&gt;
 FW Version:            2.36.5000&lt;br /&gt;
 FW Release Date:       26.1.2016&lt;br /&gt;
 MIC Version:           1.5.0&lt;br /&gt;
 Config Sectors:        2&lt;br /&gt;
 Product Version:       02.36.50.00&lt;br /&gt;
 Rom Info:              type=PXE version=3.4.718&lt;br /&gt;
 Device ID:             4103&lt;br /&gt;
 Description:           Node             Port1            Port2            Sys image&lt;br /&gt;
 GUIDs:                 f4521403002c5e00 f4521403002c5e01 f4521403002c5e02 f4521403002c5e03 &lt;br /&gt;
 MACs:                                       f452142c5e01     f452142c5e02&lt;br /&gt;
 VSD:                   &lt;br /&gt;
 PSID:                  MT_1090111019&lt;br /&gt;
 itops@syadasti:~$ &lt;br /&gt;
&lt;br /&gt;
=== Where to get firmware images ===&lt;br /&gt;
=== Burning new firmwares ===&lt;br /&gt;
=== Set card mode ===&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1605</id>
		<title>Mellanox Infiniband HCA and/or Ethernet adapters</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_Infiniband_HCA_and/or_Ethernet_adapters&amp;diff=1605"/>
		<updated>2026-04-13T03:15:41Z</updated>

		<summary type="html">&lt;p&gt;Adj: Created page with &amp;quot;I have a number of servers with ConnectX-3 cards to connect to various network infrastructure bits and bobs.  Recently (today) installed on in a Cisco UCS C220 M5 server and realized that I have made no notes about things that have been done to make the cards work.  Ooops.  == ConnectX-3 cards ==  === Finding card info === === Where to get firmware images === === Burning new firmwares === === Set card mode ===&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I have a number of servers with ConnectX-3 cards to connect to various network infrastructure bits and bobs.  Recently (today) installed on in a Cisco UCS C220 M5 server and realized that I have made no notes about things that have been done to make the cards work.  Ooops.&lt;br /&gt;
&lt;br /&gt;
== ConnectX-3 cards ==&lt;br /&gt;
&lt;br /&gt;
=== Finding card info ===&lt;br /&gt;
=== Where to get firmware images ===&lt;br /&gt;
=== Burning new firmwares ===&lt;br /&gt;
=== Set card mode ===&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Main_Page&amp;diff=1604</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Main_Page&amp;diff=1604"/>
		<updated>2026-04-13T03:04:28Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* FnordNet infrastructure */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Consult the [http://meta.wikimedia.org/wiki/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
&lt;br /&gt;
== Ceph education events ==&lt;br /&gt;
[https://sofree.us// Software Freedom School] is keen to learn more about [https://ceph.com Ceph].  As such, I&#039;ve been encouraged to cook up a group education session on the topic.  See the [[work in progress sofree.us 2025Q3 Ceph handson]] thoughts.&lt;br /&gt;
&lt;br /&gt;
== Other Ceph things ==&lt;br /&gt;
* [[Rotating applications&#039; Ceph S3 credentials]]&lt;br /&gt;
* [[Ceph performance metrics]]&lt;br /&gt;
&lt;br /&gt;
== Recreational Shooting Events ==&lt;br /&gt;
* [[ Dec 2022 Vedauwoo ]]&lt;br /&gt;
* [[ Mar 2023 Vedauwoo ]]&lt;br /&gt;
* [[ Jun 2023 Birthday and Bullets ]]&lt;br /&gt;
&lt;br /&gt;
== Vehicular Conveyances ==&lt;br /&gt;
* [[ 1997 Lexus LX 450 176849 ]]&lt;br /&gt;
* [[ 2002 Honda CR-V ]]&lt;br /&gt;
* [[ 2012 Honda Pilot Touring ]]&lt;br /&gt;
&lt;br /&gt;
== Pictures with Shadow ==&lt;br /&gt;
[[ Pictures with Shadow ]]&lt;br /&gt;
&lt;br /&gt;
== Getting started ==&lt;br /&gt;
* [http://www.mediawiki.org/wiki/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [http://www.mediawiki.org/wiki/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/mailman/listinfo/mediawiki-announce MediaWiki release mailing list]&lt;br /&gt;
&lt;br /&gt;
== House Stuff ==&lt;br /&gt;
* [[The big ass list]]&lt;br /&gt;
&lt;br /&gt;
== IPv6 stuff ==&lt;br /&gt;
* [[IPv4_and_IPv6_compared | IPv4 and IPv6 compared]]&lt;br /&gt;
* [[IPv6_address_classes | IPv6 address classes]]&lt;br /&gt;
* [[where_to_get_a_tunnel | Where to get an IPv6 address ]]&lt;br /&gt;
&lt;br /&gt;
== DockStar stuff ==&lt;br /&gt;
* [[DockStar]]&lt;br /&gt;
&lt;br /&gt;
== PXE booting for BIOS udpates ==&lt;br /&gt;
* [[PXE_booting_for_BIOS_updates | PXE booting for BIOS updates]]&lt;br /&gt;
&lt;br /&gt;
== Ur-Quan masters ==&lt;br /&gt;
A port of Star Control II to Linux&lt;br /&gt;
* [[UQM | UQM]]&lt;br /&gt;
&lt;br /&gt;
== Dell PowerEdge servers ==&lt;br /&gt;
* [[ PowerEdge 1950 Debian install ]]&lt;br /&gt;
* [[ An incremental strategy for large amounts of storage ]]&lt;br /&gt;
* [[PowerEdge BMC updates with Debian]]&lt;br /&gt;
&lt;br /&gt;
== PA-RISC servers ==&lt;br /&gt;
* [[ Debian on an HP 9000 A500 ]]&lt;br /&gt;
* [[ rp2470/A500 related hardware ]]&lt;br /&gt;
&lt;br /&gt;
== Sun/Oracle servers ==&lt;br /&gt;
* [[T5140 ILOM reset ]]&lt;br /&gt;
* [[T5140 memory configuration]]&lt;br /&gt;
&lt;br /&gt;
== FnordNet infrastructure ==&lt;br /&gt;
* [[ 44th Avenue Data Center ]]&lt;br /&gt;
* [[ New new rack ]]&lt;br /&gt;
* [[ New Rack ]] (being decommissioned at present)&lt;br /&gt;
* [[ Rack ]] (retired)&lt;br /&gt;
* [[ Dell PowerConnect 2716 ]] 16-port Gigabit Ethernet switch&lt;br /&gt;
* [[ WRT54G ]] running OpenWRT&lt;br /&gt;
&amp;lt;!-- * [[ Aironet WAP ]] running IOS --&amp;gt;&lt;br /&gt;
* [[ Force10 S50 ]] Ethernet switches&lt;br /&gt;
* [[ Qlogic SANbox 2 ]] 16 port Fibre Channel switch&lt;br /&gt;
* [[ Disk partitioning miscellanea ]]&lt;br /&gt;
* [[ IPSEC ]]&lt;br /&gt;
* [[ Computer stuff shopping list ]]&lt;br /&gt;
* [[ discordichunk ]]&lt;br /&gt;
* [[ LTO labels ]]&lt;br /&gt;
* [[ AP9210 ]] network attached power switch&lt;br /&gt;
* [[ Infiniband ]]&lt;br /&gt;
* [[ Backups ]]&lt;br /&gt;
* [[ ZFS ]]&lt;br /&gt;
* [[ Headless Debian Installation ]]&lt;br /&gt;
* [[ Postfix+uucp+ssh | UNIX email when SMTP is blocked ]]&lt;br /&gt;
* [[ Big Mass Storage ]]&lt;br /&gt;
* [[ LeftHand Networks NSM 100 | creating something useful from a LeftHand Networks NSM 100 ]]&lt;br /&gt;
* Going [[ Hiveless ]] (Aerohive WiFi APs without cloud based management.&lt;br /&gt;
* [[ Watchguard_XTM_5 ]] firewall appliance running a non-Watchguard OS&lt;br /&gt;
* Dealing with[[ password-locked disks ]]&lt;br /&gt;
* A bare metal provisioning solution using OpenStack [[ Ironic-at-home ]]&lt;br /&gt;
* [[R630 configuration]]&lt;br /&gt;
* [[OpenWRT Aruba AP-303|2025 WiFi infrastructure]] on Aruba AP-303s running OpenWRT&lt;br /&gt;
* [[FibreChannel Storage]]&lt;br /&gt;
* A few notes about [[Supermicro servers]]&lt;br /&gt;
* [[ Powervault MD3060e ]] big ass JOBDs&lt;br /&gt;
* [[ Hardware inventory ]]&lt;br /&gt;
* [[ Backup and Recovery ]]&lt;br /&gt;
* [[ Notes on VM building ]]&lt;br /&gt;
* [[ IPv6 connectivity ]]&lt;br /&gt;
* [[ In transit data security ]] using EFF&#039;s Let&#039;s Encrypt, x509 certificates, and TLS&lt;br /&gt;
* [[ Cisco things ]]&lt;br /&gt;
* [[ Mellanox Infiniband HCA and/or Ethernet adapters ]]&lt;br /&gt;
&lt;br /&gt;
== VOIP stuff ==&lt;br /&gt;
* [[Asterisk Hardening]]&lt;br /&gt;
* [[Cisco 7905]]&lt;br /&gt;
* [[Polycom Handset]]&lt;br /&gt;
&lt;br /&gt;
== Miscellaneous hardware ==&lt;br /&gt;
* [[ Sun StorEdge T300 ]]&lt;br /&gt;
&lt;br /&gt;
== Imagination Station things ==&lt;br /&gt;
* [[ Photos of stuff ]]&lt;br /&gt;
&lt;br /&gt;
== Kendra&#039;s wedding trip photos ==&lt;br /&gt;
* [[ Kendra&#039;s wedding trip photos ]]&lt;br /&gt;
&lt;br /&gt;
== IT certifications and education ==&lt;br /&gt;
=== (ISC)2 ===&lt;br /&gt;
* [[ CISSP ]] Certified Information Systems Security Professional&lt;br /&gt;
&lt;br /&gt;
=== VMware ===&lt;br /&gt;
* [[ VCP5-DV ]] VMware Certified Professional for vSphere 5 Datacenter Virtualization&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
* [[ 70-413 ]] Designing and Implementing a Server Infrastructure&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
=== Oracle ===&lt;br /&gt;
&lt;br /&gt;
== Other interesting computer things ==&lt;br /&gt;
* [[Deconstructing chatiw]]&lt;br /&gt;
== Things in the big blue room ==&lt;br /&gt;
=== Sprinkler system at the house ===&lt;br /&gt;
Seven zones:&lt;br /&gt;
# [[Sprinkler Zone 1|Back yard, west end]]&lt;br /&gt;
# [[Sprinkler Zone 2|Back yard, west center]]&lt;br /&gt;
# [[Sprinkler Zone 3|Back yard, east center]]&lt;br /&gt;
# [[Sprinkler Zone 4|Back yard, east]]&lt;br /&gt;
# [[Sprinkler Zone 5|Back yard, northeast and east of driveway]]&lt;br /&gt;
# [[Sprinkler Zone 6|Front yard]]&lt;br /&gt;
# [[Sprinkler Zone 7|west side of house and front flower bed]]&lt;br /&gt;
=== Bent sticks ===&lt;br /&gt;
* Kids&#039; bows&lt;br /&gt;
** [[Bow 20140000]] Zeroth build.  For Ryker.&lt;br /&gt;
** [[Bow 20140001]] Oneth build.  For Nya.&lt;br /&gt;
&lt;br /&gt;
== Work related ==&lt;br /&gt;
* [[CU Norlin Library Linux training]]&lt;br /&gt;
&lt;br /&gt;
== OpenStack things ==&lt;br /&gt;
* [[ Terminating access to an OpenStack environment ]]&lt;br /&gt;
* [[ SNOWMAN | Do you want to build a snow man? ]]&lt;br /&gt;
&lt;br /&gt;
== random stuff ==&lt;br /&gt;
* [[ Gwenn | Entertainment ideas for Gwenn ]]&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_SX6036&amp;diff=1603</id>
		<title>Mellanox SX6036</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_SX6036&amp;diff=1603"/>
		<updated>2026-04-12T18:06:14Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Unlocking the bootloader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Console access ==&lt;br /&gt;
=== Serial port ===&lt;br /&gt;
There is an 8P8C modular (RJ45) connector on the right side of the port side of the switch.  This connector uses the Cisco pinout and a common Cisco console cable works great for driving it.&lt;br /&gt;
&lt;br /&gt;
Serial settings are 9600 bits per second, 8 data bits, no parity bits, 1 stop bit (9600 8N1)&lt;br /&gt;
&lt;br /&gt;
=== Default credentials ===&lt;br /&gt;
User &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Password &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== Resetting the password ===&lt;br /&gt;
In the lower left  corner of the port side of the switch, there is a small hole labelled &amp;quot;RST&amp;quot;.  Holding the button inside with a paperclip or similar tool for 15 seconds will reset the switch and erase any password set for the &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039; user.  &lt;br /&gt;
&lt;br /&gt;
== Firmware updates ==&lt;br /&gt;
Updating firmware on these switches is a protracted process.  Firmware images are available on the public internet, but some searching is required.  To bring a switch from a 3.2.&#039;&#039;x&#039;&#039; release up to the final 3.6.8012 release, locate the following images on the web and save them to an SSHable or HTTP(S)able location near you:&lt;br /&gt;
* image-PPC_M460EX-3.4.3002.img&lt;br /&gt;
* image-PPC_M460EX-3.5.1006.img&lt;br /&gt;
* image-PPC_M460EX-3.6.1002.img&lt;br /&gt;
* image-PPC_M460EX-3.6.8012.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.3.3400.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.3.5006.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.4.0012.img&lt;br /&gt;
&lt;br /&gt;
=== New firmware image flashing procedure ===&lt;br /&gt;
This is a privileged operation, so first off gain elevated privileges...&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;image fetch http://172.17.0.17/~adj/image-PPC_M460EX-SX_3.3.3400.img&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;image install image-PPC_M460EX-SX_3.3.3400.img location 2 progress track verify require-sig&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;reload&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Wait for U-Boot to prompt about a menu, and send a Ctrl-B before the countdown reaches 0.  Select option 2 (no need for a newline) to boot the newly flashed image.  Iterate through each of the newer images, alternating location 1 and location 2 in the &#039;&#039;&#039;&amp;lt;code&amp;gt;image install ...&amp;lt;/code&amp;gt;&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
When updates version installations are finally complete, it might be good to ensure that 3.6.8012 is flashed to both locations 1 and 2.&lt;br /&gt;
&lt;br /&gt;
== Useful CLI commands ==&lt;br /&gt;
&lt;br /&gt;
=== Find MAC address of 1000baseT management interface 0 ===&lt;br /&gt;
Good for setting up the DHCP server&#039;s config for this switch.  For some reason, this command needs elevated privileges.  Grrr.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show interfaces mgmt0 | include HW&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Find system serial number without reading the physical tag ===&lt;br /&gt;
This is useful for license key generation.  And inventory purposes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show inventory&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Find system host ID ===&lt;br /&gt;
Also can be used for license key generation.  Looks suspiciously like the mgmt0 MAC address...&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show version | include Host&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Licensing features ==&lt;br /&gt;
Mellanox&#039;s SwitchX2 ASIC is capable of performing Infiniband &#039;&#039;&#039;and&#039;&#039;&#039; Ethernet switching.  Mellanox the company likes to lock some of these features behind licensing keys.  Which is annoying.  But with enough effort, is a surmountable obstacle&lt;br /&gt;
&lt;br /&gt;
=== The license generation tool ===&lt;br /&gt;
Inside the MLNX-OS distribution images (those files with names like &#039;&#039;&#039;&amp;lt;code&amp;gt;image-PPC_M460EX-3.6.8012.img&amp;lt;/code&amp;gt;&#039;&#039;&#039;) there exists a gzipped tarball containing the MLNX-OS filesystem.  Inside the tarball is a directory called &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  And inside &#039;&#039;that&#039;&#039; directory, one can find the license key generation program, &#039;&#039;&#039;&amp;lt;code&amp;gt;genlicense&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  The MLNX-OS filesystem image is a PowerPC Linux distribution that can be run from a Qemu emulated big-endian PowerPC machine, or natively on big-endian PowerPC hardware.  We can use this to generate feature licenses until the cows come home.  &lt;br /&gt;
&lt;br /&gt;
=== Our first license, shell access from the switch CLI ===&lt;br /&gt;
There is a hidden CLI command, &#039;&#039;&#039;&amp;lt;code&amp;gt;_shell&amp;lt;/code&amp;gt;&#039;&#039;&#039; which will cause the CLI to &#039;&#039;&#039;&amp;lt;code&amp;gt;execve(&amp;quot;/bin/bash&amp;quot;, ...)&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  This command is privileged (must be run from enable mode) and locked behind a license key.  The following is a working CLI session to install a key for this feature:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &#039;&#039;&#039;passwordgoesherebutisnotechoed&#039;&#039;&#039;&lt;br /&gt;
 Last login: Sun Feb 19 23:25:30 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal &#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-RESTRICTED_CMDS_GEN2-88A1-NEWD-BPNB-1&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show licenses&#039;&#039;&#039;&lt;br /&gt;
 License 1: LK2-RESTRICTED_CMDS_GEN2-88A1-NEWD-BPNB-1&lt;br /&gt;
    Feature:          RESTRICTED_CMDS_GEN2&lt;br /&gt;
    Description:      Access to restricted system functionality&lt;br /&gt;
    Valid:            yes&lt;br /&gt;
    Active:           yes&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
=== Ethernet features: Ethernet, Ethernet L2, and Ethernet L3 ===&lt;br /&gt;
We will generate these from the switch as we already have shell access and can use the included genlicense tool.&lt;br /&gt;
&lt;br /&gt;
Running the following from the switch&#039;s shell will print a key for a non-hardware-locked, non-date-locked license to activate the switch&#039;s full Ethernet capabilities:&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 ~]# &#039;&#039;&#039;cd /opt/tms/bin&#039;&#039;&#039;&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 bin]# &#039;&#039;&#039;./genlicense 2 EFM_SX m2l0n%0x9 -o 53 true -o 51 true -o 58 true&#039;&#039;&#039;&lt;br /&gt;
 LK2-EFM_SX-5M11-5K11-5T11-88A1-BBD0-JP82-X&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 bin]#&lt;br /&gt;
&lt;br /&gt;
A quick explanatory diversion is in order here.  There are 2 types of keys.  genlicense&#039;s first option above specifies key type 2.  &#039;&#039;&#039;&amp;lt;code&amp;gt;EFM_SX&amp;lt;/code&amp;gt;&#039;&#039;&#039; is the &#039;&#039;&#039;&amp;lt;code&amp;gt;Generic SX license&amp;lt;/code&amp;gt;&#039;&#039;&#039; type.  By itself it does nothing, but all of the &#039;&#039;&#039;&amp;lt;code&amp;gt;-o&amp;lt;/code&amp;gt;&#039;&#039;&#039; flags specify further features to be activated.  A complete list of these can be generated by running &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin/genlicense 2&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  There are 14 of these additional options, and their meaning is not well documented.  The magic word &#039;&#039;&#039;&amp;lt;code&amp;gt;m2l0n%0x9&amp;lt;/code&amp;gt;&#039;&#039;&#039; can be found by watching for &#039;&#039;&#039;&amp;lt;code&amp;gt;strlen()&amp;lt;/code&amp;gt;&#039;&#039;&#039; calls in the process flow of &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin/dumplicense&amp;lt;/code&amp;gt;&#039;&#039;&#039; when run under &#039;&#039;&#039;&amp;lt;code&amp;gt;ltrace&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
And it can be installed in the switch&#039;s configuration database by leaving the shell (which will disconnect the terminal session), logging in again, running &#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039; to get elevated privileges, and using the &#039;&#039;&#039;&amp;lt;code&amp;gt;license install&amp;lt;/code&amp;gt;&#039;&#039;&#039; configuration command like so:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Last login: Sun Feb 19 23:31:51 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-EFM_SX-5M11-5K11-5T11-88A1-BBD0-JP82-X&#039;&#039;&#039;&lt;br /&gt;
 License was installed successfully. Please wait 1 minute before further configurations.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
== Switch configuration commands ==&lt;br /&gt;
Some of these things will need licenses first.&lt;br /&gt;
&lt;br /&gt;
=== I can haz Ethernet? ===&lt;br /&gt;
Install the Ethernet key as shown above and confirm it is working:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show system capabilities&#039;&#039;&#039;&lt;br /&gt;
 IB: Supported, L2, Adaptive Routing&lt;br /&gt;
 Ethernet: Supported, L2, L3&lt;br /&gt;
 GW: Not supported&lt;br /&gt;
 Max SM nodes: 648&lt;br /&gt;
 IB Max licensed speed: FDR10&lt;br /&gt;
 Ethernet Max licensed speed: 56Gb&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
It says we can do Ethernet.  Which is cool.  But it does not have the Infiniband-Ethernet gateway feature licensed.  And this is required to enable the switch to run in VPI mode.  VPI is &amp;quot;Virtual Protocol Interconnect&amp;quot; or Mellanox&#039;s way of saying &amp;quot;We can do Infiniband &#039;&#039;and&#039;&#039; Ethernet on a single switch.&amp;quot;  So another license is needed.  Here&#039;s a key for that:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-EFM_SX-5N21-488A-182A-UQXB-Y6&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show system capabilities &#039;&#039;&#039;&lt;br /&gt;
 IB: Supported, L2, Adaptive Routing&lt;br /&gt;
 Ethernet: Supported, L2, L3&lt;br /&gt;
 GW: Supported&lt;br /&gt;
 Max SM nodes: 648&lt;br /&gt;
 IB Max licensed speed: FDR10&lt;br /&gt;
 Ethernet Max licensed speed: 56Gb&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
We will need to do this next thing to convert the switch from an Infiniband-only switch to an Infiniband-and-Ethernet switch:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;system profile vpi-single-switch&#039;&#039;&#039;&lt;br /&gt;
 Warning - confirming will cause system reboot and all configuration will be deleted&lt;br /&gt;
 Type &#039;yes&#039; to confirm profile change: &#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
Allow time for the switch to reboot and log in again.  When it next starts up, run the command &#039;&#039;&#039;&amp;lt;code&amp;gt;show system profile&amp;lt;/code&amp;gt;&#039;&#039;&#039; to confirm that it is in VPI mode:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;show system profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Profile: vpi-single-switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt;&lt;br /&gt;
And finally, let&#039;s set some ports to Ethernet mode:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;show ports type&#039;&#039;&#039;&lt;br /&gt;
 InfiniBand: 1/1 1/2 1/3 1/4 1/5 1/6 1/7 1/8 1/9 1/10 1/11 1/12 1/13 1/14 1/15 1/16 1/17 1/18 1/19 1/20 1/21 1/22 1/23 1/24 1/25 1/26 1/27 1/28 1/29 1/30 1/31 1/32 1/33 1/34 1/35 1/36 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ib 1/19-1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ib 1/19-1/36) # &#039;&#039;&#039;shutdown&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ib 1/19-1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;port 1/19-1/36 type ethernet&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ethernet 1/19-1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/19-1/36) # &#039;&#039;&#039;no shutdown&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/19-1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show ports type&#039;&#039;&#039;&lt;br /&gt;
 Ethernet:   1/19 1/20 1/21 1/22 1/23 1/24 1/25 1/26 1/27 1/28 1/29 1/30 1/31 1/32 1/33 1/34 1/35 1/36 &lt;br /&gt;
 InfiniBand: 1/1 1/2 1/3 1/4 1/5 1/6 1/7 1/8 1/9 1/10 1/11 1/12 1/13 1/14 1/15 1/16 1/17 1/18 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
=== Switch management items ===&lt;br /&gt;
==== Password for the admin user ====&lt;br /&gt;
Factory defaults are probably not a good idea, so let&#039;s tighten things up a bit.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;username admin password &#039;&#039;the_password_goes_here&#039;&#039; &#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
&lt;br /&gt;
==== IP addressing for the management interface ====&lt;br /&gt;
The following will configure the switch to retrieve its IP address, subnet mask, router IP address, name server info, and hostname from DHCP server on the management interface&#039;s local network.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface mgmt0&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;dhcp&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;dhcp hostname&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
&lt;br /&gt;
==== NTP ====&lt;br /&gt;
Let&#039;s add a couple of NTP servers to the config and discipline our poorly behaved battery backed clock:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;ntp server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;ntp server 172.17.0.17&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 NTP is administratively            : enabled&lt;br /&gt;
 NTP Authentication administratively: disabled &lt;br /&gt;
 &lt;br /&gt;
 Clock is synchronized:&lt;br /&gt;
   Reference: 172.16.10.2&lt;br /&gt;
   Offset   : -0.006 ms&lt;br /&gt;
 &lt;br /&gt;
 Active servers and peers:&lt;br /&gt;
   172.16.10.2:&lt;br /&gt;
     Conf Type          : serv&lt;br /&gt;
     Status             : sys.peer(*)&lt;br /&gt;
     Stratum            : 3  &lt;br /&gt;
     Offset(msec)       : -0.006&lt;br /&gt;
     Ref clock          : 45.45.184.14   &lt;br /&gt;
     Poll Interval (sec): 64  &lt;br /&gt;
     Last Response (sec): 8   &lt;br /&gt;
     Auth state         : none    &lt;br /&gt;
 &lt;br /&gt;
   172.17.0.17:&lt;br /&gt;
     Conf Type          : serv&lt;br /&gt;
     Status             : pending    &lt;br /&gt;
     Stratum            : 2  &lt;br /&gt;
     Offset(msec)       : 0.429&lt;br /&gt;
     Ref clock          : 198.60.22.240  &lt;br /&gt;
     Poll Interval (sec): 64  &lt;br /&gt;
     Last Response (sec): 7   &lt;br /&gt;
     Auth state         : none    &lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
=== Ethernet goodies ===&lt;br /&gt;
==== LLDP ====&lt;br /&gt;
Turn it on and test it out like so:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;lldp&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp local&#039;&#039;&#039;&lt;br /&gt;
 LLDP: enabled&lt;br /&gt;
 &lt;br /&gt;
 Local global configuration&lt;br /&gt;
     Chassis sub type: Mac Address&lt;br /&gt;
     Chassis id: 00:02:c9:6d:4d:b0&lt;br /&gt;
     System Name: mellanox-sx6036-rack-1&lt;br /&gt;
     System Description: SX6036,MLNX-OS,SWv3.6.8012&lt;br /&gt;
     Supported capabilities: B,R             &lt;br /&gt;
     Supported capabilities enabled: B&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp interfaces ethernet 1/36&#039;&#039;&#039;&lt;br /&gt;
 TLV flags&lt;br /&gt;
     PD: port-description&lt;br /&gt;
     SN: sys-name        &lt;br /&gt;
     SD: sys-description &lt;br /&gt;
     SC: sys-capabilities&lt;br /&gt;
     MA: management-address&lt;br /&gt;
     ETS-C: ETS-Configuration&lt;br /&gt;
     ETS-R: ETS-Recommendation&lt;br /&gt;
     AP: Application Priority&lt;br /&gt;
     PFC: Priority Flow Control&lt;br /&gt;
     CEE: Converged Enhanced Ethernet DCBX version&lt;br /&gt;
     MED-CAP: Media Capabilities&lt;br /&gt;
     MED-NWP: MED-Network Policy&lt;br /&gt;
 &lt;br /&gt;
 -----------------------------------------------------------------------------------&lt;br /&gt;
 Interface    Receive   Transmit  TLVs                                              &lt;br /&gt;
 -----------------------------------------------------------------------------------&lt;br /&gt;
 Eth1/36      Enabled   Enabled   PD, SN, SD, SC, PFC, AP, ETS-C, ETS-R             &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp interfaces ethernet 1/36 remote&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Eth1/36&lt;br /&gt;
 &lt;br /&gt;
 Remote Index: 1&lt;br /&gt;
 Remote chassis id: cc:4e:24:83:4b:36 ; chassis id subtype: Mac Address (4)&lt;br /&gt;
 Remote port-id: cc:4e:24:83:4b:6c ; port id subtype: Mac Address (3)&lt;br /&gt;
 Remote port description: 40GigabitEthernet1/2/6&lt;br /&gt;
 Remote system name: brocade-icx6610-48p-rack-1&lt;br /&gt;
 Remote system description: Not Advertised&lt;br /&gt;
 Remote system capabilities supported: B,R  ; enabled B,R&lt;br /&gt;
 Remote Management Addresses:&lt;br /&gt;
 SubType        Address&lt;br /&gt;
 ------------------------------------&lt;br /&gt;
 IPv4        172.16.10.17&lt;br /&gt;
 &lt;br /&gt;
 No Remote PFC entry&lt;br /&gt;
 &lt;br /&gt;
 No Remote ETS entry&lt;br /&gt;
 &lt;br /&gt;
 No Remote Application Priority entry&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
And enjoy getting to know all the things about your neighbors.&lt;br /&gt;
==== Multiple Spanning Tree Protocol ====&lt;br /&gt;
Wherein we avoid broadcast loops.  Because they are bad, even if they do make for lots of blinken lights.&lt;br /&gt;
Our Brocade switches are running MSTP and, fortunately, MLNX-OS supports that on our SX6036es as well.&lt;br /&gt;
Setting the switch to MSTP mode is pretty simple:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;spanning-tree mode mst&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show spanning-tree&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Switch                     : ethernet-default&lt;br /&gt;
 Spanning tree protocol mst : enabled&lt;br /&gt;
 Spanning tree force version: 3&lt;br /&gt;
 &lt;br /&gt;
 Root ID:&lt;br /&gt;
   Priority           : 32768&lt;br /&gt;
   Address            : 00:02:c9:6d:4c:b0   &lt;br /&gt;
   Cost               : 0&lt;br /&gt;
   Port               : Eth1/36&lt;br /&gt;
   Hello Time (sec)   : 2&lt;br /&gt;
   Max Age (sec)      : 20&lt;br /&gt;
   Forward Delay (sec): 15&lt;br /&gt;
 &lt;br /&gt;
   MST00:&lt;br /&gt;
     Bridge is executing the mstp compatible Spanning Tree Protocol&lt;br /&gt;
 &lt;br /&gt;
 Bridge ID:&lt;br /&gt;
   Priority           : 32768&lt;br /&gt;
   Address            : 00:02:c9:6d:4d:b0   &lt;br /&gt;
   Hello Time (sec)   : 2&lt;br /&gt;
   Max Age (sec)      : 20&lt;br /&gt;
   Forward Delay (sec): 15&lt;br /&gt;
 &lt;br /&gt;
 L: Loop Inconsistent&lt;br /&gt;
 R: Root Inconsistent&lt;br /&gt;
 G: BPDU Guard Inconsistent&lt;br /&gt;
 &lt;br /&gt;
 --------------------------------------------------------------------------&lt;br /&gt;
 Interface         Role         Sts              Cost      Prio   Type     &lt;br /&gt;
 --------------------------------------------------------------------------&lt;br /&gt;
 Eth1/36           Root         Forwarding       500       128    normal   &lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
==== VLANs ====&lt;br /&gt;
Create our standard assortment of VLANs like so:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 10 name Management&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 10) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 100 name &amp;quot;WAN 0 (Comcast 44th Avenue)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 100) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 101 name &amp;quot;WAN 1 (Allo)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 101) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 102 name &amp;quot;WAN 2 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 102) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 103 name &amp;quot;WAN 3 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 103) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 104 name &amp;quot;WAN 4 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 104) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 105 name &amp;quot;WAN 5 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 105) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 106 name &amp;quot;WAN 6 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 106) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # vlan 107 &#039;&#039;&#039;name &amp;quot;WAN 7 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 107) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 108 name &amp;quot;WAN 8 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 108) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 109 name &amp;quot;WAN 9 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 109) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1000 name &amp;quot;Internal Services&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1000) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1001 name &amp;quot;Internal clients&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1001) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1002 name &amp;quot;Ceph front-end&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1002) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1003 name &amp;quot;Ceph back-end&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1003) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 3900 name &amp;quot;Guest network&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 3900) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show vlan&#039;&#039;&#039;&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 VLAN    Name                    Ports&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 1       default                 Eth1/19, Eth1/20, Eth1/21, Eth1/22, Eth1/23,&lt;br /&gt;
                                 Eth1/24, Eth1/25, Eth1/26, Eth1/27, Eth1/28,&lt;br /&gt;
                                 Eth1/29, Eth1/30, Eth1/31, Eth1/32, Eth1/33,&lt;br /&gt;
                                 Eth1/34, Eth1/35, Eth1/36&lt;br /&gt;
 10      Management              &lt;br /&gt;
 100     WAN 0 (Comcast 44th Avenue)&lt;br /&gt;
 101     WAN 1 (Allo)            &lt;br /&gt;
 102     WAN 2 (unused)          &lt;br /&gt;
 103     WAN 3 (unused)          &lt;br /&gt;
 104     WAN 4 (unused)          &lt;br /&gt;
 105     WAN 5 (unused)          &lt;br /&gt;
 106     WAN 6 (unused)          &lt;br /&gt;
 107     WAN 7 (unused)          &lt;br /&gt;
 108     WAN 8 (unused)          &lt;br /&gt;
 109     WAN 9 (unused)          &lt;br /&gt;
 1000    Internal Services       &lt;br /&gt;
 1001    Internal clients        &lt;br /&gt;
 1002    Ceph front-end          &lt;br /&gt;
 1003    Ceph back-end           &lt;br /&gt;
 3900    Guest network           &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
And now, to assign all those VLANs as tagged on port 1/36:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ethernet 1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport mode trunk&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan 10&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 100-109&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 1000-1003&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 3900&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show vlan&#039;&#039;&#039;&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 VLAN    Name                    Ports&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 1       default                 Eth1/19, Eth1/20, Eth1/21, Eth1/22, Eth1/23,&lt;br /&gt;
                                 Eth1/24, Eth1/25, Eth1/26, Eth1/27, Eth1/28,&lt;br /&gt;
                                 Eth1/29, Eth1/30, Eth1/31, Eth1/32, Eth1/33,&lt;br /&gt;
                                 Eth1/34, Eth1/35&lt;br /&gt;
 10      Management              Eth1/36&lt;br /&gt;
 100     WAN 0 (Comcast 44th Avenue)Eth1/36&lt;br /&gt;
 101     WAN 1 (Allo)            Eth1/36&lt;br /&gt;
 102     WAN 2 (unused)          Eth1/36&lt;br /&gt;
 103     WAN 3 (unused)          Eth1/36&lt;br /&gt;
 104     WAN 4 (unused)          Eth1/36&lt;br /&gt;
 105     WAN 5 (unused)          Eth1/36&lt;br /&gt;
 106     WAN 6 (unused)          Eth1/36&lt;br /&gt;
 107     WAN 7 (unused)          Eth1/36&lt;br /&gt;
 108     WAN 8 (unused)          Eth1/36&lt;br /&gt;
 109     WAN 9 (unused)          Eth1/36&lt;br /&gt;
 1000    Internal Services       Eth1/36&lt;br /&gt;
 1001    Internal clients        Eth1/36&lt;br /&gt;
 1002    Ceph front-end          Eth1/36&lt;br /&gt;
 1003    Ceph back-end           Eth1/36&lt;br /&gt;
 3900    Guest network           Eth1/36&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
== Unlocking the bootloader ==&lt;br /&gt;
When reset or just powered on, the SX6036&#039;s bootloader does preset the human on the console a 5 second countdown timer and an opportunity to choose some other options than loading the currently active software image:&lt;br /&gt;
 Mellanox MLNX-OS&lt;br /&gt;
 &lt;br /&gt;
 Default image: &#039;PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&#039;&lt;br /&gt;
 Press Enter to boot this image, or &#039;Ctrl B&#039; for boot menu&lt;br /&gt;
 &lt;br /&gt;
 Booting default image in:  0 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 Mellanox MLNX-OS Boot Menu:&lt;br /&gt;
 &lt;br /&gt;
 *  1: PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&lt;br /&gt;
    2: PPC_M460EX 3.6.8010 2018-08-20 18:04:16 ppc&lt;br /&gt;
    u: USB menu (if USB device connected) (password required)&lt;br /&gt;
    c: Command prompt (password required)&lt;br /&gt;
 &lt;br /&gt;
    Choice: &lt;br /&gt;
Irritatingly, I have been unable to locate the password required for command prompt access.  Fortunately, some kind denizens of the internet have shared a way to change (even remove!) this password from a running MLNX-OS.  I found this information at https://forums.servethehome.com/index.php?threads/solved-mellanox-sx6012-u-boot-password-removal-without-bash-access.33484/&lt;br /&gt;
&lt;br /&gt;
Let&#039;s record this for posterity:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Last login: Sun Apr 12 16:57:02 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] (config) # &#039;&#039;&#039;boot bootmgr password 7 &amp;quot;&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;show bootvar&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Installed images:&lt;br /&gt;
   Partition 1:&lt;br /&gt;
     version: PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&lt;br /&gt;
 &lt;br /&gt;
   Partition 2:&lt;br /&gt;
     version: PPC_M460EX 3.6.8010 2018-08-20 18:04:16 ppc&lt;br /&gt;
 &lt;br /&gt;
 Last boot partition             : 1&lt;br /&gt;
 Next boot partition             : 1&lt;br /&gt;
 Serve image files via HTTP/HTTPS: no&lt;br /&gt;
 &lt;br /&gt;
 No boot manager password is set.&lt;br /&gt;
 &lt;br /&gt;
 Image signing              : trusted signature always required&lt;br /&gt;
 Admin require signed images: yes&lt;br /&gt;
 &lt;br /&gt;
 Settings for next boot only:&lt;br /&gt;
   Fallback reboot on configuration failure: yes (default)&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &lt;br /&gt;
Note the line saying &amp;quot;No boot manager password is set.&amp;quot;  A switch that has not had this treatment will report &amp;quot;Boot manager password is set.&amp;quot; instead.&lt;br /&gt;
&lt;br /&gt;
First try was not successful, though.  I may continue poking at this again in the future.&lt;br /&gt;
=== Second attempt ===&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Last login: Sun Apr 12 17:37:09 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] &amp;gt; &#039;&#039;&#039;_shell&#039;&#039;&#039;&lt;br /&gt;
 % Unrecognized command &amp;quot;_shell&amp;quot;.&lt;br /&gt;
 Type &amp;quot;?&amp;quot; for help.&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;_shell&#039;&#039;&#039;&lt;br /&gt;
 [admin@mellanox-sx6036-rack-2 ~]# &#039;&#039;&#039;stty rows 25 columns 160&#039;&#039;&#039;&lt;br /&gt;
 [admin@mellanox-sx6036-rack-2 ~]# &#039;&#039;&#039;/opt/tms/bin/mddbreq /config/db/initial set modify - /system/bootmgr/password string &amp;quot;&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 [admin@mellanox-sx6036-rack-2 ~]# &#039;&#039;&#039;eetool -a bf -s UBPASSWD=&amp;quot;&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 [admin@mellanox-sx6036-rack-2 ~]# &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 logo&lt;br /&gt;
 &lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Last login: Sun Apr 12 17:56:18 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;show bootvar&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Installed images:&lt;br /&gt;
   Partition 1:&lt;br /&gt;
     version: PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&lt;br /&gt;
 &lt;br /&gt;
   Partition 2:&lt;br /&gt;
     version: PPC_M460EX 3.6.8010 2018-08-20 18:04:16 ppc&lt;br /&gt;
 &lt;br /&gt;
 Last boot partition             : 1&lt;br /&gt;
 Next boot partition             : 1&lt;br /&gt;
 Serve image files via HTTP/HTTPS: no&lt;br /&gt;
 &lt;br /&gt;
 No boot manager password is set.&lt;br /&gt;
 &lt;br /&gt;
 Image signing              : trusted signature always required&lt;br /&gt;
 Admin require signed images: yes&lt;br /&gt;
 &lt;br /&gt;
 Settings for next boot only:&lt;br /&gt;
   Fallback reboot on configuration failure: yes (default)&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] #&lt;br /&gt;
And this time, success!&lt;br /&gt;
 Mellanox MLNX-OS&lt;br /&gt;
 &lt;br /&gt;
 Default image: &#039;PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&#039;&lt;br /&gt;
 Press Enter to boot this image, or &#039;Ctrl B&#039; for boot menu&lt;br /&gt;
 &lt;br /&gt;
 Booting default image in:  0 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 Mellanox MLNX-OS Boot Menu:&lt;br /&gt;
 &lt;br /&gt;
 *  1: PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&lt;br /&gt;
    2: PPC_M460EX 3.6.8010 2018-08-20 18:04:16 ppc&lt;br /&gt;
    u: USB menu (if USB device connected)&lt;br /&gt;
    c: Command prompt&lt;br /&gt;
 &lt;br /&gt;
    Choice: &#039;&#039;&#039;c&#039;&#039;&#039;&lt;br /&gt;
 Entering command prompt&lt;br /&gt;
 =&amp;gt; &#039;&#039;&#039;?&#039;&#039;&#039;&lt;br /&gt;
 ?       - alias for &#039;help&#039;&lt;br /&gt;
 askenv  - get environment variables from stdin&lt;br /&gt;
 autoscr - run script from memory&lt;br /&gt;
 base	- print or set address offset&lt;br /&gt;
 bdinfo  - print Board Info structure&lt;br /&gt;
 boot    - boot default, i.e., run &#039;bootcmd&#039;&lt;br /&gt;
 bootd   - boot default, i.e., run &#039;bootcmd&#039;&lt;br /&gt;
 bootelf - Boot from an ELF image in memory&lt;br /&gt;
 bootm   - boot application image from memory&lt;br /&gt;
 bootmenu- Run boot menu&lt;br /&gt;
 bootp	- boot image via network using BOOTP/TFTP protocol&lt;br /&gt;
 bootstrap - program the I2C bootstrap EEPROM&lt;br /&gt;
 bootvx  - Boot vxWorks from an ELF image&lt;br /&gt;
 cmp	- memory compare&lt;br /&gt;
 coninfo - print console devices and information&lt;br /&gt;
 cp	- memory copy&lt;br /&gt;
 crc32	- checksum calculation&lt;br /&gt;
 dcache  - enable or disable data cache&lt;br /&gt;
 dhcp	- boot image via network using DHCP/TFTP protocol&lt;br /&gt;
 echo    - echo args to console&lt;br /&gt;
 eeprom  - EEPROM sub-system&lt;br /&gt;
 envreset- Reset the environment to the defaults&lt;br /&gt;
 erase   - erase FLASH memory&lt;br /&gt;
 exit    - exit script&lt;br /&gt;
 ext2load- load binary file from a Ext2 filesystem&lt;br /&gt;
 ext2ls  - list files in a directory (default /)&lt;br /&gt;
 fatinfo - print information about filesystem&lt;br /&gt;
 fatload - load binary file from a dos filesystem&lt;br /&gt;
 fatls   - list files in a directory (default /)&lt;br /&gt;
 fdt     - flattened device tree utility commands&lt;br /&gt;
 flinfo  - print FLASH memory information&lt;br /&gt;
 getdcr  - Get an AMCC PPC 4xx DCR&#039;s value&lt;br /&gt;
 getidcr - Get a register value via indirect DCR addressing&lt;br /&gt;
 go      - start application at address &#039;addr&#039;&lt;br /&gt;
 help    - print online help&lt;br /&gt;
 icache  - enable or disable instruction cache&lt;br /&gt;
 icrc32  - checksum calculation&lt;br /&gt;
 iloop   - infinite loop on address range&lt;br /&gt;
 imd     - i2c memory display&lt;br /&gt;
 iminfo  - print header information for application image&lt;br /&gt;
 imls    - list all images found in flash&lt;br /&gt;
 imm     - i2c memory modify (auto-incrementing)&lt;br /&gt;
 imw     - memory write (fill)&lt;br /&gt;
 imxtract- extract a part of a multi-image&lt;br /&gt;
 inm     - memory modify (constant address)&lt;br /&gt;
 interrupts - enable or disable interrupts&lt;br /&gt;
 iprobe  - probe to discover valid I2C chip addresses&lt;br /&gt;
 irqinfo - print information about IRQs&lt;br /&gt;
 itest	- return true/false on integer compare&lt;br /&gt;
 loadb   - load binary file over serial line (kermit mode)&lt;br /&gt;
 loads   - load S-Record file over serial line&lt;br /&gt;
 loady   - load binary file over serial line (ymodem mode)&lt;br /&gt;
 loop	- infinite loop on address range&lt;br /&gt;
 loopw	- infinite write loop on address range&lt;br /&gt;
 md	- memory display&lt;br /&gt;
 mdc	- memory display cyclic&lt;br /&gt;
 mii     - MII utility commands&lt;br /&gt;
 mm	- memory modify (auto-incrementing)&lt;br /&gt;
 mtest	- simple RAM test&lt;br /&gt;
 mw	- memory write (fill)&lt;br /&gt;
 mwc	- memory write cyclic&lt;br /&gt;
 nand    - NAND sub-system&lt;br /&gt;
 nboot   - boot from NAND device&lt;br /&gt;
 nfs	- boot image via network using NFS protocol&lt;br /&gt;
 nm	- memory modify (constant address)&lt;br /&gt;
 pci     - list and access PCI Configuration Space&lt;br /&gt;
 ping	- send ICMP ECHO_REQUEST to network host&lt;br /&gt;
 printenv- print environment variables&lt;br /&gt;
 protect - enable or disable FLASH write protection&lt;br /&gt;
 rarpboot- boot image via network using RARP/TFTP protocol&lt;br /&gt;
 reginfo - print register information&lt;br /&gt;
 reset   - Perform RESET of the CPU&lt;br /&gt;
 run     - run commands in an environment variable&lt;br /&gt;
 saveenv - save environment variables to persistent storage&lt;br /&gt;
 setdcr  - Set an AMCC PPC 4xx DCR&#039;s value&lt;br /&gt;
 setenv  - set environment variables&lt;br /&gt;
 setexpr - set environment variable as the result of eval expression&lt;br /&gt;
 setidcr - Set a register value via indirect DCR addressing&lt;br /&gt;
 showvar- print local hushshell variables&lt;br /&gt;
 sleep   - delay execution for some time&lt;br /&gt;
 test    - minimal test like /bin/sh&lt;br /&gt;
 tftpboot- boot image via network using TFTP protocol&lt;br /&gt;
 usb     - USB sub-system&lt;br /&gt;
 usbboot - boot from USB device&lt;br /&gt;
 version - print monitor version&lt;br /&gt;
 =&amp;gt; &#039;&#039;&#039;version&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 U-Boot 2009.01 SX_PPC_M460EX SX_3.2.0330-82 ppc (Dec 20 2012 - 17:53:54)&lt;br /&gt;
 =&amp;gt; &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
Look!  It runs U-Boot.  This should not be a huge surprise.  Enjoy poking around inside the pre-Linux environment if you like.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_SX6036&amp;diff=1602</id>
		<title>Mellanox SX6036</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_SX6036&amp;diff=1602"/>
		<updated>2026-04-12T17:35:16Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Unlocking the bootloader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Console access ==&lt;br /&gt;
=== Serial port ===&lt;br /&gt;
There is an 8P8C modular (RJ45) connector on the right side of the port side of the switch.  This connector uses the Cisco pinout and a common Cisco console cable works great for driving it.&lt;br /&gt;
&lt;br /&gt;
Serial settings are 9600 bits per second, 8 data bits, no parity bits, 1 stop bit (9600 8N1)&lt;br /&gt;
&lt;br /&gt;
=== Default credentials ===&lt;br /&gt;
User &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Password &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== Resetting the password ===&lt;br /&gt;
In the lower left  corner of the port side of the switch, there is a small hole labelled &amp;quot;RST&amp;quot;.  Holding the button inside with a paperclip or similar tool for 15 seconds will reset the switch and erase any password set for the &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039; user.  &lt;br /&gt;
&lt;br /&gt;
== Firmware updates ==&lt;br /&gt;
Updating firmware on these switches is a protracted process.  Firmware images are available on the public internet, but some searching is required.  To bring a switch from a 3.2.&#039;&#039;x&#039;&#039; release up to the final 3.6.8012 release, locate the following images on the web and save them to an SSHable or HTTP(S)able location near you:&lt;br /&gt;
* image-PPC_M460EX-3.4.3002.img&lt;br /&gt;
* image-PPC_M460EX-3.5.1006.img&lt;br /&gt;
* image-PPC_M460EX-3.6.1002.img&lt;br /&gt;
* image-PPC_M460EX-3.6.8012.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.3.3400.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.3.5006.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.4.0012.img&lt;br /&gt;
&lt;br /&gt;
=== New firmware image flashing procedure ===&lt;br /&gt;
This is a privileged operation, so first off gain elevated privileges...&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;image fetch http://172.17.0.17/~adj/image-PPC_M460EX-SX_3.3.3400.img&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;image install image-PPC_M460EX-SX_3.3.3400.img location 2 progress track verify require-sig&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;reload&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Wait for U-Boot to prompt about a menu, and send a Ctrl-B before the countdown reaches 0.  Select option 2 (no need for a newline) to boot the newly flashed image.  Iterate through each of the newer images, alternating location 1 and location 2 in the &#039;&#039;&#039;&amp;lt;code&amp;gt;image install ...&amp;lt;/code&amp;gt;&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
When updates version installations are finally complete, it might be good to ensure that 3.6.8012 is flashed to both locations 1 and 2.&lt;br /&gt;
&lt;br /&gt;
== Useful CLI commands ==&lt;br /&gt;
&lt;br /&gt;
=== Find MAC address of 1000baseT management interface 0 ===&lt;br /&gt;
Good for setting up the DHCP server&#039;s config for this switch.  For some reason, this command needs elevated privileges.  Grrr.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show interfaces mgmt0 | include HW&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Find system serial number without reading the physical tag ===&lt;br /&gt;
This is useful for license key generation.  And inventory purposes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show inventory&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Find system host ID ===&lt;br /&gt;
Also can be used for license key generation.  Looks suspiciously like the mgmt0 MAC address...&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show version | include Host&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Licensing features ==&lt;br /&gt;
Mellanox&#039;s SwitchX2 ASIC is capable of performing Infiniband &#039;&#039;&#039;and&#039;&#039;&#039; Ethernet switching.  Mellanox the company likes to lock some of these features behind licensing keys.  Which is annoying.  But with enough effort, is a surmountable obstacle&lt;br /&gt;
&lt;br /&gt;
=== The license generation tool ===&lt;br /&gt;
Inside the MLNX-OS distribution images (those files with names like &#039;&#039;&#039;&amp;lt;code&amp;gt;image-PPC_M460EX-3.6.8012.img&amp;lt;/code&amp;gt;&#039;&#039;&#039;) there exists a gzipped tarball containing the MLNX-OS filesystem.  Inside the tarball is a directory called &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  And inside &#039;&#039;that&#039;&#039; directory, one can find the license key generation program, &#039;&#039;&#039;&amp;lt;code&amp;gt;genlicense&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  The MLNX-OS filesystem image is a PowerPC Linux distribution that can be run from a Qemu emulated big-endian PowerPC machine, or natively on big-endian PowerPC hardware.  We can use this to generate feature licenses until the cows come home.  &lt;br /&gt;
&lt;br /&gt;
=== Our first license, shell access from the switch CLI ===&lt;br /&gt;
There is a hidden CLI command, &#039;&#039;&#039;&amp;lt;code&amp;gt;_shell&amp;lt;/code&amp;gt;&#039;&#039;&#039; which will cause the CLI to &#039;&#039;&#039;&amp;lt;code&amp;gt;execve(&amp;quot;/bin/bash&amp;quot;, ...)&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  This command is privileged (must be run from enable mode) and locked behind a license key.  The following is a working CLI session to install a key for this feature:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &#039;&#039;&#039;passwordgoesherebutisnotechoed&#039;&#039;&#039;&lt;br /&gt;
 Last login: Sun Feb 19 23:25:30 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal &#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-RESTRICTED_CMDS_GEN2-88A1-NEWD-BPNB-1&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show licenses&#039;&#039;&#039;&lt;br /&gt;
 License 1: LK2-RESTRICTED_CMDS_GEN2-88A1-NEWD-BPNB-1&lt;br /&gt;
    Feature:          RESTRICTED_CMDS_GEN2&lt;br /&gt;
    Description:      Access to restricted system functionality&lt;br /&gt;
    Valid:            yes&lt;br /&gt;
    Active:           yes&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
=== Ethernet features: Ethernet, Ethernet L2, and Ethernet L3 ===&lt;br /&gt;
We will generate these from the switch as we already have shell access and can use the included genlicense tool.&lt;br /&gt;
&lt;br /&gt;
Running the following from the switch&#039;s shell will print a key for a non-hardware-locked, non-date-locked license to activate the switch&#039;s full Ethernet capabilities:&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 ~]# &#039;&#039;&#039;cd /opt/tms/bin&#039;&#039;&#039;&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 bin]# &#039;&#039;&#039;./genlicense 2 EFM_SX m2l0n%0x9 -o 53 true -o 51 true -o 58 true&#039;&#039;&#039;&lt;br /&gt;
 LK2-EFM_SX-5M11-5K11-5T11-88A1-BBD0-JP82-X&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 bin]#&lt;br /&gt;
&lt;br /&gt;
A quick explanatory diversion is in order here.  There are 2 types of keys.  genlicense&#039;s first option above specifies key type 2.  &#039;&#039;&#039;&amp;lt;code&amp;gt;EFM_SX&amp;lt;/code&amp;gt;&#039;&#039;&#039; is the &#039;&#039;&#039;&amp;lt;code&amp;gt;Generic SX license&amp;lt;/code&amp;gt;&#039;&#039;&#039; type.  By itself it does nothing, but all of the &#039;&#039;&#039;&amp;lt;code&amp;gt;-o&amp;lt;/code&amp;gt;&#039;&#039;&#039; flags specify further features to be activated.  A complete list of these can be generated by running &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin/genlicense 2&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  There are 14 of these additional options, and their meaning is not well documented.  The magic word &#039;&#039;&#039;&amp;lt;code&amp;gt;m2l0n%0x9&amp;lt;/code&amp;gt;&#039;&#039;&#039; can be found by watching for &#039;&#039;&#039;&amp;lt;code&amp;gt;strlen()&amp;lt;/code&amp;gt;&#039;&#039;&#039; calls in the process flow of &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin/dumplicense&amp;lt;/code&amp;gt;&#039;&#039;&#039; when run under &#039;&#039;&#039;&amp;lt;code&amp;gt;ltrace&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
And it can be installed in the switch&#039;s configuration database by leaving the shell (which will disconnect the terminal session), logging in again, running &#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039; to get elevated privileges, and using the &#039;&#039;&#039;&amp;lt;code&amp;gt;license install&amp;lt;/code&amp;gt;&#039;&#039;&#039; configuration command like so:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Last login: Sun Feb 19 23:31:51 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-EFM_SX-5M11-5K11-5T11-88A1-BBD0-JP82-X&#039;&#039;&#039;&lt;br /&gt;
 License was installed successfully. Please wait 1 minute before further configurations.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
== Switch configuration commands ==&lt;br /&gt;
Some of these things will need licenses first.&lt;br /&gt;
&lt;br /&gt;
=== I can haz Ethernet? ===&lt;br /&gt;
Install the Ethernet key as shown above and confirm it is working:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show system capabilities&#039;&#039;&#039;&lt;br /&gt;
 IB: Supported, L2, Adaptive Routing&lt;br /&gt;
 Ethernet: Supported, L2, L3&lt;br /&gt;
 GW: Not supported&lt;br /&gt;
 Max SM nodes: 648&lt;br /&gt;
 IB Max licensed speed: FDR10&lt;br /&gt;
 Ethernet Max licensed speed: 56Gb&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
It says we can do Ethernet.  Which is cool.  But it does not have the Infiniband-Ethernet gateway feature licensed.  And this is required to enable the switch to run in VPI mode.  VPI is &amp;quot;Virtual Protocol Interconnect&amp;quot; or Mellanox&#039;s way of saying &amp;quot;We can do Infiniband &#039;&#039;and&#039;&#039; Ethernet on a single switch.&amp;quot;  So another license is needed.  Here&#039;s a key for that:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-EFM_SX-5N21-488A-182A-UQXB-Y6&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show system capabilities &#039;&#039;&#039;&lt;br /&gt;
 IB: Supported, L2, Adaptive Routing&lt;br /&gt;
 Ethernet: Supported, L2, L3&lt;br /&gt;
 GW: Supported&lt;br /&gt;
 Max SM nodes: 648&lt;br /&gt;
 IB Max licensed speed: FDR10&lt;br /&gt;
 Ethernet Max licensed speed: 56Gb&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
We will need to do this next thing to convert the switch from an Infiniband-only switch to an Infiniband-and-Ethernet switch:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;system profile vpi-single-switch&#039;&#039;&#039;&lt;br /&gt;
 Warning - confirming will cause system reboot and all configuration will be deleted&lt;br /&gt;
 Type &#039;yes&#039; to confirm profile change: &#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
Allow time for the switch to reboot and log in again.  When it next starts up, run the command &#039;&#039;&#039;&amp;lt;code&amp;gt;show system profile&amp;lt;/code&amp;gt;&#039;&#039;&#039; to confirm that it is in VPI mode:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;show system profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Profile: vpi-single-switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt;&lt;br /&gt;
And finally, let&#039;s set some ports to Ethernet mode:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;show ports type&#039;&#039;&#039;&lt;br /&gt;
 InfiniBand: 1/1 1/2 1/3 1/4 1/5 1/6 1/7 1/8 1/9 1/10 1/11 1/12 1/13 1/14 1/15 1/16 1/17 1/18 1/19 1/20 1/21 1/22 1/23 1/24 1/25 1/26 1/27 1/28 1/29 1/30 1/31 1/32 1/33 1/34 1/35 1/36 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ib 1/19-1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ib 1/19-1/36) # &#039;&#039;&#039;shutdown&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ib 1/19-1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;port 1/19-1/36 type ethernet&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ethernet 1/19-1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/19-1/36) # &#039;&#039;&#039;no shutdown&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/19-1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show ports type&#039;&#039;&#039;&lt;br /&gt;
 Ethernet:   1/19 1/20 1/21 1/22 1/23 1/24 1/25 1/26 1/27 1/28 1/29 1/30 1/31 1/32 1/33 1/34 1/35 1/36 &lt;br /&gt;
 InfiniBand: 1/1 1/2 1/3 1/4 1/5 1/6 1/7 1/8 1/9 1/10 1/11 1/12 1/13 1/14 1/15 1/16 1/17 1/18 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
=== Switch management items ===&lt;br /&gt;
==== Password for the admin user ====&lt;br /&gt;
Factory defaults are probably not a good idea, so let&#039;s tighten things up a bit.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;username admin password &#039;&#039;the_password_goes_here&#039;&#039; &#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
&lt;br /&gt;
==== IP addressing for the management interface ====&lt;br /&gt;
The following will configure the switch to retrieve its IP address, subnet mask, router IP address, name server info, and hostname from DHCP server on the management interface&#039;s local network.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface mgmt0&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;dhcp&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;dhcp hostname&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
&lt;br /&gt;
==== NTP ====&lt;br /&gt;
Let&#039;s add a couple of NTP servers to the config and discipline our poorly behaved battery backed clock:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;ntp server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;ntp server 172.17.0.17&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 NTP is administratively            : enabled&lt;br /&gt;
 NTP Authentication administratively: disabled &lt;br /&gt;
 &lt;br /&gt;
 Clock is synchronized:&lt;br /&gt;
   Reference: 172.16.10.2&lt;br /&gt;
   Offset   : -0.006 ms&lt;br /&gt;
 &lt;br /&gt;
 Active servers and peers:&lt;br /&gt;
   172.16.10.2:&lt;br /&gt;
     Conf Type          : serv&lt;br /&gt;
     Status             : sys.peer(*)&lt;br /&gt;
     Stratum            : 3  &lt;br /&gt;
     Offset(msec)       : -0.006&lt;br /&gt;
     Ref clock          : 45.45.184.14   &lt;br /&gt;
     Poll Interval (sec): 64  &lt;br /&gt;
     Last Response (sec): 8   &lt;br /&gt;
     Auth state         : none    &lt;br /&gt;
 &lt;br /&gt;
   172.17.0.17:&lt;br /&gt;
     Conf Type          : serv&lt;br /&gt;
     Status             : pending    &lt;br /&gt;
     Stratum            : 2  &lt;br /&gt;
     Offset(msec)       : 0.429&lt;br /&gt;
     Ref clock          : 198.60.22.240  &lt;br /&gt;
     Poll Interval (sec): 64  &lt;br /&gt;
     Last Response (sec): 7   &lt;br /&gt;
     Auth state         : none    &lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
=== Ethernet goodies ===&lt;br /&gt;
==== LLDP ====&lt;br /&gt;
Turn it on and test it out like so:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;lldp&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp local&#039;&#039;&#039;&lt;br /&gt;
 LLDP: enabled&lt;br /&gt;
 &lt;br /&gt;
 Local global configuration&lt;br /&gt;
     Chassis sub type: Mac Address&lt;br /&gt;
     Chassis id: 00:02:c9:6d:4d:b0&lt;br /&gt;
     System Name: mellanox-sx6036-rack-1&lt;br /&gt;
     System Description: SX6036,MLNX-OS,SWv3.6.8012&lt;br /&gt;
     Supported capabilities: B,R             &lt;br /&gt;
     Supported capabilities enabled: B&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp interfaces ethernet 1/36&#039;&#039;&#039;&lt;br /&gt;
 TLV flags&lt;br /&gt;
     PD: port-description&lt;br /&gt;
     SN: sys-name        &lt;br /&gt;
     SD: sys-description &lt;br /&gt;
     SC: sys-capabilities&lt;br /&gt;
     MA: management-address&lt;br /&gt;
     ETS-C: ETS-Configuration&lt;br /&gt;
     ETS-R: ETS-Recommendation&lt;br /&gt;
     AP: Application Priority&lt;br /&gt;
     PFC: Priority Flow Control&lt;br /&gt;
     CEE: Converged Enhanced Ethernet DCBX version&lt;br /&gt;
     MED-CAP: Media Capabilities&lt;br /&gt;
     MED-NWP: MED-Network Policy&lt;br /&gt;
 &lt;br /&gt;
 -----------------------------------------------------------------------------------&lt;br /&gt;
 Interface    Receive   Transmit  TLVs                                              &lt;br /&gt;
 -----------------------------------------------------------------------------------&lt;br /&gt;
 Eth1/36      Enabled   Enabled   PD, SN, SD, SC, PFC, AP, ETS-C, ETS-R             &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp interfaces ethernet 1/36 remote&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Eth1/36&lt;br /&gt;
 &lt;br /&gt;
 Remote Index: 1&lt;br /&gt;
 Remote chassis id: cc:4e:24:83:4b:36 ; chassis id subtype: Mac Address (4)&lt;br /&gt;
 Remote port-id: cc:4e:24:83:4b:6c ; port id subtype: Mac Address (3)&lt;br /&gt;
 Remote port description: 40GigabitEthernet1/2/6&lt;br /&gt;
 Remote system name: brocade-icx6610-48p-rack-1&lt;br /&gt;
 Remote system description: Not Advertised&lt;br /&gt;
 Remote system capabilities supported: B,R  ; enabled B,R&lt;br /&gt;
 Remote Management Addresses:&lt;br /&gt;
 SubType        Address&lt;br /&gt;
 ------------------------------------&lt;br /&gt;
 IPv4        172.16.10.17&lt;br /&gt;
 &lt;br /&gt;
 No Remote PFC entry&lt;br /&gt;
 &lt;br /&gt;
 No Remote ETS entry&lt;br /&gt;
 &lt;br /&gt;
 No Remote Application Priority entry&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
And enjoy getting to know all the things about your neighbors.&lt;br /&gt;
==== Multiple Spanning Tree Protocol ====&lt;br /&gt;
Wherein we avoid broadcast loops.  Because they are bad, even if they do make for lots of blinken lights.&lt;br /&gt;
Our Brocade switches are running MSTP and, fortunately, MLNX-OS supports that on our SX6036es as well.&lt;br /&gt;
Setting the switch to MSTP mode is pretty simple:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;spanning-tree mode mst&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show spanning-tree&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Switch                     : ethernet-default&lt;br /&gt;
 Spanning tree protocol mst : enabled&lt;br /&gt;
 Spanning tree force version: 3&lt;br /&gt;
 &lt;br /&gt;
 Root ID:&lt;br /&gt;
   Priority           : 32768&lt;br /&gt;
   Address            : 00:02:c9:6d:4c:b0   &lt;br /&gt;
   Cost               : 0&lt;br /&gt;
   Port               : Eth1/36&lt;br /&gt;
   Hello Time (sec)   : 2&lt;br /&gt;
   Max Age (sec)      : 20&lt;br /&gt;
   Forward Delay (sec): 15&lt;br /&gt;
 &lt;br /&gt;
   MST00:&lt;br /&gt;
     Bridge is executing the mstp compatible Spanning Tree Protocol&lt;br /&gt;
 &lt;br /&gt;
 Bridge ID:&lt;br /&gt;
   Priority           : 32768&lt;br /&gt;
   Address            : 00:02:c9:6d:4d:b0   &lt;br /&gt;
   Hello Time (sec)   : 2&lt;br /&gt;
   Max Age (sec)      : 20&lt;br /&gt;
   Forward Delay (sec): 15&lt;br /&gt;
 &lt;br /&gt;
 L: Loop Inconsistent&lt;br /&gt;
 R: Root Inconsistent&lt;br /&gt;
 G: BPDU Guard Inconsistent&lt;br /&gt;
 &lt;br /&gt;
 --------------------------------------------------------------------------&lt;br /&gt;
 Interface         Role         Sts              Cost      Prio   Type     &lt;br /&gt;
 --------------------------------------------------------------------------&lt;br /&gt;
 Eth1/36           Root         Forwarding       500       128    normal   &lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
==== VLANs ====&lt;br /&gt;
Create our standard assortment of VLANs like so:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 10 name Management&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 10) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 100 name &amp;quot;WAN 0 (Comcast 44th Avenue)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 100) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 101 name &amp;quot;WAN 1 (Allo)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 101) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 102 name &amp;quot;WAN 2 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 102) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 103 name &amp;quot;WAN 3 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 103) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 104 name &amp;quot;WAN 4 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 104) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 105 name &amp;quot;WAN 5 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 105) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 106 name &amp;quot;WAN 6 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 106) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # vlan 107 &#039;&#039;&#039;name &amp;quot;WAN 7 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 107) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 108 name &amp;quot;WAN 8 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 108) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 109 name &amp;quot;WAN 9 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 109) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1000 name &amp;quot;Internal Services&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1000) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1001 name &amp;quot;Internal clients&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1001) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1002 name &amp;quot;Ceph front-end&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1002) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1003 name &amp;quot;Ceph back-end&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1003) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 3900 name &amp;quot;Guest network&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 3900) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show vlan&#039;&#039;&#039;&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 VLAN    Name                    Ports&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 1       default                 Eth1/19, Eth1/20, Eth1/21, Eth1/22, Eth1/23,&lt;br /&gt;
                                 Eth1/24, Eth1/25, Eth1/26, Eth1/27, Eth1/28,&lt;br /&gt;
                                 Eth1/29, Eth1/30, Eth1/31, Eth1/32, Eth1/33,&lt;br /&gt;
                                 Eth1/34, Eth1/35, Eth1/36&lt;br /&gt;
 10      Management              &lt;br /&gt;
 100     WAN 0 (Comcast 44th Avenue)&lt;br /&gt;
 101     WAN 1 (Allo)            &lt;br /&gt;
 102     WAN 2 (unused)          &lt;br /&gt;
 103     WAN 3 (unused)          &lt;br /&gt;
 104     WAN 4 (unused)          &lt;br /&gt;
 105     WAN 5 (unused)          &lt;br /&gt;
 106     WAN 6 (unused)          &lt;br /&gt;
 107     WAN 7 (unused)          &lt;br /&gt;
 108     WAN 8 (unused)          &lt;br /&gt;
 109     WAN 9 (unused)          &lt;br /&gt;
 1000    Internal Services       &lt;br /&gt;
 1001    Internal clients        &lt;br /&gt;
 1002    Ceph front-end          &lt;br /&gt;
 1003    Ceph back-end           &lt;br /&gt;
 3900    Guest network           &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
And now, to assign all those VLANs as tagged on port 1/36:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ethernet 1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport mode trunk&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan 10&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 100-109&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 1000-1003&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 3900&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show vlan&#039;&#039;&#039;&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 VLAN    Name                    Ports&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 1       default                 Eth1/19, Eth1/20, Eth1/21, Eth1/22, Eth1/23,&lt;br /&gt;
                                 Eth1/24, Eth1/25, Eth1/26, Eth1/27, Eth1/28,&lt;br /&gt;
                                 Eth1/29, Eth1/30, Eth1/31, Eth1/32, Eth1/33,&lt;br /&gt;
                                 Eth1/34, Eth1/35&lt;br /&gt;
 10      Management              Eth1/36&lt;br /&gt;
 100     WAN 0 (Comcast 44th Avenue)Eth1/36&lt;br /&gt;
 101     WAN 1 (Allo)            Eth1/36&lt;br /&gt;
 102     WAN 2 (unused)          Eth1/36&lt;br /&gt;
 103     WAN 3 (unused)          Eth1/36&lt;br /&gt;
 104     WAN 4 (unused)          Eth1/36&lt;br /&gt;
 105     WAN 5 (unused)          Eth1/36&lt;br /&gt;
 106     WAN 6 (unused)          Eth1/36&lt;br /&gt;
 107     WAN 7 (unused)          Eth1/36&lt;br /&gt;
 108     WAN 8 (unused)          Eth1/36&lt;br /&gt;
 109     WAN 9 (unused)          Eth1/36&lt;br /&gt;
 1000    Internal Services       Eth1/36&lt;br /&gt;
 1001    Internal clients        Eth1/36&lt;br /&gt;
 1002    Ceph front-end          Eth1/36&lt;br /&gt;
 1003    Ceph back-end           Eth1/36&lt;br /&gt;
 3900    Guest network           Eth1/36&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
== Unlocking the bootloader ==&lt;br /&gt;
When reset or just powered on, the SX6036&#039;s bootloader does preset the human on the console a 5 second countdown timer and an opportunity to choose some other options than loading the currently active software image:&lt;br /&gt;
 Mellanox MLNX-OS&lt;br /&gt;
 &lt;br /&gt;
 Default image: &#039;PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&#039;&lt;br /&gt;
 Press Enter to boot this image, or &#039;Ctrl B&#039; for boot menu&lt;br /&gt;
 &lt;br /&gt;
 Booting default image in:  0 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 Mellanox MLNX-OS Boot Menu:&lt;br /&gt;
 &lt;br /&gt;
 *  1: PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&lt;br /&gt;
    2: PPC_M460EX 3.6.8010 2018-08-20 18:04:16 ppc&lt;br /&gt;
    u: USB menu (if USB device connected) (password required)&lt;br /&gt;
    c: Command prompt (password required)&lt;br /&gt;
 &lt;br /&gt;
    Choice: &lt;br /&gt;
Irritatingly, I have been unable to locate the password required for command prompt access.  Fortunately, some kind denizens of the internet have shared a way to change (even remove!) this password from a running MLNX-OS.  I found this information at https://forums.servethehome.com/index.php?threads/solved-mellanox-sx6012-u-boot-password-removal-without-bash-access.33484/&lt;br /&gt;
&lt;br /&gt;
Let&#039;s record this for posterity:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Last login: Sun Apr 12 16:57:02 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] (config) # &#039;&#039;&#039;boot bootmgr password 7 &amp;quot;&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;show bootvar&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Installed images:&lt;br /&gt;
   Partition 1:&lt;br /&gt;
     version: PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&lt;br /&gt;
 &lt;br /&gt;
   Partition 2:&lt;br /&gt;
     version: PPC_M460EX 3.6.8010 2018-08-20 18:04:16 ppc&lt;br /&gt;
 &lt;br /&gt;
 Last boot partition             : 1&lt;br /&gt;
 Next boot partition             : 1&lt;br /&gt;
 Serve image files via HTTP/HTTPS: no&lt;br /&gt;
 &lt;br /&gt;
 No boot manager password is set.&lt;br /&gt;
 &lt;br /&gt;
 Image signing              : trusted signature always required&lt;br /&gt;
 Admin require signed images: yes&lt;br /&gt;
 &lt;br /&gt;
 Settings for next boot only:&lt;br /&gt;
   Fallback reboot on configuration failure: yes (default)&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &lt;br /&gt;
Note the line saying &amp;quot;No boot manager password is set.&amp;quot;  A switch that has not had this treatment will report &amp;quot;Boot manager password is set.&amp;quot; instead.&lt;br /&gt;
&lt;br /&gt;
First try was not successful, though.  I may continue poking at this again in the future.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_SX6036&amp;diff=1601</id>
		<title>Mellanox SX6036</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_SX6036&amp;diff=1601"/>
		<updated>2026-04-12T17:32:05Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Unlocking the bootloader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Console access ==&lt;br /&gt;
=== Serial port ===&lt;br /&gt;
There is an 8P8C modular (RJ45) connector on the right side of the port side of the switch.  This connector uses the Cisco pinout and a common Cisco console cable works great for driving it.&lt;br /&gt;
&lt;br /&gt;
Serial settings are 9600 bits per second, 8 data bits, no parity bits, 1 stop bit (9600 8N1)&lt;br /&gt;
&lt;br /&gt;
=== Default credentials ===&lt;br /&gt;
User &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Password &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== Resetting the password ===&lt;br /&gt;
In the lower left  corner of the port side of the switch, there is a small hole labelled &amp;quot;RST&amp;quot;.  Holding the button inside with a paperclip or similar tool for 15 seconds will reset the switch and erase any password set for the &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039; user.  &lt;br /&gt;
&lt;br /&gt;
== Firmware updates ==&lt;br /&gt;
Updating firmware on these switches is a protracted process.  Firmware images are available on the public internet, but some searching is required.  To bring a switch from a 3.2.&#039;&#039;x&#039;&#039; release up to the final 3.6.8012 release, locate the following images on the web and save them to an SSHable or HTTP(S)able location near you:&lt;br /&gt;
* image-PPC_M460EX-3.4.3002.img&lt;br /&gt;
* image-PPC_M460EX-3.5.1006.img&lt;br /&gt;
* image-PPC_M460EX-3.6.1002.img&lt;br /&gt;
* image-PPC_M460EX-3.6.8012.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.3.3400.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.3.5006.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.4.0012.img&lt;br /&gt;
&lt;br /&gt;
=== New firmware image flashing procedure ===&lt;br /&gt;
This is a privileged operation, so first off gain elevated privileges...&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;image fetch http://172.17.0.17/~adj/image-PPC_M460EX-SX_3.3.3400.img&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;image install image-PPC_M460EX-SX_3.3.3400.img location 2 progress track verify require-sig&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;reload&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Wait for U-Boot to prompt about a menu, and send a Ctrl-B before the countdown reaches 0.  Select option 2 (no need for a newline) to boot the newly flashed image.  Iterate through each of the newer images, alternating location 1 and location 2 in the &#039;&#039;&#039;&amp;lt;code&amp;gt;image install ...&amp;lt;/code&amp;gt;&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
When updates version installations are finally complete, it might be good to ensure that 3.6.8012 is flashed to both locations 1 and 2.&lt;br /&gt;
&lt;br /&gt;
== Useful CLI commands ==&lt;br /&gt;
&lt;br /&gt;
=== Find MAC address of 1000baseT management interface 0 ===&lt;br /&gt;
Good for setting up the DHCP server&#039;s config for this switch.  For some reason, this command needs elevated privileges.  Grrr.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show interfaces mgmt0 | include HW&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Find system serial number without reading the physical tag ===&lt;br /&gt;
This is useful for license key generation.  And inventory purposes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show inventory&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Find system host ID ===&lt;br /&gt;
Also can be used for license key generation.  Looks suspiciously like the mgmt0 MAC address...&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show version | include Host&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Licensing features ==&lt;br /&gt;
Mellanox&#039;s SwitchX2 ASIC is capable of performing Infiniband &#039;&#039;&#039;and&#039;&#039;&#039; Ethernet switching.  Mellanox the company likes to lock some of these features behind licensing keys.  Which is annoying.  But with enough effort, is a surmountable obstacle&lt;br /&gt;
&lt;br /&gt;
=== The license generation tool ===&lt;br /&gt;
Inside the MLNX-OS distribution images (those files with names like &#039;&#039;&#039;&amp;lt;code&amp;gt;image-PPC_M460EX-3.6.8012.img&amp;lt;/code&amp;gt;&#039;&#039;&#039;) there exists a gzipped tarball containing the MLNX-OS filesystem.  Inside the tarball is a directory called &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  And inside &#039;&#039;that&#039;&#039; directory, one can find the license key generation program, &#039;&#039;&#039;&amp;lt;code&amp;gt;genlicense&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  The MLNX-OS filesystem image is a PowerPC Linux distribution that can be run from a Qemu emulated big-endian PowerPC machine, or natively on big-endian PowerPC hardware.  We can use this to generate feature licenses until the cows come home.  &lt;br /&gt;
&lt;br /&gt;
=== Our first license, shell access from the switch CLI ===&lt;br /&gt;
There is a hidden CLI command, &#039;&#039;&#039;&amp;lt;code&amp;gt;_shell&amp;lt;/code&amp;gt;&#039;&#039;&#039; which will cause the CLI to &#039;&#039;&#039;&amp;lt;code&amp;gt;execve(&amp;quot;/bin/bash&amp;quot;, ...)&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  This command is privileged (must be run from enable mode) and locked behind a license key.  The following is a working CLI session to install a key for this feature:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &#039;&#039;&#039;passwordgoesherebutisnotechoed&#039;&#039;&#039;&lt;br /&gt;
 Last login: Sun Feb 19 23:25:30 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal &#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-RESTRICTED_CMDS_GEN2-88A1-NEWD-BPNB-1&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show licenses&#039;&#039;&#039;&lt;br /&gt;
 License 1: LK2-RESTRICTED_CMDS_GEN2-88A1-NEWD-BPNB-1&lt;br /&gt;
    Feature:          RESTRICTED_CMDS_GEN2&lt;br /&gt;
    Description:      Access to restricted system functionality&lt;br /&gt;
    Valid:            yes&lt;br /&gt;
    Active:           yes&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
=== Ethernet features: Ethernet, Ethernet L2, and Ethernet L3 ===&lt;br /&gt;
We will generate these from the switch as we already have shell access and can use the included genlicense tool.&lt;br /&gt;
&lt;br /&gt;
Running the following from the switch&#039;s shell will print a key for a non-hardware-locked, non-date-locked license to activate the switch&#039;s full Ethernet capabilities:&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 ~]# &#039;&#039;&#039;cd /opt/tms/bin&#039;&#039;&#039;&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 bin]# &#039;&#039;&#039;./genlicense 2 EFM_SX m2l0n%0x9 -o 53 true -o 51 true -o 58 true&#039;&#039;&#039;&lt;br /&gt;
 LK2-EFM_SX-5M11-5K11-5T11-88A1-BBD0-JP82-X&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 bin]#&lt;br /&gt;
&lt;br /&gt;
A quick explanatory diversion is in order here.  There are 2 types of keys.  genlicense&#039;s first option above specifies key type 2.  &#039;&#039;&#039;&amp;lt;code&amp;gt;EFM_SX&amp;lt;/code&amp;gt;&#039;&#039;&#039; is the &#039;&#039;&#039;&amp;lt;code&amp;gt;Generic SX license&amp;lt;/code&amp;gt;&#039;&#039;&#039; type.  By itself it does nothing, but all of the &#039;&#039;&#039;&amp;lt;code&amp;gt;-o&amp;lt;/code&amp;gt;&#039;&#039;&#039; flags specify further features to be activated.  A complete list of these can be generated by running &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin/genlicense 2&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  There are 14 of these additional options, and their meaning is not well documented.  The magic word &#039;&#039;&#039;&amp;lt;code&amp;gt;m2l0n%0x9&amp;lt;/code&amp;gt;&#039;&#039;&#039; can be found by watching for &#039;&#039;&#039;&amp;lt;code&amp;gt;strlen()&amp;lt;/code&amp;gt;&#039;&#039;&#039; calls in the process flow of &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin/dumplicense&amp;lt;/code&amp;gt;&#039;&#039;&#039; when run under &#039;&#039;&#039;&amp;lt;code&amp;gt;ltrace&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
And it can be installed in the switch&#039;s configuration database by leaving the shell (which will disconnect the terminal session), logging in again, running &#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039; to get elevated privileges, and using the &#039;&#039;&#039;&amp;lt;code&amp;gt;license install&amp;lt;/code&amp;gt;&#039;&#039;&#039; configuration command like so:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Last login: Sun Feb 19 23:31:51 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-EFM_SX-5M11-5K11-5T11-88A1-BBD0-JP82-X&#039;&#039;&#039;&lt;br /&gt;
 License was installed successfully. Please wait 1 minute before further configurations.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
== Switch configuration commands ==&lt;br /&gt;
Some of these things will need licenses first.&lt;br /&gt;
&lt;br /&gt;
=== I can haz Ethernet? ===&lt;br /&gt;
Install the Ethernet key as shown above and confirm it is working:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show system capabilities&#039;&#039;&#039;&lt;br /&gt;
 IB: Supported, L2, Adaptive Routing&lt;br /&gt;
 Ethernet: Supported, L2, L3&lt;br /&gt;
 GW: Not supported&lt;br /&gt;
 Max SM nodes: 648&lt;br /&gt;
 IB Max licensed speed: FDR10&lt;br /&gt;
 Ethernet Max licensed speed: 56Gb&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
It says we can do Ethernet.  Which is cool.  But it does not have the Infiniband-Ethernet gateway feature licensed.  And this is required to enable the switch to run in VPI mode.  VPI is &amp;quot;Virtual Protocol Interconnect&amp;quot; or Mellanox&#039;s way of saying &amp;quot;We can do Infiniband &#039;&#039;and&#039;&#039; Ethernet on a single switch.&amp;quot;  So another license is needed.  Here&#039;s a key for that:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-EFM_SX-5N21-488A-182A-UQXB-Y6&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show system capabilities &#039;&#039;&#039;&lt;br /&gt;
 IB: Supported, L2, Adaptive Routing&lt;br /&gt;
 Ethernet: Supported, L2, L3&lt;br /&gt;
 GW: Supported&lt;br /&gt;
 Max SM nodes: 648&lt;br /&gt;
 IB Max licensed speed: FDR10&lt;br /&gt;
 Ethernet Max licensed speed: 56Gb&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
We will need to do this next thing to convert the switch from an Infiniband-only switch to an Infiniband-and-Ethernet switch:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;system profile vpi-single-switch&#039;&#039;&#039;&lt;br /&gt;
 Warning - confirming will cause system reboot and all configuration will be deleted&lt;br /&gt;
 Type &#039;yes&#039; to confirm profile change: &#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
Allow time for the switch to reboot and log in again.  When it next starts up, run the command &#039;&#039;&#039;&amp;lt;code&amp;gt;show system profile&amp;lt;/code&amp;gt;&#039;&#039;&#039; to confirm that it is in VPI mode:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;show system profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Profile: vpi-single-switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt;&lt;br /&gt;
And finally, let&#039;s set some ports to Ethernet mode:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;show ports type&#039;&#039;&#039;&lt;br /&gt;
 InfiniBand: 1/1 1/2 1/3 1/4 1/5 1/6 1/7 1/8 1/9 1/10 1/11 1/12 1/13 1/14 1/15 1/16 1/17 1/18 1/19 1/20 1/21 1/22 1/23 1/24 1/25 1/26 1/27 1/28 1/29 1/30 1/31 1/32 1/33 1/34 1/35 1/36 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ib 1/19-1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ib 1/19-1/36) # &#039;&#039;&#039;shutdown&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ib 1/19-1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;port 1/19-1/36 type ethernet&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ethernet 1/19-1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/19-1/36) # &#039;&#039;&#039;no shutdown&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/19-1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show ports type&#039;&#039;&#039;&lt;br /&gt;
 Ethernet:   1/19 1/20 1/21 1/22 1/23 1/24 1/25 1/26 1/27 1/28 1/29 1/30 1/31 1/32 1/33 1/34 1/35 1/36 &lt;br /&gt;
 InfiniBand: 1/1 1/2 1/3 1/4 1/5 1/6 1/7 1/8 1/9 1/10 1/11 1/12 1/13 1/14 1/15 1/16 1/17 1/18 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
=== Switch management items ===&lt;br /&gt;
==== Password for the admin user ====&lt;br /&gt;
Factory defaults are probably not a good idea, so let&#039;s tighten things up a bit.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;username admin password &#039;&#039;the_password_goes_here&#039;&#039; &#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
&lt;br /&gt;
==== IP addressing for the management interface ====&lt;br /&gt;
The following will configure the switch to retrieve its IP address, subnet mask, router IP address, name server info, and hostname from DHCP server on the management interface&#039;s local network.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface mgmt0&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;dhcp&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;dhcp hostname&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
&lt;br /&gt;
==== NTP ====&lt;br /&gt;
Let&#039;s add a couple of NTP servers to the config and discipline our poorly behaved battery backed clock:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;ntp server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;ntp server 172.17.0.17&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 NTP is administratively            : enabled&lt;br /&gt;
 NTP Authentication administratively: disabled &lt;br /&gt;
 &lt;br /&gt;
 Clock is synchronized:&lt;br /&gt;
   Reference: 172.16.10.2&lt;br /&gt;
   Offset   : -0.006 ms&lt;br /&gt;
 &lt;br /&gt;
 Active servers and peers:&lt;br /&gt;
   172.16.10.2:&lt;br /&gt;
     Conf Type          : serv&lt;br /&gt;
     Status             : sys.peer(*)&lt;br /&gt;
     Stratum            : 3  &lt;br /&gt;
     Offset(msec)       : -0.006&lt;br /&gt;
     Ref clock          : 45.45.184.14   &lt;br /&gt;
     Poll Interval (sec): 64  &lt;br /&gt;
     Last Response (sec): 8   &lt;br /&gt;
     Auth state         : none    &lt;br /&gt;
 &lt;br /&gt;
   172.17.0.17:&lt;br /&gt;
     Conf Type          : serv&lt;br /&gt;
     Status             : pending    &lt;br /&gt;
     Stratum            : 2  &lt;br /&gt;
     Offset(msec)       : 0.429&lt;br /&gt;
     Ref clock          : 198.60.22.240  &lt;br /&gt;
     Poll Interval (sec): 64  &lt;br /&gt;
     Last Response (sec): 7   &lt;br /&gt;
     Auth state         : none    &lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
=== Ethernet goodies ===&lt;br /&gt;
==== LLDP ====&lt;br /&gt;
Turn it on and test it out like so:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;lldp&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp local&#039;&#039;&#039;&lt;br /&gt;
 LLDP: enabled&lt;br /&gt;
 &lt;br /&gt;
 Local global configuration&lt;br /&gt;
     Chassis sub type: Mac Address&lt;br /&gt;
     Chassis id: 00:02:c9:6d:4d:b0&lt;br /&gt;
     System Name: mellanox-sx6036-rack-1&lt;br /&gt;
     System Description: SX6036,MLNX-OS,SWv3.6.8012&lt;br /&gt;
     Supported capabilities: B,R             &lt;br /&gt;
     Supported capabilities enabled: B&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp interfaces ethernet 1/36&#039;&#039;&#039;&lt;br /&gt;
 TLV flags&lt;br /&gt;
     PD: port-description&lt;br /&gt;
     SN: sys-name        &lt;br /&gt;
     SD: sys-description &lt;br /&gt;
     SC: sys-capabilities&lt;br /&gt;
     MA: management-address&lt;br /&gt;
     ETS-C: ETS-Configuration&lt;br /&gt;
     ETS-R: ETS-Recommendation&lt;br /&gt;
     AP: Application Priority&lt;br /&gt;
     PFC: Priority Flow Control&lt;br /&gt;
     CEE: Converged Enhanced Ethernet DCBX version&lt;br /&gt;
     MED-CAP: Media Capabilities&lt;br /&gt;
     MED-NWP: MED-Network Policy&lt;br /&gt;
 &lt;br /&gt;
 -----------------------------------------------------------------------------------&lt;br /&gt;
 Interface    Receive   Transmit  TLVs                                              &lt;br /&gt;
 -----------------------------------------------------------------------------------&lt;br /&gt;
 Eth1/36      Enabled   Enabled   PD, SN, SD, SC, PFC, AP, ETS-C, ETS-R             &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp interfaces ethernet 1/36 remote&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Eth1/36&lt;br /&gt;
 &lt;br /&gt;
 Remote Index: 1&lt;br /&gt;
 Remote chassis id: cc:4e:24:83:4b:36 ; chassis id subtype: Mac Address (4)&lt;br /&gt;
 Remote port-id: cc:4e:24:83:4b:6c ; port id subtype: Mac Address (3)&lt;br /&gt;
 Remote port description: 40GigabitEthernet1/2/6&lt;br /&gt;
 Remote system name: brocade-icx6610-48p-rack-1&lt;br /&gt;
 Remote system description: Not Advertised&lt;br /&gt;
 Remote system capabilities supported: B,R  ; enabled B,R&lt;br /&gt;
 Remote Management Addresses:&lt;br /&gt;
 SubType        Address&lt;br /&gt;
 ------------------------------------&lt;br /&gt;
 IPv4        172.16.10.17&lt;br /&gt;
 &lt;br /&gt;
 No Remote PFC entry&lt;br /&gt;
 &lt;br /&gt;
 No Remote ETS entry&lt;br /&gt;
 &lt;br /&gt;
 No Remote Application Priority entry&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
And enjoy getting to know all the things about your neighbors.&lt;br /&gt;
==== Multiple Spanning Tree Protocol ====&lt;br /&gt;
Wherein we avoid broadcast loops.  Because they are bad, even if they do make for lots of blinken lights.&lt;br /&gt;
Our Brocade switches are running MSTP and, fortunately, MLNX-OS supports that on our SX6036es as well.&lt;br /&gt;
Setting the switch to MSTP mode is pretty simple:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;spanning-tree mode mst&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show spanning-tree&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Switch                     : ethernet-default&lt;br /&gt;
 Spanning tree protocol mst : enabled&lt;br /&gt;
 Spanning tree force version: 3&lt;br /&gt;
 &lt;br /&gt;
 Root ID:&lt;br /&gt;
   Priority           : 32768&lt;br /&gt;
   Address            : 00:02:c9:6d:4c:b0   &lt;br /&gt;
   Cost               : 0&lt;br /&gt;
   Port               : Eth1/36&lt;br /&gt;
   Hello Time (sec)   : 2&lt;br /&gt;
   Max Age (sec)      : 20&lt;br /&gt;
   Forward Delay (sec): 15&lt;br /&gt;
 &lt;br /&gt;
   MST00:&lt;br /&gt;
     Bridge is executing the mstp compatible Spanning Tree Protocol&lt;br /&gt;
 &lt;br /&gt;
 Bridge ID:&lt;br /&gt;
   Priority           : 32768&lt;br /&gt;
   Address            : 00:02:c9:6d:4d:b0   &lt;br /&gt;
   Hello Time (sec)   : 2&lt;br /&gt;
   Max Age (sec)      : 20&lt;br /&gt;
   Forward Delay (sec): 15&lt;br /&gt;
 &lt;br /&gt;
 L: Loop Inconsistent&lt;br /&gt;
 R: Root Inconsistent&lt;br /&gt;
 G: BPDU Guard Inconsistent&lt;br /&gt;
 &lt;br /&gt;
 --------------------------------------------------------------------------&lt;br /&gt;
 Interface         Role         Sts              Cost      Prio   Type     &lt;br /&gt;
 --------------------------------------------------------------------------&lt;br /&gt;
 Eth1/36           Root         Forwarding       500       128    normal   &lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
==== VLANs ====&lt;br /&gt;
Create our standard assortment of VLANs like so:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 10 name Management&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 10) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 100 name &amp;quot;WAN 0 (Comcast 44th Avenue)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 100) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 101 name &amp;quot;WAN 1 (Allo)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 101) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 102 name &amp;quot;WAN 2 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 102) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 103 name &amp;quot;WAN 3 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 103) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 104 name &amp;quot;WAN 4 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 104) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 105 name &amp;quot;WAN 5 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 105) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 106 name &amp;quot;WAN 6 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 106) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # vlan 107 &#039;&#039;&#039;name &amp;quot;WAN 7 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 107) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 108 name &amp;quot;WAN 8 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 108) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 109 name &amp;quot;WAN 9 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 109) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1000 name &amp;quot;Internal Services&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1000) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1001 name &amp;quot;Internal clients&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1001) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1002 name &amp;quot;Ceph front-end&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1002) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1003 name &amp;quot;Ceph back-end&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1003) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 3900 name &amp;quot;Guest network&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 3900) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show vlan&#039;&#039;&#039;&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 VLAN    Name                    Ports&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 1       default                 Eth1/19, Eth1/20, Eth1/21, Eth1/22, Eth1/23,&lt;br /&gt;
                                 Eth1/24, Eth1/25, Eth1/26, Eth1/27, Eth1/28,&lt;br /&gt;
                                 Eth1/29, Eth1/30, Eth1/31, Eth1/32, Eth1/33,&lt;br /&gt;
                                 Eth1/34, Eth1/35, Eth1/36&lt;br /&gt;
 10      Management              &lt;br /&gt;
 100     WAN 0 (Comcast 44th Avenue)&lt;br /&gt;
 101     WAN 1 (Allo)            &lt;br /&gt;
 102     WAN 2 (unused)          &lt;br /&gt;
 103     WAN 3 (unused)          &lt;br /&gt;
 104     WAN 4 (unused)          &lt;br /&gt;
 105     WAN 5 (unused)          &lt;br /&gt;
 106     WAN 6 (unused)          &lt;br /&gt;
 107     WAN 7 (unused)          &lt;br /&gt;
 108     WAN 8 (unused)          &lt;br /&gt;
 109     WAN 9 (unused)          &lt;br /&gt;
 1000    Internal Services       &lt;br /&gt;
 1001    Internal clients        &lt;br /&gt;
 1002    Ceph front-end          &lt;br /&gt;
 1003    Ceph back-end           &lt;br /&gt;
 3900    Guest network           &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
And now, to assign all those VLANs as tagged on port 1/36:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ethernet 1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport mode trunk&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan 10&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 100-109&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 1000-1003&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 3900&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show vlan&#039;&#039;&#039;&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 VLAN    Name                    Ports&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 1       default                 Eth1/19, Eth1/20, Eth1/21, Eth1/22, Eth1/23,&lt;br /&gt;
                                 Eth1/24, Eth1/25, Eth1/26, Eth1/27, Eth1/28,&lt;br /&gt;
                                 Eth1/29, Eth1/30, Eth1/31, Eth1/32, Eth1/33,&lt;br /&gt;
                                 Eth1/34, Eth1/35&lt;br /&gt;
 10      Management              Eth1/36&lt;br /&gt;
 100     WAN 0 (Comcast 44th Avenue)Eth1/36&lt;br /&gt;
 101     WAN 1 (Allo)            Eth1/36&lt;br /&gt;
 102     WAN 2 (unused)          Eth1/36&lt;br /&gt;
 103     WAN 3 (unused)          Eth1/36&lt;br /&gt;
 104     WAN 4 (unused)          Eth1/36&lt;br /&gt;
 105     WAN 5 (unused)          Eth1/36&lt;br /&gt;
 106     WAN 6 (unused)          Eth1/36&lt;br /&gt;
 107     WAN 7 (unused)          Eth1/36&lt;br /&gt;
 108     WAN 8 (unused)          Eth1/36&lt;br /&gt;
 109     WAN 9 (unused)          Eth1/36&lt;br /&gt;
 1000    Internal Services       Eth1/36&lt;br /&gt;
 1001    Internal clients        Eth1/36&lt;br /&gt;
 1002    Ceph front-end          Eth1/36&lt;br /&gt;
 1003    Ceph back-end           Eth1/36&lt;br /&gt;
 3900    Guest network           Eth1/36&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
== Unlocking the bootloader ==&lt;br /&gt;
When reset or just powered on, the SX6036&#039;s bootloader does preset the human on the console a 5 second countdown timer and an opportunity to choose some other options than loading the currently active software image:&lt;br /&gt;
 Mellanox MLNX-OS&lt;br /&gt;
 &lt;br /&gt;
 Default image: &#039;PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&#039;&lt;br /&gt;
 Press Enter to boot this image, or &#039;Ctrl B&#039; for boot menu&lt;br /&gt;
 &lt;br /&gt;
 Booting default image in:  0 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 Mellanox MLNX-OS Boot Menu:&lt;br /&gt;
 &lt;br /&gt;
 *  1: PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&lt;br /&gt;
    2: PPC_M460EX 3.6.8010 2018-08-20 18:04:16 ppc&lt;br /&gt;
    u: USB menu (if USB device connected) (password required)&lt;br /&gt;
    c: Command prompt (password required)&lt;br /&gt;
 &lt;br /&gt;
    Choice: &lt;br /&gt;
Irritatingly, I have been unable to locate the password required for command prompt access.  Fortunately, some kind denizens of the internet have shared a way to change (even remove!) this password from a running MLNX-OS.  I found this information at https://forums.servethehome.com/index.php?threads/solved-mellanox-sx6012-u-boot-password-removal-without-bash-access.33484/&lt;br /&gt;
&lt;br /&gt;
Let&#039;s record this for posterity:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 login: admin&lt;br /&gt;
 Password: &lt;br /&gt;
 Last login: Sun Apr 12 16:57:02 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] (config) # &#039;&#039;&#039;boot bootmgr password 7 &amp;quot;&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;show bootvar&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Installed images:&lt;br /&gt;
   Partition 1:&lt;br /&gt;
     version: PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&lt;br /&gt;
 &lt;br /&gt;
   Partition 2:&lt;br /&gt;
     version: PPC_M460EX 3.6.8010 2018-08-20 18:04:16 ppc&lt;br /&gt;
 &lt;br /&gt;
 Last boot partition             : 1&lt;br /&gt;
 Next boot partition             : 1&lt;br /&gt;
 Serve image files via HTTP/HTTPS: no&lt;br /&gt;
 &lt;br /&gt;
 No boot manager password is set.&lt;br /&gt;
 &lt;br /&gt;
 Image signing              : trusted signature always required&lt;br /&gt;
 Admin require signed images: yes&lt;br /&gt;
 &lt;br /&gt;
 Settings for next boot only:&lt;br /&gt;
   Fallback reboot on configuration failure: yes (default)&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &lt;br /&gt;
Note the line saying &amp;quot;No boot manager password is set.&amp;quot;  A switch that has not had this treatment will report &amp;quot;Boot manager password is set.&amp;quot; instead.&lt;br /&gt;
&lt;br /&gt;
First try was not successful, though.  I may continue poking at this again in the future.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_SX6036&amp;diff=1600</id>
		<title>Mellanox SX6036</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_SX6036&amp;diff=1600"/>
		<updated>2026-04-12T17:29:10Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Unlocking the bootloader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Console access ==&lt;br /&gt;
=== Serial port ===&lt;br /&gt;
There is an 8P8C modular (RJ45) connector on the right side of the port side of the switch.  This connector uses the Cisco pinout and a common Cisco console cable works great for driving it.&lt;br /&gt;
&lt;br /&gt;
Serial settings are 9600 bits per second, 8 data bits, no parity bits, 1 stop bit (9600 8N1)&lt;br /&gt;
&lt;br /&gt;
=== Default credentials ===&lt;br /&gt;
User &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Password &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== Resetting the password ===&lt;br /&gt;
In the lower left  corner of the port side of the switch, there is a small hole labelled &amp;quot;RST&amp;quot;.  Holding the button inside with a paperclip or similar tool for 15 seconds will reset the switch and erase any password set for the &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039; user.  &lt;br /&gt;
&lt;br /&gt;
== Firmware updates ==&lt;br /&gt;
Updating firmware on these switches is a protracted process.  Firmware images are available on the public internet, but some searching is required.  To bring a switch from a 3.2.&#039;&#039;x&#039;&#039; release up to the final 3.6.8012 release, locate the following images on the web and save them to an SSHable or HTTP(S)able location near you:&lt;br /&gt;
* image-PPC_M460EX-3.4.3002.img&lt;br /&gt;
* image-PPC_M460EX-3.5.1006.img&lt;br /&gt;
* image-PPC_M460EX-3.6.1002.img&lt;br /&gt;
* image-PPC_M460EX-3.6.8012.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.3.3400.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.3.5006.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.4.0012.img&lt;br /&gt;
&lt;br /&gt;
=== New firmware image flashing procedure ===&lt;br /&gt;
This is a privileged operation, so first off gain elevated privileges...&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;image fetch http://172.17.0.17/~adj/image-PPC_M460EX-SX_3.3.3400.img&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;image install image-PPC_M460EX-SX_3.3.3400.img location 2 progress track verify require-sig&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;reload&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Wait for U-Boot to prompt about a menu, and send a Ctrl-B before the countdown reaches 0.  Select option 2 (no need for a newline) to boot the newly flashed image.  Iterate through each of the newer images, alternating location 1 and location 2 in the &#039;&#039;&#039;&amp;lt;code&amp;gt;image install ...&amp;lt;/code&amp;gt;&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
When updates version installations are finally complete, it might be good to ensure that 3.6.8012 is flashed to both locations 1 and 2.&lt;br /&gt;
&lt;br /&gt;
== Useful CLI commands ==&lt;br /&gt;
&lt;br /&gt;
=== Find MAC address of 1000baseT management interface 0 ===&lt;br /&gt;
Good for setting up the DHCP server&#039;s config for this switch.  For some reason, this command needs elevated privileges.  Grrr.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show interfaces mgmt0 | include HW&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Find system serial number without reading the physical tag ===&lt;br /&gt;
This is useful for license key generation.  And inventory purposes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show inventory&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Find system host ID ===&lt;br /&gt;
Also can be used for license key generation.  Looks suspiciously like the mgmt0 MAC address...&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show version | include Host&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Licensing features ==&lt;br /&gt;
Mellanox&#039;s SwitchX2 ASIC is capable of performing Infiniband &#039;&#039;&#039;and&#039;&#039;&#039; Ethernet switching.  Mellanox the company likes to lock some of these features behind licensing keys.  Which is annoying.  But with enough effort, is a surmountable obstacle&lt;br /&gt;
&lt;br /&gt;
=== The license generation tool ===&lt;br /&gt;
Inside the MLNX-OS distribution images (those files with names like &#039;&#039;&#039;&amp;lt;code&amp;gt;image-PPC_M460EX-3.6.8012.img&amp;lt;/code&amp;gt;&#039;&#039;&#039;) there exists a gzipped tarball containing the MLNX-OS filesystem.  Inside the tarball is a directory called &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  And inside &#039;&#039;that&#039;&#039; directory, one can find the license key generation program, &#039;&#039;&#039;&amp;lt;code&amp;gt;genlicense&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  The MLNX-OS filesystem image is a PowerPC Linux distribution that can be run from a Qemu emulated big-endian PowerPC machine, or natively on big-endian PowerPC hardware.  We can use this to generate feature licenses until the cows come home.  &lt;br /&gt;
&lt;br /&gt;
=== Our first license, shell access from the switch CLI ===&lt;br /&gt;
There is a hidden CLI command, &#039;&#039;&#039;&amp;lt;code&amp;gt;_shell&amp;lt;/code&amp;gt;&#039;&#039;&#039; which will cause the CLI to &#039;&#039;&#039;&amp;lt;code&amp;gt;execve(&amp;quot;/bin/bash&amp;quot;, ...)&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  This command is privileged (must be run from enable mode) and locked behind a license key.  The following is a working CLI session to install a key for this feature:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &#039;&#039;&#039;passwordgoesherebutisnotechoed&#039;&#039;&#039;&lt;br /&gt;
 Last login: Sun Feb 19 23:25:30 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal &#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-RESTRICTED_CMDS_GEN2-88A1-NEWD-BPNB-1&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show licenses&#039;&#039;&#039;&lt;br /&gt;
 License 1: LK2-RESTRICTED_CMDS_GEN2-88A1-NEWD-BPNB-1&lt;br /&gt;
    Feature:          RESTRICTED_CMDS_GEN2&lt;br /&gt;
    Description:      Access to restricted system functionality&lt;br /&gt;
    Valid:            yes&lt;br /&gt;
    Active:           yes&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
=== Ethernet features: Ethernet, Ethernet L2, and Ethernet L3 ===&lt;br /&gt;
We will generate these from the switch as we already have shell access and can use the included genlicense tool.&lt;br /&gt;
&lt;br /&gt;
Running the following from the switch&#039;s shell will print a key for a non-hardware-locked, non-date-locked license to activate the switch&#039;s full Ethernet capabilities:&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 ~]# &#039;&#039;&#039;cd /opt/tms/bin&#039;&#039;&#039;&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 bin]# &#039;&#039;&#039;./genlicense 2 EFM_SX m2l0n%0x9 -o 53 true -o 51 true -o 58 true&#039;&#039;&#039;&lt;br /&gt;
 LK2-EFM_SX-5M11-5K11-5T11-88A1-BBD0-JP82-X&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 bin]#&lt;br /&gt;
&lt;br /&gt;
A quick explanatory diversion is in order here.  There are 2 types of keys.  genlicense&#039;s first option above specifies key type 2.  &#039;&#039;&#039;&amp;lt;code&amp;gt;EFM_SX&amp;lt;/code&amp;gt;&#039;&#039;&#039; is the &#039;&#039;&#039;&amp;lt;code&amp;gt;Generic SX license&amp;lt;/code&amp;gt;&#039;&#039;&#039; type.  By itself it does nothing, but all of the &#039;&#039;&#039;&amp;lt;code&amp;gt;-o&amp;lt;/code&amp;gt;&#039;&#039;&#039; flags specify further features to be activated.  A complete list of these can be generated by running &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin/genlicense 2&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  There are 14 of these additional options, and their meaning is not well documented.  The magic word &#039;&#039;&#039;&amp;lt;code&amp;gt;m2l0n%0x9&amp;lt;/code&amp;gt;&#039;&#039;&#039; can be found by watching for &#039;&#039;&#039;&amp;lt;code&amp;gt;strlen()&amp;lt;/code&amp;gt;&#039;&#039;&#039; calls in the process flow of &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin/dumplicense&amp;lt;/code&amp;gt;&#039;&#039;&#039; when run under &#039;&#039;&#039;&amp;lt;code&amp;gt;ltrace&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
And it can be installed in the switch&#039;s configuration database by leaving the shell (which will disconnect the terminal session), logging in again, running &#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039; to get elevated privileges, and using the &#039;&#039;&#039;&amp;lt;code&amp;gt;license install&amp;lt;/code&amp;gt;&#039;&#039;&#039; configuration command like so:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Last login: Sun Feb 19 23:31:51 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-EFM_SX-5M11-5K11-5T11-88A1-BBD0-JP82-X&#039;&#039;&#039;&lt;br /&gt;
 License was installed successfully. Please wait 1 minute before further configurations.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
== Switch configuration commands ==&lt;br /&gt;
Some of these things will need licenses first.&lt;br /&gt;
&lt;br /&gt;
=== I can haz Ethernet? ===&lt;br /&gt;
Install the Ethernet key as shown above and confirm it is working:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show system capabilities&#039;&#039;&#039;&lt;br /&gt;
 IB: Supported, L2, Adaptive Routing&lt;br /&gt;
 Ethernet: Supported, L2, L3&lt;br /&gt;
 GW: Not supported&lt;br /&gt;
 Max SM nodes: 648&lt;br /&gt;
 IB Max licensed speed: FDR10&lt;br /&gt;
 Ethernet Max licensed speed: 56Gb&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
It says we can do Ethernet.  Which is cool.  But it does not have the Infiniband-Ethernet gateway feature licensed.  And this is required to enable the switch to run in VPI mode.  VPI is &amp;quot;Virtual Protocol Interconnect&amp;quot; or Mellanox&#039;s way of saying &amp;quot;We can do Infiniband &#039;&#039;and&#039;&#039; Ethernet on a single switch.&amp;quot;  So another license is needed.  Here&#039;s a key for that:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-EFM_SX-5N21-488A-182A-UQXB-Y6&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show system capabilities &#039;&#039;&#039;&lt;br /&gt;
 IB: Supported, L2, Adaptive Routing&lt;br /&gt;
 Ethernet: Supported, L2, L3&lt;br /&gt;
 GW: Supported&lt;br /&gt;
 Max SM nodes: 648&lt;br /&gt;
 IB Max licensed speed: FDR10&lt;br /&gt;
 Ethernet Max licensed speed: 56Gb&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
We will need to do this next thing to convert the switch from an Infiniband-only switch to an Infiniband-and-Ethernet switch:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;system profile vpi-single-switch&#039;&#039;&#039;&lt;br /&gt;
 Warning - confirming will cause system reboot and all configuration will be deleted&lt;br /&gt;
 Type &#039;yes&#039; to confirm profile change: &#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
Allow time for the switch to reboot and log in again.  When it next starts up, run the command &#039;&#039;&#039;&amp;lt;code&amp;gt;show system profile&amp;lt;/code&amp;gt;&#039;&#039;&#039; to confirm that it is in VPI mode:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;show system profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Profile: vpi-single-switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt;&lt;br /&gt;
And finally, let&#039;s set some ports to Ethernet mode:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;show ports type&#039;&#039;&#039;&lt;br /&gt;
 InfiniBand: 1/1 1/2 1/3 1/4 1/5 1/6 1/7 1/8 1/9 1/10 1/11 1/12 1/13 1/14 1/15 1/16 1/17 1/18 1/19 1/20 1/21 1/22 1/23 1/24 1/25 1/26 1/27 1/28 1/29 1/30 1/31 1/32 1/33 1/34 1/35 1/36 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ib 1/19-1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ib 1/19-1/36) # &#039;&#039;&#039;shutdown&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ib 1/19-1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;port 1/19-1/36 type ethernet&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ethernet 1/19-1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/19-1/36) # &#039;&#039;&#039;no shutdown&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/19-1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show ports type&#039;&#039;&#039;&lt;br /&gt;
 Ethernet:   1/19 1/20 1/21 1/22 1/23 1/24 1/25 1/26 1/27 1/28 1/29 1/30 1/31 1/32 1/33 1/34 1/35 1/36 &lt;br /&gt;
 InfiniBand: 1/1 1/2 1/3 1/4 1/5 1/6 1/7 1/8 1/9 1/10 1/11 1/12 1/13 1/14 1/15 1/16 1/17 1/18 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
=== Switch management items ===&lt;br /&gt;
==== Password for the admin user ====&lt;br /&gt;
Factory defaults are probably not a good idea, so let&#039;s tighten things up a bit.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;username admin password &#039;&#039;the_password_goes_here&#039;&#039; &#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
&lt;br /&gt;
==== IP addressing for the management interface ====&lt;br /&gt;
The following will configure the switch to retrieve its IP address, subnet mask, router IP address, name server info, and hostname from DHCP server on the management interface&#039;s local network.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface mgmt0&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;dhcp&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;dhcp hostname&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
&lt;br /&gt;
==== NTP ====&lt;br /&gt;
Let&#039;s add a couple of NTP servers to the config and discipline our poorly behaved battery backed clock:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;ntp server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;ntp server 172.17.0.17&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 NTP is administratively            : enabled&lt;br /&gt;
 NTP Authentication administratively: disabled &lt;br /&gt;
 &lt;br /&gt;
 Clock is synchronized:&lt;br /&gt;
   Reference: 172.16.10.2&lt;br /&gt;
   Offset   : -0.006 ms&lt;br /&gt;
 &lt;br /&gt;
 Active servers and peers:&lt;br /&gt;
   172.16.10.2:&lt;br /&gt;
     Conf Type          : serv&lt;br /&gt;
     Status             : sys.peer(*)&lt;br /&gt;
     Stratum            : 3  &lt;br /&gt;
     Offset(msec)       : -0.006&lt;br /&gt;
     Ref clock          : 45.45.184.14   &lt;br /&gt;
     Poll Interval (sec): 64  &lt;br /&gt;
     Last Response (sec): 8   &lt;br /&gt;
     Auth state         : none    &lt;br /&gt;
 &lt;br /&gt;
   172.17.0.17:&lt;br /&gt;
     Conf Type          : serv&lt;br /&gt;
     Status             : pending    &lt;br /&gt;
     Stratum            : 2  &lt;br /&gt;
     Offset(msec)       : 0.429&lt;br /&gt;
     Ref clock          : 198.60.22.240  &lt;br /&gt;
     Poll Interval (sec): 64  &lt;br /&gt;
     Last Response (sec): 7   &lt;br /&gt;
     Auth state         : none    &lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
=== Ethernet goodies ===&lt;br /&gt;
==== LLDP ====&lt;br /&gt;
Turn it on and test it out like so:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;lldp&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp local&#039;&#039;&#039;&lt;br /&gt;
 LLDP: enabled&lt;br /&gt;
 &lt;br /&gt;
 Local global configuration&lt;br /&gt;
     Chassis sub type: Mac Address&lt;br /&gt;
     Chassis id: 00:02:c9:6d:4d:b0&lt;br /&gt;
     System Name: mellanox-sx6036-rack-1&lt;br /&gt;
     System Description: SX6036,MLNX-OS,SWv3.6.8012&lt;br /&gt;
     Supported capabilities: B,R             &lt;br /&gt;
     Supported capabilities enabled: B&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp interfaces ethernet 1/36&#039;&#039;&#039;&lt;br /&gt;
 TLV flags&lt;br /&gt;
     PD: port-description&lt;br /&gt;
     SN: sys-name        &lt;br /&gt;
     SD: sys-description &lt;br /&gt;
     SC: sys-capabilities&lt;br /&gt;
     MA: management-address&lt;br /&gt;
     ETS-C: ETS-Configuration&lt;br /&gt;
     ETS-R: ETS-Recommendation&lt;br /&gt;
     AP: Application Priority&lt;br /&gt;
     PFC: Priority Flow Control&lt;br /&gt;
     CEE: Converged Enhanced Ethernet DCBX version&lt;br /&gt;
     MED-CAP: Media Capabilities&lt;br /&gt;
     MED-NWP: MED-Network Policy&lt;br /&gt;
 &lt;br /&gt;
 -----------------------------------------------------------------------------------&lt;br /&gt;
 Interface    Receive   Transmit  TLVs                                              &lt;br /&gt;
 -----------------------------------------------------------------------------------&lt;br /&gt;
 Eth1/36      Enabled   Enabled   PD, SN, SD, SC, PFC, AP, ETS-C, ETS-R             &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp interfaces ethernet 1/36 remote&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Eth1/36&lt;br /&gt;
 &lt;br /&gt;
 Remote Index: 1&lt;br /&gt;
 Remote chassis id: cc:4e:24:83:4b:36 ; chassis id subtype: Mac Address (4)&lt;br /&gt;
 Remote port-id: cc:4e:24:83:4b:6c ; port id subtype: Mac Address (3)&lt;br /&gt;
 Remote port description: 40GigabitEthernet1/2/6&lt;br /&gt;
 Remote system name: brocade-icx6610-48p-rack-1&lt;br /&gt;
 Remote system description: Not Advertised&lt;br /&gt;
 Remote system capabilities supported: B,R  ; enabled B,R&lt;br /&gt;
 Remote Management Addresses:&lt;br /&gt;
 SubType        Address&lt;br /&gt;
 ------------------------------------&lt;br /&gt;
 IPv4        172.16.10.17&lt;br /&gt;
 &lt;br /&gt;
 No Remote PFC entry&lt;br /&gt;
 &lt;br /&gt;
 No Remote ETS entry&lt;br /&gt;
 &lt;br /&gt;
 No Remote Application Priority entry&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
And enjoy getting to know all the things about your neighbors.&lt;br /&gt;
==== Multiple Spanning Tree Protocol ====&lt;br /&gt;
Wherein we avoid broadcast loops.  Because they are bad, even if they do make for lots of blinken lights.&lt;br /&gt;
Our Brocade switches are running MSTP and, fortunately, MLNX-OS supports that on our SX6036es as well.&lt;br /&gt;
Setting the switch to MSTP mode is pretty simple:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;spanning-tree mode mst&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show spanning-tree&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Switch                     : ethernet-default&lt;br /&gt;
 Spanning tree protocol mst : enabled&lt;br /&gt;
 Spanning tree force version: 3&lt;br /&gt;
 &lt;br /&gt;
 Root ID:&lt;br /&gt;
   Priority           : 32768&lt;br /&gt;
   Address            : 00:02:c9:6d:4c:b0   &lt;br /&gt;
   Cost               : 0&lt;br /&gt;
   Port               : Eth1/36&lt;br /&gt;
   Hello Time (sec)   : 2&lt;br /&gt;
   Max Age (sec)      : 20&lt;br /&gt;
   Forward Delay (sec): 15&lt;br /&gt;
 &lt;br /&gt;
   MST00:&lt;br /&gt;
     Bridge is executing the mstp compatible Spanning Tree Protocol&lt;br /&gt;
 &lt;br /&gt;
 Bridge ID:&lt;br /&gt;
   Priority           : 32768&lt;br /&gt;
   Address            : 00:02:c9:6d:4d:b0   &lt;br /&gt;
   Hello Time (sec)   : 2&lt;br /&gt;
   Max Age (sec)      : 20&lt;br /&gt;
   Forward Delay (sec): 15&lt;br /&gt;
 &lt;br /&gt;
 L: Loop Inconsistent&lt;br /&gt;
 R: Root Inconsistent&lt;br /&gt;
 G: BPDU Guard Inconsistent&lt;br /&gt;
 &lt;br /&gt;
 --------------------------------------------------------------------------&lt;br /&gt;
 Interface         Role         Sts              Cost      Prio   Type     &lt;br /&gt;
 --------------------------------------------------------------------------&lt;br /&gt;
 Eth1/36           Root         Forwarding       500       128    normal   &lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
==== VLANs ====&lt;br /&gt;
Create our standard assortment of VLANs like so:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 10 name Management&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 10) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 100 name &amp;quot;WAN 0 (Comcast 44th Avenue)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 100) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 101 name &amp;quot;WAN 1 (Allo)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 101) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 102 name &amp;quot;WAN 2 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 102) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 103 name &amp;quot;WAN 3 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 103) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 104 name &amp;quot;WAN 4 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 104) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 105 name &amp;quot;WAN 5 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 105) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 106 name &amp;quot;WAN 6 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 106) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # vlan 107 &#039;&#039;&#039;name &amp;quot;WAN 7 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 107) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 108 name &amp;quot;WAN 8 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 108) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 109 name &amp;quot;WAN 9 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 109) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1000 name &amp;quot;Internal Services&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1000) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1001 name &amp;quot;Internal clients&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1001) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1002 name &amp;quot;Ceph front-end&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1002) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1003 name &amp;quot;Ceph back-end&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1003) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 3900 name &amp;quot;Guest network&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 3900) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show vlan&#039;&#039;&#039;&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 VLAN    Name                    Ports&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 1       default                 Eth1/19, Eth1/20, Eth1/21, Eth1/22, Eth1/23,&lt;br /&gt;
                                 Eth1/24, Eth1/25, Eth1/26, Eth1/27, Eth1/28,&lt;br /&gt;
                                 Eth1/29, Eth1/30, Eth1/31, Eth1/32, Eth1/33,&lt;br /&gt;
                                 Eth1/34, Eth1/35, Eth1/36&lt;br /&gt;
 10      Management              &lt;br /&gt;
 100     WAN 0 (Comcast 44th Avenue)&lt;br /&gt;
 101     WAN 1 (Allo)            &lt;br /&gt;
 102     WAN 2 (unused)          &lt;br /&gt;
 103     WAN 3 (unused)          &lt;br /&gt;
 104     WAN 4 (unused)          &lt;br /&gt;
 105     WAN 5 (unused)          &lt;br /&gt;
 106     WAN 6 (unused)          &lt;br /&gt;
 107     WAN 7 (unused)          &lt;br /&gt;
 108     WAN 8 (unused)          &lt;br /&gt;
 109     WAN 9 (unused)          &lt;br /&gt;
 1000    Internal Services       &lt;br /&gt;
 1001    Internal clients        &lt;br /&gt;
 1002    Ceph front-end          &lt;br /&gt;
 1003    Ceph back-end           &lt;br /&gt;
 3900    Guest network           &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
And now, to assign all those VLANs as tagged on port 1/36:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ethernet 1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport mode trunk&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan 10&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 100-109&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 1000-1003&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 3900&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show vlan&#039;&#039;&#039;&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 VLAN    Name                    Ports&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 1       default                 Eth1/19, Eth1/20, Eth1/21, Eth1/22, Eth1/23,&lt;br /&gt;
                                 Eth1/24, Eth1/25, Eth1/26, Eth1/27, Eth1/28,&lt;br /&gt;
                                 Eth1/29, Eth1/30, Eth1/31, Eth1/32, Eth1/33,&lt;br /&gt;
                                 Eth1/34, Eth1/35&lt;br /&gt;
 10      Management              Eth1/36&lt;br /&gt;
 100     WAN 0 (Comcast 44th Avenue)Eth1/36&lt;br /&gt;
 101     WAN 1 (Allo)            Eth1/36&lt;br /&gt;
 102     WAN 2 (unused)          Eth1/36&lt;br /&gt;
 103     WAN 3 (unused)          Eth1/36&lt;br /&gt;
 104     WAN 4 (unused)          Eth1/36&lt;br /&gt;
 105     WAN 5 (unused)          Eth1/36&lt;br /&gt;
 106     WAN 6 (unused)          Eth1/36&lt;br /&gt;
 107     WAN 7 (unused)          Eth1/36&lt;br /&gt;
 108     WAN 8 (unused)          Eth1/36&lt;br /&gt;
 109     WAN 9 (unused)          Eth1/36&lt;br /&gt;
 1000    Internal Services       Eth1/36&lt;br /&gt;
 1001    Internal clients        Eth1/36&lt;br /&gt;
 1002    Ceph front-end          Eth1/36&lt;br /&gt;
 1003    Ceph back-end           Eth1/36&lt;br /&gt;
 3900    Guest network           Eth1/36&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
== Unlocking the bootloader ==&lt;br /&gt;
When reset or just powered on, the SX6036&#039;s bootloader does preset the human on the console a 5 second countdown timer and an opportunity to choose some other options than loading the currently active software image:&lt;br /&gt;
 Mellanox MLNX-OS&lt;br /&gt;
 &lt;br /&gt;
 Default image: &#039;PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&#039;&lt;br /&gt;
 Press Enter to boot this image, or &#039;Ctrl B&#039; for boot menu&lt;br /&gt;
 &lt;br /&gt;
 Booting default image in:  0 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 Mellanox MLNX-OS Boot Menu:&lt;br /&gt;
 &lt;br /&gt;
 *  1: PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&lt;br /&gt;
    2: PPC_M460EX 3.6.8010 2018-08-20 18:04:16 ppc&lt;br /&gt;
    u: USB menu (if USB device connected) (password required)&lt;br /&gt;
    c: Command prompt (password required)&lt;br /&gt;
 &lt;br /&gt;
    Choice: &lt;br /&gt;
Irritatingly, I have been unable to locate the password required for command prompt access.  Fortunately, some kind denizens of the internet have shared a way to change (even remove!) this password from a running MLNX-OS.  I found this information at https://forums.servethehome.com/index.php?threads/solved-mellanox-sx6012-u-boot-password-removal-without-bash-access.33484/&lt;br /&gt;
&lt;br /&gt;
Let&#039;s record this for posterity:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 login: admin&lt;br /&gt;
 Password: &lt;br /&gt;
 Last login: Sun Apr 12 16:57:02 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] (config) # &#039;&#039;&#039;boot bootmgr password 7 &amp;quot;&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;show bootvar&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Installed images:&lt;br /&gt;
   Partition 1:&lt;br /&gt;
     version: PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&lt;br /&gt;
 &lt;br /&gt;
   Partition 2:&lt;br /&gt;
     version: PPC_M460EX 3.6.8010 2018-08-20 18:04:16 ppc&lt;br /&gt;
 &lt;br /&gt;
 Last boot partition             : 1&lt;br /&gt;
 Next boot partition             : 1&lt;br /&gt;
 Serve image files via HTTP/HTTPS: no&lt;br /&gt;
 &lt;br /&gt;
 No boot manager password is set.&lt;br /&gt;
 &lt;br /&gt;
 Image signing              : trusted signature always required&lt;br /&gt;
 Admin require signed images: yes&lt;br /&gt;
 &lt;br /&gt;
 Settings for next boot only:&lt;br /&gt;
   Fallback reboot on configuration failure: yes (default)&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &lt;br /&gt;
Note the line saying &amp;quot;No boot manager password is set.&amp;quot;  A switch that has not had this treatment will report &amp;quot;Boot manager password is set.&amp;quot; instead.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_SX6036&amp;diff=1599</id>
		<title>Mellanox SX6036</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Mellanox_SX6036&amp;diff=1599"/>
		<updated>2026-04-12T17:27:45Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* VLANs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Console access ==&lt;br /&gt;
=== Serial port ===&lt;br /&gt;
There is an 8P8C modular (RJ45) connector on the right side of the port side of the switch.  This connector uses the Cisco pinout and a common Cisco console cable works great for driving it.&lt;br /&gt;
&lt;br /&gt;
Serial settings are 9600 bits per second, 8 data bits, no parity bits, 1 stop bit (9600 8N1)&lt;br /&gt;
&lt;br /&gt;
=== Default credentials ===&lt;br /&gt;
User &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Password &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== Resetting the password ===&lt;br /&gt;
In the lower left  corner of the port side of the switch, there is a small hole labelled &amp;quot;RST&amp;quot;.  Holding the button inside with a paperclip or similar tool for 15 seconds will reset the switch and erase any password set for the &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039; user.  &lt;br /&gt;
&lt;br /&gt;
== Firmware updates ==&lt;br /&gt;
Updating firmware on these switches is a protracted process.  Firmware images are available on the public internet, but some searching is required.  To bring a switch from a 3.2.&#039;&#039;x&#039;&#039; release up to the final 3.6.8012 release, locate the following images on the web and save them to an SSHable or HTTP(S)able location near you:&lt;br /&gt;
* image-PPC_M460EX-3.4.3002.img&lt;br /&gt;
* image-PPC_M460EX-3.5.1006.img&lt;br /&gt;
* image-PPC_M460EX-3.6.1002.img&lt;br /&gt;
* image-PPC_M460EX-3.6.8012.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.3.3400.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.3.5006.img&lt;br /&gt;
* image-PPC_M460EX-SX_3.4.0012.img&lt;br /&gt;
&lt;br /&gt;
=== New firmware image flashing procedure ===&lt;br /&gt;
This is a privileged operation, so first off gain elevated privileges...&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;image fetch http://172.17.0.17/~adj/image-PPC_M460EX-SX_3.3.3400.img&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;image install image-PPC_M460EX-SX_3.3.3400.img location 2 progress track verify require-sig&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;reload&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Wait for U-Boot to prompt about a menu, and send a Ctrl-B before the countdown reaches 0.  Select option 2 (no need for a newline) to boot the newly flashed image.  Iterate through each of the newer images, alternating location 1 and location 2 in the &#039;&#039;&#039;&amp;lt;code&amp;gt;image install ...&amp;lt;/code&amp;gt;&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
When updates version installations are finally complete, it might be good to ensure that 3.6.8012 is flashed to both locations 1 and 2.&lt;br /&gt;
&lt;br /&gt;
== Useful CLI commands ==&lt;br /&gt;
&lt;br /&gt;
=== Find MAC address of 1000baseT management interface 0 ===&lt;br /&gt;
Good for setting up the DHCP server&#039;s config for this switch.  For some reason, this command needs elevated privileges.  Grrr.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show interfaces mgmt0 | include HW&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Find system serial number without reading the physical tag ===&lt;br /&gt;
This is useful for license key generation.  And inventory purposes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show inventory&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Find system host ID ===&lt;br /&gt;
Also can be used for license key generation.  Looks suspiciously like the mgmt0 MAC address...&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;show version | include Host&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Licensing features ==&lt;br /&gt;
Mellanox&#039;s SwitchX2 ASIC is capable of performing Infiniband &#039;&#039;&#039;and&#039;&#039;&#039; Ethernet switching.  Mellanox the company likes to lock some of these features behind licensing keys.  Which is annoying.  But with enough effort, is a surmountable obstacle&lt;br /&gt;
&lt;br /&gt;
=== The license generation tool ===&lt;br /&gt;
Inside the MLNX-OS distribution images (those files with names like &#039;&#039;&#039;&amp;lt;code&amp;gt;image-PPC_M460EX-3.6.8012.img&amp;lt;/code&amp;gt;&#039;&#039;&#039;) there exists a gzipped tarball containing the MLNX-OS filesystem.  Inside the tarball is a directory called &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  And inside &#039;&#039;that&#039;&#039; directory, one can find the license key generation program, &#039;&#039;&#039;&amp;lt;code&amp;gt;genlicense&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  The MLNX-OS filesystem image is a PowerPC Linux distribution that can be run from a Qemu emulated big-endian PowerPC machine, or natively on big-endian PowerPC hardware.  We can use this to generate feature licenses until the cows come home.  &lt;br /&gt;
&lt;br /&gt;
=== Our first license, shell access from the switch CLI ===&lt;br /&gt;
There is a hidden CLI command, &#039;&#039;&#039;&amp;lt;code&amp;gt;_shell&amp;lt;/code&amp;gt;&#039;&#039;&#039; which will cause the CLI to &#039;&#039;&#039;&amp;lt;code&amp;gt;execve(&amp;quot;/bin/bash&amp;quot;, ...)&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  This command is privileged (must be run from enable mode) and locked behind a license key.  The following is a working CLI session to install a key for this feature:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &#039;&#039;&#039;passwordgoesherebutisnotechoed&#039;&#039;&#039;&lt;br /&gt;
 Last login: Sun Feb 19 23:25:30 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal &#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-RESTRICTED_CMDS_GEN2-88A1-NEWD-BPNB-1&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show licenses&#039;&#039;&#039;&lt;br /&gt;
 License 1: LK2-RESTRICTED_CMDS_GEN2-88A1-NEWD-BPNB-1&lt;br /&gt;
    Feature:          RESTRICTED_CMDS_GEN2&lt;br /&gt;
    Description:      Access to restricted system functionality&lt;br /&gt;
    Valid:            yes&lt;br /&gt;
    Active:           yes&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
=== Ethernet features: Ethernet, Ethernet L2, and Ethernet L3 ===&lt;br /&gt;
We will generate these from the switch as we already have shell access and can use the included genlicense tool.&lt;br /&gt;
&lt;br /&gt;
Running the following from the switch&#039;s shell will print a key for a non-hardware-locked, non-date-locked license to activate the switch&#039;s full Ethernet capabilities:&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 ~]# &#039;&#039;&#039;cd /opt/tms/bin&#039;&#039;&#039;&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 bin]# &#039;&#039;&#039;./genlicense 2 EFM_SX m2l0n%0x9 -o 53 true -o 51 true -o 58 true&#039;&#039;&#039;&lt;br /&gt;
 LK2-EFM_SX-5M11-5K11-5T11-88A1-BBD0-JP82-X&lt;br /&gt;
 [admin@mellanox-sx6036-rack-0 bin]#&lt;br /&gt;
&lt;br /&gt;
A quick explanatory diversion is in order here.  There are 2 types of keys.  genlicense&#039;s first option above specifies key type 2.  &#039;&#039;&#039;&amp;lt;code&amp;gt;EFM_SX&amp;lt;/code&amp;gt;&#039;&#039;&#039; is the &#039;&#039;&#039;&amp;lt;code&amp;gt;Generic SX license&amp;lt;/code&amp;gt;&#039;&#039;&#039; type.  By itself it does nothing, but all of the &#039;&#039;&#039;&amp;lt;code&amp;gt;-o&amp;lt;/code&amp;gt;&#039;&#039;&#039; flags specify further features to be activated.  A complete list of these can be generated by running &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin/genlicense 2&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  There are 14 of these additional options, and their meaning is not well documented.  The magic word &#039;&#039;&#039;&amp;lt;code&amp;gt;m2l0n%0x9&amp;lt;/code&amp;gt;&#039;&#039;&#039; can be found by watching for &#039;&#039;&#039;&amp;lt;code&amp;gt;strlen()&amp;lt;/code&amp;gt;&#039;&#039;&#039; calls in the process flow of &#039;&#039;&#039;&amp;lt;code&amp;gt;/opt/tms/bin/dumplicense&amp;lt;/code&amp;gt;&#039;&#039;&#039; when run under &#039;&#039;&#039;&amp;lt;code&amp;gt;ltrace&amp;lt;/code&amp;gt;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
And it can be installed in the switch&#039;s configuration database by leaving the shell (which will disconnect the terminal session), logging in again, running &#039;&#039;&#039;&amp;lt;code&amp;gt;enable&amp;lt;/code&amp;gt;&#039;&#039;&#039; to get elevated privileges, and using the &#039;&#039;&#039;&amp;lt;code&amp;gt;license install&amp;lt;/code&amp;gt;&#039;&#039;&#039; configuration command like so:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Last login: Sun Feb 19 23:31:51 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-EFM_SX-5M11-5K11-5T11-88A1-BBD0-JP82-X&#039;&#039;&#039;&lt;br /&gt;
 License was installed successfully. Please wait 1 minute before further configurations.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
== Switch configuration commands ==&lt;br /&gt;
Some of these things will need licenses first.&lt;br /&gt;
&lt;br /&gt;
=== I can haz Ethernet? ===&lt;br /&gt;
Install the Ethernet key as shown above and confirm it is working:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show system capabilities&#039;&#039;&#039;&lt;br /&gt;
 IB: Supported, L2, Adaptive Routing&lt;br /&gt;
 Ethernet: Supported, L2, L3&lt;br /&gt;
 GW: Not supported&lt;br /&gt;
 Max SM nodes: 648&lt;br /&gt;
 IB Max licensed speed: FDR10&lt;br /&gt;
 Ethernet Max licensed speed: 56Gb&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
It says we can do Ethernet.  Which is cool.  But it does not have the Infiniband-Ethernet gateway feature licensed.  And this is required to enable the switch to run in VPI mode.  VPI is &amp;quot;Virtual Protocol Interconnect&amp;quot; or Mellanox&#039;s way of saying &amp;quot;We can do Infiniband &#039;&#039;and&#039;&#039; Ethernet on a single switch.&amp;quot;  So another license is needed.  Here&#039;s a key for that:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;license install LK2-EFM_SX-5N21-488A-182A-UQXB-Y6&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show system capabilities &#039;&#039;&#039;&lt;br /&gt;
 IB: Supported, L2, Adaptive Routing&lt;br /&gt;
 Ethernet: Supported, L2, L3&lt;br /&gt;
 GW: Supported&lt;br /&gt;
 Max SM nodes: 648&lt;br /&gt;
 IB Max licensed speed: FDR10&lt;br /&gt;
 Ethernet Max licensed speed: 56Gb&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
We will need to do this next thing to convert the switch from an Infiniband-only switch to an Infiniband-and-Ethernet switch:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;system profile vpi-single-switch&#039;&#039;&#039;&lt;br /&gt;
 Warning - confirming will cause system reboot and all configuration will be deleted&lt;br /&gt;
 Type &#039;yes&#039; to confirm profile change: &#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
Allow time for the switch to reboot and log in again.  When it next starts up, run the command &#039;&#039;&#039;&amp;lt;code&amp;gt;show system profile&amp;lt;/code&amp;gt;&#039;&#039;&#039; to confirm that it is in VPI mode:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;show system profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Profile: vpi-single-switch&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt;&lt;br /&gt;
And finally, let&#039;s set some ports to Ethernet mode:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;show ports type&#039;&#039;&#039;&lt;br /&gt;
 InfiniBand: 1/1 1/2 1/3 1/4 1/5 1/6 1/7 1/8 1/9 1/10 1/11 1/12 1/13 1/14 1/15 1/16 1/17 1/18 1/19 1/20 1/21 1/22 1/23 1/24 1/25 1/26 1/27 1/28 1/29 1/30 1/31 1/32 1/33 1/34 1/35 1/36 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ib 1/19-1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ib 1/19-1/36) # &#039;&#039;&#039;shutdown&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ib 1/19-1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;port 1/19-1/36 type ethernet&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ethernet 1/19-1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/19-1/36) # &#039;&#039;&#039;no shutdown&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/19-1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show ports type&#039;&#039;&#039;&lt;br /&gt;
 Ethernet:   1/19 1/20 1/21 1/22 1/23 1/24 1/25 1/26 1/27 1/28 1/29 1/30 1/31 1/32 1/33 1/34 1/35 1/36 &lt;br /&gt;
 InfiniBand: 1/1 1/2 1/3 1/4 1/5 1/6 1/7 1/8 1/9 1/10 1/11 1/12 1/13 1/14 1/15 1/16 1/17 1/18 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
&lt;br /&gt;
=== Switch management items ===&lt;br /&gt;
==== Password for the admin user ====&lt;br /&gt;
Factory defaults are probably not a good idea, so let&#039;s tighten things up a bit.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;username admin password &#039;&#039;the_password_goes_here&#039;&#039; &#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
&lt;br /&gt;
==== IP addressing for the management interface ====&lt;br /&gt;
The following will configure the switch to retrieve its IP address, subnet mask, router IP address, name server info, and hostname from DHCP server on the management interface&#039;s local network.&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface mgmt0&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;dhcp&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;dhcp hostname&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface mgmt0) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &lt;br /&gt;
&lt;br /&gt;
==== NTP ====&lt;br /&gt;
Let&#039;s add a couple of NTP servers to the config and discipline our poorly behaved battery backed clock:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;ntp server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;ntp server 172.17.0.17&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 NTP is administratively            : enabled&lt;br /&gt;
 NTP Authentication administratively: disabled &lt;br /&gt;
 &lt;br /&gt;
 Clock is synchronized:&lt;br /&gt;
   Reference: 172.16.10.2&lt;br /&gt;
   Offset   : -0.006 ms&lt;br /&gt;
 &lt;br /&gt;
 Active servers and peers:&lt;br /&gt;
   172.16.10.2:&lt;br /&gt;
     Conf Type          : serv&lt;br /&gt;
     Status             : sys.peer(*)&lt;br /&gt;
     Stratum            : 3  &lt;br /&gt;
     Offset(msec)       : -0.006&lt;br /&gt;
     Ref clock          : 45.45.184.14   &lt;br /&gt;
     Poll Interval (sec): 64  &lt;br /&gt;
     Last Response (sec): 8   &lt;br /&gt;
     Auth state         : none    &lt;br /&gt;
 &lt;br /&gt;
   172.17.0.17:&lt;br /&gt;
     Conf Type          : serv&lt;br /&gt;
     Status             : pending    &lt;br /&gt;
     Stratum            : 2  &lt;br /&gt;
     Offset(msec)       : 0.429&lt;br /&gt;
     Ref clock          : 198.60.22.240  &lt;br /&gt;
     Poll Interval (sec): 64  &lt;br /&gt;
     Last Response (sec): 7   &lt;br /&gt;
     Auth state         : none    &lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
=== Ethernet goodies ===&lt;br /&gt;
==== LLDP ====&lt;br /&gt;
Turn it on and test it out like so:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;lldp&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp local&#039;&#039;&#039;&lt;br /&gt;
 LLDP: enabled&lt;br /&gt;
 &lt;br /&gt;
 Local global configuration&lt;br /&gt;
     Chassis sub type: Mac Address&lt;br /&gt;
     Chassis id: 00:02:c9:6d:4d:b0&lt;br /&gt;
     System Name: mellanox-sx6036-rack-1&lt;br /&gt;
     System Description: SX6036,MLNX-OS,SWv3.6.8012&lt;br /&gt;
     Supported capabilities: B,R             &lt;br /&gt;
     Supported capabilities enabled: B&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp interfaces ethernet 1/36&#039;&#039;&#039;&lt;br /&gt;
 TLV flags&lt;br /&gt;
     PD: port-description&lt;br /&gt;
     SN: sys-name        &lt;br /&gt;
     SD: sys-description &lt;br /&gt;
     SC: sys-capabilities&lt;br /&gt;
     MA: management-address&lt;br /&gt;
     ETS-C: ETS-Configuration&lt;br /&gt;
     ETS-R: ETS-Recommendation&lt;br /&gt;
     AP: Application Priority&lt;br /&gt;
     PFC: Priority Flow Control&lt;br /&gt;
     CEE: Converged Enhanced Ethernet DCBX version&lt;br /&gt;
     MED-CAP: Media Capabilities&lt;br /&gt;
     MED-NWP: MED-Network Policy&lt;br /&gt;
 &lt;br /&gt;
 -----------------------------------------------------------------------------------&lt;br /&gt;
 Interface    Receive   Transmit  TLVs                                              &lt;br /&gt;
 -----------------------------------------------------------------------------------&lt;br /&gt;
 Eth1/36      Enabled   Enabled   PD, SN, SD, SC, PFC, AP, ETS-C, ETS-R             &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show lldp interfaces ethernet 1/36 remote&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Eth1/36&lt;br /&gt;
 &lt;br /&gt;
 Remote Index: 1&lt;br /&gt;
 Remote chassis id: cc:4e:24:83:4b:36 ; chassis id subtype: Mac Address (4)&lt;br /&gt;
 Remote port-id: cc:4e:24:83:4b:6c ; port id subtype: Mac Address (3)&lt;br /&gt;
 Remote port description: 40GigabitEthernet1/2/6&lt;br /&gt;
 Remote system name: brocade-icx6610-48p-rack-1&lt;br /&gt;
 Remote system description: Not Advertised&lt;br /&gt;
 Remote system capabilities supported: B,R  ; enabled B,R&lt;br /&gt;
 Remote Management Addresses:&lt;br /&gt;
 SubType        Address&lt;br /&gt;
 ------------------------------------&lt;br /&gt;
 IPv4        172.16.10.17&lt;br /&gt;
 &lt;br /&gt;
 No Remote PFC entry&lt;br /&gt;
 &lt;br /&gt;
 No Remote ETS entry&lt;br /&gt;
 &lt;br /&gt;
 No Remote Application Priority entry&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
And enjoy getting to know all the things about your neighbors.&lt;br /&gt;
==== Multiple Spanning Tree Protocol ====&lt;br /&gt;
Wherein we avoid broadcast loops.  Because they are bad, even if they do make for lots of blinken lights.&lt;br /&gt;
Our Brocade switches are running MSTP and, fortunately, MLNX-OS supports that on our SX6036es as well.&lt;br /&gt;
Setting the switch to MSTP mode is pretty simple:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;spanning-tree mode mst&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show spanning-tree&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Switch                     : ethernet-default&lt;br /&gt;
 Spanning tree protocol mst : enabled&lt;br /&gt;
 Spanning tree force version: 3&lt;br /&gt;
 &lt;br /&gt;
 Root ID:&lt;br /&gt;
   Priority           : 32768&lt;br /&gt;
   Address            : 00:02:c9:6d:4c:b0   &lt;br /&gt;
   Cost               : 0&lt;br /&gt;
   Port               : Eth1/36&lt;br /&gt;
   Hello Time (sec)   : 2&lt;br /&gt;
   Max Age (sec)      : 20&lt;br /&gt;
   Forward Delay (sec): 15&lt;br /&gt;
 &lt;br /&gt;
   MST00:&lt;br /&gt;
     Bridge is executing the mstp compatible Spanning Tree Protocol&lt;br /&gt;
 &lt;br /&gt;
 Bridge ID:&lt;br /&gt;
   Priority           : 32768&lt;br /&gt;
   Address            : 00:02:c9:6d:4d:b0   &lt;br /&gt;
   Hello Time (sec)   : 2&lt;br /&gt;
   Max Age (sec)      : 20&lt;br /&gt;
   Forward Delay (sec): 15&lt;br /&gt;
 &lt;br /&gt;
 L: Loop Inconsistent&lt;br /&gt;
 R: Root Inconsistent&lt;br /&gt;
 G: BPDU Guard Inconsistent&lt;br /&gt;
 &lt;br /&gt;
 --------------------------------------------------------------------------&lt;br /&gt;
 Interface         Role         Sts              Cost      Prio   Type     &lt;br /&gt;
 --------------------------------------------------------------------------&lt;br /&gt;
 Eth1/36           Root         Forwarding       500       128    normal   &lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
==== VLANs ====&lt;br /&gt;
Create our standard assortment of VLANs like so:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 10 name Management&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 10) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 100 name &amp;quot;WAN 0 (Comcast 44th Avenue)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 100) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 101 name &amp;quot;WAN 1 (Allo)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 101) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 102 name &amp;quot;WAN 2 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 102) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 103 name &amp;quot;WAN 3 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 103) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 104 name &amp;quot;WAN 4 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 104) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 105 name &amp;quot;WAN 5 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 105) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 106 name &amp;quot;WAN 6 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 106) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # vlan 107 &#039;&#039;&#039;name &amp;quot;WAN 7 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 107) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 108 name &amp;quot;WAN 8 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 108) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 109 name &amp;quot;WAN 9 (unused)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 109) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1000 name &amp;quot;Internal Services&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1000) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1001 name &amp;quot;Internal clients&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1001) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1002 name &amp;quot;Ceph front-end&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1002) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 1003 name &amp;quot;Ceph back-end&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 1003) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;vlan 3900 name &amp;quot;Guest network&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config vlan 3900) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show vlan&#039;&#039;&#039;&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 VLAN    Name                    Ports&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 1       default                 Eth1/19, Eth1/20, Eth1/21, Eth1/22, Eth1/23,&lt;br /&gt;
                                 Eth1/24, Eth1/25, Eth1/26, Eth1/27, Eth1/28,&lt;br /&gt;
                                 Eth1/29, Eth1/30, Eth1/31, Eth1/32, Eth1/33,&lt;br /&gt;
                                 Eth1/34, Eth1/35, Eth1/36&lt;br /&gt;
 10      Management              &lt;br /&gt;
 100     WAN 0 (Comcast 44th Avenue)&lt;br /&gt;
 101     WAN 1 (Allo)            &lt;br /&gt;
 102     WAN 2 (unused)          &lt;br /&gt;
 103     WAN 3 (unused)          &lt;br /&gt;
 104     WAN 4 (unused)          &lt;br /&gt;
 105     WAN 5 (unused)          &lt;br /&gt;
 106     WAN 6 (unused)          &lt;br /&gt;
 107     WAN 7 (unused)          &lt;br /&gt;
 108     WAN 8 (unused)          &lt;br /&gt;
 109     WAN 9 (unused)          &lt;br /&gt;
 1000    Internal Services       &lt;br /&gt;
 1001    Internal clients        &lt;br /&gt;
 1002    Ceph front-end          &lt;br /&gt;
 1003    Ceph back-end           &lt;br /&gt;
 3900    Guest network           &lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
And now, to assign all those VLANs as tagged on port 1/36:&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;interface ethernet 1/36&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport mode trunk&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan 10&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 100-109&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 1000-1003&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;switchport trunk allowed-vlan add 3900&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config interface ethernet 1/36) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] # &#039;&#039;&#039;show vlan&#039;&#039;&#039;&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 VLAN    Name                    Ports&lt;br /&gt;
 ----------------------------------------------------------------------&lt;br /&gt;
 1       default                 Eth1/19, Eth1/20, Eth1/21, Eth1/22, Eth1/23,&lt;br /&gt;
                                 Eth1/24, Eth1/25, Eth1/26, Eth1/27, Eth1/28,&lt;br /&gt;
                                 Eth1/29, Eth1/30, Eth1/31, Eth1/32, Eth1/33,&lt;br /&gt;
                                 Eth1/34, Eth1/35&lt;br /&gt;
 10      Management              Eth1/36&lt;br /&gt;
 100     WAN 0 (Comcast 44th Avenue)Eth1/36&lt;br /&gt;
 101     WAN 1 (Allo)            Eth1/36&lt;br /&gt;
 102     WAN 2 (unused)          Eth1/36&lt;br /&gt;
 103     WAN 3 (unused)          Eth1/36&lt;br /&gt;
 104     WAN 4 (unused)          Eth1/36&lt;br /&gt;
 105     WAN 5 (unused)          Eth1/36&lt;br /&gt;
 106     WAN 6 (unused)          Eth1/36&lt;br /&gt;
 107     WAN 7 (unused)          Eth1/36&lt;br /&gt;
 108     WAN 8 (unused)          Eth1/36&lt;br /&gt;
 109     WAN 9 (unused)          Eth1/36&lt;br /&gt;
 1000    Internal Services       Eth1/36&lt;br /&gt;
 1001    Internal clients        Eth1/36&lt;br /&gt;
 1002    Ceph front-end          Eth1/36&lt;br /&gt;
 1003    Ceph back-end           Eth1/36&lt;br /&gt;
 3900    Guest network           Eth1/36&lt;br /&gt;
 mellanox-sx6036-rack-1 [standalone: master] #&lt;br /&gt;
== Unlocking the bootloader ==&lt;br /&gt;
When reset or just powered on, the SX6036&#039;s bootloader does preset the human on the console a 5 second countdown timer and an opportunity to choose some other options than loading the currently active software image:&lt;br /&gt;
 Mellanox MLNX-OS&lt;br /&gt;
 &lt;br /&gt;
 Default image: &#039;PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&#039;&lt;br /&gt;
 Press Enter to boot this image, or &#039;Ctrl B&#039; for boot menu&lt;br /&gt;
 &lt;br /&gt;
 Booting default image in:  0 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 Mellanox MLNX-OS Boot Menu:&lt;br /&gt;
 &lt;br /&gt;
 *  1: PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&lt;br /&gt;
    2: PPC_M460EX 3.6.8010 2018-08-20 18:04:16 ppc&lt;br /&gt;
    u: USB menu (if USB device connected) (password required)&lt;br /&gt;
    c: Command prompt (password required)&lt;br /&gt;
 &lt;br /&gt;
    Choice: &lt;br /&gt;
Irritatingly, I have been unable to locate the password required for command prompt access.  Fortunately, some kind denizens of the internet have shared a way to change (even remove!) this password from a running MLNX-OS.  I found this information at https://forums.servethehome.com/index.php?threads/solved-mellanox-sx6012-u-boot-password-removal-without-bash-access.33484/&lt;br /&gt;
&lt;br /&gt;
Let&#039;s record this for posterity:&lt;br /&gt;
 Mellanox MLNX-OS Switch Management&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 login: admin&lt;br /&gt;
 Password: &lt;br /&gt;
 Last login: Sun Apr 12 16:57:02 on ttyS0&lt;br /&gt;
 &lt;br /&gt;
 Mellanox Switch&lt;br /&gt;
&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] &amp;gt; &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] (config) # &#039;&#039;&#039;boot bootmgr password 7 &amp;quot;&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] (config) # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;write memory&#039;&#039;&#039;&lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &#039;&#039;&#039;show bootvar&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Installed images:&lt;br /&gt;
   Partition 1:&lt;br /&gt;
     version: PPC_M460EX 3.6.8012 2019-02-22 07:53:42 ppc&lt;br /&gt;
 &lt;br /&gt;
   Partition 2:&lt;br /&gt;
     version: PPC_M460EX 3.6.8010 2018-08-20 18:04:16 ppc&lt;br /&gt;
 &lt;br /&gt;
 Last boot partition             : 1&lt;br /&gt;
 Next boot partition             : 1&lt;br /&gt;
 Serve image files via HTTP/HTTPS: no&lt;br /&gt;
 &lt;br /&gt;
 No boot manager password is set.&lt;br /&gt;
 &lt;br /&gt;
 Image signing              : trusted signature always required&lt;br /&gt;
 Admin require signed images: yes&lt;br /&gt;
 &lt;br /&gt;
 Settings for next boot only:&lt;br /&gt;
   Fallback reboot on configuration failure: yes (default)&lt;br /&gt;
 &lt;br /&gt;
 mellanox-sx6036-rack-2 [standalone: master] # &lt;br /&gt;
Note the line saying &amp;quot;No boot manager password is set.&amp;quot;  A switch that has not had this treatment will report &amp;quot;Boot manager password is set.&amp;quot; instead.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=OpenWRT_Aruba_AP-303&amp;diff=1598</id>
		<title>OpenWRT Aruba AP-303</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=OpenWRT_Aruba_AP-303&amp;diff=1598"/>
		<updated>2026-04-10T19:44:13Z</updated>

		<summary type="html">&lt;p&gt;Adj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Aruba AP-303 hardware became supported by OpenWRT in its 21.02.0 release.  Since I am all about free software wherever possible, and these are available at low prices on eBay, I have acquired a few.&lt;br /&gt;
&lt;br /&gt;
Documentation of hardware, OpenWRT installation, and network configuration is here.&lt;br /&gt;
&lt;br /&gt;
== About the Hardware and low level things ==&lt;br /&gt;
This mostly lifted from the [https://openwrt.org/toh/aruba/ap-303|OpenWRT page describing the AP-303] at openwrt.org.  The SoC is a Qualcomm IPQ4029.  Marketing data sheet can be seen at &lt;br /&gt;
https://www.qualcomm.com/content/dam/qcomm-martech/dm-assets/documents/ipq40x8ipq40x9-productbrief.pdf.   But in short, it is a 4-core 32-bit ARMv7 system integrating 2.4GHz and 5GHz Wifi components.  The AP-303 is equipped with 128MiB NAND Flash memory for persistent storage, and 512MiB of RAM for program code and data.&lt;br /&gt;
&lt;br /&gt;
=== Serial Console ===&lt;br /&gt;
Serial console is attached to an external micro B style USB connector wired to the 3.3 Volt 2 wire serial.  The HPE/Aruba cable with integrated FTDI USB to low voltage serial is sold under part number JY728A.  Do not wire standard 12 Volt serial to this connector.  Bad things are likely to happen.&lt;br /&gt;
&lt;br /&gt;
=== Power up, boot loader, etc ===&lt;br /&gt;
Not having any of the Aruba power supplies, but having some Power Over Ethernet capable switches here...&lt;br /&gt;
# Connect console cable&lt;br /&gt;
# Set serial port to 9600bps, 8 data bits, no parity, 1 stop bit&lt;br /&gt;
# Apply power to Ethernet port&lt;br /&gt;
# Interrupt autoboot when the &#039;&#039;&#039;&amp;lt;code&amp;gt;Hit &amp;lt;Enter&amp;gt; to stop autoboot:&amp;lt;/code&amp;gt;&#039;&#039;&#039; message appears.&lt;br /&gt;
&lt;br /&gt;
=== Bootloader stuff and things ===&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;mfginfo&amp;lt;/code&amp;gt;&#039;&#039;&#039; will show hardware information including the access point&#039;s serial number:&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;mfginfo&#039;&#039;&#039;&lt;br /&gt;
  Inventory:&lt;br /&gt;
  Card 0: System&lt;br /&gt;
        Wired MAC           : 90:4c:81:cb:f1:8c&lt;br /&gt;
        Wired MAC Count     : 2&lt;br /&gt;
        Serial              : CNG9K9T1HP&lt;br /&gt;
        Date Code           : 072418&lt;br /&gt;
        Country             : CCODE-US-8392f77e514e9c048d2d1e48520555e3ed355812&lt;br /&gt;
  Card 1: CPU&lt;br /&gt;
        Assembly            : 2010282C&lt;br /&gt;
        Serial              : MX87E0634&lt;br /&gt;
        Date Code           : 072418&lt;br /&gt;
        Major Rev           : 03&lt;br /&gt;
        Minor Rev/Variant   : 00&lt;br /&gt;
  apboot&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;osinfo&amp;lt;/code&amp;gt;&#039;&#039;&#039; will show information about the OS images on the flash storage:&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;osinfo&#039;&#039;&#039;&lt;br /&gt;
  Partition 0:&lt;br /&gt;
      image type: 0&lt;br /&gt;
    machine type: 48&lt;br /&gt;
            size: 22859904&lt;br /&gt;
         version: 8.7.1.0-8.7.1.0&lt;br /&gt;
    build string: ArubaOS version 8.7.1.0-8.7.1.0 for Ursa (p4build@pr-hpn-build09) (gcc version 4.6.3) #77203 SMP Wed Sep 23 00:55:22 UTC 2020&lt;br /&gt;
           flags: Instant preserve &lt;br /&gt;
             oem: aruba&lt;br /&gt;
  &lt;br /&gt;
  Image is signed; verifying checksum... passed&lt;br /&gt;
  SHA2 Signature available&lt;br /&gt;
  Signer Cert OK&lt;br /&gt;
  Policy Cert OK&lt;br /&gt;
  RSA signature verified using SHA2.&lt;br /&gt;
  &lt;br /&gt;
  Partition 1:&lt;br /&gt;
      image type: 0&lt;br /&gt;
    machine type: 48&lt;br /&gt;
            size: 20639392&lt;br /&gt;
         version: 8.8.0.0-8.8.0.0&lt;br /&gt;
    build string: ArubaOS version 8.8.0.0-8.8.0.0 for Ursa (p4build@pr-hpn-build07) (gcc version 4.6.3) #79697 SMP Sat Mar 27 05:22:09 UTC 2021&lt;br /&gt;
           flags: Instant preserve &lt;br /&gt;
             oem: aruba&lt;br /&gt;
  &lt;br /&gt;
  Image is signed; verifying checksum... passed&lt;br /&gt;
  SHA2 Signature available&lt;br /&gt;
  Signer Cert OK&lt;br /&gt;
  Policy Cert OK&lt;br /&gt;
  RSA signature verified using SHA2.&lt;br /&gt;
  apboot&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Clearing ArubaOS settings ===&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;factory_reset&amp;lt;/code&amp;gt;&#039;&#039;&#039; will wipe the AP&#039;s configuration.  Execute like so:&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;factory_reset&#039;&#039;&#039;&lt;br /&gt;
  Clearing state... &lt;br /&gt;
  Checking OS image and flags&lt;br /&gt;
  &lt;br /&gt;
  Image is signed; verifying checksum... passed&lt;br /&gt;
  Preserving image partition 0&lt;br /&gt;
  Erasing flash sector @ 0x3a0000... OK&lt;br /&gt;
  Erasing UBIFS ...done&lt;br /&gt;
  &lt;br /&gt;
  Purging environment... &lt;br /&gt;
  preserving os_partition (1)&lt;br /&gt;
  Erasing SPI flash...Writing to SPI flash...done&lt;br /&gt;
  Erasing SPI flash...Writing to SPI flash...done&lt;br /&gt;
  apboot&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Slowing down the autoboot process a bit ===&lt;br /&gt;
After the &#039;&#039;&#039;&amp;lt;code&amp;gt;factory_reset&amp;lt;/code&amp;gt;&#039;&#039;&#039; command has been executed, the autoboot delay is only 2 seconds.  Here we set it to 20 seconds and save that value to flash for the next power cycle event:&lt;br /&gt;
&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv bootdelay 20&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;saveenv&#039;&#039;&#039;&lt;br /&gt;
  Saving Environment to SPI Flash...&lt;br /&gt;
  Erasing SPI flash...Writing to SPI flash...done&lt;br /&gt;
  apboot&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Default admin credentials ===&lt;br /&gt;
ArubaOS&#039;s administrator user is &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  The default password is the access point&#039;s serial number.  After wiping the AP&#039;s config with the factory_reset boot loader command (above), feel free to login with those on the console port and poke around.  But we&#039;re not super interested in ArubaOS today, so let&#039;s move on to OpenWRT.&lt;br /&gt;
&lt;br /&gt;
== OpenWRT installation ==&lt;br /&gt;
=== OpenWRT installation image acquisition and related setup ===&lt;br /&gt;
OpenWRT is a free Linux distribution primarily designed for WiFi access points and similar devices.  Its web home page is https://www.openwrt.org/.&lt;br /&gt;
&lt;br /&gt;
OpenWRT&#039;s wiki page for the Aruba Networks AP-303 is https://openwrt.org/toh/aruba/ap-303.  See that site for the most current information.  But, for our purposes here:&lt;br /&gt;
# Acquire the OpenWRT installation image from https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/openwrt-24.10.0-ipq40xx-generic-aruba_ap-303-initramfs-uImage.itb&lt;br /&gt;
# Save this image to a location on a TFTP server that will be accessible to the AP and name it &#039;&#039;&#039;&amp;lt;code&amp;gt;ipq40xx.ari&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  (Or whatever the &amp;lt;code&amp;gt;bootfile&amp;lt;/code&amp;gt; variable is in the AP&#039;s bootloader.)&lt;br /&gt;
# Update DHCP server config to include the new AP, too.&lt;br /&gt;
## set &#039;&#039;&#039;&amp;lt;code&amp;gt;next-server&amp;lt;/code&amp;gt;&#039;&#039;&#039; with the TFTP server&#039;s IP address&lt;br /&gt;
## set &#039;&#039;&#039;&amp;lt;code&amp;gt;filename&amp;lt;/code&amp;gt;&#039;&#039;&#039; to the installation image file saved above.  &amp;quot;openwrt-24.10.0-ipq40xx-generic-aruba_ap-303-initramfs-uImage.itb&amp;quot; for now.&lt;br /&gt;
# Configure the AP&#039;s network port appropriately on the switch side&lt;br /&gt;
## Boot loader does not know about tagged VLANs.  So set primary VLAN as appropriate.  And perhaps add some tagged VLANs that will be connected to wireless SSIDs&lt;br /&gt;
## PoE enabled for the access point to run&lt;br /&gt;
&lt;br /&gt;
=== OpenWRT installation procedure ===&lt;br /&gt;
# Power on the AP, interrupt the autoboot process&lt;br /&gt;
# Tell the boot loader to get network config from a DHCP server:&lt;br /&gt;
## Interrupt bootloader at the &amp;lt;code&amp;gt;Hit &amp;lt;Enter&amp;gt; to stop autoboot:&amp;lt;/code&amp;gt; message.&lt;br /&gt;
## Get network config from DHCP server: &#039;&#039;&#039;&amp;lt;code&amp;gt;dhcp&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
# Some boot loader environment variables get set next:&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv bootargs_openwrt &amp;quot;setenv bootargs console=ttyMSM1,9600n8&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv nandboot_openwrt &amp;quot;run bootargs_openwrt; ubi part aos1; ubi read 0x85000000 kernel; set fdt_high 0x87000000; bootm 0x85000000&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv ramboot_openwrt &amp;quot;run bootargs_openwrt; setenv ipaddr 192.168.1.105; setenv serverip 192.168.1.75; netget; set fdt_high 0x87000000; bootm&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv bootcmd &amp;quot;run nandboot_openwrt&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;saveenv&#039;&#039;&#039;&lt;br /&gt;
# And now the value of the ramboot_openwrt command is actually executed: &amp;lt;code&amp;gt;apboot&amp;amp;gt; &#039;&#039;&#039;run ramboot_openwrt&#039;&#039;&#039;&amp;lt;/code&amp;gt;.  This will download the ipq40xx file from the TFTP server and run it.  Any complaint about an invalid image format can be safely ignored.&lt;br /&gt;
# After the Linux kernel stops spewing messages to the console, send a newline (hit Enter), and be greeted with the astonishing ASCII art OpenWRT logo and a root shell prompt.&lt;br /&gt;
  &lt;br /&gt;
   _______                     ________        __&lt;br /&gt;
  |       |.-----.-----.-----.|  |  |  |.----.|  |_&lt;br /&gt;
  |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|&lt;br /&gt;
  |_______||   __|_____|__|__||________||__|  |____|&lt;br /&gt;
           |__| W I R E L E S S   F R E E D O M&lt;br /&gt;
  -----------------------------------------------------&lt;br /&gt;
  OpenWrt 24.10.0, r28427-6df0e3d02a&lt;br /&gt;
  -----------------------------------------------------&lt;br /&gt;
  === WARNING! =====================================&lt;br /&gt;
  There is no root password defined on this device!&lt;br /&gt;
  Use the &amp;quot;passwd&amp;quot; command to set up a new password&lt;br /&gt;
  in order to prevent unauthorized SSH logins.&lt;br /&gt;
  --------------------------------------------------&lt;br /&gt;
  root@OpenWrt:~#&lt;br /&gt;
# Update network to use DHCP and restart it&lt;br /&gt;
## Change &amp;lt;code&amp;gt;option proto &#039;static&#039;&amp;lt;/code&amp;gt; to &amp;lt;code&amp;gt;option proto &#039;dhcp&#039;&amp;lt;/code&amp;gt; for the &amp;lt;code&amp;gt;lan&amp;lt;/code&amp;gt; interface in &amp;lt;code&amp;gt;/etc/config/network&amp;lt;/code&amp;gt;.  (There is a small implementation of vi included in the installation image.)&lt;br /&gt;
## Restart all networking by running &amp;lt;code&amp;gt;root@OpenWrt:~# &#039;&#039;&#039;service network restart&#039;&#039;&#039;&amp;lt;/code&amp;gt;.&lt;br /&gt;
# Fetch the OpenWRT sysupgrade image to /tmp on the AP: &amp;lt;code&amp;gt;root@OpenWrt:~# cd /tmp; wget &#039;&#039;&#039;https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/openwrt-24.10.0-ipq40xx-generic-aruba_ap-303-squashfs-sysupgrade.bin&#039;&#039;&#039;&amp;lt;/code&amp;gt;.&lt;br /&gt;
# Clean up the flash.  No more ArubaOS when this is done.&lt;br /&gt;
  root@OpenWrt:/tmp# &#039;&#039;&#039;ubidetach -p /dev/mtd1&#039;&#039;&#039;&lt;br /&gt;
  [ 1416.126100] ubi0: detaching mtd1&lt;br /&gt;
  [ 1416.126816] ubi0: mtd1 is detached&lt;br /&gt;
  root@OpenWrt:/tmp# &#039;&#039;&#039;ubiformat /dev/mtd1&#039;&#039;&#039;&lt;br /&gt;
  ubiformat: mtd1 (nand), size 33554432 bytes (32.0 MiB), 256 eraseblocks of 131072 bytes (128.0 KiB), min. I/O size 2048 bytes&lt;br /&gt;
  libscan: scanning eraseblock 255 -- 100 % complete  &lt;br /&gt;
  ubiformat: 256 eraseblocks have valid erase counter, mean value is 2&lt;br /&gt;
  ubiformat: formatting eraseblock 255 -- 100 % complete  &lt;br /&gt;
  root@OpenWrt:/tmp#&lt;br /&gt;
# Apply the OpenWrt sysupgrade image: &lt;br /&gt;
  root@OpenWrt:/tmp# &#039;&#039;&#039;sysupgrade -n openwrt-24.10.0-ipq40xx-generic-aruba_ap-303-squashfs-sysupgrade.bin&#039;&#039;&#039;&lt;br /&gt;
  Sat Feb 22 04:12:30 UTC 2025 upgrade: Commencing upgrade. Closing all shell sessions.&lt;br /&gt;
  Watchdog handover: fd=3&lt;br /&gt;
  - watchdog -&lt;br /&gt;
  Watchdog did not previously reset the system&lt;br /&gt;
  Sat Feb 22 04:12:31 UTC 2025 upgrade: Sending TERM to remaining processes ...&lt;br /&gt;
  Sat Feb 22 04:12:31 UTC 2025 upgrade: Sending signal TERM to netifd (3025)&lt;br /&gt;
  Sat Feb 22 04:12:35 UTC 2025 upgrade: Sending KILL to remaining processes ...&lt;br /&gt;
  Sat Feb 22 04:12:35 UTC 2025 upgrade: Sending signal KILL to netifd (3025)&lt;br /&gt;
  [11388.891505] stage2 (3683): drop_caches: 3&lt;br /&gt;
  Sat Feb 22 04:12:44 UTC 2025 upgrade: Switching to ramdisk...&lt;br /&gt;
  Sat Feb 22 04:12:46 UTC 2025 upgrade: Performing system upgrade...&lt;br /&gt;
  verifying sysupgrade tar file integrity&lt;br /&gt;
  [11392.106885] ubi0: attaching mtd1&lt;br /&gt;
  [11392.439761] ubi0: scanning is finished&lt;br /&gt;
  [11392.453417] ubi0: attached mtd1 (name &amp;quot;ubi&amp;quot;, size 32 MiB)&lt;br /&gt;
  [11392.471153] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes&lt;br /&gt;
  [11392.536731] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048&lt;br /&gt;
  [11392.617971] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096&lt;br /&gt;
  [11392.700276] ubi0: good PEBs: 256, bad PEBs: 0, corrupted PEBs: 0&lt;br /&gt;
  [11392.781509] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 128&lt;br /&gt;
  [11392.856520] ubi0: max/mean erase counter: 8/3, WL threshold: 4096, image sequence number: 1647604229&lt;br /&gt;
  [11392.940952] ubi0: available PEBs: 232, total reserved PEBs: 24, PEBs reserved for bad PEB handling: 20&lt;br /&gt;
  [11393.052389] ubi0: background thread &amp;quot;ubi_bgt0d&amp;quot; started, PID 4405&lt;br /&gt;
  UBI device number 0, total 256 LEBs (32505856 bytes, 31.0 MiB), available 232 LEBs (29458432 bytes, 28.0 MiB), LEB size 126976 bytes (124.0 KiB)[11393.308786] block ubiblock0_1: created from ubi0:1(rootfs)&lt;br /&gt;
  &lt;br /&gt;
  Volume ID 0, size 28 LEBs (3555328 bytes, 3.3 MiB), LEB size 126976 bytes (124.0 KiB), dynamic, name &amp;quot;kernel&amp;quot;, alignment 1&lt;br /&gt;
  Volume ID 1, size 33 LEBs (4190208 bytes, 3.9 MiB), LEB size 126976 bytes (124.0 KiB), dynamic, name &amp;quot;rootfs&amp;quot;, alignment 1&lt;br /&gt;
  Set volume size to 21712896&lt;br /&gt;
  Volume ID 2, size 171 LEBs (21712896 bytes, 20.7 MiB), LEB size 126976 bytes (124.0 KiB), dynamic, name &amp;quot;rootfs_data&amp;quot;, alignment 1&lt;br /&gt;
  sysupgrade&lt;br /&gt;
&lt;br /&gt;
=== Basic OpenWRT configuration ===&lt;br /&gt;
==== Wired Ethernet setup ====&lt;br /&gt;
After the OpenWrt installation has completed, the AP is lacking all configuration.  Again &amp;lt;code&amp;gt;/etc/config/network&amp;lt;/code&amp;gt; will need to be edited.  Set it to DHCP mode and again run &amp;lt;code&amp;gt;service network restart&amp;lt;/code&amp;gt;.  Then wait patiently.  45 seconds may be needed for things to fully settle out.&lt;br /&gt;
&lt;br /&gt;
==== The OpenWrt way of configuration ====&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;uci set network.lan.proto=dhcp&#039;&#039;&#039;&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;service network restart&#039;&#039;&#039;&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;sleep 60; ip addr list dev br-lan&#039;&#039;&#039;&lt;br /&gt;
  5: br-lan: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc noqueue state UP qlen 1000&lt;br /&gt;
      link/ether 90:4c:81:cb:f1:8c brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
      inet 172.16.10.40/24 brd 172.16.10.255 scope global br-lan&lt;br /&gt;
         valid_lft forever preferred_lft forever&lt;br /&gt;
      inet6 fe80::924c:81ff:fecb:f18c/64 scope link &lt;br /&gt;
         valid_lft forever preferred_lft forever&lt;br /&gt;
  root@OpenWrt:~#&lt;br /&gt;
&lt;br /&gt;
==== OS updates ====&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;opkg update&#039;&#039;&#039;&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/packages/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_core&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/packages/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_base&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/kmods/6.6.73-1-60aeaf7e722ca0f86e06f61157755da3/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_kmods&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/kmods/6.6.73-1-60aeaf7e722ca0f86e06f61157755da3/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_luci&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/packages/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_packages&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/packages/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/routing/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_routing&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/routing/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/telephony/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_telephony&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/telephony/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;opkg list-upgradable&#039;&#039;&#039;&lt;br /&gt;
  luci-mod-system - 24.336.49068~ef16778 - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-uloop - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  ucode-mod-ubus - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci-theme-bootstrap - 24.357.59015~779ca14 - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-uci - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  ucode-mod-math - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci-mod-status - 25.009.65022~20bf9a4 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-app-firewall - 25.014.06885~bd39c63 - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-fs - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci-ssl - 24.328.43591~9e70c9a - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-nl80211 - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  ucode - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci-app-package-manager - 24.341.02353~276fef8 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-proto-ppp - 25.009.71487~a88d4af - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-mod-admin-full - 19.253.48496~3f93650 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-base - 25.014.55016~7046a1c - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-proto-ipv6 - 24.350.69236~8d13ea4 - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-rtnl - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci - 24.297.79519~bcd13b9 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-light - 23.024.33244~34dee82 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-mod-network - 25.021.30718~36b6107 - 25.049.66344~2b8e93c&lt;br /&gt;
  libucode20230711 - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;opkg upgrade $(opkg list-upgradable | sort | cut -d&#039; &#039; -f1)&#039;&#039;&#039;&lt;br /&gt;
  Upgrading libucode20230711 on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/libucode20230711_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading luci on root from 24.297.79519~bcd13b9 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-app-firewall on root from 25.014.06885~bd39c63 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-app-firewall_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-app-package-manager on root from 24.341.02353~276fef8 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-app-package-manager_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-base on root from 25.014.55016~7046a1c to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-base_25.049.66344~2b8e93c_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading luci-light on root from 23.024.33244~34dee82 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-light_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-mod-admin-full on root from 19.253.48496~3f93650 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-mod-admin-full_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-mod-network on root from 25.021.30718~36b6107 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-mod-network_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-mod-status on root from 25.009.65022~20bf9a4 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-mod-status_25.049.66344~2b8e93c_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading luci-mod-system on root from 24.336.49068~ef16778 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-mod-system_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-proto-ipv6 on root from 24.350.69236~8d13ea4 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-proto-ipv6_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-proto-ppp on root from 25.009.71487~a88d4af to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-proto-ppp_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-ssl on root from 24.328.43591~9e70c9a to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-ssl_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-theme-bootstrap on root from 24.357.59015~779ca14 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-theme-bootstrap_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading ucode on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-fs on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-fs_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-math on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-math_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-nl80211 on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-nl80211_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-rtnl on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-rtnl_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-ubus on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-ubus_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-uci on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-uci_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-uloop on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-uloop_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Configuring libucode20230711.&lt;br /&gt;
  Configuring ucode.&lt;br /&gt;
  Configuring ucode-mod-fs.&lt;br /&gt;
  Configuring ucode-mod-nl80211.&lt;br /&gt;
  Configuring ucode-mod-rtnl.&lt;br /&gt;
  Configuring ucode-mod-ubus.&lt;br /&gt;
  Configuring ucode-mod-uloop.&lt;br /&gt;
  Configuring ucode-mod-uci.&lt;br /&gt;
  Configuring ucode-mod-math.&lt;br /&gt;
  Configuring luci-base.&lt;br /&gt;
  Configuring luci-mod-system.&lt;br /&gt;
  Configuring luci-theme-bootstrap.&lt;br /&gt;
  Configuring luci-mod-status.&lt;br /&gt;
  Configuring luci-app-firewall.&lt;br /&gt;
  Configuring luci-proto-ipv6.&lt;br /&gt;
  Configuring luci-mod-network.&lt;br /&gt;
  Configuring luci-mod-admin-full.&lt;br /&gt;
  Configuring luci-proto-ppp.&lt;br /&gt;
  Configuring luci-light.&lt;br /&gt;
  Configuring luci-app-package-manager.&lt;br /&gt;
  Configuring luci-ssl.&lt;br /&gt;
  Configuring luci.&lt;br /&gt;
  Collected errors:&lt;br /&gt;
   * resolve_conffiles: Existing conffile /etc/config/luci is different from the conffile in the new package. The new conffile will be placed at /etc/config/luci-opkg.&lt;br /&gt;
  root@OpenWrt:~#&lt;br /&gt;
=== Reboot and test functionality ===&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;reboot&#039;&#039;&#039;&lt;br /&gt;
== Configure our first WiFi networks ==&lt;br /&gt;
=== Out of the box contents of /etc/config/wireless ===&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;cat /etc/config/wireless&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  config wifi-device &#039;radio0&#039;&lt;br /&gt;
          option type &#039;mac80211&#039;&lt;br /&gt;
          option path &#039;platform/soc/a000000.wifi&#039;&lt;br /&gt;
          option band &#039;2g&#039;&lt;br /&gt;
          option channel &#039;1&#039;&lt;br /&gt;
          option htmode &#039;VHT20&#039;&lt;br /&gt;
          option disabled &#039;1&#039;&lt;br /&gt;
  &lt;br /&gt;
  config wifi-iface &#039;default_radio0&#039;&lt;br /&gt;
          option device &#039;radio0&#039;&lt;br /&gt;
          option network &#039;lan&#039;&lt;br /&gt;
          option mode &#039;ap&#039;&lt;br /&gt;
          option ssid &#039;OpenWrt&#039;&lt;br /&gt;
          option encryption &#039;none&#039;&lt;br /&gt;
  &lt;br /&gt;
  config wifi-device &#039;radio1&#039;&lt;br /&gt;
          option type &#039;mac80211&#039;&lt;br /&gt;
          option path &#039;platform/soc/a800000.wifi&#039;&lt;br /&gt;
          option band &#039;5g&#039;&lt;br /&gt;
          option channel &#039;36&#039;&lt;br /&gt;
          option htmode &#039;VHT80&#039;&lt;br /&gt;
          option disabled &#039;1&#039;&lt;br /&gt;
  &lt;br /&gt;
  config wifi-iface &#039;default_radio1&#039;&lt;br /&gt;
          option device &#039;radio1&#039;&lt;br /&gt;
          option network &#039;lan&#039;&lt;br /&gt;
          option mode &#039;ap&#039;&lt;br /&gt;
          option ssid &#039;OpenWrt&#039;&lt;br /&gt;
          option encryption &#039;none&#039;&lt;br /&gt;
Here we see 2 radios, both disabled.  On each of the radios, a WiFi SSID called &amp;lt;code&amp;gt;OpenWrt&amp;lt;/code&amp;gt; is defined and it is bridged to the network interface known as &amp;lt;code&amp;gt;lan&amp;lt;/code&amp;gt;.  Additionally. the radios are assigned to default channels.&lt;br /&gt;
&lt;br /&gt;
=== Restoring default WiFi radio setup ===&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;mv wireless wireless~&#039;&#039;&#039;&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;wifi config&#039;&#039;&#039;&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;ls -l wireless&#039;&#039;&#039;&lt;br /&gt;
  -rw-r--r--    1 root     root           652 Feb 25 17:25 wireless&lt;br /&gt;
  root@OpenWrt:/etc/config#&lt;br /&gt;
&lt;br /&gt;
=== Desired end state ===&lt;br /&gt;
* 2 SSIDs defined.  One for authenticated devices with access to internal network resources (VLAN 1001).  And another open network attached to the guest subnet (VLAN 3900).&lt;br /&gt;
* Both SSIDs available on both the 2.4GHz and 5GHz spectrum.&lt;br /&gt;
* APs able to do some band steering, hopefully encouraging clients to connect on the 5GHz radio.&lt;br /&gt;
* APs doing some channel selection on their own, not just a static one from the config file&lt;br /&gt;
* Fast roaming between APs&lt;br /&gt;
&lt;br /&gt;
=== Getting to end state: packages ===&lt;br /&gt;
&amp;lt;code&amp;gt;wpad-basic-mbedtls&amp;lt;/code&amp;gt; is installed out of the box on this platform.  It should be sufficient for our purposes, only has the WiFi mesh features turned off.  (WiFi mesh is inter-AP backhaul over the air, one AP is a client of another and still serving clients on the non-backhaul radio.)&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;opkg list-installed | grep wpad&#039;&#039;&#039;&lt;br /&gt;
  wpad-basic-mbedtls - 2024.09.15~5ace39b0-r2&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;opkg list | grep wpad-basic-mbedtls&#039;&#039;&#039;&lt;br /&gt;
  wpad-basic-mbedtls - 2024.09.15~5ace39b0-r2 - This package contains a basic IEEE 802.1x/WPA Authenticator and Supplicant with WPA-PSK, SAE (WPA3-Personal), 802.11r and 802.11w support.&lt;br /&gt;
  root@OpenWrt:/etc/config#&lt;br /&gt;
&lt;br /&gt;
== Oh, look, it is 2026! ==&lt;br /&gt;
And things are mostly the same.  New images to install listed at https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/ :&lt;br /&gt;
* https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/openwrt-25.12.2-ipq40xx-generic-aruba_ap-303-initramfs-uImage.itb&lt;br /&gt;
* https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/openwrt-25.12.2-ipq40xx-generic-aruba_ap-303-squashfs-sysupgrade.bin&lt;br /&gt;
And the package manager, &amp;lt;code&amp;gt;opkg&amp;lt;/code&amp;gt;, has been replaced by a tool called &amp;lt;code&amp;gt;apk&amp;lt;/code&amp;gt;.  This seems to have nothing to do with Android&#039;s APK package files, though.  An administrator&#039;s &amp;lt;code&amp;gt;apk&amp;lt;/code&amp;gt; cheatsheet can be found at https://openwrt.org/docs/guide-user/additional-software/opkg-to-apk-cheatsheet.&lt;br /&gt;
So far, it is a bit more like Debian&#039;s &amp;lt;code&amp;gt;apt-get&amp;lt;/code&amp;gt; tool.  Getting all outstanding package updates is simply &amp;lt;code&amp;gt;apk update; apk upgrade&amp;lt;/code&amp;gt; now.&lt;br /&gt;
&lt;br /&gt;
=== Packages we want on our OpenWrt 25.12.x APs ===&lt;br /&gt;
* diffutils -- GNU text file delta generator, useful for comparing two versions of a config file&lt;br /&gt;
* usteer -- this steers WiFi clients toward the best frequency band and AP depending on signal strength, number of stations connected, and other factors.&lt;br /&gt;
&lt;br /&gt;
=== And some basic system setup ===&lt;br /&gt;
OpenWrt has most (all?) of its config files stored under /etc/config.  There is a CLI tool, &amp;lt;code&amp;gt;uci&amp;lt;/code&amp;gt;, to manage them.  Let&#039;s walk through setting up a new AP&#039;s hostname, and getting a juicy kernel random seed value set:&lt;br /&gt;
 root@OpenWrt:~# &#039;&#039;&#039;uci show system&#039;&#039;&#039;&lt;br /&gt;
 system.@system[0]=system&lt;br /&gt;
 system.@system[0].hostname=&#039;OpenWrt&#039;&lt;br /&gt;
 system.@system[0].timezone=&#039;GMT0&#039;&lt;br /&gt;
 system.@system[0].zonename=&#039;UTC&#039;&lt;br /&gt;
 system.@system[0].ttylogin=&#039;0&#039;&lt;br /&gt;
 system.@system[0].log_size=&#039;128&#039;&lt;br /&gt;
 system.@system[0].urandom_seed=&#039;0&#039;&lt;br /&gt;
 system.@system[0].compat_version=&#039;1.1&#039;&lt;br /&gt;
 system.ntp=timeserver&lt;br /&gt;
 system.ntp.enabled=&#039;1&#039;&lt;br /&gt;
 system.ntp.enable_server=&#039;0&#039;&lt;br /&gt;
 system.ntp.server=&#039;0.openwrt.pool.ntp.org&#039; &#039;1.openwrt.pool.ntp.org&#039; &#039;2.openwrt.pool.ntp.org&#039; &#039;3.openwrt.pool.ntp.org&#039;&lt;br /&gt;
 root@OpenWrt:~# &#039;&#039;&#039;uci set system.@system[0].hostname=fnord-ap303-4&#039;&#039;&#039;&lt;br /&gt;
 root@OpenWrt:~# &#039;&#039;&#039;uci commit system&#039;&#039;&#039;&lt;br /&gt;
 root@OpenWrt:~# &#039;&#039;&#039;/etc/init.d/system reload&#039;&#039;&#039;&lt;br /&gt;
 root@fnord-ap303-4:~# &#039;&#039;&#039;uci set system.@system[0].urandom_seed=$(wget -q -O - &#039;https://www.random.org/cgi-bin/randbyte?nbytes=32&amp;amp;format=h&#039; | tr -d &#039; &#039; | tr -d &#039;\n&#039;)&#039;&#039;&#039;&lt;br /&gt;
 root@fnord-ap303-4:~# &#039;&#039;&#039;uci commit system&#039;&#039;&#039;&lt;br /&gt;
 root@fnord-ap303-4:~# &#039;&#039;&#039;/etc/init.d/system reload&#039;&#039;&#039;&lt;br /&gt;
 root@fnord-ap303-4:~#&lt;br /&gt;
&amp;lt;code&amp;gt;paste&amp;lt;/code&amp;gt; might be the better standard UNIX tool for the &amp;lt;code&amp;gt;tr -d &#039;\n&#039;&amp;lt;/code&amp;gt; in the above.  But many of the things we might expect from GNU coreutils are not installed by default on OpenWrt.  So we have &amp;lt;code&amp;gt;tr&amp;lt;/code&amp;gt; remove spaces from the output from random.org&#039;s super awesome random bits delivery service and then have it remove the newlines, too.  End result is the same.&lt;br /&gt;
&lt;br /&gt;
=== Wired network config ===&lt;br /&gt;
Feed this block of text to &amp;lt;code&amp;gt;uci import network&amp;lt;/code&amp;gt; and finish things off with an ASCII end-of-transmission marker (&amp;lt;code&amp;gt;Ctrl-D&amp;lt;/code&amp;gt;) or whatever your termios end-of-file (EOF) character is.&lt;br /&gt;
 package network&lt;br /&gt;
 &lt;br /&gt;
 config interface &#039;loopback&#039;&lt;br /&gt;
 	option device &#039;lo&#039;&lt;br /&gt;
 	option proto &#039;static&#039;&lt;br /&gt;
 	option ipaddr &#039;127.0.0.1&#039;&lt;br /&gt;
 	option netmask &#039;255.0.0.0&#039;&lt;br /&gt;
 &lt;br /&gt;
 config globals &#039;globals&#039;&lt;br /&gt;
 	option ula_prefix &#039;fd1f:ed39:f7d::/48&#039;&lt;br /&gt;
 	option packet_steering &#039;1&#039;&lt;br /&gt;
 &lt;br /&gt;
 config device&lt;br /&gt;
 	option name &#039;br-lan&#039;&lt;br /&gt;
 	option type &#039;bridge&#039;&lt;br /&gt;
 	list ports &#039;lan&#039;&lt;br /&gt;
 &lt;br /&gt;
 config interface &#039;lan&#039;&lt;br /&gt;
 	option device &#039;br-lan.10&#039;&lt;br /&gt;
 	option proto &#039;dhcp&#039;&lt;br /&gt;
 &lt;br /&gt;
 config device&lt;br /&gt;
 	option type &#039;8021q&#039;&lt;br /&gt;
 	option ifname &#039;br-lan&#039;&lt;br /&gt;
 	option vid &#039;1001&#039;&lt;br /&gt;
 	option name &#039;br-lan.1001&#039;&lt;br /&gt;
 &lt;br /&gt;
 config device&lt;br /&gt;
 	option type &#039;8021q&#039;&lt;br /&gt;
 	option ifname &#039;br-lan&#039;&lt;br /&gt;
 	option vid &#039;3900&#039;&lt;br /&gt;
 	option name &#039;br-lan.3900&#039;&lt;br /&gt;
 &lt;br /&gt;
 config interface &#039;lan_1001&#039;&lt;br /&gt;
 	option device &#039;br-lan.1001&#039;&lt;br /&gt;
 &lt;br /&gt;
 config interface &#039;lan_3900&#039;&lt;br /&gt;
 	option device &#039;br-lan.3900&#039;&lt;br /&gt;
 &lt;br /&gt;
 config bridge-vlan&lt;br /&gt;
 	option device &#039;br-lan&#039;&lt;br /&gt;
 	list ports &#039;lan:u*&#039;&lt;br /&gt;
 	option vlan &#039;10&#039;&lt;br /&gt;
 &lt;br /&gt;
 config bridge-vlan&lt;br /&gt;
 	option device &#039;br-lan&#039;&lt;br /&gt;
 	option vlan &#039;1001&#039;&lt;br /&gt;
 	list ports &#039;lan:t&#039;&lt;br /&gt;
 &lt;br /&gt;
 config bridge-vlan&lt;br /&gt;
 	option device &#039;br-lan&#039;&lt;br /&gt;
 	option vlan &#039;3900&#039;&lt;br /&gt;
 	list ports &#039;lan:t&#039;&lt;br /&gt;
This was pieced together experimentally over time.  Not guided by the reference documentation.  Mostly with the LuCI web UI.  The &amp;lt;code&amp;gt;ula_prefix&amp;lt;/code&amp;gt; global option value probably does not matter for anything I&#039;m doing here.&lt;br /&gt;
&lt;br /&gt;
=== Wireless network config ===&lt;br /&gt;
This is like the wired networking config previously.  Except it has SSID security passwords in it.  So I am not sharing the actual contents here.  Essentially, though, feed a config to &amp;lt;code&amp;gt;uci import wireless; uci commit wireless; sync; sleep 3; sync; reboot&amp;lt;/code&amp;gt; and things should work out OK.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=OpenWRT_Aruba_AP-303&amp;diff=1597</id>
		<title>OpenWRT Aruba AP-303</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=OpenWRT_Aruba_AP-303&amp;diff=1597"/>
		<updated>2026-04-10T19:36:42Z</updated>

		<summary type="html">&lt;p&gt;Adj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Aruba AP-303 hardware became supported by OpenWRT in its 21.02.0 release.  Since I am all about free software wherever possible, and these are available at low prices on eBay, I have acquired a few.&lt;br /&gt;
&lt;br /&gt;
Documentation of hardware, OpenWRT installation, and network configuration is here.&lt;br /&gt;
&lt;br /&gt;
== About the Hardware and low level things ==&lt;br /&gt;
This mostly lifted from the [https://openwrt.org/toh/aruba/ap-303|OpenWRT page describing the AP-303] at openwrt.org.  The SoC is a Qualcomm IPQ4029.  Marketing data sheet can be seen at &lt;br /&gt;
https://www.qualcomm.com/content/dam/qcomm-martech/dm-assets/documents/ipq40x8ipq40x9-productbrief.pdf.   But in short, it is a 4-core 32-bit ARMv7 system integrating 2.4GHz and 5GHz Wifi components.  The AP-303 is equipped with 128MiB NAND Flash memory for persistent storage, and 512MiB of RAM for program code and data.&lt;br /&gt;
&lt;br /&gt;
=== Serial Console ===&lt;br /&gt;
Serial console is attached to an external micro B style USB connector wired to the 3.3 Volt 2 wire serial.  The HPE/Aruba cable with integrated FTDI USB to low voltage serial is sold under part number JY728A.  Do not wire standard 12 Volt serial to this connector.  Bad things are likely to happen.&lt;br /&gt;
&lt;br /&gt;
=== Power up, boot loader, etc ===&lt;br /&gt;
Not having any of the Aruba power supplies, but having some Power Over Ethernet capable switches here...&lt;br /&gt;
# Connect console cable&lt;br /&gt;
# Set serial port to 9600bps, 8 data bits, no parity, 1 stop bit&lt;br /&gt;
# Apply power to Ethernet port&lt;br /&gt;
# Interrupt autoboot when the &#039;&#039;&#039;&amp;lt;code&amp;gt;Hit &amp;lt;Enter&amp;gt; to stop autoboot:&amp;lt;/code&amp;gt;&#039;&#039;&#039; message appears.&lt;br /&gt;
&lt;br /&gt;
=== Bootloader stuff and things ===&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;mfginfo&amp;lt;/code&amp;gt;&#039;&#039;&#039; will show hardware information including the access point&#039;s serial number:&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;mfginfo&#039;&#039;&#039;&lt;br /&gt;
  Inventory:&lt;br /&gt;
  Card 0: System&lt;br /&gt;
        Wired MAC           : 90:4c:81:cb:f1:8c&lt;br /&gt;
        Wired MAC Count     : 2&lt;br /&gt;
        Serial              : CNG9K9T1HP&lt;br /&gt;
        Date Code           : 072418&lt;br /&gt;
        Country             : CCODE-US-8392f77e514e9c048d2d1e48520555e3ed355812&lt;br /&gt;
  Card 1: CPU&lt;br /&gt;
        Assembly            : 2010282C&lt;br /&gt;
        Serial              : MX87E0634&lt;br /&gt;
        Date Code           : 072418&lt;br /&gt;
        Major Rev           : 03&lt;br /&gt;
        Minor Rev/Variant   : 00&lt;br /&gt;
  apboot&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;osinfo&amp;lt;/code&amp;gt;&#039;&#039;&#039; will show information about the OS images on the flash storage:&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;osinfo&#039;&#039;&#039;&lt;br /&gt;
  Partition 0:&lt;br /&gt;
      image type: 0&lt;br /&gt;
    machine type: 48&lt;br /&gt;
            size: 22859904&lt;br /&gt;
         version: 8.7.1.0-8.7.1.0&lt;br /&gt;
    build string: ArubaOS version 8.7.1.0-8.7.1.0 for Ursa (p4build@pr-hpn-build09) (gcc version 4.6.3) #77203 SMP Wed Sep 23 00:55:22 UTC 2020&lt;br /&gt;
           flags: Instant preserve &lt;br /&gt;
             oem: aruba&lt;br /&gt;
  &lt;br /&gt;
  Image is signed; verifying checksum... passed&lt;br /&gt;
  SHA2 Signature available&lt;br /&gt;
  Signer Cert OK&lt;br /&gt;
  Policy Cert OK&lt;br /&gt;
  RSA signature verified using SHA2.&lt;br /&gt;
  &lt;br /&gt;
  Partition 1:&lt;br /&gt;
      image type: 0&lt;br /&gt;
    machine type: 48&lt;br /&gt;
            size: 20639392&lt;br /&gt;
         version: 8.8.0.0-8.8.0.0&lt;br /&gt;
    build string: ArubaOS version 8.8.0.0-8.8.0.0 for Ursa (p4build@pr-hpn-build07) (gcc version 4.6.3) #79697 SMP Sat Mar 27 05:22:09 UTC 2021&lt;br /&gt;
           flags: Instant preserve &lt;br /&gt;
             oem: aruba&lt;br /&gt;
  &lt;br /&gt;
  Image is signed; verifying checksum... passed&lt;br /&gt;
  SHA2 Signature available&lt;br /&gt;
  Signer Cert OK&lt;br /&gt;
  Policy Cert OK&lt;br /&gt;
  RSA signature verified using SHA2.&lt;br /&gt;
  apboot&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Clearing ArubaOS settings ===&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;factory_reset&amp;lt;/code&amp;gt;&#039;&#039;&#039; will wipe the AP&#039;s configuration.  Execute like so:&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;factory_reset&#039;&#039;&#039;&lt;br /&gt;
  Clearing state... &lt;br /&gt;
  Checking OS image and flags&lt;br /&gt;
  &lt;br /&gt;
  Image is signed; verifying checksum... passed&lt;br /&gt;
  Preserving image partition 0&lt;br /&gt;
  Erasing flash sector @ 0x3a0000... OK&lt;br /&gt;
  Erasing UBIFS ...done&lt;br /&gt;
  &lt;br /&gt;
  Purging environment... &lt;br /&gt;
  preserving os_partition (1)&lt;br /&gt;
  Erasing SPI flash...Writing to SPI flash...done&lt;br /&gt;
  Erasing SPI flash...Writing to SPI flash...done&lt;br /&gt;
  apboot&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Slowing down the autoboot process a bit ===&lt;br /&gt;
After the &#039;&#039;&#039;&amp;lt;code&amp;gt;factory_reset&amp;lt;/code&amp;gt;&#039;&#039;&#039; command has been executed, the autoboot delay is only 2 seconds.  Here we set it to 20 seconds and save that value to flash for the next power cycle event:&lt;br /&gt;
&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv bootdelay 20&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;saveenv&#039;&#039;&#039;&lt;br /&gt;
  Saving Environment to SPI Flash...&lt;br /&gt;
  Erasing SPI flash...Writing to SPI flash...done&lt;br /&gt;
  apboot&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Default admin credentials ===&lt;br /&gt;
ArubaOS&#039;s administrator user is &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  The default password is the access point&#039;s serial number.  After wiping the AP&#039;s config with the factory_reset boot loader command (above), feel free to login with those on the console port and poke around.  But we&#039;re not super interested in ArubaOS today, so let&#039;s move on to OpenWRT.&lt;br /&gt;
&lt;br /&gt;
== OpenWRT installation ==&lt;br /&gt;
=== OpenWRT installation image acquisition and related setup ===&lt;br /&gt;
OpenWRT is a free Linux distribution primarily designed for WiFi access points and similar devices.  Its web home page is https://www.openwrt.org/.&lt;br /&gt;
&lt;br /&gt;
OpenWRT&#039;s wiki page for the Aruba Networks AP-303 is https://openwrt.org/toh/aruba/ap-303.  See that site for the most current information.  But, for our purposes here:&lt;br /&gt;
# Acquire the OpenWRT installation image from https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/openwrt-24.10.0-ipq40xx-generic-aruba_ap-303-initramfs-uImage.itb&lt;br /&gt;
# Save this image to a location on a TFTP server that will be accessible to the AP and name it &#039;&#039;&#039;&amp;lt;code&amp;gt;ipq40xx.ari&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  (Or whatever the &amp;lt;code&amp;gt;bootfile&amp;lt;/code&amp;gt; variable is in the AP&#039;s bootloader.)&lt;br /&gt;
# Update DHCP server config to include the new AP, too.&lt;br /&gt;
## set &#039;&#039;&#039;&amp;lt;code&amp;gt;next-server&amp;lt;/code&amp;gt;&#039;&#039;&#039; with the TFTP server&#039;s IP address&lt;br /&gt;
## set &#039;&#039;&#039;&amp;lt;code&amp;gt;filename&amp;lt;/code&amp;gt;&#039;&#039;&#039; to the installation image file saved above.  &amp;quot;openwrt-24.10.0-ipq40xx-generic-aruba_ap-303-initramfs-uImage.itb&amp;quot; for now.&lt;br /&gt;
# Configure the AP&#039;s network port appropriately on the switch side&lt;br /&gt;
## Boot loader does not know about tagged VLANs.  So set primary VLAN as appropriate.  And perhaps add some tagged VLANs that will be connected to wireless SSIDs&lt;br /&gt;
## PoE enabled for the access point to run&lt;br /&gt;
&lt;br /&gt;
=== OpenWRT installation procedure ===&lt;br /&gt;
# Power on the AP, interrupt the autoboot process&lt;br /&gt;
# Tell the boot loader to get network config from a DHCP server:&lt;br /&gt;
## Interrupt bootloader at the &amp;lt;code&amp;gt;Hit &amp;lt;Enter&amp;gt; to stop autoboot:&amp;lt;/code&amp;gt; message.&lt;br /&gt;
## Get network config from DHCP server: &#039;&#039;&#039;&amp;lt;code&amp;gt;dhcp&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
# Some boot loader environment variables get set next:&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv bootargs_openwrt &amp;quot;setenv bootargs console=ttyMSM1,9600n8&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv nandboot_openwrt &amp;quot;run bootargs_openwrt; ubi part aos1; ubi read 0x85000000 kernel; set fdt_high 0x87000000; bootm 0x85000000&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv ramboot_openwrt &amp;quot;run bootargs_openwrt; setenv ipaddr 192.168.1.105; setenv serverip 192.168.1.75; netget; set fdt_high 0x87000000; bootm&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv bootcmd &amp;quot;run nandboot_openwrt&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;saveenv&#039;&#039;&#039;&lt;br /&gt;
# And now the value of the ramboot_openwrt command is actually executed: &amp;lt;code&amp;gt;apboot&amp;amp;gt; &#039;&#039;&#039;run ramboot_openwrt&#039;&#039;&#039;&amp;lt;/code&amp;gt;.  This will download the ipq40xx file from the TFTP server and run it.  Any complaint about an invalid image format can be safely ignored.&lt;br /&gt;
# After the Linux kernel stops spewing messages to the console, send a newline (hit Enter), and be greeted with the astonishing ASCII art OpenWRT logo and a root shell prompt.&lt;br /&gt;
  &lt;br /&gt;
   _______                     ________        __&lt;br /&gt;
  |       |.-----.-----.-----.|  |  |  |.----.|  |_&lt;br /&gt;
  |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|&lt;br /&gt;
  |_______||   __|_____|__|__||________||__|  |____|&lt;br /&gt;
           |__| W I R E L E S S   F R E E D O M&lt;br /&gt;
  -----------------------------------------------------&lt;br /&gt;
  OpenWrt 24.10.0, r28427-6df0e3d02a&lt;br /&gt;
  -----------------------------------------------------&lt;br /&gt;
  === WARNING! =====================================&lt;br /&gt;
  There is no root password defined on this device!&lt;br /&gt;
  Use the &amp;quot;passwd&amp;quot; command to set up a new password&lt;br /&gt;
  in order to prevent unauthorized SSH logins.&lt;br /&gt;
  --------------------------------------------------&lt;br /&gt;
  root@OpenWrt:~#&lt;br /&gt;
# Update network to use DHCP and restart it&lt;br /&gt;
## Change &amp;lt;code&amp;gt;option proto &#039;static&#039;&amp;lt;/code&amp;gt; to &amp;lt;code&amp;gt;option proto &#039;dhcp&#039;&amp;lt;/code&amp;gt; for the &amp;lt;code&amp;gt;lan&amp;lt;/code&amp;gt; interface in &amp;lt;code&amp;gt;/etc/config/network&amp;lt;/code&amp;gt;.  (There is a small implementation of vi included in the installation image.)&lt;br /&gt;
## Restart all networking by running &amp;lt;code&amp;gt;root@OpenWrt:~# &#039;&#039;&#039;service network restart&#039;&#039;&#039;&amp;lt;/code&amp;gt;.&lt;br /&gt;
# Fetch the OpenWRT sysupgrade image to /tmp on the AP: &amp;lt;code&amp;gt;root@OpenWrt:~# cd /tmp; wget &#039;&#039;&#039;https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/openwrt-24.10.0-ipq40xx-generic-aruba_ap-303-squashfs-sysupgrade.bin&#039;&#039;&#039;&amp;lt;/code&amp;gt;.&lt;br /&gt;
# Clean up the flash.  No more ArubaOS when this is done.&lt;br /&gt;
  root@OpenWrt:/tmp# &#039;&#039;&#039;ubidetach -p /dev/mtd1&#039;&#039;&#039;&lt;br /&gt;
  [ 1416.126100] ubi0: detaching mtd1&lt;br /&gt;
  [ 1416.126816] ubi0: mtd1 is detached&lt;br /&gt;
  root@OpenWrt:/tmp# &#039;&#039;&#039;ubiformat /dev/mtd1&#039;&#039;&#039;&lt;br /&gt;
  ubiformat: mtd1 (nand), size 33554432 bytes (32.0 MiB), 256 eraseblocks of 131072 bytes (128.0 KiB), min. I/O size 2048 bytes&lt;br /&gt;
  libscan: scanning eraseblock 255 -- 100 % complete  &lt;br /&gt;
  ubiformat: 256 eraseblocks have valid erase counter, mean value is 2&lt;br /&gt;
  ubiformat: formatting eraseblock 255 -- 100 % complete  &lt;br /&gt;
  root@OpenWrt:/tmp#&lt;br /&gt;
# Apply the OpenWrt sysupgrade image: &lt;br /&gt;
  root@OpenWrt:/tmp# &#039;&#039;&#039;sysupgrade -n openwrt-24.10.0-ipq40xx-generic-aruba_ap-303-squashfs-sysupgrade.bin&#039;&#039;&#039;&lt;br /&gt;
  Sat Feb 22 04:12:30 UTC 2025 upgrade: Commencing upgrade. Closing all shell sessions.&lt;br /&gt;
  Watchdog handover: fd=3&lt;br /&gt;
  - watchdog -&lt;br /&gt;
  Watchdog did not previously reset the system&lt;br /&gt;
  Sat Feb 22 04:12:31 UTC 2025 upgrade: Sending TERM to remaining processes ...&lt;br /&gt;
  Sat Feb 22 04:12:31 UTC 2025 upgrade: Sending signal TERM to netifd (3025)&lt;br /&gt;
  Sat Feb 22 04:12:35 UTC 2025 upgrade: Sending KILL to remaining processes ...&lt;br /&gt;
  Sat Feb 22 04:12:35 UTC 2025 upgrade: Sending signal KILL to netifd (3025)&lt;br /&gt;
  [11388.891505] stage2 (3683): drop_caches: 3&lt;br /&gt;
  Sat Feb 22 04:12:44 UTC 2025 upgrade: Switching to ramdisk...&lt;br /&gt;
  Sat Feb 22 04:12:46 UTC 2025 upgrade: Performing system upgrade...&lt;br /&gt;
  verifying sysupgrade tar file integrity&lt;br /&gt;
  [11392.106885] ubi0: attaching mtd1&lt;br /&gt;
  [11392.439761] ubi0: scanning is finished&lt;br /&gt;
  [11392.453417] ubi0: attached mtd1 (name &amp;quot;ubi&amp;quot;, size 32 MiB)&lt;br /&gt;
  [11392.471153] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes&lt;br /&gt;
  [11392.536731] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048&lt;br /&gt;
  [11392.617971] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096&lt;br /&gt;
  [11392.700276] ubi0: good PEBs: 256, bad PEBs: 0, corrupted PEBs: 0&lt;br /&gt;
  [11392.781509] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 128&lt;br /&gt;
  [11392.856520] ubi0: max/mean erase counter: 8/3, WL threshold: 4096, image sequence number: 1647604229&lt;br /&gt;
  [11392.940952] ubi0: available PEBs: 232, total reserved PEBs: 24, PEBs reserved for bad PEB handling: 20&lt;br /&gt;
  [11393.052389] ubi0: background thread &amp;quot;ubi_bgt0d&amp;quot; started, PID 4405&lt;br /&gt;
  UBI device number 0, total 256 LEBs (32505856 bytes, 31.0 MiB), available 232 LEBs (29458432 bytes, 28.0 MiB), LEB size 126976 bytes (124.0 KiB)[11393.308786] block ubiblock0_1: created from ubi0:1(rootfs)&lt;br /&gt;
  &lt;br /&gt;
  Volume ID 0, size 28 LEBs (3555328 bytes, 3.3 MiB), LEB size 126976 bytes (124.0 KiB), dynamic, name &amp;quot;kernel&amp;quot;, alignment 1&lt;br /&gt;
  Volume ID 1, size 33 LEBs (4190208 bytes, 3.9 MiB), LEB size 126976 bytes (124.0 KiB), dynamic, name &amp;quot;rootfs&amp;quot;, alignment 1&lt;br /&gt;
  Set volume size to 21712896&lt;br /&gt;
  Volume ID 2, size 171 LEBs (21712896 bytes, 20.7 MiB), LEB size 126976 bytes (124.0 KiB), dynamic, name &amp;quot;rootfs_data&amp;quot;, alignment 1&lt;br /&gt;
  sysupgrade&lt;br /&gt;
&lt;br /&gt;
=== Basic OpenWRT configuration ===&lt;br /&gt;
==== Wired Ethernet setup ====&lt;br /&gt;
After the OpenWrt installation has completed, the AP is lacking all configuration.  Again &amp;lt;code&amp;gt;/etc/config/network&amp;lt;/code&amp;gt; will need to be edited.  Set it to DHCP mode and again run &amp;lt;code&amp;gt;service network restart&amp;lt;/code&amp;gt;.  Then wait patiently.  45 seconds may be needed for things to fully settle out.&lt;br /&gt;
&lt;br /&gt;
==== The OpenWrt way of configuration ====&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;uci set network.lan.proto=dhcp&#039;&#039;&#039;&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;service network restart&#039;&#039;&#039;&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;sleep 60; ip addr list dev br-lan&#039;&#039;&#039;&lt;br /&gt;
  5: br-lan: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc noqueue state UP qlen 1000&lt;br /&gt;
      link/ether 90:4c:81:cb:f1:8c brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
      inet 172.16.10.40/24 brd 172.16.10.255 scope global br-lan&lt;br /&gt;
         valid_lft forever preferred_lft forever&lt;br /&gt;
      inet6 fe80::924c:81ff:fecb:f18c/64 scope link &lt;br /&gt;
         valid_lft forever preferred_lft forever&lt;br /&gt;
  root@OpenWrt:~#&lt;br /&gt;
&lt;br /&gt;
==== OS updates ====&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;opkg update&#039;&#039;&#039;&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/packages/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_core&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/packages/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_base&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/kmods/6.6.73-1-60aeaf7e722ca0f86e06f61157755da3/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_kmods&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/kmods/6.6.73-1-60aeaf7e722ca0f86e06f61157755da3/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_luci&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/packages/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_packages&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/packages/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/routing/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_routing&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/routing/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/telephony/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_telephony&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/telephony/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;opkg list-upgradable&#039;&#039;&#039;&lt;br /&gt;
  luci-mod-system - 24.336.49068~ef16778 - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-uloop - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  ucode-mod-ubus - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci-theme-bootstrap - 24.357.59015~779ca14 - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-uci - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  ucode-mod-math - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci-mod-status - 25.009.65022~20bf9a4 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-app-firewall - 25.014.06885~bd39c63 - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-fs - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci-ssl - 24.328.43591~9e70c9a - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-nl80211 - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  ucode - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci-app-package-manager - 24.341.02353~276fef8 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-proto-ppp - 25.009.71487~a88d4af - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-mod-admin-full - 19.253.48496~3f93650 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-base - 25.014.55016~7046a1c - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-proto-ipv6 - 24.350.69236~8d13ea4 - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-rtnl - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci - 24.297.79519~bcd13b9 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-light - 23.024.33244~34dee82 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-mod-network - 25.021.30718~36b6107 - 25.049.66344~2b8e93c&lt;br /&gt;
  libucode20230711 - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;opkg upgrade $(opkg list-upgradable | sort | cut -d&#039; &#039; -f1)&#039;&#039;&#039;&lt;br /&gt;
  Upgrading libucode20230711 on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/libucode20230711_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading luci on root from 24.297.79519~bcd13b9 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-app-firewall on root from 25.014.06885~bd39c63 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-app-firewall_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-app-package-manager on root from 24.341.02353~276fef8 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-app-package-manager_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-base on root from 25.014.55016~7046a1c to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-base_25.049.66344~2b8e93c_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading luci-light on root from 23.024.33244~34dee82 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-light_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-mod-admin-full on root from 19.253.48496~3f93650 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-mod-admin-full_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-mod-network on root from 25.021.30718~36b6107 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-mod-network_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-mod-status on root from 25.009.65022~20bf9a4 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-mod-status_25.049.66344~2b8e93c_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading luci-mod-system on root from 24.336.49068~ef16778 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-mod-system_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-proto-ipv6 on root from 24.350.69236~8d13ea4 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-proto-ipv6_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-proto-ppp on root from 25.009.71487~a88d4af to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-proto-ppp_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-ssl on root from 24.328.43591~9e70c9a to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-ssl_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-theme-bootstrap on root from 24.357.59015~779ca14 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-theme-bootstrap_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading ucode on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-fs on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-fs_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-math on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-math_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-nl80211 on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-nl80211_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-rtnl on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-rtnl_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-ubus on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-ubus_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-uci on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-uci_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-uloop on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-uloop_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Configuring libucode20230711.&lt;br /&gt;
  Configuring ucode.&lt;br /&gt;
  Configuring ucode-mod-fs.&lt;br /&gt;
  Configuring ucode-mod-nl80211.&lt;br /&gt;
  Configuring ucode-mod-rtnl.&lt;br /&gt;
  Configuring ucode-mod-ubus.&lt;br /&gt;
  Configuring ucode-mod-uloop.&lt;br /&gt;
  Configuring ucode-mod-uci.&lt;br /&gt;
  Configuring ucode-mod-math.&lt;br /&gt;
  Configuring luci-base.&lt;br /&gt;
  Configuring luci-mod-system.&lt;br /&gt;
  Configuring luci-theme-bootstrap.&lt;br /&gt;
  Configuring luci-mod-status.&lt;br /&gt;
  Configuring luci-app-firewall.&lt;br /&gt;
  Configuring luci-proto-ipv6.&lt;br /&gt;
  Configuring luci-mod-network.&lt;br /&gt;
  Configuring luci-mod-admin-full.&lt;br /&gt;
  Configuring luci-proto-ppp.&lt;br /&gt;
  Configuring luci-light.&lt;br /&gt;
  Configuring luci-app-package-manager.&lt;br /&gt;
  Configuring luci-ssl.&lt;br /&gt;
  Configuring luci.&lt;br /&gt;
  Collected errors:&lt;br /&gt;
   * resolve_conffiles: Existing conffile /etc/config/luci is different from the conffile in the new package. The new conffile will be placed at /etc/config/luci-opkg.&lt;br /&gt;
  root@OpenWrt:~#&lt;br /&gt;
=== Reboot and test functionality ===&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;reboot&#039;&#039;&#039;&lt;br /&gt;
== Configure our first WiFi networks ==&lt;br /&gt;
=== Out of the box contents of /etc/config/wireless ===&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;cat /etc/config/wireless&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  config wifi-device &#039;radio0&#039;&lt;br /&gt;
          option type &#039;mac80211&#039;&lt;br /&gt;
          option path &#039;platform/soc/a000000.wifi&#039;&lt;br /&gt;
          option band &#039;2g&#039;&lt;br /&gt;
          option channel &#039;1&#039;&lt;br /&gt;
          option htmode &#039;VHT20&#039;&lt;br /&gt;
          option disabled &#039;1&#039;&lt;br /&gt;
  &lt;br /&gt;
  config wifi-iface &#039;default_radio0&#039;&lt;br /&gt;
          option device &#039;radio0&#039;&lt;br /&gt;
          option network &#039;lan&#039;&lt;br /&gt;
          option mode &#039;ap&#039;&lt;br /&gt;
          option ssid &#039;OpenWrt&#039;&lt;br /&gt;
          option encryption &#039;none&#039;&lt;br /&gt;
  &lt;br /&gt;
  config wifi-device &#039;radio1&#039;&lt;br /&gt;
          option type &#039;mac80211&#039;&lt;br /&gt;
          option path &#039;platform/soc/a800000.wifi&#039;&lt;br /&gt;
          option band &#039;5g&#039;&lt;br /&gt;
          option channel &#039;36&#039;&lt;br /&gt;
          option htmode &#039;VHT80&#039;&lt;br /&gt;
          option disabled &#039;1&#039;&lt;br /&gt;
  &lt;br /&gt;
  config wifi-iface &#039;default_radio1&#039;&lt;br /&gt;
          option device &#039;radio1&#039;&lt;br /&gt;
          option network &#039;lan&#039;&lt;br /&gt;
          option mode &#039;ap&#039;&lt;br /&gt;
          option ssid &#039;OpenWrt&#039;&lt;br /&gt;
          option encryption &#039;none&#039;&lt;br /&gt;
Here we see 2 radios, both disabled.  On each of the radios, a WiFi SSID called &amp;lt;code&amp;gt;OpenWrt&amp;lt;/code&amp;gt; is defined and it is bridged to the network interface known as &amp;lt;code&amp;gt;lan&amp;lt;/code&amp;gt;.  Additionally. the radios are assigned to default channels.&lt;br /&gt;
&lt;br /&gt;
=== Restoring default WiFi radio setup ===&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;mv wireless wireless~&#039;&#039;&#039;&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;wifi config&#039;&#039;&#039;&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;ls -l wireless&#039;&#039;&#039;&lt;br /&gt;
  -rw-r--r--    1 root     root           652 Feb 25 17:25 wireless&lt;br /&gt;
  root@OpenWrt:/etc/config#&lt;br /&gt;
&lt;br /&gt;
=== Desired end state ===&lt;br /&gt;
* 2 SSIDs defined.  One for authenticated devices with access to internal network resources (VLAN 1001).  And another open network attached to the guest subnet (VLAN 3900).&lt;br /&gt;
* Both SSIDs available on both the 2.4GHz and 5GHz spectrum.&lt;br /&gt;
* APs able to do some band steering, hopefully encouraging clients to connect on the 5GHz radio.&lt;br /&gt;
* APs doing some channel selection on their own, not just a static one from the config file&lt;br /&gt;
* Fast roaming between APs&lt;br /&gt;
&lt;br /&gt;
=== Getting to end state: packages ===&lt;br /&gt;
&amp;lt;code&amp;gt;wpad-basic-mbedtls&amp;lt;/code&amp;gt; is installed out of the box on this platform.  It should be sufficient for our purposes, only has the WiFi mesh features turned off.  (WiFi mesh is inter-AP backhaul over the air, one AP is a client of another and still serving clients on the non-backhaul radio.)&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;opkg list-installed | grep wpad&#039;&#039;&#039;&lt;br /&gt;
  wpad-basic-mbedtls - 2024.09.15~5ace39b0-r2&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;opkg list | grep wpad-basic-mbedtls&#039;&#039;&#039;&lt;br /&gt;
  wpad-basic-mbedtls - 2024.09.15~5ace39b0-r2 - This package contains a basic IEEE 802.1x/WPA Authenticator and Supplicant with WPA-PSK, SAE (WPA3-Personal), 802.11r and 802.11w support.&lt;br /&gt;
  root@OpenWrt:/etc/config#&lt;br /&gt;
&lt;br /&gt;
== Oh, look, it is 2026! ==&lt;br /&gt;
And things are mostly the same.  New images to install listed at https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/ :&lt;br /&gt;
* https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/openwrt-25.12.2-ipq40xx-generic-aruba_ap-303-initramfs-uImage.itb&lt;br /&gt;
* https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/openwrt-25.12.2-ipq40xx-generic-aruba_ap-303-squashfs-sysupgrade.bin&lt;br /&gt;
And the package manager, &amp;lt;code&amp;gt;opkg&amp;lt;/code&amp;gt;, has been replaced by a tool called &amp;lt;code&amp;gt;apk&amp;lt;/code&amp;gt;.  This seems to have nothing to do with Android&#039;s APK package files, though.  An administrator&#039;s &amp;lt;code&amp;gt;apk&amp;lt;/code&amp;gt; cheatsheet can be found at https://openwrt.org/docs/guide-user/additional-software/opkg-to-apk-cheatsheet.&lt;br /&gt;
So far, it is a bit more like Debian&#039;s &amp;lt;code&amp;gt;apt-get&amp;lt;/code&amp;gt; tool.  Getting all outstanding package updates is simply &amp;lt;code&amp;gt;apk update; apk upgrade&amp;lt;/code&amp;gt; now.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=OpenWRT_Aruba_AP-303&amp;diff=1596</id>
		<title>OpenWRT Aruba AP-303</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=OpenWRT_Aruba_AP-303&amp;diff=1596"/>
		<updated>2026-04-10T18:58:45Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Wired network config */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Oh, look, it is 2026! ==&lt;br /&gt;
And things are mostly the same.  New images to install listed at https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/ :&lt;br /&gt;
* https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/openwrt-25.12.2-ipq40xx-generic-aruba_ap-303-initramfs-uImage.itb&lt;br /&gt;
* https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/openwrt-25.12.2-ipq40xx-generic-aruba_ap-303-squashfs-sysupgrade.bin&lt;br /&gt;
And the package manager, &amp;lt;code&amp;gt;opkg&amp;lt;/code&amp;gt;, has been replaced by a tool called &amp;lt;code&amp;gt;apk&amp;lt;/code&amp;gt;.  This seems to have nothing to do with Android&#039;s APK package files, though.  An administrator&#039;s &amp;lt;code&amp;gt;apk&amp;lt;/code&amp;gt; cheatsheet can be found at https://openwrt.org/docs/guide-user/additional-software/opkg-to-apk-cheatsheet.&lt;br /&gt;
So far, it is a bit more like Debian&#039;s &amp;lt;code&amp;gt;apt-get&amp;lt;/code&amp;gt; tool.  Getting all outstanding package updates is simply &amp;lt;code&amp;gt;apk update; apk upgrade&amp;lt;/code&amp;gt; now.&lt;br /&gt;
&lt;br /&gt;
=== Packages we want on our OpenWrt 25.12.x APs ===&lt;br /&gt;
* diffutils -- GNU text file delta generator, useful for comparing two versions of a config file&lt;br /&gt;
* usteer -- this steers WiFi clients toward the best frequency band and AP depending on signal strength, number of stations connected, and other factors.&lt;br /&gt;
&lt;br /&gt;
=== And some basic system setup ===&lt;br /&gt;
OpenWrt has most (all?) of its config files stored under /etc/config.  There is a CLI tool, &amp;lt;code&amp;gt;uci&amp;lt;/code&amp;gt;, to manage them.  Let&#039;s walk through setting up a new AP&#039;s hostname, and getting a juicy kernel random seed value set:&lt;br /&gt;
 root@OpenWrt:~# &#039;&#039;&#039;uci show system&#039;&#039;&#039;&lt;br /&gt;
 system.@system[0]=system&lt;br /&gt;
 system.@system[0].hostname=&#039;OpenWrt&#039;&lt;br /&gt;
 system.@system[0].timezone=&#039;GMT0&#039;&lt;br /&gt;
 system.@system[0].zonename=&#039;UTC&#039;&lt;br /&gt;
 system.@system[0].ttylogin=&#039;0&#039;&lt;br /&gt;
 system.@system[0].log_size=&#039;128&#039;&lt;br /&gt;
 system.@system[0].urandom_seed=&#039;0&#039;&lt;br /&gt;
 system.@system[0].compat_version=&#039;1.1&#039;&lt;br /&gt;
 system.ntp=timeserver&lt;br /&gt;
 system.ntp.enabled=&#039;1&#039;&lt;br /&gt;
 system.ntp.enable_server=&#039;0&#039;&lt;br /&gt;
 system.ntp.server=&#039;0.openwrt.pool.ntp.org&#039; &#039;1.openwrt.pool.ntp.org&#039; &#039;2.openwrt.pool.ntp.org&#039; &#039;3.openwrt.pool.ntp.org&#039;&lt;br /&gt;
 root@OpenWrt:~# &#039;&#039;&#039;uci set system.@system[0].hostname=fnord-ap303-4&#039;&#039;&#039;&lt;br /&gt;
 root@OpenWrt:~# &#039;&#039;&#039;uci commit system&#039;&#039;&#039;&lt;br /&gt;
 root@OpenWrt:~# &#039;&#039;&#039;/etc/init.d/system reload&#039;&#039;&#039;&lt;br /&gt;
 root@fnord-ap303-4:~# &#039;&#039;&#039;uci set system.@system[0].urandom_seed=$(wget -q -O - &#039;https://www.random.org/cgi-bin/randbyte?nbytes=32&amp;amp;format=h&#039; | tr -d &#039; &#039; | tr -d &#039;\n&#039;)&#039;&#039;&#039;&lt;br /&gt;
 root@fnord-ap303-4:~# &#039;&#039;&#039;uci commit system&#039;&#039;&#039;&lt;br /&gt;
 root@fnord-ap303-4:~# &#039;&#039;&#039;/etc/init.d/system reload&#039;&#039;&#039;&lt;br /&gt;
 root@fnord-ap303-4:~#&lt;br /&gt;
&amp;lt;code&amp;gt;paste&amp;lt;/code&amp;gt; might be the better standard UNIX tool for the &amp;lt;code&amp;gt;tr -d &#039;\n&#039;&amp;lt;/code&amp;gt; in the above.  But many of the things we might expect from GNU coreutils are not installed by default on OpenWrt.  So we have &amp;lt;code&amp;gt;tr&amp;lt;/code&amp;gt; remove spaces from the output from random.org&#039;s super awesome random bits delivery service and then have it remove the newlines, too.  End result is the same.&lt;br /&gt;
&lt;br /&gt;
=== Wired network config ===&lt;br /&gt;
Feed this block of text to &amp;lt;code&amp;gt;uci import network&amp;lt;/code&amp;gt; and finish things off with an ASCII end-of-transmission marker (&amp;lt;code&amp;gt;Ctrl-D&amp;lt;/code&amp;gt;) or whatever your termios end-of-file (EOF) character is.&lt;br /&gt;
 package network&lt;br /&gt;
 &lt;br /&gt;
 config interface &#039;loopback&#039;&lt;br /&gt;
 	option device &#039;lo&#039;&lt;br /&gt;
 	option proto &#039;static&#039;&lt;br /&gt;
 	option ipaddr &#039;127.0.0.1&#039;&lt;br /&gt;
 	option netmask &#039;255.0.0.0&#039;&lt;br /&gt;
 &lt;br /&gt;
 config globals &#039;globals&#039;&lt;br /&gt;
 	option ula_prefix &#039;fd1f:ed39:f7d::/48&#039;&lt;br /&gt;
 	option packet_steering &#039;1&#039;&lt;br /&gt;
 &lt;br /&gt;
 config device&lt;br /&gt;
 	option name &#039;br-lan&#039;&lt;br /&gt;
 	option type &#039;bridge&#039;&lt;br /&gt;
 	list ports &#039;lan&#039;&lt;br /&gt;
 &lt;br /&gt;
 config interface &#039;lan&#039;&lt;br /&gt;
 	option device &#039;br-lan.10&#039;&lt;br /&gt;
 	option proto &#039;dhcp&#039;&lt;br /&gt;
 &lt;br /&gt;
 config device&lt;br /&gt;
 	option type &#039;8021q&#039;&lt;br /&gt;
 	option ifname &#039;br-lan&#039;&lt;br /&gt;
 	option vid &#039;1001&#039;&lt;br /&gt;
 	option name &#039;br-lan.1001&#039;&lt;br /&gt;
 &lt;br /&gt;
 config device&lt;br /&gt;
 	option type &#039;8021q&#039;&lt;br /&gt;
 	option ifname &#039;br-lan&#039;&lt;br /&gt;
 	option vid &#039;3900&#039;&lt;br /&gt;
 	option name &#039;br-lan.3900&#039;&lt;br /&gt;
 &lt;br /&gt;
 config interface &#039;lan_1001&#039;&lt;br /&gt;
 	option device &#039;br-lan.1001&#039;&lt;br /&gt;
 &lt;br /&gt;
 config interface &#039;lan_3900&#039;&lt;br /&gt;
 	option device &#039;br-lan.3900&#039;&lt;br /&gt;
 &lt;br /&gt;
 config bridge-vlan&lt;br /&gt;
 	option device &#039;br-lan&#039;&lt;br /&gt;
 	list ports &#039;lan:u*&#039;&lt;br /&gt;
 	option vlan &#039;10&#039;&lt;br /&gt;
 &lt;br /&gt;
 config bridge-vlan&lt;br /&gt;
 	option device &#039;br-lan&#039;&lt;br /&gt;
 	option vlan &#039;1001&#039;&lt;br /&gt;
 	list ports &#039;lan:t&#039;&lt;br /&gt;
 &lt;br /&gt;
 config bridge-vlan&lt;br /&gt;
 	option device &#039;br-lan&#039;&lt;br /&gt;
 	option vlan &#039;3900&#039;&lt;br /&gt;
 	list ports &#039;lan:t&#039;&lt;br /&gt;
This was pieced together experimentally over time.  Not guided by the reference documentation.  Mostly with the LuCI web UI.  The &amp;lt;code&amp;gt;ula_prefix&amp;lt;/code&amp;gt; global option value probably does not matter for anything I&#039;m doing here.&lt;br /&gt;
&lt;br /&gt;
=== Wireless network config ===&lt;br /&gt;
This is like the wired networking config previously.  Except it has SSID security passwords in it.  So I am not sharing the actual contents here.  Essentially, though, feed a config to &amp;lt;code&amp;gt;uci import wireless; uci commit wireless; sync; sleep 3; sync; reboot&amp;lt;/code&amp;gt; and things should work out OK.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=OpenWRT_Aruba_AP-303&amp;diff=1595</id>
		<title>OpenWRT Aruba AP-303</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=OpenWRT_Aruba_AP-303&amp;diff=1595"/>
		<updated>2026-04-08T23:20:33Z</updated>

		<summary type="html">&lt;p&gt;Adj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Oh, look, it is 2026! ==&lt;br /&gt;
And things are mostly the same.  New images to install listed at https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/ :&lt;br /&gt;
* https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/openwrt-25.12.2-ipq40xx-generic-aruba_ap-303-initramfs-uImage.itb&lt;br /&gt;
* https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/openwrt-25.12.2-ipq40xx-generic-aruba_ap-303-squashfs-sysupgrade.bin&lt;br /&gt;
And the package manager, &amp;lt;code&amp;gt;opkg&amp;lt;/code&amp;gt;, has been replaced by a tool called &amp;lt;code&amp;gt;apk&amp;lt;/code&amp;gt;.  This seems to have nothing to do with Android&#039;s APK package files, though.  An administrator&#039;s &amp;lt;code&amp;gt;apk&amp;lt;/code&amp;gt; cheatsheet can be found at https://openwrt.org/docs/guide-user/additional-software/opkg-to-apk-cheatsheet.&lt;br /&gt;
So far, it is a bit more like Debian&#039;s &amp;lt;code&amp;gt;apt-get&amp;lt;/code&amp;gt; tool.  Getting all outstanding package updates is simply &amp;lt;code&amp;gt;apk update; apk upgrade&amp;lt;/code&amp;gt; now.&lt;br /&gt;
&lt;br /&gt;
=== Packages we want on our OpenWrt 25.12.x APs ===&lt;br /&gt;
* diffutils -- GNU text file delta generator, useful for comparing two versions of a config file&lt;br /&gt;
* usteer -- this steers WiFi clients toward the best frequency band and AP depending on signal strength, number of stations connected, and other factors.&lt;br /&gt;
&lt;br /&gt;
=== And some basic system setup ===&lt;br /&gt;
OpenWrt has most (all?) of its config files stored under /etc/config.  There is a CLI tool, &amp;lt;code&amp;gt;uci&amp;lt;/code&amp;gt;, to manage them.  Let&#039;s walk through setting up a new AP&#039;s hostname, and getting a juicy kernel random seed value set:&lt;br /&gt;
 root@OpenWrt:~# &#039;&#039;&#039;uci show system&#039;&#039;&#039;&lt;br /&gt;
 system.@system[0]=system&lt;br /&gt;
 system.@system[0].hostname=&#039;OpenWrt&#039;&lt;br /&gt;
 system.@system[0].timezone=&#039;GMT0&#039;&lt;br /&gt;
 system.@system[0].zonename=&#039;UTC&#039;&lt;br /&gt;
 system.@system[0].ttylogin=&#039;0&#039;&lt;br /&gt;
 system.@system[0].log_size=&#039;128&#039;&lt;br /&gt;
 system.@system[0].urandom_seed=&#039;0&#039;&lt;br /&gt;
 system.@system[0].compat_version=&#039;1.1&#039;&lt;br /&gt;
 system.ntp=timeserver&lt;br /&gt;
 system.ntp.enabled=&#039;1&#039;&lt;br /&gt;
 system.ntp.enable_server=&#039;0&#039;&lt;br /&gt;
 system.ntp.server=&#039;0.openwrt.pool.ntp.org&#039; &#039;1.openwrt.pool.ntp.org&#039; &#039;2.openwrt.pool.ntp.org&#039; &#039;3.openwrt.pool.ntp.org&#039;&lt;br /&gt;
 root@OpenWrt:~# &#039;&#039;&#039;uci set system.@system[0].hostname=fnord-ap303-4&#039;&#039;&#039;&lt;br /&gt;
 root@OpenWrt:~# &#039;&#039;&#039;uci commit system&#039;&#039;&#039;&lt;br /&gt;
 root@OpenWrt:~# &#039;&#039;&#039;/etc/init.d/system reload&#039;&#039;&#039;&lt;br /&gt;
 root@fnord-ap303-4:~# &#039;&#039;&#039;uci set system.@system[0].urandom_seed=$(wget -q -O - &#039;https://www.random.org/cgi-bin/randbyte?nbytes=32&amp;amp;format=h&#039; | tr -d &#039; &#039; | tr -d &#039;\n&#039;)&#039;&#039;&#039;&lt;br /&gt;
 root@fnord-ap303-4:~# &#039;&#039;&#039;uci commit system&#039;&#039;&#039;&lt;br /&gt;
 root@fnord-ap303-4:~# &#039;&#039;&#039;/etc/init.d/system reload&#039;&#039;&#039;&lt;br /&gt;
 root@fnord-ap303-4:~#&lt;br /&gt;
&amp;lt;code&amp;gt;paste&amp;lt;/code&amp;gt; might be the better standard UNIX tool for the &amp;lt;code&amp;gt;tr -d &#039;\n&#039;&amp;lt;/code&amp;gt; in the above.  But many of the things we might expect from GNU coreutils are not installed by default on OpenWrt.  So we have &amp;lt;code&amp;gt;tr&amp;lt;/code&amp;gt; remove spaces from the output from random.org&#039;s super awesome random bits delivery service and then have it remove the newlines, too.  End result is the same.&lt;br /&gt;
&lt;br /&gt;
=== Wired network config ===&lt;br /&gt;
Feed this block of text to &amp;lt;code&amp;gt;uci import network&amp;lt;/code&amp;gt; and finish things off with an ASCII end-of-transmission marker (&amp;lt;code&amp;gt;Ctrl-D&amp;lt;/code&amp;gt;) or whatever your termios end-of-file (EOF) character is.&lt;br /&gt;
 package network&lt;br /&gt;
 &lt;br /&gt;
 config interface &#039;loopback&#039;&lt;br /&gt;
 	option device &#039;lo&#039;&lt;br /&gt;
 	option proto &#039;static&#039;&lt;br /&gt;
 	option ipaddr &#039;127.0.0.1&#039;&lt;br /&gt;
 	option netmask &#039;255.0.0.0&#039;&lt;br /&gt;
 &lt;br /&gt;
 config globals &#039;globals&#039;&lt;br /&gt;
 	option ula_prefix &#039;fd1f:ed39:f7d::/48&#039;&lt;br /&gt;
 	option packet_steering &#039;1&#039;&lt;br /&gt;
 &lt;br /&gt;
 config device&lt;br /&gt;
 	option name &#039;br-lan&#039;&lt;br /&gt;
 	option type &#039;bridge&#039;&lt;br /&gt;
 	list ports &#039;lan&#039;&lt;br /&gt;
 &lt;br /&gt;
 config interface &#039;lan&#039;&lt;br /&gt;
 	option device &#039;br-lan.10&#039;&lt;br /&gt;
 	option proto &#039;dhcp&#039;&lt;br /&gt;
 &lt;br /&gt;
 config device&lt;br /&gt;
 	option type &#039;8021q&#039;&lt;br /&gt;
 	option ifname &#039;br-lan&#039;&lt;br /&gt;
 	option vid &#039;1001&#039;&lt;br /&gt;
 	option name &#039;br-lan.1001&#039;&lt;br /&gt;
 &lt;br /&gt;
 config device&lt;br /&gt;
 	option type &#039;8021q&#039;&lt;br /&gt;
 	option ifname &#039;br-lan&#039;&lt;br /&gt;
 	option vid &#039;3900&#039;&lt;br /&gt;
 	option name &#039;br-lan.3900&#039;&lt;br /&gt;
 &lt;br /&gt;
 config interface &#039;lan_1001&#039;&lt;br /&gt;
 	option device &#039;br-lan.1001&#039;&lt;br /&gt;
 &lt;br /&gt;
 config interface &#039;lan_3900&#039;&lt;br /&gt;
 	option device &#039;br-lan.3900&#039;&lt;br /&gt;
 &lt;br /&gt;
 config bridge-vlan&lt;br /&gt;
 	option device &#039;br-lan&#039;&lt;br /&gt;
 	list ports &#039;lan:u*&#039;&lt;br /&gt;
 	option vlan &#039;10&#039;&lt;br /&gt;
 &lt;br /&gt;
 config bridge-vlan&lt;br /&gt;
 	option device &#039;br-lan&#039;&lt;br /&gt;
 	option vlan &#039;1001&#039;&lt;br /&gt;
 	list ports &#039;lan:t&#039;&lt;br /&gt;
 &lt;br /&gt;
 config bridge-vlan&lt;br /&gt;
 	option device &#039;br-lan&#039;&lt;br /&gt;
 	option vlan &#039;3900&#039;&lt;br /&gt;
 	list ports &#039;lan:t&#039;&lt;br /&gt;
This was pieced together experimentally over time.  Not guided by the reference documentation.  Mostly with the LuCI web UI.  The &amp;lt;code&amp;gt;ula_prefix&amp;lt;/code&amp;gt; global option value probably does not matter for anything I&#039;m doing here.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=OpenWRT_Aruba_AP-303&amp;diff=1594</id>
		<title>OpenWRT Aruba AP-303</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=OpenWRT_Aruba_AP-303&amp;diff=1594"/>
		<updated>2026-04-04T21:35:00Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Getting to end state: packages */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Aruba AP-303 hardware became supported by OpenWRT in its 21.02.0 release.  Since I am all about free software wherever possible, and these are available at low prices on eBay, I have acquired a few.&lt;br /&gt;
&lt;br /&gt;
Documentation of hardware, OpenWRT installation, and network configuration is here.&lt;br /&gt;
&lt;br /&gt;
== About the Hardware and low level things ==&lt;br /&gt;
This mostly lifted from the [https://openwrt.org/toh/aruba/ap-303|OpenWRT page describing the AP-303] at openwrt.org.  The SoC is a Qualcomm IPQ4029.  Marketing data sheet can be seen at &lt;br /&gt;
https://www.qualcomm.com/content/dam/qcomm-martech/dm-assets/documents/ipq40x8ipq40x9-productbrief.pdf.   But in short, it is a 4-core 32-bit ARMv7 system integrating 2.4GHz and 5GHz Wifi components.  The AP-303 is equipped with 128MiB NAND Flash memory for persistent storage, and 512MiB of RAM for program code and data.&lt;br /&gt;
&lt;br /&gt;
=== Serial Console ===&lt;br /&gt;
Serial console is attached to an external micro B style USB connector wired to the 3.3 Volt 2 wire serial.  The HPE/Aruba cable with integrated FTDI USB to low voltage serial is sold under part number JY728A.  Do not wire standard 12 Volt serial to this connector.  Bad things are likely to happen.&lt;br /&gt;
&lt;br /&gt;
=== Power up, boot loader, etc ===&lt;br /&gt;
Not having any of the Aruba power supplies, but having some Power Over Ethernet capable switches here...&lt;br /&gt;
# Connect console cable&lt;br /&gt;
# Set serial port to 9600bps, 8 data bits, no parity, 1 stop bit&lt;br /&gt;
# Apply power to Ethernet port&lt;br /&gt;
# Interrupt autoboot when the &#039;&#039;&#039;&amp;lt;code&amp;gt;Hit &amp;lt;Enter&amp;gt; to stop autoboot:&amp;lt;/code&amp;gt;&#039;&#039;&#039; message appears.&lt;br /&gt;
&lt;br /&gt;
=== Bootloader stuff and things ===&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;mfginfo&amp;lt;/code&amp;gt;&#039;&#039;&#039; will show hardware information including the access point&#039;s serial number:&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;mfginfo&#039;&#039;&#039;&lt;br /&gt;
  Inventory:&lt;br /&gt;
  Card 0: System&lt;br /&gt;
        Wired MAC           : 90:4c:81:cb:f1:8c&lt;br /&gt;
        Wired MAC Count     : 2&lt;br /&gt;
        Serial              : CNG9K9T1HP&lt;br /&gt;
        Date Code           : 072418&lt;br /&gt;
        Country             : CCODE-US-8392f77e514e9c048d2d1e48520555e3ed355812&lt;br /&gt;
  Card 1: CPU&lt;br /&gt;
        Assembly            : 2010282C&lt;br /&gt;
        Serial              : MX87E0634&lt;br /&gt;
        Date Code           : 072418&lt;br /&gt;
        Major Rev           : 03&lt;br /&gt;
        Minor Rev/Variant   : 00&lt;br /&gt;
  apboot&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;osinfo&amp;lt;/code&amp;gt;&#039;&#039;&#039; will show information about the OS images on the flash storage:&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;osinfo&#039;&#039;&#039;&lt;br /&gt;
  Partition 0:&lt;br /&gt;
      image type: 0&lt;br /&gt;
    machine type: 48&lt;br /&gt;
            size: 22859904&lt;br /&gt;
         version: 8.7.1.0-8.7.1.0&lt;br /&gt;
    build string: ArubaOS version 8.7.1.0-8.7.1.0 for Ursa (p4build@pr-hpn-build09) (gcc version 4.6.3) #77203 SMP Wed Sep 23 00:55:22 UTC 2020&lt;br /&gt;
           flags: Instant preserve &lt;br /&gt;
             oem: aruba&lt;br /&gt;
  &lt;br /&gt;
  Image is signed; verifying checksum... passed&lt;br /&gt;
  SHA2 Signature available&lt;br /&gt;
  Signer Cert OK&lt;br /&gt;
  Policy Cert OK&lt;br /&gt;
  RSA signature verified using SHA2.&lt;br /&gt;
  &lt;br /&gt;
  Partition 1:&lt;br /&gt;
      image type: 0&lt;br /&gt;
    machine type: 48&lt;br /&gt;
            size: 20639392&lt;br /&gt;
         version: 8.8.0.0-8.8.0.0&lt;br /&gt;
    build string: ArubaOS version 8.8.0.0-8.8.0.0 for Ursa (p4build@pr-hpn-build07) (gcc version 4.6.3) #79697 SMP Sat Mar 27 05:22:09 UTC 2021&lt;br /&gt;
           flags: Instant preserve &lt;br /&gt;
             oem: aruba&lt;br /&gt;
  &lt;br /&gt;
  Image is signed; verifying checksum... passed&lt;br /&gt;
  SHA2 Signature available&lt;br /&gt;
  Signer Cert OK&lt;br /&gt;
  Policy Cert OK&lt;br /&gt;
  RSA signature verified using SHA2.&lt;br /&gt;
  apboot&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Clearing ArubaOS settings ===&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;code&amp;gt;factory_reset&amp;lt;/code&amp;gt;&#039;&#039;&#039; will wipe the AP&#039;s configuration.  Execute like so:&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;factory_reset&#039;&#039;&#039;&lt;br /&gt;
  Clearing state... &lt;br /&gt;
  Checking OS image and flags&lt;br /&gt;
  &lt;br /&gt;
  Image is signed; verifying checksum... passed&lt;br /&gt;
  Preserving image partition 0&lt;br /&gt;
  Erasing flash sector @ 0x3a0000... OK&lt;br /&gt;
  Erasing UBIFS ...done&lt;br /&gt;
  &lt;br /&gt;
  Purging environment... &lt;br /&gt;
  preserving os_partition (1)&lt;br /&gt;
  Erasing SPI flash...Writing to SPI flash...done&lt;br /&gt;
  Erasing SPI flash...Writing to SPI flash...done&lt;br /&gt;
  apboot&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Slowing down the autoboot process a bit ===&lt;br /&gt;
After the &#039;&#039;&#039;&amp;lt;code&amp;gt;factory_reset&amp;lt;/code&amp;gt;&#039;&#039;&#039; command has been executed, the autoboot delay is only 2 seconds.  Here we set it to 20 seconds and save that value to flash for the next power cycle event:&lt;br /&gt;
&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv bootdelay 20&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;saveenv&#039;&#039;&#039;&lt;br /&gt;
  Saving Environment to SPI Flash...&lt;br /&gt;
  Erasing SPI flash...Writing to SPI flash...done&lt;br /&gt;
  apboot&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Default admin credentials ===&lt;br /&gt;
ArubaOS&#039;s administrator user is &#039;&#039;&#039;&amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  The default password is the access point&#039;s serial number.  After wiping the AP&#039;s config with the factory_reset boot loader command (above), feel free to login with those on the console port and poke around.  But we&#039;re not super interested in ArubaOS today, so let&#039;s move on to OpenWRT.&lt;br /&gt;
&lt;br /&gt;
== OpenWRT installation ==&lt;br /&gt;
=== OpenWRT installation image acquisition and related setup ===&lt;br /&gt;
OpenWRT is a free Linux distribution primarily designed for WiFi access points and similar devices.  Its web home page is https://www.openwrt.org/.&lt;br /&gt;
&lt;br /&gt;
OpenWRT&#039;s wiki page for the Aruba Networks AP-303 is https://openwrt.org/toh/aruba/ap-303.  See that site for the most current information.  But, for our purposes here:&lt;br /&gt;
# Acquire the OpenWRT installation image from https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/openwrt-24.10.0-ipq40xx-generic-aruba_ap-303-initramfs-uImage.itb&lt;br /&gt;
# Save this image to a location on a TFTP server that will be accessible to the AP and name it &#039;&#039;&#039;&amp;lt;code&amp;gt;ipq40xx.ari&amp;lt;/code&amp;gt;&#039;&#039;&#039;.  (Or whatever the &amp;lt;code&amp;gt;bootfile&amp;lt;/code&amp;gt; variable is in the AP&#039;s bootloader.)&lt;br /&gt;
# Update DHCP server config to include the new AP, too.&lt;br /&gt;
## set &#039;&#039;&#039;&amp;lt;code&amp;gt;next-server&amp;lt;/code&amp;gt;&#039;&#039;&#039; with the TFTP server&#039;s IP address&lt;br /&gt;
## set &#039;&#039;&#039;&amp;lt;code&amp;gt;filename&amp;lt;/code&amp;gt;&#039;&#039;&#039; to the installation image file saved above.  &amp;quot;openwrt-24.10.0-ipq40xx-generic-aruba_ap-303-initramfs-uImage.itb&amp;quot; for now.&lt;br /&gt;
# Configure the AP&#039;s network port appropriately on the switch side&lt;br /&gt;
## Boot loader does not know about tagged VLANs.  So set primary VLAN as appropriate.  And perhaps add some tagged VLANs that will be connected to wireless SSIDs&lt;br /&gt;
## PoE enabled for the access point to run&lt;br /&gt;
&lt;br /&gt;
=== OpenWRT installation procedure ===&lt;br /&gt;
# Power on the AP, interrupt the autoboot process&lt;br /&gt;
# Tell the boot loader to get network config from a DHCP server:&lt;br /&gt;
## Interrupt bootloader at the &amp;lt;code&amp;gt;Hit &amp;lt;Enter&amp;gt; to stop autoboot:&amp;lt;/code&amp;gt; message.&lt;br /&gt;
## Get network config from DHCP server: &#039;&#039;&#039;&amp;lt;code&amp;gt;dhcp&amp;lt;/code&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
# Some boot loader environment variables get set next:&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv bootargs_openwrt &amp;quot;setenv bootargs console=ttyMSM1,9600n8&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv nandboot_openwrt &amp;quot;run bootargs_openwrt; ubi part aos1; ubi read 0x85000000 kernel; set fdt_high 0x87000000; bootm 0x85000000&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv ramboot_openwrt &amp;quot;run bootargs_openwrt; setenv ipaddr 192.168.1.105; setenv serverip 192.168.1.75; netget; set fdt_high 0x87000000; bootm&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;setenv bootcmd &amp;quot;run nandboot_openwrt&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
  apboot&amp;gt; &#039;&#039;&#039;saveenv&#039;&#039;&#039;&lt;br /&gt;
# And now the value of the ramboot_openwrt command is actually executed: &amp;lt;code&amp;gt;apboot&amp;amp;gt; &#039;&#039;&#039;run ramboot_openwrt&#039;&#039;&#039;&amp;lt;/code&amp;gt;.  This will download the ipq40xx file from the TFTP server and run it.  Any complaint about an invalid image format can be safely ignored.&lt;br /&gt;
# After the Linux kernel stops spewing messages to the console, send a newline (hit Enter), and be greeted with the astonishing ASCII art OpenWRT logo and a root shell prompt.&lt;br /&gt;
  &lt;br /&gt;
   _______                     ________        __&lt;br /&gt;
  |       |.-----.-----.-----.|  |  |  |.----.|  |_&lt;br /&gt;
  |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|&lt;br /&gt;
  |_______||   __|_____|__|__||________||__|  |____|&lt;br /&gt;
           |__| W I R E L E S S   F R E E D O M&lt;br /&gt;
  -----------------------------------------------------&lt;br /&gt;
  OpenWrt 24.10.0, r28427-6df0e3d02a&lt;br /&gt;
  -----------------------------------------------------&lt;br /&gt;
  === WARNING! =====================================&lt;br /&gt;
  There is no root password defined on this device!&lt;br /&gt;
  Use the &amp;quot;passwd&amp;quot; command to set up a new password&lt;br /&gt;
  in order to prevent unauthorized SSH logins.&lt;br /&gt;
  --------------------------------------------------&lt;br /&gt;
  root@OpenWrt:~#&lt;br /&gt;
# Update network to use DHCP and restart it&lt;br /&gt;
## Change &amp;lt;code&amp;gt;option proto &#039;static&#039;&amp;lt;/code&amp;gt; to &amp;lt;code&amp;gt;option proto &#039;dhcp&#039;&amp;lt;/code&amp;gt; for the &amp;lt;code&amp;gt;lan&amp;lt;/code&amp;gt; interface in &amp;lt;code&amp;gt;/etc/config/network&amp;lt;/code&amp;gt;.  (There is a small implementation of vi included in the installation image.)&lt;br /&gt;
## Restart all networking by running &amp;lt;code&amp;gt;root@OpenWrt:~# &#039;&#039;&#039;service network restart&#039;&#039;&#039;&amp;lt;/code&amp;gt;.&lt;br /&gt;
# Fetch the OpenWRT sysupgrade image to /tmp on the AP: &amp;lt;code&amp;gt;root@OpenWrt:~# cd /tmp; wget &#039;&#039;&#039;https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/openwrt-24.10.0-ipq40xx-generic-aruba_ap-303-squashfs-sysupgrade.bin&#039;&#039;&#039;&amp;lt;/code&amp;gt;.&lt;br /&gt;
# Clean up the flash.  No more ArubaOS when this is done.&lt;br /&gt;
  root@OpenWrt:/tmp# &#039;&#039;&#039;ubidetach -p /dev/mtd1&#039;&#039;&#039;&lt;br /&gt;
  [ 1416.126100] ubi0: detaching mtd1&lt;br /&gt;
  [ 1416.126816] ubi0: mtd1 is detached&lt;br /&gt;
  root@OpenWrt:/tmp# &#039;&#039;&#039;ubiformat /dev/mtd1&#039;&#039;&#039;&lt;br /&gt;
  ubiformat: mtd1 (nand), size 33554432 bytes (32.0 MiB), 256 eraseblocks of 131072 bytes (128.0 KiB), min. I/O size 2048 bytes&lt;br /&gt;
  libscan: scanning eraseblock 255 -- 100 % complete  &lt;br /&gt;
  ubiformat: 256 eraseblocks have valid erase counter, mean value is 2&lt;br /&gt;
  ubiformat: formatting eraseblock 255 -- 100 % complete  &lt;br /&gt;
  root@OpenWrt:/tmp#&lt;br /&gt;
# Apply the OpenWrt sysupgrade image: &lt;br /&gt;
  root@OpenWrt:/tmp# &#039;&#039;&#039;sysupgrade -n openwrt-24.10.0-ipq40xx-generic-aruba_ap-303-squashfs-sysupgrade.bin&#039;&#039;&#039;&lt;br /&gt;
  Sat Feb 22 04:12:30 UTC 2025 upgrade: Commencing upgrade. Closing all shell sessions.&lt;br /&gt;
  Watchdog handover: fd=3&lt;br /&gt;
  - watchdog -&lt;br /&gt;
  Watchdog did not previously reset the system&lt;br /&gt;
  Sat Feb 22 04:12:31 UTC 2025 upgrade: Sending TERM to remaining processes ...&lt;br /&gt;
  Sat Feb 22 04:12:31 UTC 2025 upgrade: Sending signal TERM to netifd (3025)&lt;br /&gt;
  Sat Feb 22 04:12:35 UTC 2025 upgrade: Sending KILL to remaining processes ...&lt;br /&gt;
  Sat Feb 22 04:12:35 UTC 2025 upgrade: Sending signal KILL to netifd (3025)&lt;br /&gt;
  [11388.891505] stage2 (3683): drop_caches: 3&lt;br /&gt;
  Sat Feb 22 04:12:44 UTC 2025 upgrade: Switching to ramdisk...&lt;br /&gt;
  Sat Feb 22 04:12:46 UTC 2025 upgrade: Performing system upgrade...&lt;br /&gt;
  verifying sysupgrade tar file integrity&lt;br /&gt;
  [11392.106885] ubi0: attaching mtd1&lt;br /&gt;
  [11392.439761] ubi0: scanning is finished&lt;br /&gt;
  [11392.453417] ubi0: attached mtd1 (name &amp;quot;ubi&amp;quot;, size 32 MiB)&lt;br /&gt;
  [11392.471153] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes&lt;br /&gt;
  [11392.536731] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048&lt;br /&gt;
  [11392.617971] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096&lt;br /&gt;
  [11392.700276] ubi0: good PEBs: 256, bad PEBs: 0, corrupted PEBs: 0&lt;br /&gt;
  [11392.781509] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 128&lt;br /&gt;
  [11392.856520] ubi0: max/mean erase counter: 8/3, WL threshold: 4096, image sequence number: 1647604229&lt;br /&gt;
  [11392.940952] ubi0: available PEBs: 232, total reserved PEBs: 24, PEBs reserved for bad PEB handling: 20&lt;br /&gt;
  [11393.052389] ubi0: background thread &amp;quot;ubi_bgt0d&amp;quot; started, PID 4405&lt;br /&gt;
  UBI device number 0, total 256 LEBs (32505856 bytes, 31.0 MiB), available 232 LEBs (29458432 bytes, 28.0 MiB), LEB size 126976 bytes (124.0 KiB)[11393.308786] block ubiblock0_1: created from ubi0:1(rootfs)&lt;br /&gt;
  &lt;br /&gt;
  Volume ID 0, size 28 LEBs (3555328 bytes, 3.3 MiB), LEB size 126976 bytes (124.0 KiB), dynamic, name &amp;quot;kernel&amp;quot;, alignment 1&lt;br /&gt;
  Volume ID 1, size 33 LEBs (4190208 bytes, 3.9 MiB), LEB size 126976 bytes (124.0 KiB), dynamic, name &amp;quot;rootfs&amp;quot;, alignment 1&lt;br /&gt;
  Set volume size to 21712896&lt;br /&gt;
  Volume ID 2, size 171 LEBs (21712896 bytes, 20.7 MiB), LEB size 126976 bytes (124.0 KiB), dynamic, name &amp;quot;rootfs_data&amp;quot;, alignment 1&lt;br /&gt;
  sysupgrade&lt;br /&gt;
&lt;br /&gt;
=== Basic OpenWRT configuration ===&lt;br /&gt;
==== Wired Ethernet setup ====&lt;br /&gt;
After the OpenWrt installation has completed, the AP is lacking all configuration.  Again &amp;lt;code&amp;gt;/etc/config/network&amp;lt;/code&amp;gt; will need to be edited.  Set it to DHCP mode and again run &amp;lt;code&amp;gt;service network restart&amp;lt;/code&amp;gt;.  Then wait patiently.  45 seconds may be needed for things to fully settle out.&lt;br /&gt;
&lt;br /&gt;
==== The OpenWrt way of configuration ====&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;uci set network.lan.proto=dhcp&#039;&#039;&#039;&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;service network restart&#039;&#039;&#039;&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;sleep 60; ip addr list dev br-lan&#039;&#039;&#039;&lt;br /&gt;
  5: br-lan: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc noqueue state UP qlen 1000&lt;br /&gt;
      link/ether 90:4c:81:cb:f1:8c brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
      inet 172.16.10.40/24 brd 172.16.10.255 scope global br-lan&lt;br /&gt;
         valid_lft forever preferred_lft forever&lt;br /&gt;
      inet6 fe80::924c:81ff:fecb:f18c/64 scope link &lt;br /&gt;
         valid_lft forever preferred_lft forever&lt;br /&gt;
  root@OpenWrt:~#&lt;br /&gt;
&lt;br /&gt;
==== OS updates ====&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;opkg update&#039;&#039;&#039;&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/packages/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_core&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/packages/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_base&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/kmods/6.6.73-1-60aeaf7e722ca0f86e06f61157755da3/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_kmods&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/targets/ipq40xx/generic/kmods/6.6.73-1-60aeaf7e722ca0f86e06f61157755da3/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_luci&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/packages/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_packages&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/packages/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/routing/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_routing&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/routing/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/telephony/Packages.gz&lt;br /&gt;
  Updated list of available packages in /var/opkg-lists/openwrt_telephony&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/telephony/Packages.sig&lt;br /&gt;
  Signature check passed.&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;opkg list-upgradable&#039;&#039;&#039;&lt;br /&gt;
  luci-mod-system - 24.336.49068~ef16778 - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-uloop - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  ucode-mod-ubus - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci-theme-bootstrap - 24.357.59015~779ca14 - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-uci - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  ucode-mod-math - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci-mod-status - 25.009.65022~20bf9a4 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-app-firewall - 25.014.06885~bd39c63 - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-fs - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci-ssl - 24.328.43591~9e70c9a - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-nl80211 - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  ucode - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci-app-package-manager - 24.341.02353~276fef8 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-proto-ppp - 25.009.71487~a88d4af - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-mod-admin-full - 19.253.48496~3f93650 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-base - 25.014.55016~7046a1c - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-proto-ipv6 - 24.350.69236~8d13ea4 - 25.049.66344~2b8e93c&lt;br /&gt;
  ucode-mod-rtnl - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  luci - 24.297.79519~bcd13b9 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-light - 23.024.33244~34dee82 - 25.049.66344~2b8e93c&lt;br /&gt;
  luci-mod-network - 25.021.30718~36b6107 - 25.049.66344~2b8e93c&lt;br /&gt;
  libucode20230711 - 2024.07.22~b610860d-r3 - 2025.02.10~a8a11aea-r1&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;opkg upgrade $(opkg list-upgradable | sort | cut -d&#039; &#039; -f1)&#039;&#039;&#039;&lt;br /&gt;
  Upgrading libucode20230711 on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/libucode20230711_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading luci on root from 24.297.79519~bcd13b9 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-app-firewall on root from 25.014.06885~bd39c63 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-app-firewall_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-app-package-manager on root from 24.341.02353~276fef8 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-app-package-manager_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-base on root from 25.014.55016~7046a1c to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-base_25.049.66344~2b8e93c_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading luci-light on root from 23.024.33244~34dee82 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-light_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-mod-admin-full on root from 19.253.48496~3f93650 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-mod-admin-full_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-mod-network on root from 25.021.30718~36b6107 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-mod-network_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-mod-status on root from 25.009.65022~20bf9a4 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-mod-status_25.049.66344~2b8e93c_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading luci-mod-system on root from 24.336.49068~ef16778 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-mod-system_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-proto-ipv6 on root from 24.350.69236~8d13ea4 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-proto-ipv6_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-proto-ppp on root from 25.009.71487~a88d4af to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-proto-ppp_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-ssl on root from 24.328.43591~9e70c9a to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-ssl_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading luci-theme-bootstrap on root from 24.357.59015~779ca14 to 25.049.66344~2b8e93c...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/luci/luci-theme-bootstrap_25.049.66344~2b8e93c_all.ipk&lt;br /&gt;
  Upgrading ucode on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-fs on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-fs_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-math on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-math_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-nl80211 on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-nl80211_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-rtnl on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-rtnl_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-ubus on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-ubus_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-uci on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-uci_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Upgrading ucode-mod-uloop on root from 2024.07.22~b610860d-r3 to 2025.02.10~a8a11aea-r1...&lt;br /&gt;
  Downloading https://downloads.openwrt.org/releases/24.10.0/packages/arm_cortex-a7_neon-vfpv4/base/ucode-mod-uloop_2025.02.10~a8a11aea-r1_arm_cortex-a7_neon-vfpv4.ipk&lt;br /&gt;
  Configuring libucode20230711.&lt;br /&gt;
  Configuring ucode.&lt;br /&gt;
  Configuring ucode-mod-fs.&lt;br /&gt;
  Configuring ucode-mod-nl80211.&lt;br /&gt;
  Configuring ucode-mod-rtnl.&lt;br /&gt;
  Configuring ucode-mod-ubus.&lt;br /&gt;
  Configuring ucode-mod-uloop.&lt;br /&gt;
  Configuring ucode-mod-uci.&lt;br /&gt;
  Configuring ucode-mod-math.&lt;br /&gt;
  Configuring luci-base.&lt;br /&gt;
  Configuring luci-mod-system.&lt;br /&gt;
  Configuring luci-theme-bootstrap.&lt;br /&gt;
  Configuring luci-mod-status.&lt;br /&gt;
  Configuring luci-app-firewall.&lt;br /&gt;
  Configuring luci-proto-ipv6.&lt;br /&gt;
  Configuring luci-mod-network.&lt;br /&gt;
  Configuring luci-mod-admin-full.&lt;br /&gt;
  Configuring luci-proto-ppp.&lt;br /&gt;
  Configuring luci-light.&lt;br /&gt;
  Configuring luci-app-package-manager.&lt;br /&gt;
  Configuring luci-ssl.&lt;br /&gt;
  Configuring luci.&lt;br /&gt;
  Collected errors:&lt;br /&gt;
   * resolve_conffiles: Existing conffile /etc/config/luci is different from the conffile in the new package. The new conffile will be placed at /etc/config/luci-opkg.&lt;br /&gt;
  root@OpenWrt:~#&lt;br /&gt;
=== Reboot and test functionality ===&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;reboot&#039;&#039;&#039;&lt;br /&gt;
== Configure our first WiFi networks ==&lt;br /&gt;
=== Out of the box contents of /etc/config/wireless ===&lt;br /&gt;
  root@OpenWrt:~# &#039;&#039;&#039;cat /etc/config/wireless&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  config wifi-device &#039;radio0&#039;&lt;br /&gt;
          option type &#039;mac80211&#039;&lt;br /&gt;
          option path &#039;platform/soc/a000000.wifi&#039;&lt;br /&gt;
          option band &#039;2g&#039;&lt;br /&gt;
          option channel &#039;1&#039;&lt;br /&gt;
          option htmode &#039;VHT20&#039;&lt;br /&gt;
          option disabled &#039;1&#039;&lt;br /&gt;
  &lt;br /&gt;
  config wifi-iface &#039;default_radio0&#039;&lt;br /&gt;
          option device &#039;radio0&#039;&lt;br /&gt;
          option network &#039;lan&#039;&lt;br /&gt;
          option mode &#039;ap&#039;&lt;br /&gt;
          option ssid &#039;OpenWrt&#039;&lt;br /&gt;
          option encryption &#039;none&#039;&lt;br /&gt;
  &lt;br /&gt;
  config wifi-device &#039;radio1&#039;&lt;br /&gt;
          option type &#039;mac80211&#039;&lt;br /&gt;
          option path &#039;platform/soc/a800000.wifi&#039;&lt;br /&gt;
          option band &#039;5g&#039;&lt;br /&gt;
          option channel &#039;36&#039;&lt;br /&gt;
          option htmode &#039;VHT80&#039;&lt;br /&gt;
          option disabled &#039;1&#039;&lt;br /&gt;
  &lt;br /&gt;
  config wifi-iface &#039;default_radio1&#039;&lt;br /&gt;
          option device &#039;radio1&#039;&lt;br /&gt;
          option network &#039;lan&#039;&lt;br /&gt;
          option mode &#039;ap&#039;&lt;br /&gt;
          option ssid &#039;OpenWrt&#039;&lt;br /&gt;
          option encryption &#039;none&#039;&lt;br /&gt;
Here we see 2 radios, both disabled.  On each of the radios, a WiFi SSID called &amp;lt;code&amp;gt;OpenWrt&amp;lt;/code&amp;gt; is defined and it is bridged to the network interface known as &amp;lt;code&amp;gt;lan&amp;lt;/code&amp;gt;.  Additionally. the radios are assigned to default channels.&lt;br /&gt;
&lt;br /&gt;
=== Restoring default WiFi radio setup ===&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;mv wireless wireless~&#039;&#039;&#039;&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;wifi config&#039;&#039;&#039;&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;ls -l wireless&#039;&#039;&#039;&lt;br /&gt;
  -rw-r--r--    1 root     root           652 Feb 25 17:25 wireless&lt;br /&gt;
  root@OpenWrt:/etc/config#&lt;br /&gt;
&lt;br /&gt;
=== Desired end state ===&lt;br /&gt;
* 2 SSIDs defined.  One for authenticated devices with access to internal network resources (VLAN 1001).  And another open network attached to the guest subnet (VLAN 3900).&lt;br /&gt;
* Both SSIDs available on both the 2.4GHz and 5GHz spectrum.&lt;br /&gt;
* APs able to do some band steering, hopefully encouraging clients to connect on the 5GHz radio.&lt;br /&gt;
* APs doing some channel selection on their own, not just a static one from the config file&lt;br /&gt;
* Fast roaming between APs&lt;br /&gt;
&lt;br /&gt;
=== Getting to end state: packages ===&lt;br /&gt;
&amp;lt;code&amp;gt;wpad-basic-mbedtls&amp;lt;/code&amp;gt; is installed out of the box on this platform.  It should be sufficient for our purposes, only has the WiFi mesh features turned off.  (WiFi mesh is inter-AP backhaul over the air, one AP is a client of another and still serving clients on the non-backhaul radio.)&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;opkg list-installed | grep wpad&#039;&#039;&#039;&lt;br /&gt;
  wpad-basic-mbedtls - 2024.09.15~5ace39b0-r2&lt;br /&gt;
  root@OpenWrt:/etc/config# &#039;&#039;&#039;opkg list | grep wpad-basic-mbedtls&#039;&#039;&#039;&lt;br /&gt;
  wpad-basic-mbedtls - 2024.09.15~5ace39b0-r2 - This package contains a basic IEEE 802.1x/WPA Authenticator and Supplicant with WPA-PSK, SAE (WPA3-Personal), 802.11r and 802.11w support.&lt;br /&gt;
  root@OpenWrt:/etc/config#&lt;br /&gt;
&lt;br /&gt;
== Oh, look, it is 2026! ==&lt;br /&gt;
And things are mostly the same.  New images to install listed at https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/ :&lt;br /&gt;
* https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/openwrt-25.12.2-ipq40xx-generic-aruba_ap-303-initramfs-uImage.itb&lt;br /&gt;
* https://downloads.openwrt.org/releases/25.12.2/targets/ipq40xx/generic/openwrt-25.12.2-ipq40xx-generic-aruba_ap-303-squashfs-sysupgrade.bin&lt;br /&gt;
And the package manager, &amp;lt;code&amp;gt;opkg&amp;lt;/code&amp;gt;, has been replaced by a tool called &amp;lt;code&amp;gt;apk&amp;lt;/code&amp;gt;.  This seems to have nothing to do with Android&#039;s APK package files, though.  An administrator&#039;s &amp;lt;code&amp;gt;apk&amp;lt;/code&amp;gt; cheatsheet can be found at https://openwrt.org/docs/guide-user/additional-software/opkg-to-apk-cheatsheet.&lt;br /&gt;
So far, it is a bit more like Debian&#039;s &amp;lt;code&amp;gt;apt-get&amp;lt;/code&amp;gt; tool.  Getting all outstanding package updates is simply &amp;lt;code&amp;gt;apk update; apk upgrade&amp;lt;/code&amp;gt; now.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1593</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1593"/>
		<updated>2026-04-03T05:10:26Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* A new step for firmware infrastructure updates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the friendly FI management software is all lovely out of date (completely unrunnable in 2026!) Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;br /&gt;
&lt;br /&gt;
Now that we are on 2.2(8m), the SSH client is able to fetch the .bin file using scp.  Or maybe I just got the syntax correct this time.  So here we are:&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-infra.2.5.2a.A.bin&#039;&#039;&#039;&lt;br /&gt;
 Password:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  Download task:&lt;br /&gt;
      File Name Protocol Server          Userid          State&lt;br /&gt;
      --------- -------- --------------- --------------- -----&lt;br /&gt;
      ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
                Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
      ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
                Scp      172.17.0.18     adj             Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.5(2a)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.5(2a)A&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: Success&lt;br /&gt;
         Completion Time: 2009-01-01T01:59:13.146&lt;br /&gt;
         Progress (%): 100&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Success      2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
    FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 95&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 In Progress  1&lt;br /&gt;
         9      DeployActivateUCSM                       Pending      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Pending      0&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 96&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Success      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # Connection to 172.16.10.176 closed.&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And after some more time and one more disconnect, we see that another OpenSSH client compatibility option is required to connect:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa -o Ciphers=+aes256-cbc admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== But I&#039;m still trying to get the blades&#039; CIMCs connected! ==&lt;br /&gt;
The struggle is real!  But I did find https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/integrated-management-controller/118367-configure-cimc-00.pdf which is a GUI-specific outline of the process involved in getting UCS servers&#039; (blade and maybe also rackmount) CIMCs attached to the greater network environment.&lt;br /&gt;
=== In-band?  Out-of-band?  Huh? ===&lt;br /&gt;
First decision to be made here.  In UCS versions before 2.2, the servers&#039; CIMCs always had Ethernet connectivity through the Fabric Interconnects&#039; management port.  This connection amounts to a single point of failure for CIMC connectivity.&lt;br /&gt;
&lt;br /&gt;
In UCS version 2.2 and newer, there are two options for CIMC connectivity: In-band using the FIs&#039; high bandwidth network uplink ports, and out-of band using an FI&#039;s 1000baseT management port.  Naturally, being me, I will opt for the more complicated alternative.  And probably complain the whole way through.&lt;br /&gt;
&lt;br /&gt;
=== In-band CIMC connectivity setup ===&lt;br /&gt;
Log in to the FI.  Go to the organization (probably &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;.  And create an IP pool.  We are skipping the IPv6 stuff for now and the management VLAN is IPv4-only.&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show ip-pool&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     ext-mgmt                      0          0 Internal&lt;br /&gt;
     iscsi-initiator-pool          0          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ip-pool CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool* # &#039;&#039;&#039;create block 172.16.10.168 172.16.10.175 172.16.10.1 255.255.255.0&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;set primary-dns 172.16.10.1 secondary-dns 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From: 172.16.10.168&lt;br /&gt;
     To: 172.16.10.175&lt;br /&gt;
     Default Gateway: 172.16.10.1&lt;br /&gt;
     Subnet Mask: 255.255.255.0&lt;br /&gt;
     Primary DNS: 172.16.10.1&lt;br /&gt;
     Secondary DNS: 172.16.10.2&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From            To              Default Gateway Subnet Mask&lt;br /&gt;
     --------------- --------------- --------------- -----------&lt;br /&gt;
     172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     CIMC_inband_pool              8          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     IPv4 Size: 8&lt;br /&gt;
     IPv4 Assigned: 0&lt;br /&gt;
     IPv6 Size: 0&lt;br /&gt;
     IPv6 Assigned: 0&lt;br /&gt;
     Descr:&lt;br /&gt;
     Assignment Order: Default&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
     Guid: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Net bios enabled or disabled: Not Active&lt;br /&gt;
     DHCP enaled or disabled: Not Supported&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
 &lt;br /&gt;
     Block of IP Addresses:&lt;br /&gt;
         From            To              Default Gateway Subnet Mask&lt;br /&gt;
         --------------- --------------- --------------- -----------&lt;br /&gt;
         172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 &lt;br /&gt;
     Pooled:&lt;br /&gt;
         Id              Subnet          Assigned Assigned To&lt;br /&gt;
         --------------- --------------- -------- -----------&lt;br /&gt;
         172.16.10.168   255.255.255.0   No&lt;br /&gt;
         172.16.10.169   255.255.255.0   No&lt;br /&gt;
         172.16.10.170   255.255.255.0   No&lt;br /&gt;
         172.16.10.171   255.255.255.0   No&lt;br /&gt;
         172.16.10.172   255.255.255.0   No&lt;br /&gt;
         172.16.10.173   255.255.255.0   No&lt;br /&gt;
         172.16.10.174   255.255.255.0   No&lt;br /&gt;
         172.16.10.175   255.255.255.0   No&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool #&lt;br /&gt;
So we now have a pool of IPv4 addresses to hand out to CIMCs in our UCS domain.  And we can also LOL at Cisco&#039;s &amp;lt;code&amp;gt;DHCP &#039;&#039;&#039;enaled&#039;&#039;&#039; or disabled&amp;lt;/code&amp;gt; spelling error.  But not too loud.  It may well be fixed in newer versions.&lt;br /&gt;
&lt;br /&gt;
=== Create VLAN and VLAN group to connect the CIMC IP pool to ===&lt;br /&gt;
VLAN on the Ethernet uplinks:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan Management 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set native no&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set vlan-id 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
VLAN group now:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show vlan-group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan-group Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group* # &#039;&#039;&#039;create member-vlan Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
Add IP pool, VLAN, VLAN group to in-band profile:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope inband-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &#039;&#039;&#039;set default-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set default-vlan-name Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set net-group-name Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &lt;br /&gt;
Now that the in-band profile is set, update a blade&#039;s service profile to reference it:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ext-mgmt-ip-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;set ext-mgmt-ip-state pooled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset hard-reset-immediate&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset-kvm&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;reset-ipmi&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID              Serial (SN)      HW Revision&lt;br /&gt;
     ---------------- ---------------- -----------&lt;br /&gt;
     UCSB-B200-M3     FCH162871NA      0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V01&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     GUID:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
 &lt;br /&gt;
     Vmedia Mapping List:&lt;br /&gt;
         Full Name: sys/chassis-1/blade-1/mgmt/actual-mount-list&lt;br /&gt;
 &lt;br /&gt;
         Vmedia Mapping:&lt;br /&gt;
             Vdisk Id Mapping Name Device Type Mount Protocol Mount Status&lt;br /&gt;
             -------- ------------ ----------- -------------- ------------&lt;br /&gt;
             1                     Cdd         Unknown        Not Mounted&lt;br /&gt;
             2                     Hdd         Unknown        Not Mounted&lt;br /&gt;
 &lt;br /&gt;
     External Management Interface:&lt;br /&gt;
         Mode: In Band&lt;br /&gt;
         Ip V4 State: Pooled&lt;br /&gt;
         Ip V6 State: Pooled&lt;br /&gt;
 &lt;br /&gt;
         External Management Virtual LAN:&lt;br /&gt;
             Network Name: Management&lt;br /&gt;
             Id: 10&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IP:&lt;br /&gt;
                 Name       IP Address      Default Gateway Subnet          Primary DNS IP  Secondary DNS IP&lt;br /&gt;
                 ---------- --------------- --------------- --------------- --------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            172.16.10.169   172.16.10.1     255.255.255.0   172.16.10.1     172.16.10.2&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IPv6:&lt;br /&gt;
                 Name       IP Address Default Gateway Prefix Primary DNS IP Secondary DNS IP&lt;br /&gt;
                 ---------- ---------- --------------- ------ -------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            ::         ::              64     ::             ::&lt;br /&gt;
 &lt;br /&gt;
     Management Interface:&lt;br /&gt;
         Access Type: Unspecified&lt;br /&gt;
         IP Address: 0.0.0.0&lt;br /&gt;
         Netmask: 0.0.0.0&lt;br /&gt;
         Gateway: 0.0.0.0&lt;br /&gt;
         MAC Address: 30:F7:0D:BE:89:EA&lt;br /&gt;
         Fabric ID: A&lt;br /&gt;
         Peer Port:&lt;br /&gt;
         Peer Port Id: 1&lt;br /&gt;
         Peer Slot Id: 1&lt;br /&gt;
         Peer Chassis Id: 1&lt;br /&gt;
         Discovery: Absent&lt;br /&gt;
         &lt;br /&gt;
     Management Endpoint Log Control:&lt;br /&gt;
         Type   ID  Capacity&lt;br /&gt;
         ------ --- --------&lt;br /&gt;
         SEL    0   Available&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
(Some) Success!  The blade&#039;s CIMC is assigned an IPv4 address.  And it is pingable on the local network.  SSH is a no-go, though.  Maybe not a thing at all on B series blades?  And some further fiddling seems to be needed to get IPMI over LAN working.  Something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile* # &#039;&#039;&#039;create ipmi-user admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;set password&#039;&#039;&#039;&lt;br /&gt;
 Enter a password:&lt;br /&gt;
 Confirm the password:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;set privilege admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;set ipmi-over-lan enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;connect cimc 1/1&#039;&#039;&#039;&lt;br /&gt;
 Trying 127.5.1.1...&lt;br /&gt;
 Connected to 127.5.1.1.&lt;br /&gt;
 Escape character is &#039;^]&#039;.&lt;br /&gt;
 &lt;br /&gt;
 CIMC Debug Firmware Utility Shell [ support ]&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;help&#039;&#039;&#039;&lt;br /&gt;
 __________________________________________&lt;br /&gt;
           Debug Firmware Utility          &lt;br /&gt;
 __________________________________________&lt;br /&gt;
 Command List&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 alarms&lt;br /&gt;
 cores&lt;br /&gt;
 exit&lt;br /&gt;
 i2cstats&lt;br /&gt;
 images&lt;br /&gt;
 mctools&lt;br /&gt;
 memory&lt;br /&gt;
 messages&lt;br /&gt;
 mrcout&lt;br /&gt;
 network&lt;br /&gt;
 obfl&lt;br /&gt;
 post&lt;br /&gt;
 power&lt;br /&gt;
 programmables&lt;br /&gt;
 sensors&lt;br /&gt;
 sel&lt;br /&gt;
 fru&lt;br /&gt;
 tasks&lt;br /&gt;
 top&lt;br /&gt;
 update&lt;br /&gt;
 users&lt;br /&gt;
 version&lt;br /&gt;
 mezz1fru&lt;br /&gt;
 mezz2fru&lt;br /&gt;
 sldp&lt;br /&gt;
 help [COMMAND]&lt;br /&gt;
 __________________________________________&lt;br /&gt;
  Notes: &lt;br /&gt;
 &amp;quot;enter Key&amp;quot; will execute last command&lt;br /&gt;
 &amp;quot;COMMAND ?&amp;quot; will execute help for that command&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;users&#039;&#039;&#039;&lt;br /&gt;
 0. [ &amp;quot;admin&amp;quot; ] [ &amp;quot;&amp;quot; ] [ 2 ]&lt;br /&gt;
 1. [ Empty Entry ]&lt;br /&gt;
 2. [ Empty Entry ]&lt;br /&gt;
 3. [ Empty Entry ]&lt;br /&gt;
 4. [ Empty Entry ]&lt;br /&gt;
 5. [ Empty Entry ]&lt;br /&gt;
 6. [ Empty Entry ]&lt;br /&gt;
 7. [ Empty Entry ]&lt;br /&gt;
 8. [ Empty Entry ]&lt;br /&gt;
 9. [ Empty Entry ]&lt;br /&gt;
 10. [ Empty Entry ]&lt;br /&gt;
 11. [ Empty Entry ]&lt;br /&gt;
 12. [ Empty Entry ]&lt;br /&gt;
 13. [ Empty Entry ]&lt;br /&gt;
 14. [ Empty Entry ]&lt;br /&gt;
 15. [ Empty Entry ]&lt;br /&gt;
 [ users ]# &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 Connection closed by foreign host.&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
So that looks like we should have IPMI over LAN.  Let&#039;s poke at it a bit and see what happens:&lt;br /&gt;
 $ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=63 time=0.930 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=63 time=0.655 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=63 time=0.677 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=63 time=0.658 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=63 time=0.732 ms&lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4058ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.655/0.730/0.930/0.103 ms&lt;br /&gt;
 $ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error: Unable to establish IPMI v2 / RMCP+ session&lt;br /&gt;
 $&lt;br /&gt;
And that is a promising start with a disappointing finish.  Just for grins, let&#039;s try from a machine on the same subnet.  Maybe ICMP echo replies get routed but the IPMI over LAN traffic doesn&#039;t?&lt;br /&gt;
 router$ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=64 time=1.85 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=64 time=0.498 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=64 time=0.463 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=64 time=0.452 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=64 time=0.460 ms &lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4067ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.452/0.745/1.853/0.554 ms&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin mc info&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Device ID                 : 32&lt;br /&gt;
 Device Revision           : 0&lt;br /&gt;
 Firmware Revision         : 3.01&lt;br /&gt;
 IPMI Version              : 2.0&lt;br /&gt;
 Manufacturer ID           : 5771&lt;br /&gt;
 Manufacturer Name         : Cisco Systems, Inc.&lt;br /&gt;
 Product ID                : 9 (0x0009)&lt;br /&gt;
 Product Name              : Unknown (0x09)&lt;br /&gt;
 Device Available          : yes&lt;br /&gt;
 Provides Device SDRs      : yes&lt;br /&gt;
 Additional Device Support :&lt;br /&gt;
     Sensor Device&lt;br /&gt;
     SDR Repository Device&lt;br /&gt;
     SEL Device&lt;br /&gt;
     FRU Inventory Device&lt;br /&gt;
     IPMB Event Receiver&lt;br /&gt;
     IPMB Event Generator&lt;br /&gt;
 Aux Firmware Rev Info     : &lt;br /&gt;
     0x00&lt;br /&gt;
     0x00&lt;br /&gt;
     0x2a&lt;br /&gt;
     0x8b&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin lan print&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Set in Progress         : Set Complete&lt;br /&gt;
 Auth Type Support       : NONE MD2 MD5 PASSWORD &lt;br /&gt;
 Auth Type Enable        : Callback : &lt;br /&gt;
                         : User     : &lt;br /&gt;
                         : Operator : &lt;br /&gt;
                         : Admin    : &lt;br /&gt;
                         : OEM      : &lt;br /&gt;
 IP Address Source       : Static Address&lt;br /&gt;
 IP Address              : 0.0.0.0&lt;br /&gt;
 Subnet Mask             : 0.0.0.0&lt;br /&gt;
 MAC Address             : 30:f7:0d:be:89:ea&lt;br /&gt;
 SNMP Community String   : public&lt;br /&gt;
 IP Header               : TTL=0x40 Flags=0x00 Precedence=0x00 TOS=0x10&lt;br /&gt;
 BMC ARP Control         : ARP Responses Disabled, Gratuitous ARP Disabled&lt;br /&gt;
 Gratituous ARP Intrvl   : 2.0 seconds&lt;br /&gt;
 Default Gateway IP      : 0.0.0.0&lt;br /&gt;
 Default Gateway MAC     : 00:00:00:00:00:00&lt;br /&gt;
 Backup Gateway IP       : 0.0.0.0&lt;br /&gt;
 Backup Gateway MAC      : 00:00:00:00:00:00&lt;br /&gt;
 802.1q VLAN ID          : Disabled&lt;br /&gt;
 802.1q VLAN Priority    : 0&lt;br /&gt;
 RMCP+ Cipher Suites     : 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,128&lt;br /&gt;
 Cipher Suite Priv Max   : XXXaaaXXaaaXaaa&lt;br /&gt;
                         :     X=Cipher Suite Unused&lt;br /&gt;
                         :     c=CALLBACK&lt;br /&gt;
                         :     u=USER&lt;br /&gt;
                         :     o=OPERATOR&lt;br /&gt;
                         :     a=ADMIN&lt;br /&gt;
                         :     O=OEM&lt;br /&gt;
 Bad Password Threshold  : Not Available&lt;br /&gt;
 router$&lt;br /&gt;
Yay!  Very strange that it can be pinged from a different subnet, but &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; cannot talk to it that way.  Also very strange that it says it has no IP address assigned.  I am just guessing here, but perhaps the code in the FI is doing that for us and I have not found the documentation describing how it works.&lt;br /&gt;
&lt;br /&gt;
=== Serial console for blades? ===&lt;br /&gt;
I am fine with low bit rate serial stuff.  No need for a fancy bit mapped screen to manage my computers.  And it saves me having to run crazy Avocent Java applications in the process.  So let&#039;s see what happens when we try to connect from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
Disappointing.  But I think I might have seem something about serial over LAN in the service profiles somewhere.  Let&#039;s see if we can get it turned on:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show sol-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;set speed 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
&lt;br /&gt;
And trying again from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$ &lt;br /&gt;
&lt;br /&gt;
So still no.  Grrrr.  Maybe it needs to be powered on first?&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power is off&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power on&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power Control: Up/On&lt;br /&gt;
 router$ &#039;&#039;&#039;sleep 30&#039;&#039;&#039;&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
&lt;br /&gt;
More grrrr.  Manuals suggest I might need a BIOS policy that enables the serial port, too?&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set quiet-boot-config quiet-boot disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set serial-port-a-config serial-port-a enabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config baud-rate 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config console-redir serial-port-a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config flow-control none&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config legacy-os-redir disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config terminal-type vt100-plus&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So there is still no working serial console on the blade at this point.  https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/ucs-b-series-blade-servers/200105-Utilizing-SoL-logging-for-Serial-Redirec.html says to SSH to the CIMC IP address.  Just getting a TCP RST back (&amp;quot;connection refused&amp;quot;) when trying that.  And the IPMI over LAN serial just does not seem to be supported at all.  Maybe the blade needs a firmware update, too?&lt;br /&gt;
=== Applying firmware update to blades ===&lt;br /&gt;
So far (I think) I have only done firmware updates to the fabric interconnect and the blade chassis FEXes.  First up, let&#039;s see what is available for our B200 M3 blades:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show image | i b200-m3&#039;&#039;&#039;&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.0.4a.0.080920121557.bin&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.2.1a.0.111220131105.bin&lt;br /&gt;
 ucs-b200-m3-brdprog.11.0.bin                  Board Controller     11.0&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.0.4b.bin                CIMC                 2.0(4b)&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.2.1c.bin                CIMC                 2.2(1c)&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.10.1-0100_4.30.00_NA.bin&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.12.1-0160_4.37.00_NA.bin&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
Those might be kinda old?  Let&#039;s see what is installed on the B200 M3 that is in the chassis:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Adapter 1:&lt;br /&gt;
         Running-Vers: 4.1(3a)&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
     Adapter 2:&lt;br /&gt;
         Running-Vers: 4.1(3a)&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
     RAID Controller 1:&lt;br /&gt;
         Running-Vers: 20.13.1-0255&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
     BoardController:&lt;br /&gt;
         Running-Vers: 15.0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
From this, it would seem that the blade in the chassis is already running a newer firmware bundle than the one running on the fabric interconnect.  So, let&#039;s find out what we are running on the FI, and see about some more updates to it:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
It would seem that 3.0(2f) is the latest in the next-newer release train.  So acquire that from Cisco&#039;s download site and install on the FI and apply following the process documented above.  And there is a hiccup with the SSH in 2.5(2a) not being able to get a host key from the SSH servers running on Debian 12 or Debian 13.  Here&#039;s an example Debian server log of that:&lt;br /&gt;
 adj@zarathud:~$ &#039;&#039;&#039;sudo grep ssh.*172.16.10.176 /var/log/auth.log&#039;&#039;&#039;&lt;br /&gt;
 2026-04-02T17:24:54.156462+00:00 zarathud sshd[3090225]: Unable to negotiate with 172.16.10.176 port 33905: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:41:20.766493+00:00 zarathud sshd[3092657]: Unable to negotiate with 172.16.10.176 port 58959: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:50:44.154486+00:00 zarathud sshd[3094045]: Unable to negotiate with 172.16.10.176 port 45452: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:51:36.645000+00:00 zarathud sudo:      adj : TTY=pts/22 ; PWD=/home/adj ; USER=root ; COMMAND=/usr/bin/grep ssh.*172.16.10.176 /var/log/auth.log&lt;br /&gt;
 2026-04-02T17:53:33.561802+00:00 zarathud sudo:      adj : TTY=pts/22 ; PWD=/home/adj ; USER=root ; COMMAND=/usr/bin/grep ssh.*172.16.10.176 /var/log/auth.log&lt;br /&gt;
 adj@zarathud:~$&lt;br /&gt;
So, for expediency&#039;s sake, we will just do it over TFTP this time.  Maybe the SSH client in the 3.1(3l) release will be better able to talk to my SSH servers?  That last remains to be seen.  But the SSH server is a bit nearer to 2026 standards:&lt;br /&gt;
 adj@yetanotherthinclient:~$ &#039;&#039;&#039;ssh admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching host key type found. Their offer: ssh-rsa&lt;br /&gt;
 adj@yetanotherthinclient:~$ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 3.1(3l)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 3.1(3l)&lt;br /&gt;
 Package-Vers: 3.1(3l)A&lt;br /&gt;
 Service pack version: 3.1(3)SP0(Default)&lt;br /&gt;
 Running-Modules:&lt;br /&gt;
 Package-Vers:&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Still only does RSA host keys.  But it does support more recent symmetric encryption schemes than the SSH server in 2.5(2a).  But major excitement!  The web UI now just needs HTML rendering.  And ECMAscript.  And CSS.  But no more need for Java just to see what is going on with the UCS infrastructure.  It does seem to still be needed for the KVM.  But this is a major step forward.  I very strongly recommend getting to the 3.1 UCS Manager releases.&lt;br /&gt;
&lt;br /&gt;
And now for some server (blade) firmware.  Available at the same place as the UCS Manager download, a section called &amp;quot;Related Software&amp;quot; has the server firmware images.  Download and copy those to the UCS Manager running on the fabric interconnects, too:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-b-series.3.1.3l.B.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server                                Userid          State&lt;br /&gt;
     --------- -------- ------------------------------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-b-series.3.1.3l.B.bin&lt;br /&gt;
               Scp      172.17.0.18                           adj             Downloading&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                                           Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18                           adj             Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.3.1.3l.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                                           Downloaded&lt;br /&gt;
     ucs-mini-k9-bundle-infra.3.0.2f.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                                           Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task ucs-k9-bundle-b-series.3.1.3l.B.bin detail&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name: ucs-k9-bundle-b-series.3.1.3l.B.bin&lt;br /&gt;
     Protocol: Scp&lt;br /&gt;
     Server: 172.17.0.18&lt;br /&gt;
     Userid: adj&lt;br /&gt;
     Path: /home/adj/Downloads&lt;br /&gt;
     Downloaded Image Size (KB): 517633&lt;br /&gt;
     State: Downloading&lt;br /&gt;
     Current Task: unpacking image ucs-k9-bundle-b-series.3.1.3l.B.bin on primary(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:UnpackLocal)&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task ucs-k9-bundle-b-series.3.1.3l.B.bin detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name: ucs-k9-bundle-b-series.3.1.3l.B.bin&lt;br /&gt;
     Protocol: Scp&lt;br /&gt;
     Server: 172.17.0.18&lt;br /&gt;
     Userid: adj&lt;br /&gt;
     Path: /home/adj/Downloads&lt;br /&gt;
     Downloaded Image Size (KB): 517633&lt;br /&gt;
     State: Downloaded&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware #&lt;br /&gt;
Note that the UCS Manager SSH client can now talk to a Debian 12 OpenSSH server.  Small wins are still wins!&lt;br /&gt;
&lt;br /&gt;
=== A new step for firmware infrastructure updates ===&lt;br /&gt;
It seems that one must accept that a fabric interconnect reboot has happened before applying a new infrastructure firmware pack.  Something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope monitoring&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /monitoring # &#039;&#039;&#039;show new-faults&#039;&#039;&#039;&lt;br /&gt;
 Severity  Code     Last Transition Time     ID       Description&lt;br /&gt;
 --------- -------- ------------------------ -------- -----------&lt;br /&gt;
 Info      F0440    2026-04-02T18:37:14.718    113208 Chassis discovery policy conflict: Link IOM 1/1/2 to peer port A:N/A/1/2 not configured&lt;br /&gt;
 ucs-fi-6248up-0-A /monitoring # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 3.2(3p)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 (7) Some fabric-interconnect service-pack install/uninstall will do additional FI reboots in order to complete install/uninstall&lt;br /&gt;
     To ensure before triggering auto-install, check manual service-pack activation/remove where warning is given if reboots are required&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 3.2(3p)A&lt;br /&gt;
 Warning: Any Service Pack installed in the system will be removed&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 Warning: Check the outstanding faults (scope monitoring &amp;lt;enter&amp;gt; show new-faults) since last FI reboot. &lt;br /&gt;
 Please make sure the data paths are recovered before proceeding with this FI reboot to ensure there is no interruption to the data traffic.&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
 Broadcast message from root (Thu Apr  2 23:36:05 2026):&lt;br /&gt;
 &lt;br /&gt;
 The system is going down for reboot NOW!&lt;br /&gt;
 Connection to 172.16.10.176 closed by remote host.&lt;br /&gt;
 Connection to 172.16.10.176 closed.&lt;br /&gt;
The UCS Manager SSH server generated itself a new, longer host RSA key as part of the 3.2(3p) upgrade.  So expect host key validation failures after the FI reboots and you tell your SSH client to connect again.  Maybe we can get back to updates for the blade servers&#039; firmware now?&lt;br /&gt;
&lt;br /&gt;
=== Blade server firmware.  Another attempt. ===&lt;br /&gt;
This is going to assume that the server (blade) firmware has been copied to the UCS manager.  Cisco&#039;s filename for the B series blade firmware bundles for the 3.2(3p) release is &amp;lt;code&amp;gt;ucs-k9-bundle-b-series.3.2.3p.B.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show image | i b200-m3&#039;&#039;&#039;&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.0.4a.0.080920121557.bin&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.2.1a.0.111220131105.bin&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.2.6h.0.110720191420.bin&lt;br /&gt;
 ucs-b200-m3-brdprog.11.0.bin                  Board Controller     11.0&lt;br /&gt;
 ucs-b200-m3-brdprog.15.0.bin                  Board Controller     15.0&lt;br /&gt;
 ucs-b200-m3-brdprog.16.0.bin                  Board Controller     16.0&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.0.4b.bin                CIMC                 2.0(4b)&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.2.1c.bin                CIMC                 2.2(1c)&lt;br /&gt;
 ucs-b200-m3-k9-cimc.3.1.23e.bin               CIMC                 3.1(23e)&lt;br /&gt;
 ucs-b200-m3-k9-cimc.3.1.26p.bin               CIMC                 3.1(26p)&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.10.1-0100_4.30.00_NA.bin&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.12.1-0160_4.37.00_NA.bin&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.13.1-0255_4.38.02.2_NA.bin&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show fw-host-pack&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server Host Pack:&lt;br /&gt;
     Name                 Mode&lt;br /&gt;
     -------------------- ----&lt;br /&gt;
     default              Staged&lt;br /&gt;
     test                 Staged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create fw-host-pack b200-m3-3.2.3p&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack* # &#039;&#039;&#039;create pack-image &amp;quot;Cisco Systems Inc&amp;quot; UCSB-B200-M3 board-controller 16.0&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack/pack-image* # &#039;&#039;&#039;set version 16.0&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack/pack-image* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack/pack-image # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack # &#039;&#039;&#039;create pack-image &amp;quot;Cisco Systems Inc&amp;quot; UCSB-B200-M3 cimc &amp;quot;3.1(26p)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack/pack-image* # &#039;&#039;&#039;set version &amp;quot;3.1(26p)&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack/pack-image* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack/pack-image # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack # &#039;&#039;&#039;create pack-image &amp;quot;Cisco Systems, Inc.&amp;quot; UCSB-B200-M3 server-bios &amp;quot;B200M3.2.2.6h.0.110720191420&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack/pack-image* # &#039;&#039;&#039;set version &amp;quot;B200M3.2.2.6h.0.110720191420&amp;quot;&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack/pack-image* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack/pack-image # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server Host Pack:&lt;br /&gt;
     Name                 Mode&lt;br /&gt;
     -------------------- ----&lt;br /&gt;
     b200-m3-3.2.3p       Staged&lt;br /&gt;
 ucs-fi-6248up-0-A /org/fw-host-pack # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show fw-host-pack&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server Host Pack:&lt;br /&gt;
     Name                 Mode&lt;br /&gt;
     -------------------- ----&lt;br /&gt;
     b200-m3-3.2.3p       Staged&lt;br /&gt;
     default              Staged&lt;br /&gt;
     test                 Staged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&#039;&#039;&#039;VERY IMPORTANT DETAIL:&#039;&#039;&#039; In the above, see how sometimes the vendor string is &amp;quot;Cisco Systems Inc&amp;quot; and other times it is &amp;quot;Cisco Systems, Inc.&amp;quot;?  This is very stupid.  Very easy to miss.  And very important to getting a configuration that will validate.&lt;br /&gt;
&lt;br /&gt;
And it still needs to be added to a service profile:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set host-fw-policy b200-m3-3.2.3p&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;reapply-config&#039;&#039;&#039;&lt;br /&gt;
 Warning: Any unapplied configuration changes will now get applied. This potentially will cause a reboot of the associated server.&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;show assoc&#039;&#039;&#039;&lt;br /&gt;
 Service Profile Name Association    Server  Server Pool&lt;br /&gt;
 -------------------- -------------- ------- -----------&lt;br /&gt;
 UCS_B200_M3_FCH162871NA&lt;br /&gt;
                      Associating    1/1&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
It still says Associating.  So has not completely worked just yet.  Let&#039;s see if we can figure out why.&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show assoc&#039;&#039;&#039;&lt;br /&gt;
 Association  Service Profile&lt;br /&gt;
 ------------ ---------------&lt;br /&gt;
 None         UCS_B200_M3_FCH162871NA&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &lt;br /&gt;
So not sure what the issue is from that.  One more attempt here.  We know the service profile name.  Let&#039;s see if there are any faults listed that mention it:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show fault | i UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 Critical  F1000035 2026-03-30T23:08:37.136    281911 [FSM:FAILED]: Configuring Service Profile UCS_B200_M3_FCH162871NA(FSM:sam:dme:LsServerConfigure)&lt;br /&gt;
 Major     F0327    2026-03-23T20:49:35.442    124543 Service profile UCS_B200_M3_FCH162871NA configuration failed due to insufficient-resources,mac-address-assignment&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show fault 124543 detail&#039;&#039;&#039;&lt;br /&gt;
 Fault Instance&lt;br /&gt;
 &lt;br /&gt;
 Severity: Major&lt;br /&gt;
 Code: F0327&lt;br /&gt;
 Last Transition Time: 2026-03-23T20:49:35.442&lt;br /&gt;
 ID: 124543&lt;br /&gt;
 Status: Pinned&lt;br /&gt;
 Description: Service profile UCS_B200_M3_FCH162871NA configuration failed due to insufficient-resources,mac-address-assignment&lt;br /&gt;
 Affected Object: org-root/ls-UCS_B200_M3_FCH162871NA&lt;br /&gt;
 Name: Ls Server Config Failure&lt;br /&gt;
 Cause: Configuration Failure&lt;br /&gt;
 Type: Server&lt;br /&gt;
 Acknowledged: No&lt;br /&gt;
 Occurrences: 1&lt;br /&gt;
 Creation Time: 2026-03-23T20:49:35.442&lt;br /&gt;
 Original Severity: Major&lt;br /&gt;
 Previous Severity: Major&lt;br /&gt;
 Highest Severity: Major&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
That seems like it is likely the culprit.  We can&#039;t even get a server firmware update without giving it synthetic MAC addresses?  OMFG!&lt;br /&gt;
&lt;br /&gt;
Let us see what we can see...  I see something about a LAN connectivity policy inside our organization.  Can we just make a simple one?&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show lan-connectivity-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create lan-connectivity-policy test_lancon_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/lan-connectivity-policy* # &#039;&#039;&#039;create vnic test_vnic eth-if vlan_1000 fabric a-b&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/lan-connectivity-policy/vnic* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/lan-connectivity-policy # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 vNIC LAN connectivity policy:&lt;br /&gt;
     Name: test_lancon_pol&lt;br /&gt;
     Description:&lt;br /&gt;
 &lt;br /&gt;
     vNIC:&lt;br /&gt;
         Name: test_vnic&lt;br /&gt;
         Fabric ID: A B&lt;br /&gt;
         Dynamic MAC Addr: Derived&lt;br /&gt;
         Virtualization Preference: NONE&lt;br /&gt;
 &lt;br /&gt;
         Ethernet Interface:&lt;br /&gt;
             Name: vlan_1000&lt;br /&gt;
             Dynamic MAC Addr: Derived&lt;br /&gt;
             Type: Ether&lt;br /&gt;
             Owner: Logical&lt;br /&gt;
             Default Network: No&lt;br /&gt;
             Config Qual: N/A&lt;br /&gt;
 ucs-fi-6248up-0-A /org/lan-connectivity-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set lan-connectivity-policy-name test_lancon_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer verify-only&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;reapply-config&#039;&#039;&#039;&lt;br /&gt;
 Warning: Any unapplied configuration changes will now get applied. This potentially will cause a reboot of the associated server.&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show fault | i UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 Minor     F0169    2026-04-03T05:03:54.043    518234 Eth vNIC test_vnic, service profile UCS_B200_M3_FCH162871NA failed to apply configuration&lt;br /&gt;
 Critical  F1000035 2026-03-30T23:08:37.136    281911 [FSM:FAILED]: Configuring Service Profile UCS_B200_M3_FCH162871NA(FSM:sam:dme:LsServerConfigure)&lt;br /&gt;
 Major     F0327    2026-03-23T20:49:35.442    124543 Service profile UCS_B200_M3_FCH162871NA configuration failed due to insufficient-resources,connection-placement,insufficient-vnic-capacity&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show fault 518234&#039;&#039;&#039;&lt;br /&gt;
 Severity  Code     Last Transition Time     ID       Description&lt;br /&gt;
 --------- -------- ------------------------ -------- -----------&lt;br /&gt;
 Minor     F0169    2026-04-03T05:03:54.043    518234 Eth vNIC test_vnic, service profile UCS_B200_M3_FCH162871NA failed to apply configuration&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show fault 518234 detail&#039;&#039;&#039;&lt;br /&gt;
 Fault Instance&lt;br /&gt;
 &lt;br /&gt;
 Severity: Minor&lt;br /&gt;
 Code: F0169&lt;br /&gt;
 Last Transition Time: 2026-04-03T05:03:54.043&lt;br /&gt;
 ID: 518234&lt;br /&gt;
 Status: None&lt;br /&gt;
 Description: Eth vNIC test_vnic, service profile UCS_B200_M3_FCH162871NA failed to apply configuration&lt;br /&gt;
 Affected Object: org-root/ls-UCS_B200_M3_FCH162871NA/ether-test_vnic&lt;br /&gt;
 Name: Vnic Ether Config Failed&lt;br /&gt;
 Cause: Configuration Failed&lt;br /&gt;
 Type: Configuration&lt;br /&gt;
 Acknowledged: No&lt;br /&gt;
 Occurrences: 1&lt;br /&gt;
 Creation Time: 2026-04-03T05:03:54.043&lt;br /&gt;
 Original Severity: Minor&lt;br /&gt;
 Previous Severity: Minor&lt;br /&gt;
 Highest Severity: Minor&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Still not there.  Inching closer.  Hopefully.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1592</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1592"/>
		<updated>2026-04-02T23:37:27Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Applying firmware update to blades */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the friendly FI management software is all lovely out of date (completely unrunnable in 2026!) Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;br /&gt;
&lt;br /&gt;
Now that we are on 2.2(8m), the SSH client is able to fetch the .bin file using scp.  Or maybe I just got the syntax correct this time.  So here we are:&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-infra.2.5.2a.A.bin&#039;&#039;&#039;&lt;br /&gt;
 Password:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  Download task:&lt;br /&gt;
      File Name Protocol Server          Userid          State&lt;br /&gt;
      --------- -------- --------------- --------------- -----&lt;br /&gt;
      ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
                Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
      ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
                Scp      172.17.0.18     adj             Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.5(2a)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.5(2a)A&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: Success&lt;br /&gt;
         Completion Time: 2009-01-01T01:59:13.146&lt;br /&gt;
         Progress (%): 100&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Success      2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
    FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 95&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 In Progress  1&lt;br /&gt;
         9      DeployActivateUCSM                       Pending      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Pending      0&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 96&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Success      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # Connection to 172.16.10.176 closed.&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And after some more time and one more disconnect, we see that another OpenSSH client compatibility option is required to connect:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa -o Ciphers=+aes256-cbc admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== But I&#039;m still trying to get the blades&#039; CIMCs connected! ==&lt;br /&gt;
The struggle is real!  But I did find https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/integrated-management-controller/118367-configure-cimc-00.pdf which is a GUI-specific outline of the process involved in getting UCS servers&#039; (blade and maybe also rackmount) CIMCs attached to the greater network environment.&lt;br /&gt;
=== In-band?  Out-of-band?  Huh? ===&lt;br /&gt;
First decision to be made here.  In UCS versions before 2.2, the servers&#039; CIMCs always had Ethernet connectivity through the Fabric Interconnects&#039; management port.  This connection amounts to a single point of failure for CIMC connectivity.&lt;br /&gt;
&lt;br /&gt;
In UCS version 2.2 and newer, there are two options for CIMC connectivity: In-band using the FIs&#039; high bandwidth network uplink ports, and out-of band using an FI&#039;s 1000baseT management port.  Naturally, being me, I will opt for the more complicated alternative.  And probably complain the whole way through.&lt;br /&gt;
&lt;br /&gt;
=== In-band CIMC connectivity setup ===&lt;br /&gt;
Log in to the FI.  Go to the organization (probably &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;.  And create an IP pool.  We are skipping the IPv6 stuff for now and the management VLAN is IPv4-only.&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show ip-pool&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     ext-mgmt                      0          0 Internal&lt;br /&gt;
     iscsi-initiator-pool          0          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ip-pool CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool* # &#039;&#039;&#039;create block 172.16.10.168 172.16.10.175 172.16.10.1 255.255.255.0&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;set primary-dns 172.16.10.1 secondary-dns 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From: 172.16.10.168&lt;br /&gt;
     To: 172.16.10.175&lt;br /&gt;
     Default Gateway: 172.16.10.1&lt;br /&gt;
     Subnet Mask: 255.255.255.0&lt;br /&gt;
     Primary DNS: 172.16.10.1&lt;br /&gt;
     Secondary DNS: 172.16.10.2&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From            To              Default Gateway Subnet Mask&lt;br /&gt;
     --------------- --------------- --------------- -----------&lt;br /&gt;
     172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     CIMC_inband_pool              8          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     IPv4 Size: 8&lt;br /&gt;
     IPv4 Assigned: 0&lt;br /&gt;
     IPv6 Size: 0&lt;br /&gt;
     IPv6 Assigned: 0&lt;br /&gt;
     Descr:&lt;br /&gt;
     Assignment Order: Default&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
     Guid: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Net bios enabled or disabled: Not Active&lt;br /&gt;
     DHCP enaled or disabled: Not Supported&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
 &lt;br /&gt;
     Block of IP Addresses:&lt;br /&gt;
         From            To              Default Gateway Subnet Mask&lt;br /&gt;
         --------------- --------------- --------------- -----------&lt;br /&gt;
         172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 &lt;br /&gt;
     Pooled:&lt;br /&gt;
         Id              Subnet          Assigned Assigned To&lt;br /&gt;
         --------------- --------------- -------- -----------&lt;br /&gt;
         172.16.10.168   255.255.255.0   No&lt;br /&gt;
         172.16.10.169   255.255.255.0   No&lt;br /&gt;
         172.16.10.170   255.255.255.0   No&lt;br /&gt;
         172.16.10.171   255.255.255.0   No&lt;br /&gt;
         172.16.10.172   255.255.255.0   No&lt;br /&gt;
         172.16.10.173   255.255.255.0   No&lt;br /&gt;
         172.16.10.174   255.255.255.0   No&lt;br /&gt;
         172.16.10.175   255.255.255.0   No&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool #&lt;br /&gt;
So we now have a pool of IPv4 addresses to hand out to CIMCs in our UCS domain.  And we can also LOL at Cisco&#039;s &amp;lt;code&amp;gt;DHCP &#039;&#039;&#039;enaled&#039;&#039;&#039; or disabled&amp;lt;/code&amp;gt; spelling error.  But not too loud.  It may well be fixed in newer versions.&lt;br /&gt;
&lt;br /&gt;
=== Create VLAN and VLAN group to connect the CIMC IP pool to ===&lt;br /&gt;
VLAN on the Ethernet uplinks:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan Management 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set native no&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set vlan-id 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
VLAN group now:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show vlan-group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan-group Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group* # &#039;&#039;&#039;create member-vlan Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
Add IP pool, VLAN, VLAN group to in-band profile:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope inband-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &#039;&#039;&#039;set default-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set default-vlan-name Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set net-group-name Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &lt;br /&gt;
Now that the in-band profile is set, update a blade&#039;s service profile to reference it:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ext-mgmt-ip-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;set ext-mgmt-ip-state pooled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset hard-reset-immediate&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset-kvm&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;reset-ipmi&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID              Serial (SN)      HW Revision&lt;br /&gt;
     ---------------- ---------------- -----------&lt;br /&gt;
     UCSB-B200-M3     FCH162871NA      0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V01&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     GUID:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
 &lt;br /&gt;
     Vmedia Mapping List:&lt;br /&gt;
         Full Name: sys/chassis-1/blade-1/mgmt/actual-mount-list&lt;br /&gt;
 &lt;br /&gt;
         Vmedia Mapping:&lt;br /&gt;
             Vdisk Id Mapping Name Device Type Mount Protocol Mount Status&lt;br /&gt;
             -------- ------------ ----------- -------------- ------------&lt;br /&gt;
             1                     Cdd         Unknown        Not Mounted&lt;br /&gt;
             2                     Hdd         Unknown        Not Mounted&lt;br /&gt;
 &lt;br /&gt;
     External Management Interface:&lt;br /&gt;
         Mode: In Band&lt;br /&gt;
         Ip V4 State: Pooled&lt;br /&gt;
         Ip V6 State: Pooled&lt;br /&gt;
 &lt;br /&gt;
         External Management Virtual LAN:&lt;br /&gt;
             Network Name: Management&lt;br /&gt;
             Id: 10&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IP:&lt;br /&gt;
                 Name       IP Address      Default Gateway Subnet          Primary DNS IP  Secondary DNS IP&lt;br /&gt;
                 ---------- --------------- --------------- --------------- --------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            172.16.10.169   172.16.10.1     255.255.255.0   172.16.10.1     172.16.10.2&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IPv6:&lt;br /&gt;
                 Name       IP Address Default Gateway Prefix Primary DNS IP Secondary DNS IP&lt;br /&gt;
                 ---------- ---------- --------------- ------ -------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            ::         ::              64     ::             ::&lt;br /&gt;
 &lt;br /&gt;
     Management Interface:&lt;br /&gt;
         Access Type: Unspecified&lt;br /&gt;
         IP Address: 0.0.0.0&lt;br /&gt;
         Netmask: 0.0.0.0&lt;br /&gt;
         Gateway: 0.0.0.0&lt;br /&gt;
         MAC Address: 30:F7:0D:BE:89:EA&lt;br /&gt;
         Fabric ID: A&lt;br /&gt;
         Peer Port:&lt;br /&gt;
         Peer Port Id: 1&lt;br /&gt;
         Peer Slot Id: 1&lt;br /&gt;
         Peer Chassis Id: 1&lt;br /&gt;
         Discovery: Absent&lt;br /&gt;
         &lt;br /&gt;
     Management Endpoint Log Control:&lt;br /&gt;
         Type   ID  Capacity&lt;br /&gt;
         ------ --- --------&lt;br /&gt;
         SEL    0   Available&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
(Some) Success!  The blade&#039;s CIMC is assigned an IPv4 address.  And it is pingable on the local network.  SSH is a no-go, though.  Maybe not a thing at all on B series blades?  And some further fiddling seems to be needed to get IPMI over LAN working.  Something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile* # &#039;&#039;&#039;create ipmi-user admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;set password&#039;&#039;&#039;&lt;br /&gt;
 Enter a password:&lt;br /&gt;
 Confirm the password:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;set privilege admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;set ipmi-over-lan enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;connect cimc 1/1&#039;&#039;&#039;&lt;br /&gt;
 Trying 127.5.1.1...&lt;br /&gt;
 Connected to 127.5.1.1.&lt;br /&gt;
 Escape character is &#039;^]&#039;.&lt;br /&gt;
 &lt;br /&gt;
 CIMC Debug Firmware Utility Shell [ support ]&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;help&#039;&#039;&#039;&lt;br /&gt;
 __________________________________________&lt;br /&gt;
           Debug Firmware Utility          &lt;br /&gt;
 __________________________________________&lt;br /&gt;
 Command List&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 alarms&lt;br /&gt;
 cores&lt;br /&gt;
 exit&lt;br /&gt;
 i2cstats&lt;br /&gt;
 images&lt;br /&gt;
 mctools&lt;br /&gt;
 memory&lt;br /&gt;
 messages&lt;br /&gt;
 mrcout&lt;br /&gt;
 network&lt;br /&gt;
 obfl&lt;br /&gt;
 post&lt;br /&gt;
 power&lt;br /&gt;
 programmables&lt;br /&gt;
 sensors&lt;br /&gt;
 sel&lt;br /&gt;
 fru&lt;br /&gt;
 tasks&lt;br /&gt;
 top&lt;br /&gt;
 update&lt;br /&gt;
 users&lt;br /&gt;
 version&lt;br /&gt;
 mezz1fru&lt;br /&gt;
 mezz2fru&lt;br /&gt;
 sldp&lt;br /&gt;
 help [COMMAND]&lt;br /&gt;
 __________________________________________&lt;br /&gt;
  Notes: &lt;br /&gt;
 &amp;quot;enter Key&amp;quot; will execute last command&lt;br /&gt;
 &amp;quot;COMMAND ?&amp;quot; will execute help for that command&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;users&#039;&#039;&#039;&lt;br /&gt;
 0. [ &amp;quot;admin&amp;quot; ] [ &amp;quot;&amp;quot; ] [ 2 ]&lt;br /&gt;
 1. [ Empty Entry ]&lt;br /&gt;
 2. [ Empty Entry ]&lt;br /&gt;
 3. [ Empty Entry ]&lt;br /&gt;
 4. [ Empty Entry ]&lt;br /&gt;
 5. [ Empty Entry ]&lt;br /&gt;
 6. [ Empty Entry ]&lt;br /&gt;
 7. [ Empty Entry ]&lt;br /&gt;
 8. [ Empty Entry ]&lt;br /&gt;
 9. [ Empty Entry ]&lt;br /&gt;
 10. [ Empty Entry ]&lt;br /&gt;
 11. [ Empty Entry ]&lt;br /&gt;
 12. [ Empty Entry ]&lt;br /&gt;
 13. [ Empty Entry ]&lt;br /&gt;
 14. [ Empty Entry ]&lt;br /&gt;
 15. [ Empty Entry ]&lt;br /&gt;
 [ users ]# &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 Connection closed by foreign host.&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
So that looks like we should have IPMI over LAN.  Let&#039;s poke at it a bit and see what happens:&lt;br /&gt;
 $ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=63 time=0.930 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=63 time=0.655 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=63 time=0.677 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=63 time=0.658 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=63 time=0.732 ms&lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4058ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.655/0.730/0.930/0.103 ms&lt;br /&gt;
 $ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error: Unable to establish IPMI v2 / RMCP+ session&lt;br /&gt;
 $&lt;br /&gt;
And that is a promising start with a disappointing finish.  Just for grins, let&#039;s try from a machine on the same subnet.  Maybe ICMP echo replies get routed but the IPMI over LAN traffic doesn&#039;t?&lt;br /&gt;
 router$ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=64 time=1.85 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=64 time=0.498 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=64 time=0.463 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=64 time=0.452 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=64 time=0.460 ms &lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4067ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.452/0.745/1.853/0.554 ms&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin mc info&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Device ID                 : 32&lt;br /&gt;
 Device Revision           : 0&lt;br /&gt;
 Firmware Revision         : 3.01&lt;br /&gt;
 IPMI Version              : 2.0&lt;br /&gt;
 Manufacturer ID           : 5771&lt;br /&gt;
 Manufacturer Name         : Cisco Systems, Inc.&lt;br /&gt;
 Product ID                : 9 (0x0009)&lt;br /&gt;
 Product Name              : Unknown (0x09)&lt;br /&gt;
 Device Available          : yes&lt;br /&gt;
 Provides Device SDRs      : yes&lt;br /&gt;
 Additional Device Support :&lt;br /&gt;
     Sensor Device&lt;br /&gt;
     SDR Repository Device&lt;br /&gt;
     SEL Device&lt;br /&gt;
     FRU Inventory Device&lt;br /&gt;
     IPMB Event Receiver&lt;br /&gt;
     IPMB Event Generator&lt;br /&gt;
 Aux Firmware Rev Info     : &lt;br /&gt;
     0x00&lt;br /&gt;
     0x00&lt;br /&gt;
     0x2a&lt;br /&gt;
     0x8b&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin lan print&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Set in Progress         : Set Complete&lt;br /&gt;
 Auth Type Support       : NONE MD2 MD5 PASSWORD &lt;br /&gt;
 Auth Type Enable        : Callback : &lt;br /&gt;
                         : User     : &lt;br /&gt;
                         : Operator : &lt;br /&gt;
                         : Admin    : &lt;br /&gt;
                         : OEM      : &lt;br /&gt;
 IP Address Source       : Static Address&lt;br /&gt;
 IP Address              : 0.0.0.0&lt;br /&gt;
 Subnet Mask             : 0.0.0.0&lt;br /&gt;
 MAC Address             : 30:f7:0d:be:89:ea&lt;br /&gt;
 SNMP Community String   : public&lt;br /&gt;
 IP Header               : TTL=0x40 Flags=0x00 Precedence=0x00 TOS=0x10&lt;br /&gt;
 BMC ARP Control         : ARP Responses Disabled, Gratuitous ARP Disabled&lt;br /&gt;
 Gratituous ARP Intrvl   : 2.0 seconds&lt;br /&gt;
 Default Gateway IP      : 0.0.0.0&lt;br /&gt;
 Default Gateway MAC     : 00:00:00:00:00:00&lt;br /&gt;
 Backup Gateway IP       : 0.0.0.0&lt;br /&gt;
 Backup Gateway MAC      : 00:00:00:00:00:00&lt;br /&gt;
 802.1q VLAN ID          : Disabled&lt;br /&gt;
 802.1q VLAN Priority    : 0&lt;br /&gt;
 RMCP+ Cipher Suites     : 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,128&lt;br /&gt;
 Cipher Suite Priv Max   : XXXaaaXXaaaXaaa&lt;br /&gt;
                         :     X=Cipher Suite Unused&lt;br /&gt;
                         :     c=CALLBACK&lt;br /&gt;
                         :     u=USER&lt;br /&gt;
                         :     o=OPERATOR&lt;br /&gt;
                         :     a=ADMIN&lt;br /&gt;
                         :     O=OEM&lt;br /&gt;
 Bad Password Threshold  : Not Available&lt;br /&gt;
 router$&lt;br /&gt;
Yay!  Very strange that it can be pinged from a different subnet, but &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; cannot talk to it that way.  Also very strange that it says it has no IP address assigned.  I am just guessing here, but perhaps the code in the FI is doing that for us and I have not found the documentation describing how it works.&lt;br /&gt;
&lt;br /&gt;
=== Serial console for blades? ===&lt;br /&gt;
I am fine with low bit rate serial stuff.  No need for a fancy bit mapped screen to manage my computers.  And it saves me having to run crazy Avocent Java applications in the process.  So let&#039;s see what happens when we try to connect from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
Disappointing.  But I think I might have seem something about serial over LAN in the service profiles somewhere.  Let&#039;s see if we can get it turned on:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show sol-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;set speed 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
&lt;br /&gt;
And trying again from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$ &lt;br /&gt;
&lt;br /&gt;
So still no.  Grrrr.  Maybe it needs to be powered on first?&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power is off&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power on&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power Control: Up/On&lt;br /&gt;
 router$ &#039;&#039;&#039;sleep 30&#039;&#039;&#039;&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
&lt;br /&gt;
More grrrr.  Manuals suggest I might need a BIOS policy that enables the serial port, too?&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set quiet-boot-config quiet-boot disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set serial-port-a-config serial-port-a enabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config baud-rate 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config console-redir serial-port-a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config flow-control none&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config legacy-os-redir disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config terminal-type vt100-plus&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So there is still no working serial console on the blade at this point.  https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/ucs-b-series-blade-servers/200105-Utilizing-SoL-logging-for-Serial-Redirec.html says to SSH to the CIMC IP address.  Just getting a TCP RST back (&amp;quot;connection refused&amp;quot;) when trying that.  And the IPMI over LAN serial just does not seem to be supported at all.  Maybe the blade needs a firmware update, too?&lt;br /&gt;
=== Applying firmware update to blades ===&lt;br /&gt;
So far (I think) I have only done firmware updates to the fabric interconnect and the blade chassis FEXes.  First up, let&#039;s see what is available for our B200 M3 blades:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show image | i b200-m3&#039;&#039;&#039;&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.0.4a.0.080920121557.bin&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.2.1a.0.111220131105.bin&lt;br /&gt;
 ucs-b200-m3-brdprog.11.0.bin                  Board Controller     11.0&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.0.4b.bin                CIMC                 2.0(4b)&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.2.1c.bin                CIMC                 2.2(1c)&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.10.1-0100_4.30.00_NA.bin&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.12.1-0160_4.37.00_NA.bin&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
Those might be kinda old?  Let&#039;s see what is installed on the B200 M3 that is in the chassis:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Adapter 1:&lt;br /&gt;
         Running-Vers: 4.1(3a)&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
     Adapter 2:&lt;br /&gt;
         Running-Vers: 4.1(3a)&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
     RAID Controller 1:&lt;br /&gt;
         Running-Vers: 20.13.1-0255&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
     BoardController:&lt;br /&gt;
         Running-Vers: 15.0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
From this, it would seem that the blade in the chassis is already running a newer firmware bundle than the one running on the fabric interconnect.  So, let&#039;s find out what we are running on the FI, and see about some more updates to it:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
It would seem that 3.0(2f) is the latest in the next-newer release train.  So acquire that from Cisco&#039;s download site and install on the FI and apply following the process documented above.  And there is a hiccup with the SSH in 2.5(2a) not being able to get a host key from the SSH servers running on Debian 12 or Debian 13.  Here&#039;s an example Debian server log of that:&lt;br /&gt;
 adj@zarathud:~$ &#039;&#039;&#039;sudo grep ssh.*172.16.10.176 /var/log/auth.log&#039;&#039;&#039;&lt;br /&gt;
 2026-04-02T17:24:54.156462+00:00 zarathud sshd[3090225]: Unable to negotiate with 172.16.10.176 port 33905: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:41:20.766493+00:00 zarathud sshd[3092657]: Unable to negotiate with 172.16.10.176 port 58959: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:50:44.154486+00:00 zarathud sshd[3094045]: Unable to negotiate with 172.16.10.176 port 45452: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:51:36.645000+00:00 zarathud sudo:      adj : TTY=pts/22 ; PWD=/home/adj ; USER=root ; COMMAND=/usr/bin/grep ssh.*172.16.10.176 /var/log/auth.log&lt;br /&gt;
 2026-04-02T17:53:33.561802+00:00 zarathud sudo:      adj : TTY=pts/22 ; PWD=/home/adj ; USER=root ; COMMAND=/usr/bin/grep ssh.*172.16.10.176 /var/log/auth.log&lt;br /&gt;
 adj@zarathud:~$&lt;br /&gt;
So, for expediency&#039;s sake, we will just do it over TFTP this time.  Maybe the SSH client in the 3.1(3l) release will be better able to talk to my SSH servers?  That last remains to be seen.  But the SSH server is a bit nearer to 2026 standards:&lt;br /&gt;
 adj@yetanotherthinclient:~$ &#039;&#039;&#039;ssh admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching host key type found. Their offer: ssh-rsa&lt;br /&gt;
 adj@yetanotherthinclient:~$ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 3.1(3l)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 3.1(3l)&lt;br /&gt;
 Package-Vers: 3.1(3l)A&lt;br /&gt;
 Service pack version: 3.1(3)SP0(Default)&lt;br /&gt;
 Running-Modules:&lt;br /&gt;
 Package-Vers:&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Still only does RSA host keys.  But it does support more recent symmetric encryption schemes than the SSH server in 2.5(2a).  But major excitement!  The web UI now just needs HTML rendering.  And ECMAscript.  And CSS.  But no more need for Java just to see what is going on with the UCS infrastructure.  It does seem to still be needed for the KVM.  But this is a major step forward.  I very strongly recommend getting to the 3.1 UCS Manager releases.&lt;br /&gt;
&lt;br /&gt;
And now for some server (blade) firmware.  Available at the same place as the UCS Manager download, a section called &amp;quot;Related Software&amp;quot; has the server firmware images.  Download and copy those to the UCS Manager running on the fabric interconnects, too:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-b-series.3.1.3l.B.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server                                Userid          State&lt;br /&gt;
     --------- -------- ------------------------------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-b-series.3.1.3l.B.bin&lt;br /&gt;
               Scp      172.17.0.18                           adj             Downloading&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                                           Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18                           adj             Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.3.1.3l.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                                           Downloaded&lt;br /&gt;
     ucs-mini-k9-bundle-infra.3.0.2f.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                                           Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task ucs-k9-bundle-b-series.3.1.3l.B.bin detail&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name: ucs-k9-bundle-b-series.3.1.3l.B.bin&lt;br /&gt;
     Protocol: Scp&lt;br /&gt;
     Server: 172.17.0.18&lt;br /&gt;
     Userid: adj&lt;br /&gt;
     Path: /home/adj/Downloads&lt;br /&gt;
     Downloaded Image Size (KB): 517633&lt;br /&gt;
     State: Downloading&lt;br /&gt;
     Current Task: unpacking image ucs-k9-bundle-b-series.3.1.3l.B.bin on primary(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:UnpackLocal)&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task ucs-k9-bundle-b-series.3.1.3l.B.bin detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name: ucs-k9-bundle-b-series.3.1.3l.B.bin&lt;br /&gt;
     Protocol: Scp&lt;br /&gt;
     Server: 172.17.0.18&lt;br /&gt;
     Userid: adj&lt;br /&gt;
     Path: /home/adj/Downloads&lt;br /&gt;
     Downloaded Image Size (KB): 517633&lt;br /&gt;
     State: Downloaded&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware #&lt;br /&gt;
Note that the UCS Manager SSH client can now talk to a Debian 12 OpenSSH server.  Small wins are still wins!&lt;br /&gt;
&lt;br /&gt;
=== A new step for firmware infrastructure updates ===&lt;br /&gt;
It seems that one must accept that a fabric interconnect reboot has happened before applying a new infrastructure firmware pack.  Something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope monitoring&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /monitoring # &#039;&#039;&#039;show new-faults&#039;&#039;&#039;&lt;br /&gt;
 Severity  Code     Last Transition Time     ID       Description&lt;br /&gt;
 --------- -------- ------------------------ -------- -----------&lt;br /&gt;
 Info      F0440    2026-04-02T18:37:14.718    113208 Chassis discovery policy conflict: Link IOM 1/1/2 to peer port A:N/A/1/2 not configured&lt;br /&gt;
 ucs-fi-6248up-0-A /monitoring # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 3.2(3p)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 (7) Some fabric-interconnect service-pack install/uninstall will do additional FI reboots in order to complete install/uninstall&lt;br /&gt;
     To ensure before triggering auto-install, check manual service-pack activation/remove where warning is given if reboots are required&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 3.2(3p)A&lt;br /&gt;
 Warning: Any Service Pack installed in the system will be removed&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 Warning: Check the outstanding faults (scope monitoring &amp;lt;enter&amp;gt; show new-faults) since last FI reboot. &lt;br /&gt;
 Please make sure the data paths are recovered before proceeding with this FI reboot to ensure there is no interruption to the data traffic.&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
 Broadcast message from root (Thu Apr  2 23:36:05 2026):&lt;br /&gt;
 &lt;br /&gt;
 The system is going down for reboot NOW!&lt;br /&gt;
 Connection to 172.16.10.176 closed by remote host.&lt;br /&gt;
 Connection to 172.16.10.176 closed.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1591</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1591"/>
		<updated>2026-04-02T21:48:00Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Applying firmware update to blades */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the friendly FI management software is all lovely out of date (completely unrunnable in 2026!) Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;br /&gt;
&lt;br /&gt;
Now that we are on 2.2(8m), the SSH client is able to fetch the .bin file using scp.  Or maybe I just got the syntax correct this time.  So here we are:&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-infra.2.5.2a.A.bin&#039;&#039;&#039;&lt;br /&gt;
 Password:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  Download task:&lt;br /&gt;
      File Name Protocol Server          Userid          State&lt;br /&gt;
      --------- -------- --------------- --------------- -----&lt;br /&gt;
      ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
                Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
      ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
                Scp      172.17.0.18     adj             Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.5(2a)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.5(2a)A&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: Success&lt;br /&gt;
         Completion Time: 2009-01-01T01:59:13.146&lt;br /&gt;
         Progress (%): 100&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Success      2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
    FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 95&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 In Progress  1&lt;br /&gt;
         9      DeployActivateUCSM                       Pending      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Pending      0&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 96&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Success      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # Connection to 172.16.10.176 closed.&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And after some more time and one more disconnect, we see that another OpenSSH client compatibility option is required to connect:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa -o Ciphers=+aes256-cbc admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== But I&#039;m still trying to get the blades&#039; CIMCs connected! ==&lt;br /&gt;
The struggle is real!  But I did find https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/integrated-management-controller/118367-configure-cimc-00.pdf which is a GUI-specific outline of the process involved in getting UCS servers&#039; (blade and maybe also rackmount) CIMCs attached to the greater network environment.&lt;br /&gt;
=== In-band?  Out-of-band?  Huh? ===&lt;br /&gt;
First decision to be made here.  In UCS versions before 2.2, the servers&#039; CIMCs always had Ethernet connectivity through the Fabric Interconnects&#039; management port.  This connection amounts to a single point of failure for CIMC connectivity.&lt;br /&gt;
&lt;br /&gt;
In UCS version 2.2 and newer, there are two options for CIMC connectivity: In-band using the FIs&#039; high bandwidth network uplink ports, and out-of band using an FI&#039;s 1000baseT management port.  Naturally, being me, I will opt for the more complicated alternative.  And probably complain the whole way through.&lt;br /&gt;
&lt;br /&gt;
=== In-band CIMC connectivity setup ===&lt;br /&gt;
Log in to the FI.  Go to the organization (probably &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;.  And create an IP pool.  We are skipping the IPv6 stuff for now and the management VLAN is IPv4-only.&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show ip-pool&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     ext-mgmt                      0          0 Internal&lt;br /&gt;
     iscsi-initiator-pool          0          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ip-pool CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool* # &#039;&#039;&#039;create block 172.16.10.168 172.16.10.175 172.16.10.1 255.255.255.0&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;set primary-dns 172.16.10.1 secondary-dns 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From: 172.16.10.168&lt;br /&gt;
     To: 172.16.10.175&lt;br /&gt;
     Default Gateway: 172.16.10.1&lt;br /&gt;
     Subnet Mask: 255.255.255.0&lt;br /&gt;
     Primary DNS: 172.16.10.1&lt;br /&gt;
     Secondary DNS: 172.16.10.2&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From            To              Default Gateway Subnet Mask&lt;br /&gt;
     --------------- --------------- --------------- -----------&lt;br /&gt;
     172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     CIMC_inband_pool              8          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     IPv4 Size: 8&lt;br /&gt;
     IPv4 Assigned: 0&lt;br /&gt;
     IPv6 Size: 0&lt;br /&gt;
     IPv6 Assigned: 0&lt;br /&gt;
     Descr:&lt;br /&gt;
     Assignment Order: Default&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
     Guid: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Net bios enabled or disabled: Not Active&lt;br /&gt;
     DHCP enaled or disabled: Not Supported&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
 &lt;br /&gt;
     Block of IP Addresses:&lt;br /&gt;
         From            To              Default Gateway Subnet Mask&lt;br /&gt;
         --------------- --------------- --------------- -----------&lt;br /&gt;
         172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 &lt;br /&gt;
     Pooled:&lt;br /&gt;
         Id              Subnet          Assigned Assigned To&lt;br /&gt;
         --------------- --------------- -------- -----------&lt;br /&gt;
         172.16.10.168   255.255.255.0   No&lt;br /&gt;
         172.16.10.169   255.255.255.0   No&lt;br /&gt;
         172.16.10.170   255.255.255.0   No&lt;br /&gt;
         172.16.10.171   255.255.255.0   No&lt;br /&gt;
         172.16.10.172   255.255.255.0   No&lt;br /&gt;
         172.16.10.173   255.255.255.0   No&lt;br /&gt;
         172.16.10.174   255.255.255.0   No&lt;br /&gt;
         172.16.10.175   255.255.255.0   No&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool #&lt;br /&gt;
So we now have a pool of IPv4 addresses to hand out to CIMCs in our UCS domain.  And we can also LOL at Cisco&#039;s &amp;lt;code&amp;gt;DHCP &#039;&#039;&#039;enaled&#039;&#039;&#039; or disabled&amp;lt;/code&amp;gt; spelling error.  But not too loud.  It may well be fixed in newer versions.&lt;br /&gt;
&lt;br /&gt;
=== Create VLAN and VLAN group to connect the CIMC IP pool to ===&lt;br /&gt;
VLAN on the Ethernet uplinks:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan Management 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set native no&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set vlan-id 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
VLAN group now:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show vlan-group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan-group Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group* # &#039;&#039;&#039;create member-vlan Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
Add IP pool, VLAN, VLAN group to in-band profile:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope inband-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &#039;&#039;&#039;set default-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set default-vlan-name Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set net-group-name Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &lt;br /&gt;
Now that the in-band profile is set, update a blade&#039;s service profile to reference it:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ext-mgmt-ip-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;set ext-mgmt-ip-state pooled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset hard-reset-immediate&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset-kvm&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;reset-ipmi&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID              Serial (SN)      HW Revision&lt;br /&gt;
     ---------------- ---------------- -----------&lt;br /&gt;
     UCSB-B200-M3     FCH162871NA      0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V01&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     GUID:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
 &lt;br /&gt;
     Vmedia Mapping List:&lt;br /&gt;
         Full Name: sys/chassis-1/blade-1/mgmt/actual-mount-list&lt;br /&gt;
 &lt;br /&gt;
         Vmedia Mapping:&lt;br /&gt;
             Vdisk Id Mapping Name Device Type Mount Protocol Mount Status&lt;br /&gt;
             -------- ------------ ----------- -------------- ------------&lt;br /&gt;
             1                     Cdd         Unknown        Not Mounted&lt;br /&gt;
             2                     Hdd         Unknown        Not Mounted&lt;br /&gt;
 &lt;br /&gt;
     External Management Interface:&lt;br /&gt;
         Mode: In Band&lt;br /&gt;
         Ip V4 State: Pooled&lt;br /&gt;
         Ip V6 State: Pooled&lt;br /&gt;
 &lt;br /&gt;
         External Management Virtual LAN:&lt;br /&gt;
             Network Name: Management&lt;br /&gt;
             Id: 10&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IP:&lt;br /&gt;
                 Name       IP Address      Default Gateway Subnet          Primary DNS IP  Secondary DNS IP&lt;br /&gt;
                 ---------- --------------- --------------- --------------- --------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            172.16.10.169   172.16.10.1     255.255.255.0   172.16.10.1     172.16.10.2&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IPv6:&lt;br /&gt;
                 Name       IP Address Default Gateway Prefix Primary DNS IP Secondary DNS IP&lt;br /&gt;
                 ---------- ---------- --------------- ------ -------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            ::         ::              64     ::             ::&lt;br /&gt;
 &lt;br /&gt;
     Management Interface:&lt;br /&gt;
         Access Type: Unspecified&lt;br /&gt;
         IP Address: 0.0.0.0&lt;br /&gt;
         Netmask: 0.0.0.0&lt;br /&gt;
         Gateway: 0.0.0.0&lt;br /&gt;
         MAC Address: 30:F7:0D:BE:89:EA&lt;br /&gt;
         Fabric ID: A&lt;br /&gt;
         Peer Port:&lt;br /&gt;
         Peer Port Id: 1&lt;br /&gt;
         Peer Slot Id: 1&lt;br /&gt;
         Peer Chassis Id: 1&lt;br /&gt;
         Discovery: Absent&lt;br /&gt;
         &lt;br /&gt;
     Management Endpoint Log Control:&lt;br /&gt;
         Type   ID  Capacity&lt;br /&gt;
         ------ --- --------&lt;br /&gt;
         SEL    0   Available&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
(Some) Success!  The blade&#039;s CIMC is assigned an IPv4 address.  And it is pingable on the local network.  SSH is a no-go, though.  Maybe not a thing at all on B series blades?  And some further fiddling seems to be needed to get IPMI over LAN working.  Something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile* # &#039;&#039;&#039;create ipmi-user admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;set password&#039;&#039;&#039;&lt;br /&gt;
 Enter a password:&lt;br /&gt;
 Confirm the password:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;set privilege admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;set ipmi-over-lan enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;connect cimc 1/1&#039;&#039;&#039;&lt;br /&gt;
 Trying 127.5.1.1...&lt;br /&gt;
 Connected to 127.5.1.1.&lt;br /&gt;
 Escape character is &#039;^]&#039;.&lt;br /&gt;
 &lt;br /&gt;
 CIMC Debug Firmware Utility Shell [ support ]&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;help&#039;&#039;&#039;&lt;br /&gt;
 __________________________________________&lt;br /&gt;
           Debug Firmware Utility          &lt;br /&gt;
 __________________________________________&lt;br /&gt;
 Command List&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 alarms&lt;br /&gt;
 cores&lt;br /&gt;
 exit&lt;br /&gt;
 i2cstats&lt;br /&gt;
 images&lt;br /&gt;
 mctools&lt;br /&gt;
 memory&lt;br /&gt;
 messages&lt;br /&gt;
 mrcout&lt;br /&gt;
 network&lt;br /&gt;
 obfl&lt;br /&gt;
 post&lt;br /&gt;
 power&lt;br /&gt;
 programmables&lt;br /&gt;
 sensors&lt;br /&gt;
 sel&lt;br /&gt;
 fru&lt;br /&gt;
 tasks&lt;br /&gt;
 top&lt;br /&gt;
 update&lt;br /&gt;
 users&lt;br /&gt;
 version&lt;br /&gt;
 mezz1fru&lt;br /&gt;
 mezz2fru&lt;br /&gt;
 sldp&lt;br /&gt;
 help [COMMAND]&lt;br /&gt;
 __________________________________________&lt;br /&gt;
  Notes: &lt;br /&gt;
 &amp;quot;enter Key&amp;quot; will execute last command&lt;br /&gt;
 &amp;quot;COMMAND ?&amp;quot; will execute help for that command&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;users&#039;&#039;&#039;&lt;br /&gt;
 0. [ &amp;quot;admin&amp;quot; ] [ &amp;quot;&amp;quot; ] [ 2 ]&lt;br /&gt;
 1. [ Empty Entry ]&lt;br /&gt;
 2. [ Empty Entry ]&lt;br /&gt;
 3. [ Empty Entry ]&lt;br /&gt;
 4. [ Empty Entry ]&lt;br /&gt;
 5. [ Empty Entry ]&lt;br /&gt;
 6. [ Empty Entry ]&lt;br /&gt;
 7. [ Empty Entry ]&lt;br /&gt;
 8. [ Empty Entry ]&lt;br /&gt;
 9. [ Empty Entry ]&lt;br /&gt;
 10. [ Empty Entry ]&lt;br /&gt;
 11. [ Empty Entry ]&lt;br /&gt;
 12. [ Empty Entry ]&lt;br /&gt;
 13. [ Empty Entry ]&lt;br /&gt;
 14. [ Empty Entry ]&lt;br /&gt;
 15. [ Empty Entry ]&lt;br /&gt;
 [ users ]# &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 Connection closed by foreign host.&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
So that looks like we should have IPMI over LAN.  Let&#039;s poke at it a bit and see what happens:&lt;br /&gt;
 $ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=63 time=0.930 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=63 time=0.655 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=63 time=0.677 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=63 time=0.658 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=63 time=0.732 ms&lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4058ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.655/0.730/0.930/0.103 ms&lt;br /&gt;
 $ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error: Unable to establish IPMI v2 / RMCP+ session&lt;br /&gt;
 $&lt;br /&gt;
And that is a promising start with a disappointing finish.  Just for grins, let&#039;s try from a machine on the same subnet.  Maybe ICMP echo replies get routed but the IPMI over LAN traffic doesn&#039;t?&lt;br /&gt;
 router$ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=64 time=1.85 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=64 time=0.498 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=64 time=0.463 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=64 time=0.452 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=64 time=0.460 ms &lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4067ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.452/0.745/1.853/0.554 ms&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin mc info&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Device ID                 : 32&lt;br /&gt;
 Device Revision           : 0&lt;br /&gt;
 Firmware Revision         : 3.01&lt;br /&gt;
 IPMI Version              : 2.0&lt;br /&gt;
 Manufacturer ID           : 5771&lt;br /&gt;
 Manufacturer Name         : Cisco Systems, Inc.&lt;br /&gt;
 Product ID                : 9 (0x0009)&lt;br /&gt;
 Product Name              : Unknown (0x09)&lt;br /&gt;
 Device Available          : yes&lt;br /&gt;
 Provides Device SDRs      : yes&lt;br /&gt;
 Additional Device Support :&lt;br /&gt;
     Sensor Device&lt;br /&gt;
     SDR Repository Device&lt;br /&gt;
     SEL Device&lt;br /&gt;
     FRU Inventory Device&lt;br /&gt;
     IPMB Event Receiver&lt;br /&gt;
     IPMB Event Generator&lt;br /&gt;
 Aux Firmware Rev Info     : &lt;br /&gt;
     0x00&lt;br /&gt;
     0x00&lt;br /&gt;
     0x2a&lt;br /&gt;
     0x8b&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin lan print&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Set in Progress         : Set Complete&lt;br /&gt;
 Auth Type Support       : NONE MD2 MD5 PASSWORD &lt;br /&gt;
 Auth Type Enable        : Callback : &lt;br /&gt;
                         : User     : &lt;br /&gt;
                         : Operator : &lt;br /&gt;
                         : Admin    : &lt;br /&gt;
                         : OEM      : &lt;br /&gt;
 IP Address Source       : Static Address&lt;br /&gt;
 IP Address              : 0.0.0.0&lt;br /&gt;
 Subnet Mask             : 0.0.0.0&lt;br /&gt;
 MAC Address             : 30:f7:0d:be:89:ea&lt;br /&gt;
 SNMP Community String   : public&lt;br /&gt;
 IP Header               : TTL=0x40 Flags=0x00 Precedence=0x00 TOS=0x10&lt;br /&gt;
 BMC ARP Control         : ARP Responses Disabled, Gratuitous ARP Disabled&lt;br /&gt;
 Gratituous ARP Intrvl   : 2.0 seconds&lt;br /&gt;
 Default Gateway IP      : 0.0.0.0&lt;br /&gt;
 Default Gateway MAC     : 00:00:00:00:00:00&lt;br /&gt;
 Backup Gateway IP       : 0.0.0.0&lt;br /&gt;
 Backup Gateway MAC      : 00:00:00:00:00:00&lt;br /&gt;
 802.1q VLAN ID          : Disabled&lt;br /&gt;
 802.1q VLAN Priority    : 0&lt;br /&gt;
 RMCP+ Cipher Suites     : 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,128&lt;br /&gt;
 Cipher Suite Priv Max   : XXXaaaXXaaaXaaa&lt;br /&gt;
                         :     X=Cipher Suite Unused&lt;br /&gt;
                         :     c=CALLBACK&lt;br /&gt;
                         :     u=USER&lt;br /&gt;
                         :     o=OPERATOR&lt;br /&gt;
                         :     a=ADMIN&lt;br /&gt;
                         :     O=OEM&lt;br /&gt;
 Bad Password Threshold  : Not Available&lt;br /&gt;
 router$&lt;br /&gt;
Yay!  Very strange that it can be pinged from a different subnet, but &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; cannot talk to it that way.  Also very strange that it says it has no IP address assigned.  I am just guessing here, but perhaps the code in the FI is doing that for us and I have not found the documentation describing how it works.&lt;br /&gt;
&lt;br /&gt;
=== Serial console for blades? ===&lt;br /&gt;
I am fine with low bit rate serial stuff.  No need for a fancy bit mapped screen to manage my computers.  And it saves me having to run crazy Avocent Java applications in the process.  So let&#039;s see what happens when we try to connect from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
Disappointing.  But I think I might have seem something about serial over LAN in the service profiles somewhere.  Let&#039;s see if we can get it turned on:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show sol-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;set speed 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
&lt;br /&gt;
And trying again from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$ &lt;br /&gt;
&lt;br /&gt;
So still no.  Grrrr.  Maybe it needs to be powered on first?&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power is off&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power on&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power Control: Up/On&lt;br /&gt;
 router$ &#039;&#039;&#039;sleep 30&#039;&#039;&#039;&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
&lt;br /&gt;
More grrrr.  Manuals suggest I might need a BIOS policy that enables the serial port, too?&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set quiet-boot-config quiet-boot disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set serial-port-a-config serial-port-a enabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config baud-rate 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config console-redir serial-port-a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config flow-control none&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config legacy-os-redir disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config terminal-type vt100-plus&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So there is still no working serial console on the blade at this point.  https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/ucs-b-series-blade-servers/200105-Utilizing-SoL-logging-for-Serial-Redirec.html says to SSH to the CIMC IP address.  Just getting a TCP RST back (&amp;quot;connection refused&amp;quot;) when trying that.  And the IPMI over LAN serial just does not seem to be supported at all.  Maybe the blade needs a firmware update, too?&lt;br /&gt;
=== Applying firmware update to blades ===&lt;br /&gt;
So far (I think) I have only done firmware updates to the fabric interconnect and the blade chassis FEXes.  First up, let&#039;s see what is available for our B200 M3 blades:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show image | i b200-m3&#039;&#039;&#039;&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.0.4a.0.080920121557.bin&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.2.1a.0.111220131105.bin&lt;br /&gt;
 ucs-b200-m3-brdprog.11.0.bin                  Board Controller     11.0&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.0.4b.bin                CIMC                 2.0(4b)&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.2.1c.bin                CIMC                 2.2(1c)&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.10.1-0100_4.30.00_NA.bin&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.12.1-0160_4.37.00_NA.bin&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
Those might be kinda old?  Let&#039;s see what is installed on the B200 M3 that is in the chassis:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Adapter 1:&lt;br /&gt;
         Running-Vers: 4.1(3a)&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
     Adapter 2:&lt;br /&gt;
         Running-Vers: 4.1(3a)&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
     RAID Controller 1:&lt;br /&gt;
         Running-Vers: 20.13.1-0255&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
     BoardController:&lt;br /&gt;
         Running-Vers: 15.0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
From this, it would seem that the blade in the chassis is already running a newer firmware bundle than the one running on the fabric interconnect.  So, let&#039;s find out what we are running on the FI, and see about some more updates to it:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
It would seem that 3.0(2f) is the latest in the next-newer release train.  So acquire that from Cisco&#039;s download site and install on the FI and apply following the process documented above.  And there is a hiccup with the SSH in 2.5(2a) not being able to get a host key from the SSH servers running on Debian 12 or Debian 13.  Here&#039;s an example Debian server log of that:&lt;br /&gt;
 adj@zarathud:~$ &#039;&#039;&#039;sudo grep ssh.*172.16.10.176 /var/log/auth.log&#039;&#039;&#039;&lt;br /&gt;
 2026-04-02T17:24:54.156462+00:00 zarathud sshd[3090225]: Unable to negotiate with 172.16.10.176 port 33905: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:41:20.766493+00:00 zarathud sshd[3092657]: Unable to negotiate with 172.16.10.176 port 58959: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:50:44.154486+00:00 zarathud sshd[3094045]: Unable to negotiate with 172.16.10.176 port 45452: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:51:36.645000+00:00 zarathud sudo:      adj : TTY=pts/22 ; PWD=/home/adj ; USER=root ; COMMAND=/usr/bin/grep ssh.*172.16.10.176 /var/log/auth.log&lt;br /&gt;
 2026-04-02T17:53:33.561802+00:00 zarathud sudo:      adj : TTY=pts/22 ; PWD=/home/adj ; USER=root ; COMMAND=/usr/bin/grep ssh.*172.16.10.176 /var/log/auth.log&lt;br /&gt;
 adj@zarathud:~$&lt;br /&gt;
So, for expediency&#039;s sake, we will just do it over TFTP this time.  Maybe the SSH client in the 3.1(3l) release will be better able to talk to my SSH servers?  That last remains to be seen.  But the SSH server is a bit nearer to 2026 standards:&lt;br /&gt;
 adj@yetanotherthinclient:~$ &#039;&#039;&#039;ssh admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching host key type found. Their offer: ssh-rsa&lt;br /&gt;
 adj@yetanotherthinclient:~$ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 3.1(3l)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 3.1(3l)&lt;br /&gt;
 Package-Vers: 3.1(3l)A&lt;br /&gt;
 Service pack version: 3.1(3)SP0(Default)&lt;br /&gt;
 Running-Modules:&lt;br /&gt;
 Package-Vers:&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Still only does RSA host keys.  But it does support more recent symmetric encryption schemes than the SSH server in 2.5(2a).  But major excitement!  The web UI now just needs HTML rendering.  And ECMAscript.  And CSS.  But no more need for Java just to see what is going on with the UCS infrastructure.  It does seem to still be needed for the KVM.  But this is a major step forward.  I very strongly recommend getting to the 3.1 UCS Manager releases.&lt;br /&gt;
&lt;br /&gt;
And now for some server (blade) firmware.  Available at the same place as the UCS Manager download, a section called &amp;quot;Related Software&amp;quot; has the server firmware images.  Download and copy those to the UCS Manager running on the fabric interconnects, too:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-b-series.3.1.3l.B.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server                                Userid          State&lt;br /&gt;
     --------- -------- ------------------------------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-b-series.3.1.3l.B.bin&lt;br /&gt;
               Scp      172.17.0.18                           adj             Downloading&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                                           Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18                           adj             Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.3.1.3l.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                                           Downloaded&lt;br /&gt;
     ucs-mini-k9-bundle-infra.3.0.2f.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                                           Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task ucs-k9-bundle-b-series.3.1.3l.B.bin detail&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name: ucs-k9-bundle-b-series.3.1.3l.B.bin&lt;br /&gt;
     Protocol: Scp&lt;br /&gt;
     Server: 172.17.0.18&lt;br /&gt;
     Userid: adj&lt;br /&gt;
     Path: /home/adj/Downloads&lt;br /&gt;
     Downloaded Image Size (KB): 517633&lt;br /&gt;
     State: Downloading&lt;br /&gt;
     Current Task: unpacking image ucs-k9-bundle-b-series.3.1.3l.B.bin on primary(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:UnpackLocal)&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task ucs-k9-bundle-b-series.3.1.3l.B.bin detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name: ucs-k9-bundle-b-series.3.1.3l.B.bin&lt;br /&gt;
     Protocol: Scp&lt;br /&gt;
     Server: 172.17.0.18&lt;br /&gt;
     Userid: adj&lt;br /&gt;
     Path: /home/adj/Downloads&lt;br /&gt;
     Downloaded Image Size (KB): 517633&lt;br /&gt;
     State: Downloaded&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware #&lt;br /&gt;
Note that the UCS Manager SSH client can now talk to a Debian 12 OpenSSH server.  Small wins are still wins!&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1590</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1590"/>
		<updated>2026-04-02T19:37:49Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Applying firmware update to blades */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the friendly FI management software is all lovely out of date (completely unrunnable in 2026!) Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;br /&gt;
&lt;br /&gt;
Now that we are on 2.2(8m), the SSH client is able to fetch the .bin file using scp.  Or maybe I just got the syntax correct this time.  So here we are:&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-infra.2.5.2a.A.bin&#039;&#039;&#039;&lt;br /&gt;
 Password:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  Download task:&lt;br /&gt;
      File Name Protocol Server          Userid          State&lt;br /&gt;
      --------- -------- --------------- --------------- -----&lt;br /&gt;
      ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
                Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
      ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
                Scp      172.17.0.18     adj             Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.5(2a)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.5(2a)A&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: Success&lt;br /&gt;
         Completion Time: 2009-01-01T01:59:13.146&lt;br /&gt;
         Progress (%): 100&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Success      2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
    FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 95&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 In Progress  1&lt;br /&gt;
         9      DeployActivateUCSM                       Pending      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Pending      0&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 96&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Success      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # Connection to 172.16.10.176 closed.&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And after some more time and one more disconnect, we see that another OpenSSH client compatibility option is required to connect:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa -o Ciphers=+aes256-cbc admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== But I&#039;m still trying to get the blades&#039; CIMCs connected! ==&lt;br /&gt;
The struggle is real!  But I did find https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/integrated-management-controller/118367-configure-cimc-00.pdf which is a GUI-specific outline of the process involved in getting UCS servers&#039; (blade and maybe also rackmount) CIMCs attached to the greater network environment.&lt;br /&gt;
=== In-band?  Out-of-band?  Huh? ===&lt;br /&gt;
First decision to be made here.  In UCS versions before 2.2, the servers&#039; CIMCs always had Ethernet connectivity through the Fabric Interconnects&#039; management port.  This connection amounts to a single point of failure for CIMC connectivity.&lt;br /&gt;
&lt;br /&gt;
In UCS version 2.2 and newer, there are two options for CIMC connectivity: In-band using the FIs&#039; high bandwidth network uplink ports, and out-of band using an FI&#039;s 1000baseT management port.  Naturally, being me, I will opt for the more complicated alternative.  And probably complain the whole way through.&lt;br /&gt;
&lt;br /&gt;
=== In-band CIMC connectivity setup ===&lt;br /&gt;
Log in to the FI.  Go to the organization (probably &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;.  And create an IP pool.  We are skipping the IPv6 stuff for now and the management VLAN is IPv4-only.&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show ip-pool&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     ext-mgmt                      0          0 Internal&lt;br /&gt;
     iscsi-initiator-pool          0          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ip-pool CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool* # &#039;&#039;&#039;create block 172.16.10.168 172.16.10.175 172.16.10.1 255.255.255.0&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;set primary-dns 172.16.10.1 secondary-dns 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From: 172.16.10.168&lt;br /&gt;
     To: 172.16.10.175&lt;br /&gt;
     Default Gateway: 172.16.10.1&lt;br /&gt;
     Subnet Mask: 255.255.255.0&lt;br /&gt;
     Primary DNS: 172.16.10.1&lt;br /&gt;
     Secondary DNS: 172.16.10.2&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From            To              Default Gateway Subnet Mask&lt;br /&gt;
     --------------- --------------- --------------- -----------&lt;br /&gt;
     172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     CIMC_inband_pool              8          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     IPv4 Size: 8&lt;br /&gt;
     IPv4 Assigned: 0&lt;br /&gt;
     IPv6 Size: 0&lt;br /&gt;
     IPv6 Assigned: 0&lt;br /&gt;
     Descr:&lt;br /&gt;
     Assignment Order: Default&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
     Guid: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Net bios enabled or disabled: Not Active&lt;br /&gt;
     DHCP enaled or disabled: Not Supported&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
 &lt;br /&gt;
     Block of IP Addresses:&lt;br /&gt;
         From            To              Default Gateway Subnet Mask&lt;br /&gt;
         --------------- --------------- --------------- -----------&lt;br /&gt;
         172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 &lt;br /&gt;
     Pooled:&lt;br /&gt;
         Id              Subnet          Assigned Assigned To&lt;br /&gt;
         --------------- --------------- -------- -----------&lt;br /&gt;
         172.16.10.168   255.255.255.0   No&lt;br /&gt;
         172.16.10.169   255.255.255.0   No&lt;br /&gt;
         172.16.10.170   255.255.255.0   No&lt;br /&gt;
         172.16.10.171   255.255.255.0   No&lt;br /&gt;
         172.16.10.172   255.255.255.0   No&lt;br /&gt;
         172.16.10.173   255.255.255.0   No&lt;br /&gt;
         172.16.10.174   255.255.255.0   No&lt;br /&gt;
         172.16.10.175   255.255.255.0   No&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool #&lt;br /&gt;
So we now have a pool of IPv4 addresses to hand out to CIMCs in our UCS domain.  And we can also LOL at Cisco&#039;s &amp;lt;code&amp;gt;DHCP &#039;&#039;&#039;enaled&#039;&#039;&#039; or disabled&amp;lt;/code&amp;gt; spelling error.  But not too loud.  It may well be fixed in newer versions.&lt;br /&gt;
&lt;br /&gt;
=== Create VLAN and VLAN group to connect the CIMC IP pool to ===&lt;br /&gt;
VLAN on the Ethernet uplinks:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan Management 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set native no&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set vlan-id 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
VLAN group now:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show vlan-group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan-group Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group* # &#039;&#039;&#039;create member-vlan Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
Add IP pool, VLAN, VLAN group to in-band profile:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope inband-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &#039;&#039;&#039;set default-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set default-vlan-name Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set net-group-name Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &lt;br /&gt;
Now that the in-band profile is set, update a blade&#039;s service profile to reference it:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ext-mgmt-ip-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;set ext-mgmt-ip-state pooled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset hard-reset-immediate&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset-kvm&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;reset-ipmi&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID              Serial (SN)      HW Revision&lt;br /&gt;
     ---------------- ---------------- -----------&lt;br /&gt;
     UCSB-B200-M3     FCH162871NA      0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V01&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     GUID:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
 &lt;br /&gt;
     Vmedia Mapping List:&lt;br /&gt;
         Full Name: sys/chassis-1/blade-1/mgmt/actual-mount-list&lt;br /&gt;
 &lt;br /&gt;
         Vmedia Mapping:&lt;br /&gt;
             Vdisk Id Mapping Name Device Type Mount Protocol Mount Status&lt;br /&gt;
             -------- ------------ ----------- -------------- ------------&lt;br /&gt;
             1                     Cdd         Unknown        Not Mounted&lt;br /&gt;
             2                     Hdd         Unknown        Not Mounted&lt;br /&gt;
 &lt;br /&gt;
     External Management Interface:&lt;br /&gt;
         Mode: In Band&lt;br /&gt;
         Ip V4 State: Pooled&lt;br /&gt;
         Ip V6 State: Pooled&lt;br /&gt;
 &lt;br /&gt;
         External Management Virtual LAN:&lt;br /&gt;
             Network Name: Management&lt;br /&gt;
             Id: 10&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IP:&lt;br /&gt;
                 Name       IP Address      Default Gateway Subnet          Primary DNS IP  Secondary DNS IP&lt;br /&gt;
                 ---------- --------------- --------------- --------------- --------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            172.16.10.169   172.16.10.1     255.255.255.0   172.16.10.1     172.16.10.2&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IPv6:&lt;br /&gt;
                 Name       IP Address Default Gateway Prefix Primary DNS IP Secondary DNS IP&lt;br /&gt;
                 ---------- ---------- --------------- ------ -------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            ::         ::              64     ::             ::&lt;br /&gt;
 &lt;br /&gt;
     Management Interface:&lt;br /&gt;
         Access Type: Unspecified&lt;br /&gt;
         IP Address: 0.0.0.0&lt;br /&gt;
         Netmask: 0.0.0.0&lt;br /&gt;
         Gateway: 0.0.0.0&lt;br /&gt;
         MAC Address: 30:F7:0D:BE:89:EA&lt;br /&gt;
         Fabric ID: A&lt;br /&gt;
         Peer Port:&lt;br /&gt;
         Peer Port Id: 1&lt;br /&gt;
         Peer Slot Id: 1&lt;br /&gt;
         Peer Chassis Id: 1&lt;br /&gt;
         Discovery: Absent&lt;br /&gt;
         &lt;br /&gt;
     Management Endpoint Log Control:&lt;br /&gt;
         Type   ID  Capacity&lt;br /&gt;
         ------ --- --------&lt;br /&gt;
         SEL    0   Available&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
(Some) Success!  The blade&#039;s CIMC is assigned an IPv4 address.  And it is pingable on the local network.  SSH is a no-go, though.  Maybe not a thing at all on B series blades?  And some further fiddling seems to be needed to get IPMI over LAN working.  Something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile* # &#039;&#039;&#039;create ipmi-user admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;set password&#039;&#039;&#039;&lt;br /&gt;
 Enter a password:&lt;br /&gt;
 Confirm the password:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;set privilege admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;set ipmi-over-lan enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;connect cimc 1/1&#039;&#039;&#039;&lt;br /&gt;
 Trying 127.5.1.1...&lt;br /&gt;
 Connected to 127.5.1.1.&lt;br /&gt;
 Escape character is &#039;^]&#039;.&lt;br /&gt;
 &lt;br /&gt;
 CIMC Debug Firmware Utility Shell [ support ]&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;help&#039;&#039;&#039;&lt;br /&gt;
 __________________________________________&lt;br /&gt;
           Debug Firmware Utility          &lt;br /&gt;
 __________________________________________&lt;br /&gt;
 Command List&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 alarms&lt;br /&gt;
 cores&lt;br /&gt;
 exit&lt;br /&gt;
 i2cstats&lt;br /&gt;
 images&lt;br /&gt;
 mctools&lt;br /&gt;
 memory&lt;br /&gt;
 messages&lt;br /&gt;
 mrcout&lt;br /&gt;
 network&lt;br /&gt;
 obfl&lt;br /&gt;
 post&lt;br /&gt;
 power&lt;br /&gt;
 programmables&lt;br /&gt;
 sensors&lt;br /&gt;
 sel&lt;br /&gt;
 fru&lt;br /&gt;
 tasks&lt;br /&gt;
 top&lt;br /&gt;
 update&lt;br /&gt;
 users&lt;br /&gt;
 version&lt;br /&gt;
 mezz1fru&lt;br /&gt;
 mezz2fru&lt;br /&gt;
 sldp&lt;br /&gt;
 help [COMMAND]&lt;br /&gt;
 __________________________________________&lt;br /&gt;
  Notes: &lt;br /&gt;
 &amp;quot;enter Key&amp;quot; will execute last command&lt;br /&gt;
 &amp;quot;COMMAND ?&amp;quot; will execute help for that command&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;users&#039;&#039;&#039;&lt;br /&gt;
 0. [ &amp;quot;admin&amp;quot; ] [ &amp;quot;&amp;quot; ] [ 2 ]&lt;br /&gt;
 1. [ Empty Entry ]&lt;br /&gt;
 2. [ Empty Entry ]&lt;br /&gt;
 3. [ Empty Entry ]&lt;br /&gt;
 4. [ Empty Entry ]&lt;br /&gt;
 5. [ Empty Entry ]&lt;br /&gt;
 6. [ Empty Entry ]&lt;br /&gt;
 7. [ Empty Entry ]&lt;br /&gt;
 8. [ Empty Entry ]&lt;br /&gt;
 9. [ Empty Entry ]&lt;br /&gt;
 10. [ Empty Entry ]&lt;br /&gt;
 11. [ Empty Entry ]&lt;br /&gt;
 12. [ Empty Entry ]&lt;br /&gt;
 13. [ Empty Entry ]&lt;br /&gt;
 14. [ Empty Entry ]&lt;br /&gt;
 15. [ Empty Entry ]&lt;br /&gt;
 [ users ]# &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 Connection closed by foreign host.&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
So that looks like we should have IPMI over LAN.  Let&#039;s poke at it a bit and see what happens:&lt;br /&gt;
 $ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=63 time=0.930 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=63 time=0.655 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=63 time=0.677 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=63 time=0.658 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=63 time=0.732 ms&lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4058ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.655/0.730/0.930/0.103 ms&lt;br /&gt;
 $ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error: Unable to establish IPMI v2 / RMCP+ session&lt;br /&gt;
 $&lt;br /&gt;
And that is a promising start with a disappointing finish.  Just for grins, let&#039;s try from a machine on the same subnet.  Maybe ICMP echo replies get routed but the IPMI over LAN traffic doesn&#039;t?&lt;br /&gt;
 router$ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=64 time=1.85 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=64 time=0.498 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=64 time=0.463 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=64 time=0.452 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=64 time=0.460 ms &lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4067ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.452/0.745/1.853/0.554 ms&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin mc info&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Device ID                 : 32&lt;br /&gt;
 Device Revision           : 0&lt;br /&gt;
 Firmware Revision         : 3.01&lt;br /&gt;
 IPMI Version              : 2.0&lt;br /&gt;
 Manufacturer ID           : 5771&lt;br /&gt;
 Manufacturer Name         : Cisco Systems, Inc.&lt;br /&gt;
 Product ID                : 9 (0x0009)&lt;br /&gt;
 Product Name              : Unknown (0x09)&lt;br /&gt;
 Device Available          : yes&lt;br /&gt;
 Provides Device SDRs      : yes&lt;br /&gt;
 Additional Device Support :&lt;br /&gt;
     Sensor Device&lt;br /&gt;
     SDR Repository Device&lt;br /&gt;
     SEL Device&lt;br /&gt;
     FRU Inventory Device&lt;br /&gt;
     IPMB Event Receiver&lt;br /&gt;
     IPMB Event Generator&lt;br /&gt;
 Aux Firmware Rev Info     : &lt;br /&gt;
     0x00&lt;br /&gt;
     0x00&lt;br /&gt;
     0x2a&lt;br /&gt;
     0x8b&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin lan print&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Set in Progress         : Set Complete&lt;br /&gt;
 Auth Type Support       : NONE MD2 MD5 PASSWORD &lt;br /&gt;
 Auth Type Enable        : Callback : &lt;br /&gt;
                         : User     : &lt;br /&gt;
                         : Operator : &lt;br /&gt;
                         : Admin    : &lt;br /&gt;
                         : OEM      : &lt;br /&gt;
 IP Address Source       : Static Address&lt;br /&gt;
 IP Address              : 0.0.0.0&lt;br /&gt;
 Subnet Mask             : 0.0.0.0&lt;br /&gt;
 MAC Address             : 30:f7:0d:be:89:ea&lt;br /&gt;
 SNMP Community String   : public&lt;br /&gt;
 IP Header               : TTL=0x40 Flags=0x00 Precedence=0x00 TOS=0x10&lt;br /&gt;
 BMC ARP Control         : ARP Responses Disabled, Gratuitous ARP Disabled&lt;br /&gt;
 Gratituous ARP Intrvl   : 2.0 seconds&lt;br /&gt;
 Default Gateway IP      : 0.0.0.0&lt;br /&gt;
 Default Gateway MAC     : 00:00:00:00:00:00&lt;br /&gt;
 Backup Gateway IP       : 0.0.0.0&lt;br /&gt;
 Backup Gateway MAC      : 00:00:00:00:00:00&lt;br /&gt;
 802.1q VLAN ID          : Disabled&lt;br /&gt;
 802.1q VLAN Priority    : 0&lt;br /&gt;
 RMCP+ Cipher Suites     : 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,128&lt;br /&gt;
 Cipher Suite Priv Max   : XXXaaaXXaaaXaaa&lt;br /&gt;
                         :     X=Cipher Suite Unused&lt;br /&gt;
                         :     c=CALLBACK&lt;br /&gt;
                         :     u=USER&lt;br /&gt;
                         :     o=OPERATOR&lt;br /&gt;
                         :     a=ADMIN&lt;br /&gt;
                         :     O=OEM&lt;br /&gt;
 Bad Password Threshold  : Not Available&lt;br /&gt;
 router$&lt;br /&gt;
Yay!  Very strange that it can be pinged from a different subnet, but &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; cannot talk to it that way.  Also very strange that it says it has no IP address assigned.  I am just guessing here, but perhaps the code in the FI is doing that for us and I have not found the documentation describing how it works.&lt;br /&gt;
&lt;br /&gt;
=== Serial console for blades? ===&lt;br /&gt;
I am fine with low bit rate serial stuff.  No need for a fancy bit mapped screen to manage my computers.  And it saves me having to run crazy Avocent Java applications in the process.  So let&#039;s see what happens when we try to connect from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
Disappointing.  But I think I might have seem something about serial over LAN in the service profiles somewhere.  Let&#039;s see if we can get it turned on:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show sol-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;set speed 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
&lt;br /&gt;
And trying again from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$ &lt;br /&gt;
&lt;br /&gt;
So still no.  Grrrr.  Maybe it needs to be powered on first?&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power is off&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power on&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power Control: Up/On&lt;br /&gt;
 router$ &#039;&#039;&#039;sleep 30&#039;&#039;&#039;&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
&lt;br /&gt;
More grrrr.  Manuals suggest I might need a BIOS policy that enables the serial port, too?&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set quiet-boot-config quiet-boot disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set serial-port-a-config serial-port-a enabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config baud-rate 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config console-redir serial-port-a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config flow-control none&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config legacy-os-redir disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config terminal-type vt100-plus&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So there is still no working serial console on the blade at this point.  https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/ucs-b-series-blade-servers/200105-Utilizing-SoL-logging-for-Serial-Redirec.html says to SSH to the CIMC IP address.  Just getting a TCP RST back (&amp;quot;connection refused&amp;quot;) when trying that.  And the IPMI over LAN serial just does not seem to be supported at all.  Maybe the blade needs a firmware update, too?&lt;br /&gt;
=== Applying firmware update to blades ===&lt;br /&gt;
So far (I think) I have only done firmware updates to the fabric interconnect and the blade chassis FEXes.  First up, let&#039;s see what is available for our B200 M3 blades:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show image | i b200-m3&#039;&#039;&#039;&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.0.4a.0.080920121557.bin&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.2.1a.0.111220131105.bin&lt;br /&gt;
 ucs-b200-m3-brdprog.11.0.bin                  Board Controller     11.0&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.0.4b.bin                CIMC                 2.0(4b)&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.2.1c.bin                CIMC                 2.2(1c)&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.10.1-0100_4.30.00_NA.bin&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.12.1-0160_4.37.00_NA.bin&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
Those might be kinda old?  Let&#039;s see what is installed on the B200 M3 that is in the chassis:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Adapter 1:&lt;br /&gt;
         Running-Vers: 4.1(3a)&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
     Adapter 2:&lt;br /&gt;
         Running-Vers: 4.1(3a)&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
     RAID Controller 1:&lt;br /&gt;
         Running-Vers: 20.13.1-0255&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
     BoardController:&lt;br /&gt;
         Running-Vers: 15.0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
From this, it would seem that the blade in the chassis is already running a newer firmware bundle than the one running on the fabric interconnect.  So, let&#039;s find out what we are running on the FI, and see about some more updates to it:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
It would seem that 3.0(2f) is the latest in the next-newer release train.  So acquire that from Cisco&#039;s download site and install on the FI and apply following the process documented above.  And there is a hiccup with the SSH in 2.5(2a) not being able to get a host key from the SSH servers running on Debian 12 or Debian 13.  Here&#039;s an example Debian server log of that:&lt;br /&gt;
 adj@zarathud:~$ &#039;&#039;&#039;sudo grep ssh.*172.16.10.176 /var/log/auth.log&#039;&#039;&#039;&lt;br /&gt;
 2026-04-02T17:24:54.156462+00:00 zarathud sshd[3090225]: Unable to negotiate with 172.16.10.176 port 33905: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:41:20.766493+00:00 zarathud sshd[3092657]: Unable to negotiate with 172.16.10.176 port 58959: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:50:44.154486+00:00 zarathud sshd[3094045]: Unable to negotiate with 172.16.10.176 port 45452: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:51:36.645000+00:00 zarathud sudo:      adj : TTY=pts/22 ; PWD=/home/adj ; USER=root ; COMMAND=/usr/bin/grep ssh.*172.16.10.176 /var/log/auth.log&lt;br /&gt;
 2026-04-02T17:53:33.561802+00:00 zarathud sudo:      adj : TTY=pts/22 ; PWD=/home/adj ; USER=root ; COMMAND=/usr/bin/grep ssh.*172.16.10.176 /var/log/auth.log&lt;br /&gt;
 adj@zarathud:~$&lt;br /&gt;
So, for expediency&#039;s sake, we will just do it over TFTP this time.  Maybe the SSH client in the 3.1(3l) release will be better able to talk to my SSH servers?  That last remains to be seen.  But the SSH server is a bit nearer to 2026 standards:&lt;br /&gt;
 adj@yetanotherthinclient:~$ &#039;&#039;&#039;ssh admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching host key type found. Their offer: ssh-rsa&lt;br /&gt;
 adj@yetanotherthinclient:~$ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 3.1(3l)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 3.1(3l)&lt;br /&gt;
 Package-Vers: 3.1(3l)A&lt;br /&gt;
 Service pack version: 3.1(3)SP0(Default)&lt;br /&gt;
 Running-Modules:&lt;br /&gt;
 Package-Vers:&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Still only does RSA host keys.  But it does support more recent symmetric encryption schemes than the SSH server in 2.5(2a).  But major excitement!  The web UI now just needs HTML rendering.  And ECMAscript.  And CSS.  But no more need for Java just to see what is going on with the UCS infrastructure.  It does seem to still be needed for the KVM.  But this is a major step forward.  I very strongly recommend getting to the 3.1 UCS Manager releases.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1589</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1589"/>
		<updated>2026-04-02T18:00:39Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Applying firmware update to blades */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the friendly FI management software is all lovely out of date (completely unrunnable in 2026!) Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;br /&gt;
&lt;br /&gt;
Now that we are on 2.2(8m), the SSH client is able to fetch the .bin file using scp.  Or maybe I just got the syntax correct this time.  So here we are:&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-infra.2.5.2a.A.bin&#039;&#039;&#039;&lt;br /&gt;
 Password:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  Download task:&lt;br /&gt;
      File Name Protocol Server          Userid          State&lt;br /&gt;
      --------- -------- --------------- --------------- -----&lt;br /&gt;
      ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
                Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
      ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
                Scp      172.17.0.18     adj             Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.5(2a)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.5(2a)A&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: Success&lt;br /&gt;
         Completion Time: 2009-01-01T01:59:13.146&lt;br /&gt;
         Progress (%): 100&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Success      2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
    FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 95&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 In Progress  1&lt;br /&gt;
         9      DeployActivateUCSM                       Pending      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Pending      0&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 96&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Success      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # Connection to 172.16.10.176 closed.&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And after some more time and one more disconnect, we see that another OpenSSH client compatibility option is required to connect:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa -o Ciphers=+aes256-cbc admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== But I&#039;m still trying to get the blades&#039; CIMCs connected! ==&lt;br /&gt;
The struggle is real!  But I did find https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/integrated-management-controller/118367-configure-cimc-00.pdf which is a GUI-specific outline of the process involved in getting UCS servers&#039; (blade and maybe also rackmount) CIMCs attached to the greater network environment.&lt;br /&gt;
=== In-band?  Out-of-band?  Huh? ===&lt;br /&gt;
First decision to be made here.  In UCS versions before 2.2, the servers&#039; CIMCs always had Ethernet connectivity through the Fabric Interconnects&#039; management port.  This connection amounts to a single point of failure for CIMC connectivity.&lt;br /&gt;
&lt;br /&gt;
In UCS version 2.2 and newer, there are two options for CIMC connectivity: In-band using the FIs&#039; high bandwidth network uplink ports, and out-of band using an FI&#039;s 1000baseT management port.  Naturally, being me, I will opt for the more complicated alternative.  And probably complain the whole way through.&lt;br /&gt;
&lt;br /&gt;
=== In-band CIMC connectivity setup ===&lt;br /&gt;
Log in to the FI.  Go to the organization (probably &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;.  And create an IP pool.  We are skipping the IPv6 stuff for now and the management VLAN is IPv4-only.&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show ip-pool&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     ext-mgmt                      0          0 Internal&lt;br /&gt;
     iscsi-initiator-pool          0          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ip-pool CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool* # &#039;&#039;&#039;create block 172.16.10.168 172.16.10.175 172.16.10.1 255.255.255.0&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;set primary-dns 172.16.10.1 secondary-dns 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From: 172.16.10.168&lt;br /&gt;
     To: 172.16.10.175&lt;br /&gt;
     Default Gateway: 172.16.10.1&lt;br /&gt;
     Subnet Mask: 255.255.255.0&lt;br /&gt;
     Primary DNS: 172.16.10.1&lt;br /&gt;
     Secondary DNS: 172.16.10.2&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From            To              Default Gateway Subnet Mask&lt;br /&gt;
     --------------- --------------- --------------- -----------&lt;br /&gt;
     172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     CIMC_inband_pool              8          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     IPv4 Size: 8&lt;br /&gt;
     IPv4 Assigned: 0&lt;br /&gt;
     IPv6 Size: 0&lt;br /&gt;
     IPv6 Assigned: 0&lt;br /&gt;
     Descr:&lt;br /&gt;
     Assignment Order: Default&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
     Guid: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Net bios enabled or disabled: Not Active&lt;br /&gt;
     DHCP enaled or disabled: Not Supported&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
 &lt;br /&gt;
     Block of IP Addresses:&lt;br /&gt;
         From            To              Default Gateway Subnet Mask&lt;br /&gt;
         --------------- --------------- --------------- -----------&lt;br /&gt;
         172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 &lt;br /&gt;
     Pooled:&lt;br /&gt;
         Id              Subnet          Assigned Assigned To&lt;br /&gt;
         --------------- --------------- -------- -----------&lt;br /&gt;
         172.16.10.168   255.255.255.0   No&lt;br /&gt;
         172.16.10.169   255.255.255.0   No&lt;br /&gt;
         172.16.10.170   255.255.255.0   No&lt;br /&gt;
         172.16.10.171   255.255.255.0   No&lt;br /&gt;
         172.16.10.172   255.255.255.0   No&lt;br /&gt;
         172.16.10.173   255.255.255.0   No&lt;br /&gt;
         172.16.10.174   255.255.255.0   No&lt;br /&gt;
         172.16.10.175   255.255.255.0   No&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool #&lt;br /&gt;
So we now have a pool of IPv4 addresses to hand out to CIMCs in our UCS domain.  And we can also LOL at Cisco&#039;s &amp;lt;code&amp;gt;DHCP &#039;&#039;&#039;enaled&#039;&#039;&#039; or disabled&amp;lt;/code&amp;gt; spelling error.  But not too loud.  It may well be fixed in newer versions.&lt;br /&gt;
&lt;br /&gt;
=== Create VLAN and VLAN group to connect the CIMC IP pool to ===&lt;br /&gt;
VLAN on the Ethernet uplinks:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan Management 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set native no&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set vlan-id 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
VLAN group now:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show vlan-group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan-group Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group* # &#039;&#039;&#039;create member-vlan Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
Add IP pool, VLAN, VLAN group to in-band profile:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope inband-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &#039;&#039;&#039;set default-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set default-vlan-name Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set net-group-name Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &lt;br /&gt;
Now that the in-band profile is set, update a blade&#039;s service profile to reference it:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ext-mgmt-ip-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;set ext-mgmt-ip-state pooled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset hard-reset-immediate&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset-kvm&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;reset-ipmi&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID              Serial (SN)      HW Revision&lt;br /&gt;
     ---------------- ---------------- -----------&lt;br /&gt;
     UCSB-B200-M3     FCH162871NA      0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V01&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     GUID:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
 &lt;br /&gt;
     Vmedia Mapping List:&lt;br /&gt;
         Full Name: sys/chassis-1/blade-1/mgmt/actual-mount-list&lt;br /&gt;
 &lt;br /&gt;
         Vmedia Mapping:&lt;br /&gt;
             Vdisk Id Mapping Name Device Type Mount Protocol Mount Status&lt;br /&gt;
             -------- ------------ ----------- -------------- ------------&lt;br /&gt;
             1                     Cdd         Unknown        Not Mounted&lt;br /&gt;
             2                     Hdd         Unknown        Not Mounted&lt;br /&gt;
 &lt;br /&gt;
     External Management Interface:&lt;br /&gt;
         Mode: In Band&lt;br /&gt;
         Ip V4 State: Pooled&lt;br /&gt;
         Ip V6 State: Pooled&lt;br /&gt;
 &lt;br /&gt;
         External Management Virtual LAN:&lt;br /&gt;
             Network Name: Management&lt;br /&gt;
             Id: 10&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IP:&lt;br /&gt;
                 Name       IP Address      Default Gateway Subnet          Primary DNS IP  Secondary DNS IP&lt;br /&gt;
                 ---------- --------------- --------------- --------------- --------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            172.16.10.169   172.16.10.1     255.255.255.0   172.16.10.1     172.16.10.2&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IPv6:&lt;br /&gt;
                 Name       IP Address Default Gateway Prefix Primary DNS IP Secondary DNS IP&lt;br /&gt;
                 ---------- ---------- --------------- ------ -------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            ::         ::              64     ::             ::&lt;br /&gt;
 &lt;br /&gt;
     Management Interface:&lt;br /&gt;
         Access Type: Unspecified&lt;br /&gt;
         IP Address: 0.0.0.0&lt;br /&gt;
         Netmask: 0.0.0.0&lt;br /&gt;
         Gateway: 0.0.0.0&lt;br /&gt;
         MAC Address: 30:F7:0D:BE:89:EA&lt;br /&gt;
         Fabric ID: A&lt;br /&gt;
         Peer Port:&lt;br /&gt;
         Peer Port Id: 1&lt;br /&gt;
         Peer Slot Id: 1&lt;br /&gt;
         Peer Chassis Id: 1&lt;br /&gt;
         Discovery: Absent&lt;br /&gt;
         &lt;br /&gt;
     Management Endpoint Log Control:&lt;br /&gt;
         Type   ID  Capacity&lt;br /&gt;
         ------ --- --------&lt;br /&gt;
         SEL    0   Available&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
(Some) Success!  The blade&#039;s CIMC is assigned an IPv4 address.  And it is pingable on the local network.  SSH is a no-go, though.  Maybe not a thing at all on B series blades?  And some further fiddling seems to be needed to get IPMI over LAN working.  Something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile* # &#039;&#039;&#039;create ipmi-user admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;set password&#039;&#039;&#039;&lt;br /&gt;
 Enter a password:&lt;br /&gt;
 Confirm the password:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;set privilege admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;set ipmi-over-lan enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;connect cimc 1/1&#039;&#039;&#039;&lt;br /&gt;
 Trying 127.5.1.1...&lt;br /&gt;
 Connected to 127.5.1.1.&lt;br /&gt;
 Escape character is &#039;^]&#039;.&lt;br /&gt;
 &lt;br /&gt;
 CIMC Debug Firmware Utility Shell [ support ]&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;help&#039;&#039;&#039;&lt;br /&gt;
 __________________________________________&lt;br /&gt;
           Debug Firmware Utility          &lt;br /&gt;
 __________________________________________&lt;br /&gt;
 Command List&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 alarms&lt;br /&gt;
 cores&lt;br /&gt;
 exit&lt;br /&gt;
 i2cstats&lt;br /&gt;
 images&lt;br /&gt;
 mctools&lt;br /&gt;
 memory&lt;br /&gt;
 messages&lt;br /&gt;
 mrcout&lt;br /&gt;
 network&lt;br /&gt;
 obfl&lt;br /&gt;
 post&lt;br /&gt;
 power&lt;br /&gt;
 programmables&lt;br /&gt;
 sensors&lt;br /&gt;
 sel&lt;br /&gt;
 fru&lt;br /&gt;
 tasks&lt;br /&gt;
 top&lt;br /&gt;
 update&lt;br /&gt;
 users&lt;br /&gt;
 version&lt;br /&gt;
 mezz1fru&lt;br /&gt;
 mezz2fru&lt;br /&gt;
 sldp&lt;br /&gt;
 help [COMMAND]&lt;br /&gt;
 __________________________________________&lt;br /&gt;
  Notes: &lt;br /&gt;
 &amp;quot;enter Key&amp;quot; will execute last command&lt;br /&gt;
 &amp;quot;COMMAND ?&amp;quot; will execute help for that command&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;users&#039;&#039;&#039;&lt;br /&gt;
 0. [ &amp;quot;admin&amp;quot; ] [ &amp;quot;&amp;quot; ] [ 2 ]&lt;br /&gt;
 1. [ Empty Entry ]&lt;br /&gt;
 2. [ Empty Entry ]&lt;br /&gt;
 3. [ Empty Entry ]&lt;br /&gt;
 4. [ Empty Entry ]&lt;br /&gt;
 5. [ Empty Entry ]&lt;br /&gt;
 6. [ Empty Entry ]&lt;br /&gt;
 7. [ Empty Entry ]&lt;br /&gt;
 8. [ Empty Entry ]&lt;br /&gt;
 9. [ Empty Entry ]&lt;br /&gt;
 10. [ Empty Entry ]&lt;br /&gt;
 11. [ Empty Entry ]&lt;br /&gt;
 12. [ Empty Entry ]&lt;br /&gt;
 13. [ Empty Entry ]&lt;br /&gt;
 14. [ Empty Entry ]&lt;br /&gt;
 15. [ Empty Entry ]&lt;br /&gt;
 [ users ]# &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 Connection closed by foreign host.&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
So that looks like we should have IPMI over LAN.  Let&#039;s poke at it a bit and see what happens:&lt;br /&gt;
 $ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=63 time=0.930 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=63 time=0.655 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=63 time=0.677 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=63 time=0.658 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=63 time=0.732 ms&lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4058ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.655/0.730/0.930/0.103 ms&lt;br /&gt;
 $ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error: Unable to establish IPMI v2 / RMCP+ session&lt;br /&gt;
 $&lt;br /&gt;
And that is a promising start with a disappointing finish.  Just for grins, let&#039;s try from a machine on the same subnet.  Maybe ICMP echo replies get routed but the IPMI over LAN traffic doesn&#039;t?&lt;br /&gt;
 router$ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=64 time=1.85 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=64 time=0.498 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=64 time=0.463 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=64 time=0.452 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=64 time=0.460 ms &lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4067ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.452/0.745/1.853/0.554 ms&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin mc info&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Device ID                 : 32&lt;br /&gt;
 Device Revision           : 0&lt;br /&gt;
 Firmware Revision         : 3.01&lt;br /&gt;
 IPMI Version              : 2.0&lt;br /&gt;
 Manufacturer ID           : 5771&lt;br /&gt;
 Manufacturer Name         : Cisco Systems, Inc.&lt;br /&gt;
 Product ID                : 9 (0x0009)&lt;br /&gt;
 Product Name              : Unknown (0x09)&lt;br /&gt;
 Device Available          : yes&lt;br /&gt;
 Provides Device SDRs      : yes&lt;br /&gt;
 Additional Device Support :&lt;br /&gt;
     Sensor Device&lt;br /&gt;
     SDR Repository Device&lt;br /&gt;
     SEL Device&lt;br /&gt;
     FRU Inventory Device&lt;br /&gt;
     IPMB Event Receiver&lt;br /&gt;
     IPMB Event Generator&lt;br /&gt;
 Aux Firmware Rev Info     : &lt;br /&gt;
     0x00&lt;br /&gt;
     0x00&lt;br /&gt;
     0x2a&lt;br /&gt;
     0x8b&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin lan print&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Set in Progress         : Set Complete&lt;br /&gt;
 Auth Type Support       : NONE MD2 MD5 PASSWORD &lt;br /&gt;
 Auth Type Enable        : Callback : &lt;br /&gt;
                         : User     : &lt;br /&gt;
                         : Operator : &lt;br /&gt;
                         : Admin    : &lt;br /&gt;
                         : OEM      : &lt;br /&gt;
 IP Address Source       : Static Address&lt;br /&gt;
 IP Address              : 0.0.0.0&lt;br /&gt;
 Subnet Mask             : 0.0.0.0&lt;br /&gt;
 MAC Address             : 30:f7:0d:be:89:ea&lt;br /&gt;
 SNMP Community String   : public&lt;br /&gt;
 IP Header               : TTL=0x40 Flags=0x00 Precedence=0x00 TOS=0x10&lt;br /&gt;
 BMC ARP Control         : ARP Responses Disabled, Gratuitous ARP Disabled&lt;br /&gt;
 Gratituous ARP Intrvl   : 2.0 seconds&lt;br /&gt;
 Default Gateway IP      : 0.0.0.0&lt;br /&gt;
 Default Gateway MAC     : 00:00:00:00:00:00&lt;br /&gt;
 Backup Gateway IP       : 0.0.0.0&lt;br /&gt;
 Backup Gateway MAC      : 00:00:00:00:00:00&lt;br /&gt;
 802.1q VLAN ID          : Disabled&lt;br /&gt;
 802.1q VLAN Priority    : 0&lt;br /&gt;
 RMCP+ Cipher Suites     : 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,128&lt;br /&gt;
 Cipher Suite Priv Max   : XXXaaaXXaaaXaaa&lt;br /&gt;
                         :     X=Cipher Suite Unused&lt;br /&gt;
                         :     c=CALLBACK&lt;br /&gt;
                         :     u=USER&lt;br /&gt;
                         :     o=OPERATOR&lt;br /&gt;
                         :     a=ADMIN&lt;br /&gt;
                         :     O=OEM&lt;br /&gt;
 Bad Password Threshold  : Not Available&lt;br /&gt;
 router$&lt;br /&gt;
Yay!  Very strange that it can be pinged from a different subnet, but &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; cannot talk to it that way.  Also very strange that it says it has no IP address assigned.  I am just guessing here, but perhaps the code in the FI is doing that for us and I have not found the documentation describing how it works.&lt;br /&gt;
&lt;br /&gt;
=== Serial console for blades? ===&lt;br /&gt;
I am fine with low bit rate serial stuff.  No need for a fancy bit mapped screen to manage my computers.  And it saves me having to run crazy Avocent Java applications in the process.  So let&#039;s see what happens when we try to connect from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
Disappointing.  But I think I might have seem something about serial over LAN in the service profiles somewhere.  Let&#039;s see if we can get it turned on:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show sol-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;set speed 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
&lt;br /&gt;
And trying again from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$ &lt;br /&gt;
&lt;br /&gt;
So still no.  Grrrr.  Maybe it needs to be powered on first?&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power is off&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power on&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power Control: Up/On&lt;br /&gt;
 router$ &#039;&#039;&#039;sleep 30&#039;&#039;&#039;&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
&lt;br /&gt;
More grrrr.  Manuals suggest I might need a BIOS policy that enables the serial port, too?&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set quiet-boot-config quiet-boot disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set serial-port-a-config serial-port-a enabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config baud-rate 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config console-redir serial-port-a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config flow-control none&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config legacy-os-redir disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config terminal-type vt100-plus&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So there is still no working serial console on the blade at this point.  https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/ucs-b-series-blade-servers/200105-Utilizing-SoL-logging-for-Serial-Redirec.html says to SSH to the CIMC IP address.  Just getting a TCP RST back (&amp;quot;connection refused&amp;quot;) when trying that.  And the IPMI over LAN serial just does not seem to be supported at all.  Maybe the blade needs a firmware update, too?&lt;br /&gt;
=== Applying firmware update to blades ===&lt;br /&gt;
So far (I think) I have only done firmware updates to the fabric interconnect and the blade chassis FEXes.  First up, let&#039;s see what is available for our B200 M3 blades:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show image | i b200-m3&#039;&#039;&#039;&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.0.4a.0.080920121557.bin&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.2.1a.0.111220131105.bin&lt;br /&gt;
 ucs-b200-m3-brdprog.11.0.bin                  Board Controller     11.0&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.0.4b.bin                CIMC                 2.0(4b)&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.2.1c.bin                CIMC                 2.2(1c)&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.10.1-0100_4.30.00_NA.bin&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.12.1-0160_4.37.00_NA.bin&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
Those might be kinda old?  Let&#039;s see what is installed on the B200 M3 that is in the chassis:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Adapter 1:&lt;br /&gt;
         Running-Vers: 4.1(3a)&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
     Adapter 2:&lt;br /&gt;
         Running-Vers: 4.1(3a)&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
     RAID Controller 1:&lt;br /&gt;
         Running-Vers: 20.13.1-0255&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
     BoardController:&lt;br /&gt;
         Running-Vers: 15.0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
From this, it would seem that the blade in the chassis is already running a newer firmware bundle than the one running on the fabric interconnect.  So, let&#039;s find out what we are running on the FI, and see about some more updates to it:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
It would seem that 3.0(2f) is the latest in the next-newer release train.  So acquire that from Cisco&#039;s download site and install on the FI and apply following the process documented above.  And there is a hiccup with the SSH in 2.5(2a) not being able to get a host key from the SSH servers running on Debian 12 or Debian 13.  Here&#039;s an example Debian server log of that:&lt;br /&gt;
 adj@zarathud:~$ &#039;&#039;&#039;sudo grep ssh.*172.16.10.176 /var/log/auth.log&#039;&#039;&#039;&lt;br /&gt;
 2026-04-02T17:24:54.156462+00:00 zarathud sshd[3090225]: Unable to negotiate with 172.16.10.176 port 33905: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:41:20.766493+00:00 zarathud sshd[3092657]: Unable to negotiate with 172.16.10.176 port 58959: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:50:44.154486+00:00 zarathud sshd[3094045]: Unable to negotiate with 172.16.10.176 port 45452: no matching host key type found. Their offer: x509v3-sign-rsa,x509v3-sign-dss,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss [preauth]&lt;br /&gt;
 2026-04-02T17:51:36.645000+00:00 zarathud sudo:      adj : TTY=pts/22 ; PWD=/home/adj ; USER=root ; COMMAND=/usr/bin/grep ssh.*172.16.10.176 /var/log/auth.log&lt;br /&gt;
 2026-04-02T17:53:33.561802+00:00 zarathud sudo:      adj : TTY=pts/22 ; PWD=/home/adj ; USER=root ; COMMAND=/usr/bin/grep ssh.*172.16.10.176 /var/log/auth.log&lt;br /&gt;
 adj@zarathud:~$&lt;br /&gt;
So, for expediency&#039;s sake, we will just do it over TFTP this time.  Maybe the SSH client in the 3.0(2f) release will be better able to talk to my SSH servers?&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1588</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1588"/>
		<updated>2026-04-02T17:21:09Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Serial console for blades? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the friendly FI management software is all lovely out of date (completely unrunnable in 2026!) Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;br /&gt;
&lt;br /&gt;
Now that we are on 2.2(8m), the SSH client is able to fetch the .bin file using scp.  Or maybe I just got the syntax correct this time.  So here we are:&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-infra.2.5.2a.A.bin&#039;&#039;&#039;&lt;br /&gt;
 Password:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  Download task:&lt;br /&gt;
      File Name Protocol Server          Userid          State&lt;br /&gt;
      --------- -------- --------------- --------------- -----&lt;br /&gt;
      ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
                Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
      ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
                Scp      172.17.0.18     adj             Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.5(2a)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.5(2a)A&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: Success&lt;br /&gt;
         Completion Time: 2009-01-01T01:59:13.146&lt;br /&gt;
         Progress (%): 100&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Success      2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
    FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 95&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 In Progress  1&lt;br /&gt;
         9      DeployActivateUCSM                       Pending      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Pending      0&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 96&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Success      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # Connection to 172.16.10.176 closed.&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And after some more time and one more disconnect, we see that another OpenSSH client compatibility option is required to connect:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa -o Ciphers=+aes256-cbc admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== But I&#039;m still trying to get the blades&#039; CIMCs connected! ==&lt;br /&gt;
The struggle is real!  But I did find https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/integrated-management-controller/118367-configure-cimc-00.pdf which is a GUI-specific outline of the process involved in getting UCS servers&#039; (blade and maybe also rackmount) CIMCs attached to the greater network environment.&lt;br /&gt;
=== In-band?  Out-of-band?  Huh? ===&lt;br /&gt;
First decision to be made here.  In UCS versions before 2.2, the servers&#039; CIMCs always had Ethernet connectivity through the Fabric Interconnects&#039; management port.  This connection amounts to a single point of failure for CIMC connectivity.&lt;br /&gt;
&lt;br /&gt;
In UCS version 2.2 and newer, there are two options for CIMC connectivity: In-band using the FIs&#039; high bandwidth network uplink ports, and out-of band using an FI&#039;s 1000baseT management port.  Naturally, being me, I will opt for the more complicated alternative.  And probably complain the whole way through.&lt;br /&gt;
&lt;br /&gt;
=== In-band CIMC connectivity setup ===&lt;br /&gt;
Log in to the FI.  Go to the organization (probably &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;.  And create an IP pool.  We are skipping the IPv6 stuff for now and the management VLAN is IPv4-only.&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show ip-pool&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     ext-mgmt                      0          0 Internal&lt;br /&gt;
     iscsi-initiator-pool          0          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ip-pool CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool* # &#039;&#039;&#039;create block 172.16.10.168 172.16.10.175 172.16.10.1 255.255.255.0&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;set primary-dns 172.16.10.1 secondary-dns 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From: 172.16.10.168&lt;br /&gt;
     To: 172.16.10.175&lt;br /&gt;
     Default Gateway: 172.16.10.1&lt;br /&gt;
     Subnet Mask: 255.255.255.0&lt;br /&gt;
     Primary DNS: 172.16.10.1&lt;br /&gt;
     Secondary DNS: 172.16.10.2&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From            To              Default Gateway Subnet Mask&lt;br /&gt;
     --------------- --------------- --------------- -----------&lt;br /&gt;
     172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     CIMC_inband_pool              8          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     IPv4 Size: 8&lt;br /&gt;
     IPv4 Assigned: 0&lt;br /&gt;
     IPv6 Size: 0&lt;br /&gt;
     IPv6 Assigned: 0&lt;br /&gt;
     Descr:&lt;br /&gt;
     Assignment Order: Default&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
     Guid: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Net bios enabled or disabled: Not Active&lt;br /&gt;
     DHCP enaled or disabled: Not Supported&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
 &lt;br /&gt;
     Block of IP Addresses:&lt;br /&gt;
         From            To              Default Gateway Subnet Mask&lt;br /&gt;
         --------------- --------------- --------------- -----------&lt;br /&gt;
         172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 &lt;br /&gt;
     Pooled:&lt;br /&gt;
         Id              Subnet          Assigned Assigned To&lt;br /&gt;
         --------------- --------------- -------- -----------&lt;br /&gt;
         172.16.10.168   255.255.255.0   No&lt;br /&gt;
         172.16.10.169   255.255.255.0   No&lt;br /&gt;
         172.16.10.170   255.255.255.0   No&lt;br /&gt;
         172.16.10.171   255.255.255.0   No&lt;br /&gt;
         172.16.10.172   255.255.255.0   No&lt;br /&gt;
         172.16.10.173   255.255.255.0   No&lt;br /&gt;
         172.16.10.174   255.255.255.0   No&lt;br /&gt;
         172.16.10.175   255.255.255.0   No&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool #&lt;br /&gt;
So we now have a pool of IPv4 addresses to hand out to CIMCs in our UCS domain.  And we can also LOL at Cisco&#039;s &amp;lt;code&amp;gt;DHCP &#039;&#039;&#039;enaled&#039;&#039;&#039; or disabled&amp;lt;/code&amp;gt; spelling error.  But not too loud.  It may well be fixed in newer versions.&lt;br /&gt;
&lt;br /&gt;
=== Create VLAN and VLAN group to connect the CIMC IP pool to ===&lt;br /&gt;
VLAN on the Ethernet uplinks:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan Management 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set native no&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set vlan-id 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
VLAN group now:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show vlan-group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan-group Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group* # &#039;&#039;&#039;create member-vlan Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
Add IP pool, VLAN, VLAN group to in-band profile:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope inband-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &#039;&#039;&#039;set default-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set default-vlan-name Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set net-group-name Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &lt;br /&gt;
Now that the in-band profile is set, update a blade&#039;s service profile to reference it:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ext-mgmt-ip-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;set ext-mgmt-ip-state pooled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset hard-reset-immediate&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset-kvm&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;reset-ipmi&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID              Serial (SN)      HW Revision&lt;br /&gt;
     ---------------- ---------------- -----------&lt;br /&gt;
     UCSB-B200-M3     FCH162871NA      0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V01&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     GUID:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
 &lt;br /&gt;
     Vmedia Mapping List:&lt;br /&gt;
         Full Name: sys/chassis-1/blade-1/mgmt/actual-mount-list&lt;br /&gt;
 &lt;br /&gt;
         Vmedia Mapping:&lt;br /&gt;
             Vdisk Id Mapping Name Device Type Mount Protocol Mount Status&lt;br /&gt;
             -------- ------------ ----------- -------------- ------------&lt;br /&gt;
             1                     Cdd         Unknown        Not Mounted&lt;br /&gt;
             2                     Hdd         Unknown        Not Mounted&lt;br /&gt;
 &lt;br /&gt;
     External Management Interface:&lt;br /&gt;
         Mode: In Band&lt;br /&gt;
         Ip V4 State: Pooled&lt;br /&gt;
         Ip V6 State: Pooled&lt;br /&gt;
 &lt;br /&gt;
         External Management Virtual LAN:&lt;br /&gt;
             Network Name: Management&lt;br /&gt;
             Id: 10&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IP:&lt;br /&gt;
                 Name       IP Address      Default Gateway Subnet          Primary DNS IP  Secondary DNS IP&lt;br /&gt;
                 ---------- --------------- --------------- --------------- --------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            172.16.10.169   172.16.10.1     255.255.255.0   172.16.10.1     172.16.10.2&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IPv6:&lt;br /&gt;
                 Name       IP Address Default Gateway Prefix Primary DNS IP Secondary DNS IP&lt;br /&gt;
                 ---------- ---------- --------------- ------ -------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            ::         ::              64     ::             ::&lt;br /&gt;
 &lt;br /&gt;
     Management Interface:&lt;br /&gt;
         Access Type: Unspecified&lt;br /&gt;
         IP Address: 0.0.0.0&lt;br /&gt;
         Netmask: 0.0.0.0&lt;br /&gt;
         Gateway: 0.0.0.0&lt;br /&gt;
         MAC Address: 30:F7:0D:BE:89:EA&lt;br /&gt;
         Fabric ID: A&lt;br /&gt;
         Peer Port:&lt;br /&gt;
         Peer Port Id: 1&lt;br /&gt;
         Peer Slot Id: 1&lt;br /&gt;
         Peer Chassis Id: 1&lt;br /&gt;
         Discovery: Absent&lt;br /&gt;
         &lt;br /&gt;
     Management Endpoint Log Control:&lt;br /&gt;
         Type   ID  Capacity&lt;br /&gt;
         ------ --- --------&lt;br /&gt;
         SEL    0   Available&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
(Some) Success!  The blade&#039;s CIMC is assigned an IPv4 address.  And it is pingable on the local network.  SSH is a no-go, though.  Maybe not a thing at all on B series blades?  And some further fiddling seems to be needed to get IPMI over LAN working.  Something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile* # &#039;&#039;&#039;create ipmi-user admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;set password&#039;&#039;&#039;&lt;br /&gt;
 Enter a password:&lt;br /&gt;
 Confirm the password:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;set privilege admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;set ipmi-over-lan enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;connect cimc 1/1&#039;&#039;&#039;&lt;br /&gt;
 Trying 127.5.1.1...&lt;br /&gt;
 Connected to 127.5.1.1.&lt;br /&gt;
 Escape character is &#039;^]&#039;.&lt;br /&gt;
 &lt;br /&gt;
 CIMC Debug Firmware Utility Shell [ support ]&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;help&#039;&#039;&#039;&lt;br /&gt;
 __________________________________________&lt;br /&gt;
           Debug Firmware Utility          &lt;br /&gt;
 __________________________________________&lt;br /&gt;
 Command List&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 alarms&lt;br /&gt;
 cores&lt;br /&gt;
 exit&lt;br /&gt;
 i2cstats&lt;br /&gt;
 images&lt;br /&gt;
 mctools&lt;br /&gt;
 memory&lt;br /&gt;
 messages&lt;br /&gt;
 mrcout&lt;br /&gt;
 network&lt;br /&gt;
 obfl&lt;br /&gt;
 post&lt;br /&gt;
 power&lt;br /&gt;
 programmables&lt;br /&gt;
 sensors&lt;br /&gt;
 sel&lt;br /&gt;
 fru&lt;br /&gt;
 tasks&lt;br /&gt;
 top&lt;br /&gt;
 update&lt;br /&gt;
 users&lt;br /&gt;
 version&lt;br /&gt;
 mezz1fru&lt;br /&gt;
 mezz2fru&lt;br /&gt;
 sldp&lt;br /&gt;
 help [COMMAND]&lt;br /&gt;
 __________________________________________&lt;br /&gt;
  Notes: &lt;br /&gt;
 &amp;quot;enter Key&amp;quot; will execute last command&lt;br /&gt;
 &amp;quot;COMMAND ?&amp;quot; will execute help for that command&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;users&#039;&#039;&#039;&lt;br /&gt;
 0. [ &amp;quot;admin&amp;quot; ] [ &amp;quot;&amp;quot; ] [ 2 ]&lt;br /&gt;
 1. [ Empty Entry ]&lt;br /&gt;
 2. [ Empty Entry ]&lt;br /&gt;
 3. [ Empty Entry ]&lt;br /&gt;
 4. [ Empty Entry ]&lt;br /&gt;
 5. [ Empty Entry ]&lt;br /&gt;
 6. [ Empty Entry ]&lt;br /&gt;
 7. [ Empty Entry ]&lt;br /&gt;
 8. [ Empty Entry ]&lt;br /&gt;
 9. [ Empty Entry ]&lt;br /&gt;
 10. [ Empty Entry ]&lt;br /&gt;
 11. [ Empty Entry ]&lt;br /&gt;
 12. [ Empty Entry ]&lt;br /&gt;
 13. [ Empty Entry ]&lt;br /&gt;
 14. [ Empty Entry ]&lt;br /&gt;
 15. [ Empty Entry ]&lt;br /&gt;
 [ users ]# &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 Connection closed by foreign host.&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
So that looks like we should have IPMI over LAN.  Let&#039;s poke at it a bit and see what happens:&lt;br /&gt;
 $ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=63 time=0.930 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=63 time=0.655 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=63 time=0.677 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=63 time=0.658 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=63 time=0.732 ms&lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4058ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.655/0.730/0.930/0.103 ms&lt;br /&gt;
 $ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error: Unable to establish IPMI v2 / RMCP+ session&lt;br /&gt;
 $&lt;br /&gt;
And that is a promising start with a disappointing finish.  Just for grins, let&#039;s try from a machine on the same subnet.  Maybe ICMP echo replies get routed but the IPMI over LAN traffic doesn&#039;t?&lt;br /&gt;
 router$ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=64 time=1.85 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=64 time=0.498 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=64 time=0.463 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=64 time=0.452 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=64 time=0.460 ms &lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4067ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.452/0.745/1.853/0.554 ms&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin mc info&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Device ID                 : 32&lt;br /&gt;
 Device Revision           : 0&lt;br /&gt;
 Firmware Revision         : 3.01&lt;br /&gt;
 IPMI Version              : 2.0&lt;br /&gt;
 Manufacturer ID           : 5771&lt;br /&gt;
 Manufacturer Name         : Cisco Systems, Inc.&lt;br /&gt;
 Product ID                : 9 (0x0009)&lt;br /&gt;
 Product Name              : Unknown (0x09)&lt;br /&gt;
 Device Available          : yes&lt;br /&gt;
 Provides Device SDRs      : yes&lt;br /&gt;
 Additional Device Support :&lt;br /&gt;
     Sensor Device&lt;br /&gt;
     SDR Repository Device&lt;br /&gt;
     SEL Device&lt;br /&gt;
     FRU Inventory Device&lt;br /&gt;
     IPMB Event Receiver&lt;br /&gt;
     IPMB Event Generator&lt;br /&gt;
 Aux Firmware Rev Info     : &lt;br /&gt;
     0x00&lt;br /&gt;
     0x00&lt;br /&gt;
     0x2a&lt;br /&gt;
     0x8b&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin lan print&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Set in Progress         : Set Complete&lt;br /&gt;
 Auth Type Support       : NONE MD2 MD5 PASSWORD &lt;br /&gt;
 Auth Type Enable        : Callback : &lt;br /&gt;
                         : User     : &lt;br /&gt;
                         : Operator : &lt;br /&gt;
                         : Admin    : &lt;br /&gt;
                         : OEM      : &lt;br /&gt;
 IP Address Source       : Static Address&lt;br /&gt;
 IP Address              : 0.0.0.0&lt;br /&gt;
 Subnet Mask             : 0.0.0.0&lt;br /&gt;
 MAC Address             : 30:f7:0d:be:89:ea&lt;br /&gt;
 SNMP Community String   : public&lt;br /&gt;
 IP Header               : TTL=0x40 Flags=0x00 Precedence=0x00 TOS=0x10&lt;br /&gt;
 BMC ARP Control         : ARP Responses Disabled, Gratuitous ARP Disabled&lt;br /&gt;
 Gratituous ARP Intrvl   : 2.0 seconds&lt;br /&gt;
 Default Gateway IP      : 0.0.0.0&lt;br /&gt;
 Default Gateway MAC     : 00:00:00:00:00:00&lt;br /&gt;
 Backup Gateway IP       : 0.0.0.0&lt;br /&gt;
 Backup Gateway MAC      : 00:00:00:00:00:00&lt;br /&gt;
 802.1q VLAN ID          : Disabled&lt;br /&gt;
 802.1q VLAN Priority    : 0&lt;br /&gt;
 RMCP+ Cipher Suites     : 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,128&lt;br /&gt;
 Cipher Suite Priv Max   : XXXaaaXXaaaXaaa&lt;br /&gt;
                         :     X=Cipher Suite Unused&lt;br /&gt;
                         :     c=CALLBACK&lt;br /&gt;
                         :     u=USER&lt;br /&gt;
                         :     o=OPERATOR&lt;br /&gt;
                         :     a=ADMIN&lt;br /&gt;
                         :     O=OEM&lt;br /&gt;
 Bad Password Threshold  : Not Available&lt;br /&gt;
 router$&lt;br /&gt;
Yay!  Very strange that it can be pinged from a different subnet, but &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; cannot talk to it that way.  Also very strange that it says it has no IP address assigned.  I am just guessing here, but perhaps the code in the FI is doing that for us and I have not found the documentation describing how it works.&lt;br /&gt;
&lt;br /&gt;
=== Serial console for blades? ===&lt;br /&gt;
I am fine with low bit rate serial stuff.  No need for a fancy bit mapped screen to manage my computers.  And it saves me having to run crazy Avocent Java applications in the process.  So let&#039;s see what happens when we try to connect from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
Disappointing.  But I think I might have seem something about serial over LAN in the service profiles somewhere.  Let&#039;s see if we can get it turned on:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show sol-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;set speed 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
&lt;br /&gt;
And trying again from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$ &lt;br /&gt;
&lt;br /&gt;
So still no.  Grrrr.  Maybe it needs to be powered on first?&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power is off&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power on&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power Control: Up/On&lt;br /&gt;
 router$ &#039;&#039;&#039;sleep 30&#039;&#039;&#039;&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
&lt;br /&gt;
More grrrr.  Manuals suggest I might need a BIOS policy that enables the serial port, too?&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set quiet-boot-config quiet-boot disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set serial-port-a-config serial-port-a enabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config baud-rate 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config console-redir serial-port-a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config flow-control none&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config legacy-os-redir disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config terminal-type vt100-plus&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So there is still no working serial console on the blade at this point.  https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/ucs-b-series-blade-servers/200105-Utilizing-SoL-logging-for-Serial-Redirec.html says to SSH to the CIMC IP address.  Just getting a TCP RST back (&amp;quot;connection refused&amp;quot;) when trying that.  And the IPMI over LAN serial just does not seem to be supported at all.  Maybe the blade needs a firmware update, too?&lt;br /&gt;
=== Applying firmware update to blades ===&lt;br /&gt;
So far (I think) I have only done firmware updates to the fabric interconnect and the blade chassis FEXes.  First up, let&#039;s see what is available for our B200 M3 blades:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show image | i b200-m3&#039;&#039;&#039;&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.0.4a.0.080920121557.bin&lt;br /&gt;
 ucs-b200-m3-bios.B200M3.2.2.1a.0.111220131105.bin&lt;br /&gt;
 ucs-b200-m3-brdprog.11.0.bin                  Board Controller     11.0&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.0.4b.bin                CIMC                 2.0(4b)&lt;br /&gt;
 ucs-b200-m3-k9-cimc.2.2.1c.bin                CIMC                 2.2(1c)&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.10.1-0100_4.30.00_NA.bin&lt;br /&gt;
 ucs-b200-m3-mrsasctlr.20.12.1-0160_4.37.00_NA.bin&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
Those might be kinda old?  Let&#039;s see what is installed on the B200 M3 that is in the chassis:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Adapter 1:&lt;br /&gt;
         Running-Vers: 4.1(3a)&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
     Adapter 2:&lt;br /&gt;
         Running-Vers: 4.1(3a)&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
     RAID Controller 1:&lt;br /&gt;
         Running-Vers: 20.13.1-0255&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
     BoardController:&lt;br /&gt;
         Running-Vers: 15.0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
From this, it would seem that the blade in the chassis is already running a newer firmware bundle than the one running on the fabric interconnect.  So, let&#039;s find out what we are running on the FI, and see about some more updates to it:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
It would seem that 3.0(2f) is the latest in the next-newer release train.  So acquire that from Cisco&#039;s download site and install on the FI and apply following the process documented above.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1587</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1587"/>
		<updated>2026-03-31T22:04:43Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Serial console for blades? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the friendly FI management software is all lovely out of date (completely unrunnable in 2026!) Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;br /&gt;
&lt;br /&gt;
Now that we are on 2.2(8m), the SSH client is able to fetch the .bin file using scp.  Or maybe I just got the syntax correct this time.  So here we are:&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-infra.2.5.2a.A.bin&#039;&#039;&#039;&lt;br /&gt;
 Password:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  Download task:&lt;br /&gt;
      File Name Protocol Server          Userid          State&lt;br /&gt;
      --------- -------- --------------- --------------- -----&lt;br /&gt;
      ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
                Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
      ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
                Scp      172.17.0.18     adj             Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.5(2a)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.5(2a)A&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: Success&lt;br /&gt;
         Completion Time: 2009-01-01T01:59:13.146&lt;br /&gt;
         Progress (%): 100&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Success      2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
    FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 95&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 In Progress  1&lt;br /&gt;
         9      DeployActivateUCSM                       Pending      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Pending      0&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 96&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Success      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # Connection to 172.16.10.176 closed.&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And after some more time and one more disconnect, we see that another OpenSSH client compatibility option is required to connect:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa -o Ciphers=+aes256-cbc admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== But I&#039;m still trying to get the blades&#039; CIMCs connected! ==&lt;br /&gt;
The struggle is real!  But I did find https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/integrated-management-controller/118367-configure-cimc-00.pdf which is a GUI-specific outline of the process involved in getting UCS servers&#039; (blade and maybe also rackmount) CIMCs attached to the greater network environment.&lt;br /&gt;
=== In-band?  Out-of-band?  Huh? ===&lt;br /&gt;
First decision to be made here.  In UCS versions before 2.2, the servers&#039; CIMCs always had Ethernet connectivity through the Fabric Interconnects&#039; management port.  This connection amounts to a single point of failure for CIMC connectivity.&lt;br /&gt;
&lt;br /&gt;
In UCS version 2.2 and newer, there are two options for CIMC connectivity: In-band using the FIs&#039; high bandwidth network uplink ports, and out-of band using an FI&#039;s 1000baseT management port.  Naturally, being me, I will opt for the more complicated alternative.  And probably complain the whole way through.&lt;br /&gt;
&lt;br /&gt;
=== In-band CIMC connectivity setup ===&lt;br /&gt;
Log in to the FI.  Go to the organization (probably &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;.  And create an IP pool.  We are skipping the IPv6 stuff for now and the management VLAN is IPv4-only.&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show ip-pool&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     ext-mgmt                      0          0 Internal&lt;br /&gt;
     iscsi-initiator-pool          0          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ip-pool CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool* # &#039;&#039;&#039;create block 172.16.10.168 172.16.10.175 172.16.10.1 255.255.255.0&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;set primary-dns 172.16.10.1 secondary-dns 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From: 172.16.10.168&lt;br /&gt;
     To: 172.16.10.175&lt;br /&gt;
     Default Gateway: 172.16.10.1&lt;br /&gt;
     Subnet Mask: 255.255.255.0&lt;br /&gt;
     Primary DNS: 172.16.10.1&lt;br /&gt;
     Secondary DNS: 172.16.10.2&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From            To              Default Gateway Subnet Mask&lt;br /&gt;
     --------------- --------------- --------------- -----------&lt;br /&gt;
     172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     CIMC_inband_pool              8          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     IPv4 Size: 8&lt;br /&gt;
     IPv4 Assigned: 0&lt;br /&gt;
     IPv6 Size: 0&lt;br /&gt;
     IPv6 Assigned: 0&lt;br /&gt;
     Descr:&lt;br /&gt;
     Assignment Order: Default&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
     Guid: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Net bios enabled or disabled: Not Active&lt;br /&gt;
     DHCP enaled or disabled: Not Supported&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
 &lt;br /&gt;
     Block of IP Addresses:&lt;br /&gt;
         From            To              Default Gateway Subnet Mask&lt;br /&gt;
         --------------- --------------- --------------- -----------&lt;br /&gt;
         172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 &lt;br /&gt;
     Pooled:&lt;br /&gt;
         Id              Subnet          Assigned Assigned To&lt;br /&gt;
         --------------- --------------- -------- -----------&lt;br /&gt;
         172.16.10.168   255.255.255.0   No&lt;br /&gt;
         172.16.10.169   255.255.255.0   No&lt;br /&gt;
         172.16.10.170   255.255.255.0   No&lt;br /&gt;
         172.16.10.171   255.255.255.0   No&lt;br /&gt;
         172.16.10.172   255.255.255.0   No&lt;br /&gt;
         172.16.10.173   255.255.255.0   No&lt;br /&gt;
         172.16.10.174   255.255.255.0   No&lt;br /&gt;
         172.16.10.175   255.255.255.0   No&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool #&lt;br /&gt;
So we now have a pool of IPv4 addresses to hand out to CIMCs in our UCS domain.  And we can also LOL at Cisco&#039;s &amp;lt;code&amp;gt;DHCP &#039;&#039;&#039;enaled&#039;&#039;&#039; or disabled&amp;lt;/code&amp;gt; spelling error.  But not too loud.  It may well be fixed in newer versions.&lt;br /&gt;
&lt;br /&gt;
=== Create VLAN and VLAN group to connect the CIMC IP pool to ===&lt;br /&gt;
VLAN on the Ethernet uplinks:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan Management 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set native no&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set vlan-id 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
VLAN group now:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show vlan-group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan-group Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group* # &#039;&#039;&#039;create member-vlan Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
Add IP pool, VLAN, VLAN group to in-band profile:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope inband-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &#039;&#039;&#039;set default-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set default-vlan-name Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set net-group-name Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &lt;br /&gt;
Now that the in-band profile is set, update a blade&#039;s service profile to reference it:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ext-mgmt-ip-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;set ext-mgmt-ip-state pooled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset hard-reset-immediate&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset-kvm&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;reset-ipmi&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID              Serial (SN)      HW Revision&lt;br /&gt;
     ---------------- ---------------- -----------&lt;br /&gt;
     UCSB-B200-M3     FCH162871NA      0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V01&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     GUID:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
 &lt;br /&gt;
     Vmedia Mapping List:&lt;br /&gt;
         Full Name: sys/chassis-1/blade-1/mgmt/actual-mount-list&lt;br /&gt;
 &lt;br /&gt;
         Vmedia Mapping:&lt;br /&gt;
             Vdisk Id Mapping Name Device Type Mount Protocol Mount Status&lt;br /&gt;
             -------- ------------ ----------- -------------- ------------&lt;br /&gt;
             1                     Cdd         Unknown        Not Mounted&lt;br /&gt;
             2                     Hdd         Unknown        Not Mounted&lt;br /&gt;
 &lt;br /&gt;
     External Management Interface:&lt;br /&gt;
         Mode: In Band&lt;br /&gt;
         Ip V4 State: Pooled&lt;br /&gt;
         Ip V6 State: Pooled&lt;br /&gt;
 &lt;br /&gt;
         External Management Virtual LAN:&lt;br /&gt;
             Network Name: Management&lt;br /&gt;
             Id: 10&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IP:&lt;br /&gt;
                 Name       IP Address      Default Gateway Subnet          Primary DNS IP  Secondary DNS IP&lt;br /&gt;
                 ---------- --------------- --------------- --------------- --------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            172.16.10.169   172.16.10.1     255.255.255.0   172.16.10.1     172.16.10.2&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IPv6:&lt;br /&gt;
                 Name       IP Address Default Gateway Prefix Primary DNS IP Secondary DNS IP&lt;br /&gt;
                 ---------- ---------- --------------- ------ -------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            ::         ::              64     ::             ::&lt;br /&gt;
 &lt;br /&gt;
     Management Interface:&lt;br /&gt;
         Access Type: Unspecified&lt;br /&gt;
         IP Address: 0.0.0.0&lt;br /&gt;
         Netmask: 0.0.0.0&lt;br /&gt;
         Gateway: 0.0.0.0&lt;br /&gt;
         MAC Address: 30:F7:0D:BE:89:EA&lt;br /&gt;
         Fabric ID: A&lt;br /&gt;
         Peer Port:&lt;br /&gt;
         Peer Port Id: 1&lt;br /&gt;
         Peer Slot Id: 1&lt;br /&gt;
         Peer Chassis Id: 1&lt;br /&gt;
         Discovery: Absent&lt;br /&gt;
         &lt;br /&gt;
     Management Endpoint Log Control:&lt;br /&gt;
         Type   ID  Capacity&lt;br /&gt;
         ------ --- --------&lt;br /&gt;
         SEL    0   Available&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
(Some) Success!  The blade&#039;s CIMC is assigned an IPv4 address.  And it is pingable on the local network.  SSH is a no-go, though.  Maybe not a thing at all on B series blades?  And some further fiddling seems to be needed to get IPMI over LAN working.  Something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile* # &#039;&#039;&#039;create ipmi-user admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;set password&#039;&#039;&#039;&lt;br /&gt;
 Enter a password:&lt;br /&gt;
 Confirm the password:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;set privilege admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;set ipmi-over-lan enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;connect cimc 1/1&#039;&#039;&#039;&lt;br /&gt;
 Trying 127.5.1.1...&lt;br /&gt;
 Connected to 127.5.1.1.&lt;br /&gt;
 Escape character is &#039;^]&#039;.&lt;br /&gt;
 &lt;br /&gt;
 CIMC Debug Firmware Utility Shell [ support ]&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;help&#039;&#039;&#039;&lt;br /&gt;
 __________________________________________&lt;br /&gt;
           Debug Firmware Utility          &lt;br /&gt;
 __________________________________________&lt;br /&gt;
 Command List&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 alarms&lt;br /&gt;
 cores&lt;br /&gt;
 exit&lt;br /&gt;
 i2cstats&lt;br /&gt;
 images&lt;br /&gt;
 mctools&lt;br /&gt;
 memory&lt;br /&gt;
 messages&lt;br /&gt;
 mrcout&lt;br /&gt;
 network&lt;br /&gt;
 obfl&lt;br /&gt;
 post&lt;br /&gt;
 power&lt;br /&gt;
 programmables&lt;br /&gt;
 sensors&lt;br /&gt;
 sel&lt;br /&gt;
 fru&lt;br /&gt;
 tasks&lt;br /&gt;
 top&lt;br /&gt;
 update&lt;br /&gt;
 users&lt;br /&gt;
 version&lt;br /&gt;
 mezz1fru&lt;br /&gt;
 mezz2fru&lt;br /&gt;
 sldp&lt;br /&gt;
 help [COMMAND]&lt;br /&gt;
 __________________________________________&lt;br /&gt;
  Notes: &lt;br /&gt;
 &amp;quot;enter Key&amp;quot; will execute last command&lt;br /&gt;
 &amp;quot;COMMAND ?&amp;quot; will execute help for that command&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;users&#039;&#039;&#039;&lt;br /&gt;
 0. [ &amp;quot;admin&amp;quot; ] [ &amp;quot;&amp;quot; ] [ 2 ]&lt;br /&gt;
 1. [ Empty Entry ]&lt;br /&gt;
 2. [ Empty Entry ]&lt;br /&gt;
 3. [ Empty Entry ]&lt;br /&gt;
 4. [ Empty Entry ]&lt;br /&gt;
 5. [ Empty Entry ]&lt;br /&gt;
 6. [ Empty Entry ]&lt;br /&gt;
 7. [ Empty Entry ]&lt;br /&gt;
 8. [ Empty Entry ]&lt;br /&gt;
 9. [ Empty Entry ]&lt;br /&gt;
 10. [ Empty Entry ]&lt;br /&gt;
 11. [ Empty Entry ]&lt;br /&gt;
 12. [ Empty Entry ]&lt;br /&gt;
 13. [ Empty Entry ]&lt;br /&gt;
 14. [ Empty Entry ]&lt;br /&gt;
 15. [ Empty Entry ]&lt;br /&gt;
 [ users ]# &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 Connection closed by foreign host.&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
So that looks like we should have IPMI over LAN.  Let&#039;s poke at it a bit and see what happens:&lt;br /&gt;
 $ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=63 time=0.930 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=63 time=0.655 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=63 time=0.677 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=63 time=0.658 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=63 time=0.732 ms&lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4058ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.655/0.730/0.930/0.103 ms&lt;br /&gt;
 $ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error: Unable to establish IPMI v2 / RMCP+ session&lt;br /&gt;
 $&lt;br /&gt;
And that is a promising start with a disappointing finish.  Just for grins, let&#039;s try from a machine on the same subnet.  Maybe ICMP echo replies get routed but the IPMI over LAN traffic doesn&#039;t?&lt;br /&gt;
 router$ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=64 time=1.85 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=64 time=0.498 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=64 time=0.463 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=64 time=0.452 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=64 time=0.460 ms &lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4067ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.452/0.745/1.853/0.554 ms&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin mc info&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Device ID                 : 32&lt;br /&gt;
 Device Revision           : 0&lt;br /&gt;
 Firmware Revision         : 3.01&lt;br /&gt;
 IPMI Version              : 2.0&lt;br /&gt;
 Manufacturer ID           : 5771&lt;br /&gt;
 Manufacturer Name         : Cisco Systems, Inc.&lt;br /&gt;
 Product ID                : 9 (0x0009)&lt;br /&gt;
 Product Name              : Unknown (0x09)&lt;br /&gt;
 Device Available          : yes&lt;br /&gt;
 Provides Device SDRs      : yes&lt;br /&gt;
 Additional Device Support :&lt;br /&gt;
     Sensor Device&lt;br /&gt;
     SDR Repository Device&lt;br /&gt;
     SEL Device&lt;br /&gt;
     FRU Inventory Device&lt;br /&gt;
     IPMB Event Receiver&lt;br /&gt;
     IPMB Event Generator&lt;br /&gt;
 Aux Firmware Rev Info     : &lt;br /&gt;
     0x00&lt;br /&gt;
     0x00&lt;br /&gt;
     0x2a&lt;br /&gt;
     0x8b&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin lan print&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Set in Progress         : Set Complete&lt;br /&gt;
 Auth Type Support       : NONE MD2 MD5 PASSWORD &lt;br /&gt;
 Auth Type Enable        : Callback : &lt;br /&gt;
                         : User     : &lt;br /&gt;
                         : Operator : &lt;br /&gt;
                         : Admin    : &lt;br /&gt;
                         : OEM      : &lt;br /&gt;
 IP Address Source       : Static Address&lt;br /&gt;
 IP Address              : 0.0.0.0&lt;br /&gt;
 Subnet Mask             : 0.0.0.0&lt;br /&gt;
 MAC Address             : 30:f7:0d:be:89:ea&lt;br /&gt;
 SNMP Community String   : public&lt;br /&gt;
 IP Header               : TTL=0x40 Flags=0x00 Precedence=0x00 TOS=0x10&lt;br /&gt;
 BMC ARP Control         : ARP Responses Disabled, Gratuitous ARP Disabled&lt;br /&gt;
 Gratituous ARP Intrvl   : 2.0 seconds&lt;br /&gt;
 Default Gateway IP      : 0.0.0.0&lt;br /&gt;
 Default Gateway MAC     : 00:00:00:00:00:00&lt;br /&gt;
 Backup Gateway IP       : 0.0.0.0&lt;br /&gt;
 Backup Gateway MAC      : 00:00:00:00:00:00&lt;br /&gt;
 802.1q VLAN ID          : Disabled&lt;br /&gt;
 802.1q VLAN Priority    : 0&lt;br /&gt;
 RMCP+ Cipher Suites     : 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,128&lt;br /&gt;
 Cipher Suite Priv Max   : XXXaaaXXaaaXaaa&lt;br /&gt;
                         :     X=Cipher Suite Unused&lt;br /&gt;
                         :     c=CALLBACK&lt;br /&gt;
                         :     u=USER&lt;br /&gt;
                         :     o=OPERATOR&lt;br /&gt;
                         :     a=ADMIN&lt;br /&gt;
                         :     O=OEM&lt;br /&gt;
 Bad Password Threshold  : Not Available&lt;br /&gt;
 router$&lt;br /&gt;
Yay!  Very strange that it can be pinged from a different subnet, but &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; cannot talk to it that way.  Also very strange that it says it has no IP address assigned.  I am just guessing here, but perhaps the code in the FI is doing that for us and I have not found the documentation describing how it works.&lt;br /&gt;
&lt;br /&gt;
=== Serial console for blades? ===&lt;br /&gt;
I am fine with low bit rate serial stuff.  No need for a fancy bit mapped screen to manage my computers.  And it saves me having to run crazy Avocent Java applications in the process.  So let&#039;s see what happens when we try to connect from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
Disappointing.  But I think I might have seem something about serial over LAN in the service profiles somewhere.  Let&#039;s see if we can get it turned on:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show sol-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;set speed 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
&lt;br /&gt;
And trying again from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$ &lt;br /&gt;
&lt;br /&gt;
So still no.  Grrrr.  Maybe it needs to be powered on first?&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power is off&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis power on&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Chassis Power Control: Up/On&lt;br /&gt;
 router$ &#039;&#039;&#039;sleep 30&#039;&#039;&#039;&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
&lt;br /&gt;
More grrrr.  Manuals suggest I might need a BIOS policy that enables the serial port, too?&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set quiet-boot-config quiet-boot disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set serial-port-a-config serial-port-a enabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config baud-rate 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config console-redir serial-port-a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config flow-control none&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config legacy-os-redir disabled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;set console-redir-config terminal-type vt100-plus&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/bios-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set bios-policy serial_is_good&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1586</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1586"/>
		<updated>2026-03-31T18:19:56Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Create VLAN and VLAN group to connect the CIMC IP pool to */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the friendly FI management software is all lovely out of date (completely unrunnable in 2026!) Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;br /&gt;
&lt;br /&gt;
Now that we are on 2.2(8m), the SSH client is able to fetch the .bin file using scp.  Or maybe I just got the syntax correct this time.  So here we are:&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-infra.2.5.2a.A.bin&#039;&#039;&#039;&lt;br /&gt;
 Password:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  Download task:&lt;br /&gt;
      File Name Protocol Server          Userid          State&lt;br /&gt;
      --------- -------- --------------- --------------- -----&lt;br /&gt;
      ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
                Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
      ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
                Scp      172.17.0.18     adj             Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.5(2a)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.5(2a)A&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: Success&lt;br /&gt;
         Completion Time: 2009-01-01T01:59:13.146&lt;br /&gt;
         Progress (%): 100&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Success      2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
    FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 95&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 In Progress  1&lt;br /&gt;
         9      DeployActivateUCSM                       Pending      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Pending      0&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 96&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Success      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # Connection to 172.16.10.176 closed.&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And after some more time and one more disconnect, we see that another OpenSSH client compatibility option is required to connect:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa -o Ciphers=+aes256-cbc admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== But I&#039;m still trying to get the blades&#039; CIMCs connected! ==&lt;br /&gt;
The struggle is real!  But I did find https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/integrated-management-controller/118367-configure-cimc-00.pdf which is a GUI-specific outline of the process involved in getting UCS servers&#039; (blade and maybe also rackmount) CIMCs attached to the greater network environment.&lt;br /&gt;
=== In-band?  Out-of-band?  Huh? ===&lt;br /&gt;
First decision to be made here.  In UCS versions before 2.2, the servers&#039; CIMCs always had Ethernet connectivity through the Fabric Interconnects&#039; management port.  This connection amounts to a single point of failure for CIMC connectivity.&lt;br /&gt;
&lt;br /&gt;
In UCS version 2.2 and newer, there are two options for CIMC connectivity: In-band using the FIs&#039; high bandwidth network uplink ports, and out-of band using an FI&#039;s 1000baseT management port.  Naturally, being me, I will opt for the more complicated alternative.  And probably complain the whole way through.&lt;br /&gt;
&lt;br /&gt;
=== In-band CIMC connectivity setup ===&lt;br /&gt;
Log in to the FI.  Go to the organization (probably &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;.  And create an IP pool.  We are skipping the IPv6 stuff for now and the management VLAN is IPv4-only.&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show ip-pool&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     ext-mgmt                      0          0 Internal&lt;br /&gt;
     iscsi-initiator-pool          0          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ip-pool CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool* # &#039;&#039;&#039;create block 172.16.10.168 172.16.10.175 172.16.10.1 255.255.255.0&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;set primary-dns 172.16.10.1 secondary-dns 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From: 172.16.10.168&lt;br /&gt;
     To: 172.16.10.175&lt;br /&gt;
     Default Gateway: 172.16.10.1&lt;br /&gt;
     Subnet Mask: 255.255.255.0&lt;br /&gt;
     Primary DNS: 172.16.10.1&lt;br /&gt;
     Secondary DNS: 172.16.10.2&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From            To              Default Gateway Subnet Mask&lt;br /&gt;
     --------------- --------------- --------------- -----------&lt;br /&gt;
     172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     CIMC_inband_pool              8          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     IPv4 Size: 8&lt;br /&gt;
     IPv4 Assigned: 0&lt;br /&gt;
     IPv6 Size: 0&lt;br /&gt;
     IPv6 Assigned: 0&lt;br /&gt;
     Descr:&lt;br /&gt;
     Assignment Order: Default&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
     Guid: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Net bios enabled or disabled: Not Active&lt;br /&gt;
     DHCP enaled or disabled: Not Supported&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
 &lt;br /&gt;
     Block of IP Addresses:&lt;br /&gt;
         From            To              Default Gateway Subnet Mask&lt;br /&gt;
         --------------- --------------- --------------- -----------&lt;br /&gt;
         172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 &lt;br /&gt;
     Pooled:&lt;br /&gt;
         Id              Subnet          Assigned Assigned To&lt;br /&gt;
         --------------- --------------- -------- -----------&lt;br /&gt;
         172.16.10.168   255.255.255.0   No&lt;br /&gt;
         172.16.10.169   255.255.255.0   No&lt;br /&gt;
         172.16.10.170   255.255.255.0   No&lt;br /&gt;
         172.16.10.171   255.255.255.0   No&lt;br /&gt;
         172.16.10.172   255.255.255.0   No&lt;br /&gt;
         172.16.10.173   255.255.255.0   No&lt;br /&gt;
         172.16.10.174   255.255.255.0   No&lt;br /&gt;
         172.16.10.175   255.255.255.0   No&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool #&lt;br /&gt;
So we now have a pool of IPv4 addresses to hand out to CIMCs in our UCS domain.  And we can also LOL at Cisco&#039;s &amp;lt;code&amp;gt;DHCP &#039;&#039;&#039;enaled&#039;&#039;&#039; or disabled&amp;lt;/code&amp;gt; spelling error.  But not too loud.  It may well be fixed in newer versions.&lt;br /&gt;
&lt;br /&gt;
=== Create VLAN and VLAN group to connect the CIMC IP pool to ===&lt;br /&gt;
VLAN on the Ethernet uplinks:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan Management 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set native no&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set vlan-id 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
VLAN group now:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show vlan-group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan-group Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group* # &#039;&#039;&#039;create member-vlan Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
Add IP pool, VLAN, VLAN group to in-band profile:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope inband-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &#039;&#039;&#039;set default-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set default-vlan-name Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set net-group-name Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &lt;br /&gt;
Now that the in-band profile is set, update a blade&#039;s service profile to reference it:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ext-mgmt-ip-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;set ext-mgmt-ip-state pooled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset hard-reset-immediate&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset-kvm&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;reset-ipmi&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID              Serial (SN)      HW Revision&lt;br /&gt;
     ---------------- ---------------- -----------&lt;br /&gt;
     UCSB-B200-M3     FCH162871NA      0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V01&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     GUID:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
 &lt;br /&gt;
     Vmedia Mapping List:&lt;br /&gt;
         Full Name: sys/chassis-1/blade-1/mgmt/actual-mount-list&lt;br /&gt;
 &lt;br /&gt;
         Vmedia Mapping:&lt;br /&gt;
             Vdisk Id Mapping Name Device Type Mount Protocol Mount Status&lt;br /&gt;
             -------- ------------ ----------- -------------- ------------&lt;br /&gt;
             1                     Cdd         Unknown        Not Mounted&lt;br /&gt;
             2                     Hdd         Unknown        Not Mounted&lt;br /&gt;
 &lt;br /&gt;
     External Management Interface:&lt;br /&gt;
         Mode: In Band&lt;br /&gt;
         Ip V4 State: Pooled&lt;br /&gt;
         Ip V6 State: Pooled&lt;br /&gt;
 &lt;br /&gt;
         External Management Virtual LAN:&lt;br /&gt;
             Network Name: Management&lt;br /&gt;
             Id: 10&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IP:&lt;br /&gt;
                 Name       IP Address      Default Gateway Subnet          Primary DNS IP  Secondary DNS IP&lt;br /&gt;
                 ---------- --------------- --------------- --------------- --------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            172.16.10.169   172.16.10.1     255.255.255.0   172.16.10.1     172.16.10.2&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IPv6:&lt;br /&gt;
                 Name       IP Address Default Gateway Prefix Primary DNS IP Secondary DNS IP&lt;br /&gt;
                 ---------- ---------- --------------- ------ -------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            ::         ::              64     ::             ::&lt;br /&gt;
 &lt;br /&gt;
     Management Interface:&lt;br /&gt;
         Access Type: Unspecified&lt;br /&gt;
         IP Address: 0.0.0.0&lt;br /&gt;
         Netmask: 0.0.0.0&lt;br /&gt;
         Gateway: 0.0.0.0&lt;br /&gt;
         MAC Address: 30:F7:0D:BE:89:EA&lt;br /&gt;
         Fabric ID: A&lt;br /&gt;
         Peer Port:&lt;br /&gt;
         Peer Port Id: 1&lt;br /&gt;
         Peer Slot Id: 1&lt;br /&gt;
         Peer Chassis Id: 1&lt;br /&gt;
         Discovery: Absent&lt;br /&gt;
         &lt;br /&gt;
     Management Endpoint Log Control:&lt;br /&gt;
         Type   ID  Capacity&lt;br /&gt;
         ------ --- --------&lt;br /&gt;
         SEL    0   Available&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
(Some) Success!  The blade&#039;s CIMC is assigned an IPv4 address.  And it is pingable on the local network.  SSH is a no-go, though.  Maybe not a thing at all on B series blades?  And some further fiddling seems to be needed to get IPMI over LAN working.  Something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile* # &#039;&#039;&#039;create ipmi-user admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;set password&#039;&#039;&#039;&lt;br /&gt;
 Enter a password:&lt;br /&gt;
 Confirm the password:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;set privilege admin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile/ipmi-user # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;set ipmi-over-lan enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ipmi-access-profile # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ipmi-access-profile ipmi_profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;connect cimc 1/1&#039;&#039;&#039;&lt;br /&gt;
 Trying 127.5.1.1...&lt;br /&gt;
 Connected to 127.5.1.1.&lt;br /&gt;
 Escape character is &#039;^]&#039;.&lt;br /&gt;
 &lt;br /&gt;
 CIMC Debug Firmware Utility Shell [ support ]&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;help&#039;&#039;&#039;&lt;br /&gt;
 __________________________________________&lt;br /&gt;
           Debug Firmware Utility          &lt;br /&gt;
 __________________________________________&lt;br /&gt;
 Command List&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 alarms&lt;br /&gt;
 cores&lt;br /&gt;
 exit&lt;br /&gt;
 i2cstats&lt;br /&gt;
 images&lt;br /&gt;
 mctools&lt;br /&gt;
 memory&lt;br /&gt;
 messages&lt;br /&gt;
 mrcout&lt;br /&gt;
 network&lt;br /&gt;
 obfl&lt;br /&gt;
 post&lt;br /&gt;
 power&lt;br /&gt;
 programmables&lt;br /&gt;
 sensors&lt;br /&gt;
 sel&lt;br /&gt;
 fru&lt;br /&gt;
 tasks&lt;br /&gt;
 top&lt;br /&gt;
 update&lt;br /&gt;
 users&lt;br /&gt;
 version&lt;br /&gt;
 mezz1fru&lt;br /&gt;
 mezz2fru&lt;br /&gt;
 sldp&lt;br /&gt;
 help [COMMAND]&lt;br /&gt;
 __________________________________________&lt;br /&gt;
  Notes: &lt;br /&gt;
 &amp;quot;enter Key&amp;quot; will execute last command&lt;br /&gt;
 &amp;quot;COMMAND ?&amp;quot; will execute help for that command&lt;br /&gt;
 __________________________________________&lt;br /&gt;
 [ help ]# &#039;&#039;&#039;users&#039;&#039;&#039;&lt;br /&gt;
 0. [ &amp;quot;admin&amp;quot; ] [ &amp;quot;&amp;quot; ] [ 2 ]&lt;br /&gt;
 1. [ Empty Entry ]&lt;br /&gt;
 2. [ Empty Entry ]&lt;br /&gt;
 3. [ Empty Entry ]&lt;br /&gt;
 4. [ Empty Entry ]&lt;br /&gt;
 5. [ Empty Entry ]&lt;br /&gt;
 6. [ Empty Entry ]&lt;br /&gt;
 7. [ Empty Entry ]&lt;br /&gt;
 8. [ Empty Entry ]&lt;br /&gt;
 9. [ Empty Entry ]&lt;br /&gt;
 10. [ Empty Entry ]&lt;br /&gt;
 11. [ Empty Entry ]&lt;br /&gt;
 12. [ Empty Entry ]&lt;br /&gt;
 13. [ Empty Entry ]&lt;br /&gt;
 14. [ Empty Entry ]&lt;br /&gt;
 15. [ Empty Entry ]&lt;br /&gt;
 [ users ]# &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 Connection closed by foreign host.&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
So that looks like we should have IPMI over LAN.  Let&#039;s poke at it a bit and see what happens:&lt;br /&gt;
 $ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=63 time=0.930 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=63 time=0.655 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=63 time=0.677 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=63 time=0.658 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=63 time=0.732 ms&lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4058ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.655/0.730/0.930/0.103 ms&lt;br /&gt;
 $ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin chassis status&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error: Unable to establish IPMI v2 / RMCP+ session&lt;br /&gt;
 $&lt;br /&gt;
And that is a promising start with a disappointing finish.  Just for grins, let&#039;s try from a machine on the same subnet.  Maybe ICMP echo replies get routed but the IPMI over LAN traffic doesn&#039;t?&lt;br /&gt;
 router$ &#039;&#039;&#039;ping -c 5 172.16.10.169&#039;&#039;&#039;&lt;br /&gt;
 PING 172.16.10.169 (172.16.10.169) 56(84) bytes of data.&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=1 ttl=64 time=1.85 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=2 ttl=64 time=0.498 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=3 ttl=64 time=0.463 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=4 ttl=64 time=0.452 ms&lt;br /&gt;
 64 bytes from 172.16.10.169: icmp_seq=5 ttl=64 time=0.460 ms &lt;br /&gt;
 &lt;br /&gt;
 --- 172.16.10.169 ping statistics ---&lt;br /&gt;
 5 packets transmitted, 5 received, 0% packet loss, time 4067ms&lt;br /&gt;
 rtt min/avg/max/mdev = 0.452/0.745/1.853/0.554 ms&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin mc info&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Device ID                 : 32&lt;br /&gt;
 Device Revision           : 0&lt;br /&gt;
 Firmware Revision         : 3.01&lt;br /&gt;
 IPMI Version              : 2.0&lt;br /&gt;
 Manufacturer ID           : 5771&lt;br /&gt;
 Manufacturer Name         : Cisco Systems, Inc.&lt;br /&gt;
 Product ID                : 9 (0x0009)&lt;br /&gt;
 Product Name              : Unknown (0x09)&lt;br /&gt;
 Device Available          : yes&lt;br /&gt;
 Provides Device SDRs      : yes&lt;br /&gt;
 Additional Device Support :&lt;br /&gt;
     Sensor Device&lt;br /&gt;
     SDR Repository Device&lt;br /&gt;
     SEL Device&lt;br /&gt;
     FRU Inventory Device&lt;br /&gt;
     IPMB Event Receiver&lt;br /&gt;
     IPMB Event Generator&lt;br /&gt;
 Aux Firmware Rev Info     : &lt;br /&gt;
     0x00&lt;br /&gt;
     0x00&lt;br /&gt;
     0x2a&lt;br /&gt;
     0x8b&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin lan print&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Set in Progress         : Set Complete&lt;br /&gt;
 Auth Type Support       : NONE MD2 MD5 PASSWORD &lt;br /&gt;
 Auth Type Enable        : Callback : &lt;br /&gt;
                         : User     : &lt;br /&gt;
                         : Operator : &lt;br /&gt;
                         : Admin    : &lt;br /&gt;
                         : OEM      : &lt;br /&gt;
 IP Address Source       : Static Address&lt;br /&gt;
 IP Address              : 0.0.0.0&lt;br /&gt;
 Subnet Mask             : 0.0.0.0&lt;br /&gt;
 MAC Address             : 30:f7:0d:be:89:ea&lt;br /&gt;
 SNMP Community String   : public&lt;br /&gt;
 IP Header               : TTL=0x40 Flags=0x00 Precedence=0x00 TOS=0x10&lt;br /&gt;
 BMC ARP Control         : ARP Responses Disabled, Gratuitous ARP Disabled&lt;br /&gt;
 Gratituous ARP Intrvl   : 2.0 seconds&lt;br /&gt;
 Default Gateway IP      : 0.0.0.0&lt;br /&gt;
 Default Gateway MAC     : 00:00:00:00:00:00&lt;br /&gt;
 Backup Gateway IP       : 0.0.0.0&lt;br /&gt;
 Backup Gateway MAC      : 00:00:00:00:00:00&lt;br /&gt;
 802.1q VLAN ID          : Disabled&lt;br /&gt;
 802.1q VLAN Priority    : 0&lt;br /&gt;
 RMCP+ Cipher Suites     : 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,128&lt;br /&gt;
 Cipher Suite Priv Max   : XXXaaaXXaaaXaaa&lt;br /&gt;
                         :     X=Cipher Suite Unused&lt;br /&gt;
                         :     c=CALLBACK&lt;br /&gt;
                         :     u=USER&lt;br /&gt;
                         :     o=OPERATOR&lt;br /&gt;
                         :     a=ADMIN&lt;br /&gt;
                         :     O=OEM&lt;br /&gt;
 Bad Password Threshold  : Not Available&lt;br /&gt;
 router$&lt;br /&gt;
Yay!  Very strange that it can be pinged from a different subnet, but &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; cannot talk to it that way.  Also very strange that it says it has no IP address assigned.  I am just guessing here, but perhaps the code in the FI is doing that for us and I have not found the documentation describing how it works.&lt;br /&gt;
&lt;br /&gt;
=== Serial console for blades? ===&lt;br /&gt;
I am fine with low bit rate serial stuff.  No need for a fancy bit mapped screen to manage my computers.  And it saves me having to run crazy Avocent Java applications in the process.  So let&#039;s see what happens when we try to connect from a machine on the same subnet:&lt;br /&gt;
 router$ &#039;&#039;&#039;ipmitool -I lanplus -H 172.16.10.169 -U admin sol activate&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Error activating SOL payload: Invalid data field in request&lt;br /&gt;
 router$&lt;br /&gt;
Disappointing.  But I think I might have seem something about serial over LAN in the service profiles somewhere.  Let&#039;s see if we can get it turned on:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show sol-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;set speed 115200&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/sol-policy # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set sol-policy sol_pol&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;reset&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1585</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1585"/>
		<updated>2026-03-30T22:05:08Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Another UCS Manager (and Fabric Interconnect) update */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the friendly FI management software is all lovely out of date (completely unrunnable in 2026!) Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;br /&gt;
&lt;br /&gt;
Now that we are on 2.2(8m), the SSH client is able to fetch the .bin file using scp.  Or maybe I just got the syntax correct this time.  So here we are:&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-infra.2.5.2a.A.bin&#039;&#039;&#039;&lt;br /&gt;
 Password:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  Download task:&lt;br /&gt;
      File Name Protocol Server          Userid          State&lt;br /&gt;
      --------- -------- --------------- --------------- -----&lt;br /&gt;
      ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
                Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
      ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
                Scp      172.17.0.18     adj             Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.5(2a)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.5(2a)A&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: Success&lt;br /&gt;
         Completion Time: 2009-01-01T01:59:13.146&lt;br /&gt;
         Progress (%): 100&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Success      2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
    FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 95&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 In Progress  1&lt;br /&gt;
         9      DeployActivateUCSM                       Pending      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Pending      0&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 96&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Success      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # Connection to 172.16.10.176 closed.&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And after some more time and one more disconnect, we see that another OpenSSH client compatibility option is required to connect:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa -o Ciphers=+aes256-cbc admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== But I&#039;m still trying to get the blades&#039; CIMCs connected! ==&lt;br /&gt;
The struggle is real!  But I did find https://www.cisco.com/c/en/us/support/docs/servers-unified-computing/integrated-management-controller/118367-configure-cimc-00.pdf which is a GUI-specific outline of the process involved in getting UCS servers&#039; (blade and maybe also rackmount) CIMCs attached to the greater network environment.&lt;br /&gt;
=== In-band?  Out-of-band?  Huh? ===&lt;br /&gt;
First decision to be made here.  In UCS versions before 2.2, the servers&#039; CIMCs always had Ethernet connectivity through the Fabric Interconnects&#039; management port.  This connection amounts to a single point of failure for CIMC connectivity.&lt;br /&gt;
&lt;br /&gt;
In UCS version 2.2 and newer, there are two options for CIMC connectivity: In-band using the FIs&#039; high bandwidth network uplink ports, and out-of band using an FI&#039;s 1000baseT management port.  Naturally, being me, I will opt for the more complicated alternative.  And probably complain the whole way through.&lt;br /&gt;
&lt;br /&gt;
=== In-band CIMC connectivity setup ===&lt;br /&gt;
Log in to the FI.  Go to the organization (probably &amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;.  And create an IP pool.  We are skipping the IPv6 stuff for now and the management VLAN is IPv4-only.&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show ip-pool&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     ext-mgmt                      0          0 Internal&lt;br /&gt;
     iscsi-initiator-pool          0          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create ip-pool CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool* # &#039;&#039;&#039;create block 172.16.10.168 172.16.10.175 172.16.10.1 255.255.255.0&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;set primary-dns 172.16.10.1 secondary-dns 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From: 172.16.10.168&lt;br /&gt;
     To: 172.16.10.175&lt;br /&gt;
     Default Gateway: 172.16.10.1&lt;br /&gt;
     Subnet Mask: 255.255.255.0&lt;br /&gt;
     Primary DNS: 172.16.10.1&lt;br /&gt;
     Secondary DNS: 172.16.10.2&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Block of IP Addresses:&lt;br /&gt;
     From            To              Default Gateway Subnet Mask&lt;br /&gt;
     --------------- --------------- --------------- -----------&lt;br /&gt;
     172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool/block # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name                 Size       Assigned   Management mode&lt;br /&gt;
     -------------------- ---------- ---------- ---------------&lt;br /&gt;
     CIMC_inband_pool              8          0 Internal&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     IPv4 Size: 8&lt;br /&gt;
     IPv4 Assigned: 0&lt;br /&gt;
     IPv6 Size: 0&lt;br /&gt;
     IPv6 Assigned: 0&lt;br /&gt;
     Descr:&lt;br /&gt;
     Assignment Order: Default&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
     Guid: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Net bios enabled or disabled: Not Active&lt;br /&gt;
     DHCP enaled or disabled: Not Supported&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 IP Pool:&lt;br /&gt;
     Name: CIMC_inband_pool&lt;br /&gt;
     Size: 8&lt;br /&gt;
     Assigned: 0&lt;br /&gt;
     Management mode: Internal&lt;br /&gt;
 &lt;br /&gt;
     Block of IP Addresses:&lt;br /&gt;
         From            To              Default Gateway Subnet Mask&lt;br /&gt;
         --------------- --------------- --------------- -----------&lt;br /&gt;
         172.16.10.168   172.16.10.175   172.16.10.1     255.255.255.0&lt;br /&gt;
 &lt;br /&gt;
     Pooled:&lt;br /&gt;
         Id              Subnet          Assigned Assigned To&lt;br /&gt;
         --------------- --------------- -------- -----------&lt;br /&gt;
         172.16.10.168   255.255.255.0   No&lt;br /&gt;
         172.16.10.169   255.255.255.0   No&lt;br /&gt;
         172.16.10.170   255.255.255.0   No&lt;br /&gt;
         172.16.10.171   255.255.255.0   No&lt;br /&gt;
         172.16.10.172   255.255.255.0   No&lt;br /&gt;
         172.16.10.173   255.255.255.0   No&lt;br /&gt;
         172.16.10.174   255.255.255.0   No&lt;br /&gt;
         172.16.10.175   255.255.255.0   No&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool #&lt;br /&gt;
So we now have a pool of IPv4 addresses to hand out to CIMCs in our UCS domain.  And we can also LOL at Cisco&#039;s &amp;lt;code&amp;gt;DHCP &#039;&#039;&#039;enaled&#039;&#039;&#039; or disabled&amp;lt;/code&amp;gt; spelling error.  But not too loud.  It may well be fixed in newer versions.&lt;br /&gt;
&lt;br /&gt;
=== Create VLAN and VLAN group to connect the CIMC IP pool to ===&lt;br /&gt;
VLAN on the Ethernet uplinks:&lt;br /&gt;
 ucs-fi-6248up-0-A /org/ip-pool # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan Management 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set native no&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;set vlan-id 10&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
VLAN group now:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show vlan-group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;create vlan-group Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group* # &#039;&#039;&#039;create member-vlan Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
Add IP pool, VLAN, VLAN group to in-band profile:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/vlan-group/member-vlan # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope inband-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &#039;&#039;&#039;set default-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set default-vlan-name Management&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;set net-group-name Management_group&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/inband-profile # &lt;br /&gt;
Now that the in-band profile is set, update a blade&#039;s service profile to reference it:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show service-profile&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Service Profile:&lt;br /&gt;
     Service Profile Name Type              Server  Assignment Association&lt;br /&gt;
     -------------------- ----------------- ------- ---------- -----------&lt;br /&gt;
     UCS_B200_M3_FCH162871NA&lt;br /&gt;
                          Instance          1/1     Assigned   Associating&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;set ext-mgmt-ip-pool-name CIMC_inband_pool&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;set ext-mgmt-ip-state pooled&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset hard-reset-immediate&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;reset-kvm&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;reset-ipmi&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID              Serial (SN)      HW Revision&lt;br /&gt;
     ---------------- ---------------- -----------&lt;br /&gt;
     UCSB-B200-M3     FCH162871NA      0&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V01&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     GUID:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc # &#039;&#039;&#039;show expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 CIMC:&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
 &lt;br /&gt;
     Vmedia Mapping List:&lt;br /&gt;
         Full Name: sys/chassis-1/blade-1/mgmt/actual-mount-list&lt;br /&gt;
 &lt;br /&gt;
         Vmedia Mapping:&lt;br /&gt;
             Vdisk Id Mapping Name Device Type Mount Protocol Mount Status&lt;br /&gt;
             -------- ------------ ----------- -------------- ------------&lt;br /&gt;
             1                     Cdd         Unknown        Not Mounted&lt;br /&gt;
             2                     Hdd         Unknown        Not Mounted&lt;br /&gt;
 &lt;br /&gt;
     External Management Interface:&lt;br /&gt;
         Mode: In Band&lt;br /&gt;
         Ip V4 State: Pooled&lt;br /&gt;
         Ip V6 State: Pooled&lt;br /&gt;
 &lt;br /&gt;
         External Management Virtual LAN:&lt;br /&gt;
             Network Name: Management&lt;br /&gt;
             Id: 10&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IP:&lt;br /&gt;
                 Name       IP Address      Default Gateway Subnet          Primary DNS IP  Secondary DNS IP&lt;br /&gt;
                 ---------- --------------- --------------- --------------- --------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            172.16.10.169   172.16.10.1     255.255.255.0   172.16.10.1     172.16.10.2&lt;br /&gt;
 &lt;br /&gt;
             External Management Pooled IPv6:&lt;br /&gt;
                 Name       IP Address Default Gateway Prefix Primary DNS IP Secondary DNS IP&lt;br /&gt;
                 ---------- ---------- --------------- ------ -------------- ----------------&lt;br /&gt;
                 CIMC_inband_pool&lt;br /&gt;
                            ::         ::              64     ::             ::&lt;br /&gt;
 &lt;br /&gt;
     Management Interface:&lt;br /&gt;
         Access Type: Unspecified&lt;br /&gt;
         IP Address: 0.0.0.0&lt;br /&gt;
         Netmask: 0.0.0.0&lt;br /&gt;
         Gateway: 0.0.0.0&lt;br /&gt;
         MAC Address: 30:F7:0D:BE:89:EA&lt;br /&gt;
         Fabric ID: A&lt;br /&gt;
         Peer Port:&lt;br /&gt;
         Peer Port Id: 1&lt;br /&gt;
         Peer Slot Id: 1&lt;br /&gt;
         Peer Chassis Id: 1&lt;br /&gt;
         Discovery: Absent&lt;br /&gt;
         &lt;br /&gt;
     Management Endpoint Log Control:&lt;br /&gt;
         Type   ID  Capacity&lt;br /&gt;
         ------ --- --------&lt;br /&gt;
         SEL    0   Available&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server/cimc #&lt;br /&gt;
(Some) Success!  The blade&#039;s CIMC is assigned an IPv4 address.  And it is pingable on the local network.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1584</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1584"/>
		<updated>2026-03-27T17:12:21Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Telling the FI to discover the blade chassis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the friendly FI management software is all lovely out of date (completely unrunnable in 2026!) Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;br /&gt;
&lt;br /&gt;
Now that we are on 2.2(8m), the SSH client is able to fetch the .bin file using scp.  Or maybe I just got the syntax correct this time.  So here we are:&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-infra.2.5.2a.A.bin&#039;&#039;&#039;&lt;br /&gt;
 Password:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  Download task:&lt;br /&gt;
      File Name Protocol Server          Userid          State&lt;br /&gt;
      --------- -------- --------------- --------------- -----&lt;br /&gt;
      ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
                Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
      ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
                Scp      172.17.0.18     adj             Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.5(2a)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.5(2a)A&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: Success&lt;br /&gt;
         Completion Time: 2009-01-01T01:59:13.146&lt;br /&gt;
         Progress (%): 100&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Success      2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
    FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 95&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 In Progress  1&lt;br /&gt;
         9      DeployActivateUCSM                       Pending      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Pending      0&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 96&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Success      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # Connection to 172.16.10.176 closed.&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And after some more time and one more disconnect, we see that another OpenSSH client compatibility option is required to connect:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa -o Ciphers=+aes256-cbc admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1583</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1583"/>
		<updated>2026-03-27T02:41:04Z</updated>

		<summary type="html">&lt;p&gt;Adj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;br /&gt;
&lt;br /&gt;
Now that we are on 2.2(8m), the SSH client is able to fetch the .bin file using scp.  Or maybe I just got the syntax correct this time.  So here we are:&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-infra.2.5.2a.A.bin&#039;&#039;&#039;&lt;br /&gt;
 Password:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  Download task:&lt;br /&gt;
      File Name Protocol Server          Userid          State&lt;br /&gt;
      --------- -------- --------------- --------------- -----&lt;br /&gt;
      ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
                Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
      ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
                Scp      172.17.0.18     adj             Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.5(2a)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.5(2a)A&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: Success&lt;br /&gt;
         Completion Time: 2009-01-01T01:59:13.146&lt;br /&gt;
         Progress (%): 100&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Success      2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
    FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 95&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 In Progress  1&lt;br /&gt;
         9      DeployActivateUCSM                       Pending      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Pending      0&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 96&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Success      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # Connection to 172.16.10.176 closed.&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And after some more time and one more disconnect, we see that another OpenSSH client compatibility option is required to connect:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Unable to negotiate with 172.16.10.176 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa -o Ciphers=+aes256-cbc admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1582</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1582"/>
		<updated>2026-03-27T00:35:32Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Another UCS Manager (and Fabric Interconnect) update */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;br /&gt;
&lt;br /&gt;
Now that we are on 2.2(8m), the SSH client is able to fetch the .bin file using scp.  Or maybe I just got the syntax correct this time.  So here we are:&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image scp://adj@172.17.0.18/home/adj/Downloads/ucs-k9-bundle-infra.2.5.2a.A.bin&#039;&#039;&#039;&lt;br /&gt;
 Password:&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
     ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
               Scp      172.17.0.18     adj             Downloading&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
  Download task:&lt;br /&gt;
      File Name Protocol Server          Userid          State&lt;br /&gt;
      --------- -------- --------------- --------------- -----&lt;br /&gt;
      ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
                Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
      ucs-k9-bundle-infra.2.5.2a.A.bin&lt;br /&gt;
                Scp      172.17.0.18     adj             Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.5(2a)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs).&lt;br /&gt;
 Here is the checklist of things that are recommended before starting Auto-Install&lt;br /&gt;
 (1) Review current critical/major faults&lt;br /&gt;
 (2) Initiate a configuration backup&lt;br /&gt;
 (3) Check if Management Interface Monitoring Policy is enabled&lt;br /&gt;
 (4) Check if there is a pending Fabric Interconnect Reboot activitiy&lt;br /&gt;
 (5) Ensure NTP is configured&lt;br /&gt;
 (6) Check if any hardware (fabric interconnects, io-modules, servers or adapters) is unsupported in the target release&lt;br /&gt;
 Do you want to proceed? (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.5(2a)A&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: Success&lt;br /&gt;
         Completion Time: 2009-01-01T01:59:13.146&lt;br /&gt;
         Progress (%): 100&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Success      2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
    FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 95&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 In Progress  1&lt;br /&gt;
         9      DeployActivateUCSM                       Pending      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Pending      0&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 96&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Success      0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         11     DeployUpdateIOM                          Pending      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         13     DeployActivateIOM                        Pending      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         17     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Pending      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # Connection to 172.16.10.176 closed.&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -o HostKeyAlgorithms=+ssh-rsa admin@172.16.10.176&#039;&#039;&#039;&lt;br /&gt;
 Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 (admin@172.16.10.176) Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.5(2a)&lt;br /&gt;
 Package-Vers: 2.5(2a)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1581</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1581"/>
		<updated>2026-03-27T00:05:43Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* UCS Fabric Interconnect uplink ports */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;br /&gt;
&lt;br /&gt;
== Another UCS Manager (and Fabric Interconnect) update ==&lt;br /&gt;
I have acquired a pair of B200 M4 blades.  And the FI (and UCS Manager) need upgrading to support them.  Hopefully nothing breaks in the process.  Hopefully...&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Cisco_UCS_Rack_servers&amp;diff=1580</id>
		<title>Cisco UCS Rack servers</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Cisco_UCS_Rack_servers&amp;diff=1580"/>
		<updated>2026-03-26T18:26:05Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Serial over LAN */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Acquired a Cisco UCS C220 M5 on 2026-03-10.  Here are some notes.&lt;br /&gt;
&lt;br /&gt;
== Network based management ==&lt;br /&gt;
CIMC, the Cisco Integrated Management Controller.  On the machine I have obtained, this was not configured to use the dedicated management Ethernet interface on the back of the server.  This is easily corrected while the machine starts up.  Pressing F8 from a USB keyboard during the server&#039;s power on self test sequence will bring up the CIMC configuration screen.  From there, the dedicated NIC option, IPv4 option, and DHCP enabled can be selected to do the expected things.  After those are selected, press the &amp;lt;code&amp;gt;&amp;amp;lt;F1&amp;amp;gt;&amp;lt;/code&amp;gt; key and fix the dedicated NIC port properties if the need any adjustment.&lt;br /&gt;
&lt;br /&gt;
The CIMC is accessible over https and SSH. At first login (at least by HTTPS), a new password must be set.  None of Dell&#039;s just warning &amp;quot;Heh, you have the default credentials.  Not recommended!&amp;quot; warning stuff.&lt;br /&gt;
&lt;br /&gt;
== Firmware updates ==&lt;br /&gt;
As acquired, server s/n WZP22040X50 is running BIOS version C220M5.3.1.2b.0.1025170315 and CIMC version 3.1(2c).  Cisco&#039;s firmware update process is heavier weight than some other vendors&#039;.  More like HP(E)&#039;s Service Pack for Proliant than Dells &amp;quot;get iDRAC to download update images from an FTP or web server.&amp;quot;  An ISO image must be downloaded and booted from.  (This is maybe avoidable.  And if is, updates will be made to document the process here.)  As we are running 3.1 release code now, download the final update ISO image, 3.1(3k).  This is free-as-in-beer with an account on Cisco&#039;s support site.  No $$$ required.  I have not read every line of the release notes to understand whether entire release trains can be skipped in the upgrade process.&lt;br /&gt;
&lt;br /&gt;
One thing that is nice about getting the account created: they have a notification system a customer can sign up for when sends an email when new firmware is released.  With options for weekly, daily, or monthly notications.&lt;br /&gt;
&lt;br /&gt;
After the ISO is downloaded, open the KVM on the server&#039;s CIMC and attach it to the server using the appropriate item in the &amp;quot;Virtual Media&amp;quot; menu.  Reboot server and press the &amp;lt;code&amp;gt;&amp;amp;lt;F6&amp;amp;gt;&amp;lt;/code&amp;gt; key at the appropriate time to invoke the boot device selection menu.  From there, boot from the Cisco vKVM attached ISO image.  Wait patiently.  After several minutes, you might catch Linux kernel boot messages.  And shortly after that, something about the Cisco UCS Host Upgrade Utility Version 3.1.3k doing its work.  Then wait some more.  The Host Update Utility is not very good about giving progress updates.  At least not this version.  After 5-10 minutes an &amp;quot;accept the license&amp;quot; screen will appear.  Do the obvious.  And then, the easy thing is to use the &amp;quot;Update All&amp;quot; button and get all updates applied.  Wait patiently some more.  But at least we get some progress reports as the actual updates are applied.  After all desired updates are complete, select &amp;quot;Exit&amp;quot;  The CIMC will reboot if its code was updated.  And the server will as well.&lt;br /&gt;
&lt;br /&gt;
If the paranoia is very strong with you, Host Upgrade Utility ISO can be booted from a second time, and all updates verified.  The boot and utility loading are just as excruciatingly slow as the actual update, but the verification itself goes swiftly.&lt;br /&gt;
&lt;br /&gt;
First thing of note with going from CIMC 3.1(2c) to 3.1(3k) is that the CIMC&#039;s SSH server now supports more modern SSH host keys.  No more need for &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; when pointing an SSH client at the CIMC.&lt;br /&gt;
&lt;br /&gt;
Also, following the release notes, jumping straight from 3.1(2c) to the most recent 4.3(2.260007) is almost certainly not a thing.  I have been doing it in increments so far: 3.1(2c) -&amp;gt; 3.1(3k) -&amp;gt; 4.0(4n) -&amp;gt; 4.1(3n) -&amp;gt; 4.2(3l)&lt;br /&gt;
&lt;br /&gt;
4.1(3n) includes some sort of cloud management functionality which I probably don&#039;t want.  It is called &amp;quot;Cisco Intersight.&amp;quot;  It will get its own section.&lt;br /&gt;
&lt;br /&gt;
== Cisco Intersight Cloud Management ==&lt;br /&gt;
Yeah, what I said just above.  I am pretty sure I don&#039;t want this.  Do not need this server&#039;s BMC phoning home to the Cisco mothership.  Need to do some reading about turning it off.&lt;br /&gt;
&lt;br /&gt;
It turns out to not to too difficult.  Kinda hidden, but here&#039;s how I did it:&lt;br /&gt;
&lt;br /&gt;
# Log into CIMC web UI.  You will be looking at the Chassis / Summary page.&lt;br /&gt;
# Click on the icon in the top left corner.  It is pretty much a three bar &amp;quot;hamburger&amp;quot; menu with a right-pointing arrow over its top.&lt;br /&gt;
# At the bottom of the just-exposed navigation pane, select the Admin / Device Connector link.&lt;br /&gt;
# On the right side of the Device Connector page, find the &amp;quot;Settings&amp;quot; link and follow it.&lt;br /&gt;
# Toggle Device Connector off, save settings, enjoy some peace about not having your server watching you quite as much.&lt;br /&gt;
&lt;br /&gt;
The above is what I did on CIMC 4.1(3n).  It may be different in newer releases.  It may also be re-activated after further firmware updates.  So make a note to check this one after more of those.&lt;br /&gt;
&lt;br /&gt;
== Doing things with the CIMC ==&lt;br /&gt;
=== Restarting the CIMC ===&lt;br /&gt;
The web UI has a &amp;quot;CIMC Reboot&amp;quot; link toward the top right of the main page.  At least while running CIMC 4.3 code.  From an SSH session, do the following after logging in:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /cimc # &#039;&#039;&#039;reboot&#039;&#039;&#039;&lt;br /&gt;
 This operation will reboot the Cisco IMC.&lt;br /&gt;
 Continue?[y|N]&#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
and wait for it to restart.&lt;br /&gt;
&lt;br /&gt;
=== Server Power Control ===&lt;br /&gt;
Pretty easy:&lt;br /&gt;
 C220-WZP22040X50# &lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope chassis&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;power on&#039;&#039;&#039;&lt;br /&gt;
 Do you want to continue?[y|N]&#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
It also has some other options:&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope chassis&#039;&#039;&#039; &lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;power&#039;&#039;&#039;&lt;br /&gt;
   cycle       Power off then power on&lt;br /&gt;
   hard-reset  Equivalent to pressing Front Panel reset button or IPMI reset&lt;br /&gt;
   off         Turn power off (OS given short time to shutdown)&lt;br /&gt;
   on          Turn power on&lt;br /&gt;
   shutdown    Gracefully shutdown the host OS &amp;amp; power off&lt;br /&gt;
 &lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;power&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Serial over LAN ===&lt;br /&gt;
This is a bit different than Dell&#039;s iDRAC or HP(E)&#039;s iLO.  It gets its own dedicated SSH port.  From an SSH connection to the CIMC, the configuration can be listed out like so:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;show sol detail&#039;&#039;&#039;&lt;br /&gt;
 Serial Over LAN:&lt;br /&gt;
     Enabled: no&lt;br /&gt;
     Baud Rate(bps): 115200&lt;br /&gt;
     Com Port: com0&lt;br /&gt;
     SOL SSH Port: 2400&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
It does need to be explicitly enabled.  Again, to do that from the CIMC SSH interface (there are maybe BIOS config and CMIC web interface toggles for this, too) do this:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope sol&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol # &#039;&#039;&#039;set enabled yes&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol *# &#039;&#039;&#039;commit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
And that is done, so connect to the SSH server on port 2400.  With OpenSSH, that is done by specifying &amp;lt;code&amp;gt;-p 2400&amp;lt;/code&amp;gt; on the &amp;lt;code&amp;gt;ssh&amp;lt;/code&amp;gt; command line.  Something like:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -p 2400 admin@172.16.10.160&#039;&#039;&#039;&lt;br /&gt;
 admin@172.16.10.160&#039;s password: &lt;br /&gt;
 CISCO Serial Over LAN:&lt;br /&gt;
 Press Ctrl+x to Exit the session&lt;br /&gt;
 &lt;br /&gt;
 CISCO Serial Over LAN exited&lt;br /&gt;
 Connection to 172.16.10.160 closed.&lt;br /&gt;
 $&lt;br /&gt;
The Ctrl+x thing is annoying.  My habit with GRUB is to kick off edited menu entries with Ctrl+x.  On this one, I must hit the F10 key instead.  No major complaints aside from that, though.  Pasting in 200+ character disk passphrases works without issue.&lt;br /&gt;
&lt;br /&gt;
== Mass storage devices, RAID, JBOD, and such ==&lt;br /&gt;
The ECS C220 M5 has a Broadcom/LSI MegaRAID Tri-Mode SAS3516 attached to the disk backplane in the front of the chassis.&lt;br /&gt;
&lt;br /&gt;
I prefer running my disk interfaces in JBOD (just a bunch of disks) or pass-through mode, exposing the individual physical storage devices to the operating system, and using OS tooling to manage redundancy.  As this server arrived running VMware ESXi, an OS without those data redundancy management features, the server came using the SAS3516 RAID controller set up to present 2 virtual disks to the OS.  Setting the controller to JBOD mode is possible, though.  To get to the MegaRAID configuration without a running OS equipped with &amp;lt;code&amp;gt;storcli&amp;lt;/code&amp;gt; and related tools, restart the server, and enter the BIOS setup interface by hitting &amp;lt;code&amp;gt;F2&amp;lt;/code&amp;gt; before the boot loader is started.  This can be done on the VGA console, CIMC virtual VGA console, or even the serial console.  From the main screen, right arrow over to the Advanced screen and then down to the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu option.  From there, navigate down to &amp;lt;code&amp;gt;Set Factory Defaults&amp;lt;/code&amp;gt;, select it, and reboot server.  Then enter the BIOS setup screens before control is passed to the boot loader again.  This time through, the existing virtual drives will be deleted:&lt;br /&gt;
* From main BIOS config menu screen, arrow right to Advanced&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;View Server Profile&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Virtual Drive Management&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* A list of virtual drives is now presented.  For each virtual drive in the list:&lt;br /&gt;
** Press Enter to see the Virtual Drive Details&lt;br /&gt;
** Press Enter again, to open the Operation menu&lt;br /&gt;
** Arrow down to &amp;lt;code&amp;gt;Delete Virtual Drive&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
** Select the &amp;lt;code&amp;gt;Go&amp;lt;/code&amp;gt; option presented beneath the now selected &amp;lt;code&amp;gt;Delete Virtual Drive&amp;lt;/code&amp;gt; operation.&lt;br /&gt;
** Change the &amp;lt;code&amp;gt;Confirm&amp;lt;/code&amp;gt; setting in the next menu to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt;.&lt;br /&gt;
** Select &amp;lt;code&amp;gt;Yes&amp;lt;/code&amp;gt; in the menu.&lt;br /&gt;
** Select &amp;lt;code&amp;gt;OK&amp;lt;/code&amp;gt; to return to the list of existing virtual drives.&lt;br /&gt;
* When the list of virtual drives is empty, return to the top level of the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Configure&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Make JBOD&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Check All&amp;lt;/code&amp;gt; from the menu.  This option is displayed after the list of physical drives the controller has found.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;OK&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Move up and change the &amp;lt;code&amp;gt;Confirm&amp;lt;/code&amp;gt; setting to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt;&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Yes&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Return to the top level of the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu.&lt;br /&gt;
* Save configuration, reboot server, and enter the BIOS setup screen one more time (press &amp;lt;code&amp;gt;F2&amp;lt;/code&amp;gt;).&lt;br /&gt;
* From main BIOS config menu screen, arrow right to Advanced&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;View Server Profile&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Controller Management&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Advanced Controller Properties&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;JBOD Mode&amp;lt;/code&amp;gt; and set to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt; if it is not already so.&lt;br /&gt;
* Save changes and reset the system one more time&lt;br /&gt;
From here, operating system installation can commence.  Or storage device firmware updates.  Or whatever...&lt;br /&gt;
&lt;br /&gt;
== Storage media with SCSI Protection Information need not apply ==&lt;br /&gt;
Yeah, so the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; does not like these at all.  These would be drives that do not have 512-byte or 4096-byte sectors.  Often such drives are NetApp or EMC or 3PAR pulls. Drop into a Dell machine with perhaps a LSI SAS2008 instead and do something like&lt;br /&gt;
 $ &#039;&#039;&#039;sudo sg_format --verbose --verbose --format --quick --size=512 --fmtpinfo=0 --pfu=0 /dev/sg3&#039;&#039;&#039;&lt;br /&gt;
to such a drive before trying anything in the UCS server.  Ugh...&lt;br /&gt;
&lt;br /&gt;
== JBOD operations ==&lt;br /&gt;
JBOD mode, right?  Plug in a disk, maybe scan the bus, watch it go, right?  Well, no.  That would be too easy.  Instead, one can SSH to the CIMC and do something like this:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope chassis&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;scope storageadapter MRAID&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter # &#039;&#039;&#039;scope physical-drive 2&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive # &#039;&#039;&#039;make-jbod&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive # &lt;br /&gt;
And then search for it from the OS.  Hopefully.&lt;br /&gt;
&lt;br /&gt;
== Hardware Fault Resolution ==&lt;br /&gt;
Before arriving in the data center and being put into service, my first UCS C series server had a memory DIMM removed to count how much RAM was installed.  It was won at auction and no hardware specs were supplied.  The DIMM was not correctly re-seated before the server was powered on.  The POST code correctly flagged the issue, deactivated the DIMM, and made entries in the System Event Log (SEL) &#039;&#039;&#039;and&#039;&#039;&#039; a Cisco specific Fault History Log.  The SEL is easy enough to clear with &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; from the running OS, or from the CIMC.  However, the Fault History Log is separate.  &amp;lt;strike&amp;gt;Google&amp;lt;/strike&amp;gt; Duck Duck Go search results have indicated the server&#039;s Fault History Log may be clearable with the Cisco UCS Manager software.  [[UCS Manager]] is a whole separate thing and has its own page.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Cisco_UCS_Rack_servers&amp;diff=1579</id>
		<title>Cisco UCS Rack servers</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Cisco_UCS_Rack_servers&amp;diff=1579"/>
		<updated>2026-03-26T15:53:36Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Server Power Control */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Acquired a Cisco UCS C220 M5 on 2026-03-10.  Here are some notes.&lt;br /&gt;
&lt;br /&gt;
== Network based management ==&lt;br /&gt;
CIMC, the Cisco Integrated Management Controller.  On the machine I have obtained, this was not configured to use the dedicated management Ethernet interface on the back of the server.  This is easily corrected while the machine starts up.  Pressing F8 from a USB keyboard during the server&#039;s power on self test sequence will bring up the CIMC configuration screen.  From there, the dedicated NIC option, IPv4 option, and DHCP enabled can be selected to do the expected things.  After those are selected, press the &amp;lt;code&amp;gt;&amp;amp;lt;F1&amp;amp;gt;&amp;lt;/code&amp;gt; key and fix the dedicated NIC port properties if the need any adjustment.&lt;br /&gt;
&lt;br /&gt;
The CIMC is accessible over https and SSH. At first login (at least by HTTPS), a new password must be set.  None of Dell&#039;s just warning &amp;quot;Heh, you have the default credentials.  Not recommended!&amp;quot; warning stuff.&lt;br /&gt;
&lt;br /&gt;
== Firmware updates ==&lt;br /&gt;
As acquired, server s/n WZP22040X50 is running BIOS version C220M5.3.1.2b.0.1025170315 and CIMC version 3.1(2c).  Cisco&#039;s firmware update process is heavier weight than some other vendors&#039;.  More like HP(E)&#039;s Service Pack for Proliant than Dells &amp;quot;get iDRAC to download update images from an FTP or web server.&amp;quot;  An ISO image must be downloaded and booted from.  (This is maybe avoidable.  And if is, updates will be made to document the process here.)  As we are running 3.1 release code now, download the final update ISO image, 3.1(3k).  This is free-as-in-beer with an account on Cisco&#039;s support site.  No $$$ required.  I have not read every line of the release notes to understand whether entire release trains can be skipped in the upgrade process.&lt;br /&gt;
&lt;br /&gt;
One thing that is nice about getting the account created: they have a notification system a customer can sign up for when sends an email when new firmware is released.  With options for weekly, daily, or monthly notications.&lt;br /&gt;
&lt;br /&gt;
After the ISO is downloaded, open the KVM on the server&#039;s CIMC and attach it to the server using the appropriate item in the &amp;quot;Virtual Media&amp;quot; menu.  Reboot server and press the &amp;lt;code&amp;gt;&amp;amp;lt;F6&amp;amp;gt;&amp;lt;/code&amp;gt; key at the appropriate time to invoke the boot device selection menu.  From there, boot from the Cisco vKVM attached ISO image.  Wait patiently.  After several minutes, you might catch Linux kernel boot messages.  And shortly after that, something about the Cisco UCS Host Upgrade Utility Version 3.1.3k doing its work.  Then wait some more.  The Host Update Utility is not very good about giving progress updates.  At least not this version.  After 5-10 minutes an &amp;quot;accept the license&amp;quot; screen will appear.  Do the obvious.  And then, the easy thing is to use the &amp;quot;Update All&amp;quot; button and get all updates applied.  Wait patiently some more.  But at least we get some progress reports as the actual updates are applied.  After all desired updates are complete, select &amp;quot;Exit&amp;quot;  The CIMC will reboot if its code was updated.  And the server will as well.&lt;br /&gt;
&lt;br /&gt;
If the paranoia is very strong with you, Host Upgrade Utility ISO can be booted from a second time, and all updates verified.  The boot and utility loading are just as excruciatingly slow as the actual update, but the verification itself goes swiftly.&lt;br /&gt;
&lt;br /&gt;
First thing of note with going from CIMC 3.1(2c) to 3.1(3k) is that the CIMC&#039;s SSH server now supports more modern SSH host keys.  No more need for &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; when pointing an SSH client at the CIMC.&lt;br /&gt;
&lt;br /&gt;
Also, following the release notes, jumping straight from 3.1(2c) to the most recent 4.3(2.260007) is almost certainly not a thing.  I have been doing it in increments so far: 3.1(2c) -&amp;gt; 3.1(3k) -&amp;gt; 4.0(4n) -&amp;gt; 4.1(3n) -&amp;gt; 4.2(3l)&lt;br /&gt;
&lt;br /&gt;
4.1(3n) includes some sort of cloud management functionality which I probably don&#039;t want.  It is called &amp;quot;Cisco Intersight.&amp;quot;  It will get its own section.&lt;br /&gt;
&lt;br /&gt;
== Cisco Intersight Cloud Management ==&lt;br /&gt;
Yeah, what I said just above.  I am pretty sure I don&#039;t want this.  Do not need this server&#039;s BMC phoning home to the Cisco mothership.  Need to do some reading about turning it off.&lt;br /&gt;
&lt;br /&gt;
It turns out to not to too difficult.  Kinda hidden, but here&#039;s how I did it:&lt;br /&gt;
&lt;br /&gt;
# Log into CIMC web UI.  You will be looking at the Chassis / Summary page.&lt;br /&gt;
# Click on the icon in the top left corner.  It is pretty much a three bar &amp;quot;hamburger&amp;quot; menu with a right-pointing arrow over its top.&lt;br /&gt;
# At the bottom of the just-exposed navigation pane, select the Admin / Device Connector link.&lt;br /&gt;
# On the right side of the Device Connector page, find the &amp;quot;Settings&amp;quot; link and follow it.&lt;br /&gt;
# Toggle Device Connector off, save settings, enjoy some peace about not having your server watching you quite as much.&lt;br /&gt;
&lt;br /&gt;
The above is what I did on CIMC 4.1(3n).  It may be different in newer releases.  It may also be re-activated after further firmware updates.  So make a note to check this one after more of those.&lt;br /&gt;
&lt;br /&gt;
== Doing things with the CIMC ==&lt;br /&gt;
=== Restarting the CIMC ===&lt;br /&gt;
The web UI has a &amp;quot;CIMC Reboot&amp;quot; link toward the top right of the main page.  At least while running CIMC 4.3 code.  From an SSH session, do the following after logging in:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /cimc # &#039;&#039;&#039;reboot&#039;&#039;&#039;&lt;br /&gt;
 This operation will reboot the Cisco IMC.&lt;br /&gt;
 Continue?[y|N]&#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
and wait for it to restart.&lt;br /&gt;
&lt;br /&gt;
=== Server Power Control ===&lt;br /&gt;
Pretty easy:&lt;br /&gt;
 C220-WZP22040X50# &lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope chassis&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;power on&#039;&#039;&#039;&lt;br /&gt;
 Do you want to continue?[y|N]&#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
It also has some other options:&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope chassis&#039;&#039;&#039; &lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;power&#039;&#039;&#039;&lt;br /&gt;
   cycle       Power off then power on&lt;br /&gt;
   hard-reset  Equivalent to pressing Front Panel reset button or IPMI reset&lt;br /&gt;
   off         Turn power off (OS given short time to shutdown)&lt;br /&gt;
   on          Turn power on&lt;br /&gt;
   shutdown    Gracefully shutdown the host OS &amp;amp; power off&lt;br /&gt;
 &lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;power&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Serial over LAN ===&lt;br /&gt;
This is a bit different than Dell&#039;s iDRAC or HP(E)&#039;s iLO.  It gets its own dedicated SSH port.  From an SSH connection to the CIMC, the configuration can be listed out like so:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;show sol detail&#039;&#039;&#039;&lt;br /&gt;
 Serial Over LAN:&lt;br /&gt;
     Enabled: no&lt;br /&gt;
     Baud Rate(bps): 115200&lt;br /&gt;
     Com Port: com0&lt;br /&gt;
     SOL SSH Port: 2400&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
It does need to be explicitly enabled.  Again, to do that from the CIMC SSH interface (there are maybe BIOS config and CMIC web interface toggles for this, too) do this:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope sol&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol # &#039;&#039;&#039;set enabled yes&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol *# &#039;&#039;&#039;commit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
And that is done, so connect to the SSH server on port 2400.  With OpenSSH, that is done by specifying &amp;lt;code&amp;gt;-p 2400&amp;lt;/code&amp;gt; on the &amp;lt;code&amp;gt;ssh&amp;lt;/code&amp;gt; command line.  Something like:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -p 2400 admin@172.16.10.160&#039;&#039;&#039;&lt;br /&gt;
 admin@172.16.10.160&#039;s password: &lt;br /&gt;
 CISCO Serial Over LAN:&lt;br /&gt;
 Press Ctrl+x to Exit the session&lt;br /&gt;
 &lt;br /&gt;
 CISCO Serial Over LAN exited&lt;br /&gt;
 Connection to 172.16.10.160 closed.&lt;br /&gt;
 $&lt;br /&gt;
&lt;br /&gt;
== Mass storage devices, RAID, JBOD, and such ==&lt;br /&gt;
The ECS C220 M5 has a Broadcom/LSI MegaRAID Tri-Mode SAS3516 attached to the disk backplane in the front of the chassis.&lt;br /&gt;
&lt;br /&gt;
I prefer running my disk interfaces in JBOD (just a bunch of disks) or pass-through mode, exposing the individual physical storage devices to the operating system, and using OS tooling to manage redundancy.  As this server arrived running VMware ESXi, an OS without those data redundancy management features, the server came using the SAS3516 RAID controller set up to present 2 virtual disks to the OS.  Setting the controller to JBOD mode is possible, though.  To get to the MegaRAID configuration without a running OS equipped with &amp;lt;code&amp;gt;storcli&amp;lt;/code&amp;gt; and related tools, restart the server, and enter the BIOS setup interface by hitting &amp;lt;code&amp;gt;F2&amp;lt;/code&amp;gt; before the boot loader is started.  This can be done on the VGA console, CIMC virtual VGA console, or even the serial console.  From the main screen, right arrow over to the Advanced screen and then down to the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu option.  From there, navigate down to &amp;lt;code&amp;gt;Set Factory Defaults&amp;lt;/code&amp;gt;, select it, and reboot server.  Then enter the BIOS setup screens before control is passed to the boot loader again.  This time through, the existing virtual drives will be deleted:&lt;br /&gt;
* From main BIOS config menu screen, arrow right to Advanced&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;View Server Profile&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Virtual Drive Management&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* A list of virtual drives is now presented.  For each virtual drive in the list:&lt;br /&gt;
** Press Enter to see the Virtual Drive Details&lt;br /&gt;
** Press Enter again, to open the Operation menu&lt;br /&gt;
** Arrow down to &amp;lt;code&amp;gt;Delete Virtual Drive&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
** Select the &amp;lt;code&amp;gt;Go&amp;lt;/code&amp;gt; option presented beneath the now selected &amp;lt;code&amp;gt;Delete Virtual Drive&amp;lt;/code&amp;gt; operation.&lt;br /&gt;
** Change the &amp;lt;code&amp;gt;Confirm&amp;lt;/code&amp;gt; setting in the next menu to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt;.&lt;br /&gt;
** Select &amp;lt;code&amp;gt;Yes&amp;lt;/code&amp;gt; in the menu.&lt;br /&gt;
** Select &amp;lt;code&amp;gt;OK&amp;lt;/code&amp;gt; to return to the list of existing virtual drives.&lt;br /&gt;
* When the list of virtual drives is empty, return to the top level of the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Configure&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Make JBOD&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Check All&amp;lt;/code&amp;gt; from the menu.  This option is displayed after the list of physical drives the controller has found.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;OK&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Move up and change the &amp;lt;code&amp;gt;Confirm&amp;lt;/code&amp;gt; setting to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt;&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Yes&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Return to the top level of the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu.&lt;br /&gt;
* Save configuration, reboot server, and enter the BIOS setup screen one more time (press &amp;lt;code&amp;gt;F2&amp;lt;/code&amp;gt;).&lt;br /&gt;
* From main BIOS config menu screen, arrow right to Advanced&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;View Server Profile&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Controller Management&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Advanced Controller Properties&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;JBOD Mode&amp;lt;/code&amp;gt; and set to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt; if it is not already so.&lt;br /&gt;
* Save changes and reset the system one more time&lt;br /&gt;
From here, operating system installation can commence.  Or storage device firmware updates.  Or whatever...&lt;br /&gt;
&lt;br /&gt;
== Storage media with SCSI Protection Information need not apply ==&lt;br /&gt;
Yeah, so the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; does not like these at all.  These would be drives that do not have 512-byte or 4096-byte sectors.  Often such drives are NetApp or EMC or 3PAR pulls. Drop into a Dell machine with perhaps a LSI SAS2008 instead and do something like&lt;br /&gt;
 $ &#039;&#039;&#039;sudo sg_format --verbose --verbose --format --quick --size=512 --fmtpinfo=0 --pfu=0 /dev/sg3&#039;&#039;&#039;&lt;br /&gt;
to such a drive before trying anything in the UCS server.  Ugh...&lt;br /&gt;
&lt;br /&gt;
== JBOD operations ==&lt;br /&gt;
JBOD mode, right?  Plug in a disk, maybe scan the bus, watch it go, right?  Well, no.  That would be too easy.  Instead, one can SSH to the CIMC and do something like this:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope chassis&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;scope storageadapter MRAID&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter # &#039;&#039;&#039;scope physical-drive 2&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive # &#039;&#039;&#039;make-jbod&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive # &lt;br /&gt;
And then search for it from the OS.  Hopefully.&lt;br /&gt;
&lt;br /&gt;
== Hardware Fault Resolution ==&lt;br /&gt;
Before arriving in the data center and being put into service, my first UCS C series server had a memory DIMM removed to count how much RAM was installed.  It was won at auction and no hardware specs were supplied.  The DIMM was not correctly re-seated before the server was powered on.  The POST code correctly flagged the issue, deactivated the DIMM, and made entries in the System Event Log (SEL) &#039;&#039;&#039;and&#039;&#039;&#039; a Cisco specific Fault History Log.  The SEL is easy enough to clear with &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; from the running OS, or from the CIMC.  However, the Fault History Log is separate.  &amp;lt;strike&amp;gt;Google&amp;lt;/strike&amp;gt; Duck Duck Go search results have indicated the server&#039;s Fault History Log may be clearable with the Cisco UCS Manager software.  [[UCS Manager]] is a whole separate thing and has its own page.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Cisco_UCS_Rack_servers&amp;diff=1578</id>
		<title>Cisco UCS Rack servers</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Cisco_UCS_Rack_servers&amp;diff=1578"/>
		<updated>2026-03-26T15:30:33Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Doing things with the CIMC */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Acquired a Cisco UCS C220 M5 on 2026-03-10.  Here are some notes.&lt;br /&gt;
&lt;br /&gt;
== Network based management ==&lt;br /&gt;
CIMC, the Cisco Integrated Management Controller.  On the machine I have obtained, this was not configured to use the dedicated management Ethernet interface on the back of the server.  This is easily corrected while the machine starts up.  Pressing F8 from a USB keyboard during the server&#039;s power on self test sequence will bring up the CIMC configuration screen.  From there, the dedicated NIC option, IPv4 option, and DHCP enabled can be selected to do the expected things.  After those are selected, press the &amp;lt;code&amp;gt;&amp;amp;lt;F1&amp;amp;gt;&amp;lt;/code&amp;gt; key and fix the dedicated NIC port properties if the need any adjustment.&lt;br /&gt;
&lt;br /&gt;
The CIMC is accessible over https and SSH. At first login (at least by HTTPS), a new password must be set.  None of Dell&#039;s just warning &amp;quot;Heh, you have the default credentials.  Not recommended!&amp;quot; warning stuff.&lt;br /&gt;
&lt;br /&gt;
== Firmware updates ==&lt;br /&gt;
As acquired, server s/n WZP22040X50 is running BIOS version C220M5.3.1.2b.0.1025170315 and CIMC version 3.1(2c).  Cisco&#039;s firmware update process is heavier weight than some other vendors&#039;.  More like HP(E)&#039;s Service Pack for Proliant than Dells &amp;quot;get iDRAC to download update images from an FTP or web server.&amp;quot;  An ISO image must be downloaded and booted from.  (This is maybe avoidable.  And if is, updates will be made to document the process here.)  As we are running 3.1 release code now, download the final update ISO image, 3.1(3k).  This is free-as-in-beer with an account on Cisco&#039;s support site.  No $$$ required.  I have not read every line of the release notes to understand whether entire release trains can be skipped in the upgrade process.&lt;br /&gt;
&lt;br /&gt;
One thing that is nice about getting the account created: they have a notification system a customer can sign up for when sends an email when new firmware is released.  With options for weekly, daily, or monthly notications.&lt;br /&gt;
&lt;br /&gt;
After the ISO is downloaded, open the KVM on the server&#039;s CIMC and attach it to the server using the appropriate item in the &amp;quot;Virtual Media&amp;quot; menu.  Reboot server and press the &amp;lt;code&amp;gt;&amp;amp;lt;F6&amp;amp;gt;&amp;lt;/code&amp;gt; key at the appropriate time to invoke the boot device selection menu.  From there, boot from the Cisco vKVM attached ISO image.  Wait patiently.  After several minutes, you might catch Linux kernel boot messages.  And shortly after that, something about the Cisco UCS Host Upgrade Utility Version 3.1.3k doing its work.  Then wait some more.  The Host Update Utility is not very good about giving progress updates.  At least not this version.  After 5-10 minutes an &amp;quot;accept the license&amp;quot; screen will appear.  Do the obvious.  And then, the easy thing is to use the &amp;quot;Update All&amp;quot; button and get all updates applied.  Wait patiently some more.  But at least we get some progress reports as the actual updates are applied.  After all desired updates are complete, select &amp;quot;Exit&amp;quot;  The CIMC will reboot if its code was updated.  And the server will as well.&lt;br /&gt;
&lt;br /&gt;
If the paranoia is very strong with you, Host Upgrade Utility ISO can be booted from a second time, and all updates verified.  The boot and utility loading are just as excruciatingly slow as the actual update, but the verification itself goes swiftly.&lt;br /&gt;
&lt;br /&gt;
First thing of note with going from CIMC 3.1(2c) to 3.1(3k) is that the CIMC&#039;s SSH server now supports more modern SSH host keys.  No more need for &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; when pointing an SSH client at the CIMC.&lt;br /&gt;
&lt;br /&gt;
Also, following the release notes, jumping straight from 3.1(2c) to the most recent 4.3(2.260007) is almost certainly not a thing.  I have been doing it in increments so far: 3.1(2c) -&amp;gt; 3.1(3k) -&amp;gt; 4.0(4n) -&amp;gt; 4.1(3n) -&amp;gt; 4.2(3l)&lt;br /&gt;
&lt;br /&gt;
4.1(3n) includes some sort of cloud management functionality which I probably don&#039;t want.  It is called &amp;quot;Cisco Intersight.&amp;quot;  It will get its own section.&lt;br /&gt;
&lt;br /&gt;
== Cisco Intersight Cloud Management ==&lt;br /&gt;
Yeah, what I said just above.  I am pretty sure I don&#039;t want this.  Do not need this server&#039;s BMC phoning home to the Cisco mothership.  Need to do some reading about turning it off.&lt;br /&gt;
&lt;br /&gt;
It turns out to not to too difficult.  Kinda hidden, but here&#039;s how I did it:&lt;br /&gt;
&lt;br /&gt;
# Log into CIMC web UI.  You will be looking at the Chassis / Summary page.&lt;br /&gt;
# Click on the icon in the top left corner.  It is pretty much a three bar &amp;quot;hamburger&amp;quot; menu with a right-pointing arrow over its top.&lt;br /&gt;
# At the bottom of the just-exposed navigation pane, select the Admin / Device Connector link.&lt;br /&gt;
# On the right side of the Device Connector page, find the &amp;quot;Settings&amp;quot; link and follow it.&lt;br /&gt;
# Toggle Device Connector off, save settings, enjoy some peace about not having your server watching you quite as much.&lt;br /&gt;
&lt;br /&gt;
The above is what I did on CIMC 4.1(3n).  It may be different in newer releases.  It may also be re-activated after further firmware updates.  So make a note to check this one after more of those.&lt;br /&gt;
&lt;br /&gt;
== Doing things with the CIMC ==&lt;br /&gt;
=== Restarting the CIMC ===&lt;br /&gt;
The web UI has a &amp;quot;CIMC Reboot&amp;quot; link toward the top right of the main page.  At least while running CIMC 4.3 code.  From an SSH session, do the following after logging in:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /cimc # &#039;&#039;&#039;reboot&#039;&#039;&#039;&lt;br /&gt;
 This operation will reboot the Cisco IMC.&lt;br /&gt;
 Continue?[y|N]&#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
and wait for it to restart.&lt;br /&gt;
&lt;br /&gt;
=== Server Power Control ===&lt;br /&gt;
Pretty easy:&lt;br /&gt;
 C220-WZP22040X50# &lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope chassis&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;power on&#039;&#039;&#039;&lt;br /&gt;
 Do you want to continue?[y|N]&#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50# &lt;br /&gt;
&lt;br /&gt;
=== Serial over LAN ===&lt;br /&gt;
This is a bit different than Dell&#039;s iDRAC or HP(E)&#039;s iLO.  It gets its own dedicated SSH port.  From an SSH connection to the CIMC, the configuration can be listed out like so:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;show sol detail&#039;&#039;&#039;&lt;br /&gt;
 Serial Over LAN:&lt;br /&gt;
     Enabled: no&lt;br /&gt;
     Baud Rate(bps): 115200&lt;br /&gt;
     Com Port: com0&lt;br /&gt;
     SOL SSH Port: 2400&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
It does need to be explicitly enabled.  Again, to do that from the CIMC SSH interface (there are maybe BIOS config and CMIC web interface toggles for this, too) do this:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope sol&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol # &#039;&#039;&#039;set enabled yes&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol *# &#039;&#039;&#039;commit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
And that is done, so connect to the SSH server on port 2400.  With OpenSSH, that is done by specifying &amp;lt;code&amp;gt;-p 2400&amp;lt;/code&amp;gt; on the &amp;lt;code&amp;gt;ssh&amp;lt;/code&amp;gt; command line.  Something like:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -p 2400 admin@172.16.10.160&#039;&#039;&#039;&lt;br /&gt;
 admin@172.16.10.160&#039;s password: &lt;br /&gt;
 CISCO Serial Over LAN:&lt;br /&gt;
 Press Ctrl+x to Exit the session&lt;br /&gt;
 &lt;br /&gt;
 CISCO Serial Over LAN exited&lt;br /&gt;
 Connection to 172.16.10.160 closed.&lt;br /&gt;
 $&lt;br /&gt;
&lt;br /&gt;
== Mass storage devices, RAID, JBOD, and such ==&lt;br /&gt;
The ECS C220 M5 has a Broadcom/LSI MegaRAID Tri-Mode SAS3516 attached to the disk backplane in the front of the chassis.&lt;br /&gt;
&lt;br /&gt;
I prefer running my disk interfaces in JBOD (just a bunch of disks) or pass-through mode, exposing the individual physical storage devices to the operating system, and using OS tooling to manage redundancy.  As this server arrived running VMware ESXi, an OS without those data redundancy management features, the server came using the SAS3516 RAID controller set up to present 2 virtual disks to the OS.  Setting the controller to JBOD mode is possible, though.  To get to the MegaRAID configuration without a running OS equipped with &amp;lt;code&amp;gt;storcli&amp;lt;/code&amp;gt; and related tools, restart the server, and enter the BIOS setup interface by hitting &amp;lt;code&amp;gt;F2&amp;lt;/code&amp;gt; before the boot loader is started.  This can be done on the VGA console, CIMC virtual VGA console, or even the serial console.  From the main screen, right arrow over to the Advanced screen and then down to the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu option.  From there, navigate down to &amp;lt;code&amp;gt;Set Factory Defaults&amp;lt;/code&amp;gt;, select it, and reboot server.  Then enter the BIOS setup screens before control is passed to the boot loader again.  This time through, the existing virtual drives will be deleted:&lt;br /&gt;
* From main BIOS config menu screen, arrow right to Advanced&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;View Server Profile&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Virtual Drive Management&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* A list of virtual drives is now presented.  For each virtual drive in the list:&lt;br /&gt;
** Press Enter to see the Virtual Drive Details&lt;br /&gt;
** Press Enter again, to open the Operation menu&lt;br /&gt;
** Arrow down to &amp;lt;code&amp;gt;Delete Virtual Drive&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
** Select the &amp;lt;code&amp;gt;Go&amp;lt;/code&amp;gt; option presented beneath the now selected &amp;lt;code&amp;gt;Delete Virtual Drive&amp;lt;/code&amp;gt; operation.&lt;br /&gt;
** Change the &amp;lt;code&amp;gt;Confirm&amp;lt;/code&amp;gt; setting in the next menu to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt;.&lt;br /&gt;
** Select &amp;lt;code&amp;gt;Yes&amp;lt;/code&amp;gt; in the menu.&lt;br /&gt;
** Select &amp;lt;code&amp;gt;OK&amp;lt;/code&amp;gt; to return to the list of existing virtual drives.&lt;br /&gt;
* When the list of virtual drives is empty, return to the top level of the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Configure&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Make JBOD&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Check All&amp;lt;/code&amp;gt; from the menu.  This option is displayed after the list of physical drives the controller has found.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;OK&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Move up and change the &amp;lt;code&amp;gt;Confirm&amp;lt;/code&amp;gt; setting to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt;&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Yes&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Return to the top level of the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu.&lt;br /&gt;
* Save configuration, reboot server, and enter the BIOS setup screen one more time (press &amp;lt;code&amp;gt;F2&amp;lt;/code&amp;gt;).&lt;br /&gt;
* From main BIOS config menu screen, arrow right to Advanced&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;View Server Profile&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Controller Management&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Advanced Controller Properties&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;JBOD Mode&amp;lt;/code&amp;gt; and set to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt; if it is not already so.&lt;br /&gt;
* Save changes and reset the system one more time&lt;br /&gt;
From here, operating system installation can commence.  Or storage device firmware updates.  Or whatever...&lt;br /&gt;
&lt;br /&gt;
== Storage media with SCSI Protection Information need not apply ==&lt;br /&gt;
Yeah, so the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; does not like these at all.  These would be drives that do not have 512-byte or 4096-byte sectors.  Often such drives are NetApp or EMC or 3PAR pulls. Drop into a Dell machine with perhaps a LSI SAS2008 instead and do something like&lt;br /&gt;
 $ &#039;&#039;&#039;sudo sg_format --verbose --verbose --format --quick --size=512 --fmtpinfo=0 --pfu=0 /dev/sg3&#039;&#039;&#039;&lt;br /&gt;
to such a drive before trying anything in the UCS server.  Ugh...&lt;br /&gt;
&lt;br /&gt;
== JBOD operations ==&lt;br /&gt;
JBOD mode, right?  Plug in a disk, maybe scan the bus, watch it go, right?  Well, no.  That would be too easy.  Instead, one can SSH to the CIMC and do something like this:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope chassis&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;scope storageadapter MRAID&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter # &#039;&#039;&#039;scope physical-drive 2&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive # &#039;&#039;&#039;make-jbod&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive # &lt;br /&gt;
And then search for it from the OS.  Hopefully.&lt;br /&gt;
&lt;br /&gt;
== Hardware Fault Resolution ==&lt;br /&gt;
Before arriving in the data center and being put into service, my first UCS C series server had a memory DIMM removed to count how much RAM was installed.  It was won at auction and no hardware specs were supplied.  The DIMM was not correctly re-seated before the server was powered on.  The POST code correctly flagged the issue, deactivated the DIMM, and made entries in the System Event Log (SEL) &#039;&#039;&#039;and&#039;&#039;&#039; a Cisco specific Fault History Log.  The SEL is easy enough to clear with &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; from the running OS, or from the CIMC.  However, the Fault History Log is separate.  &amp;lt;strike&amp;gt;Google&amp;lt;/strike&amp;gt; Duck Duck Go search results have indicated the server&#039;s Fault History Log may be clearable with the Cisco UCS Manager software.  [[UCS Manager]] is a whole separate thing and has its own page.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1577</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1577"/>
		<updated>2026-03-24T22:44:15Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* CIMC networking */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Configure some VLANs on the FI uplink ports ???&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1576</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1576"/>
		<updated>2026-03-24T22:41:51Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Server and Infrastructure issues */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;br /&gt;
== CIMC networking ==&lt;br /&gt;
This is going to get us started with attaching the Fabric Interconnect(s) to the rest of the network.  Hopefully things go mostly OK.  The network at large is all Brocade and Mellanox gear.  But here&#039;s the strategy statement:&lt;br /&gt;
* Create a Link Aggregation Group interface on the appropriate top-of-rack Brocade ICX switches.  Pipe all VLANs we care about (management and generic server, 10 and 1000) to that LAG.&lt;br /&gt;
* Configure the Fabric Interconnect with some uplink ports to connect to the Brocade LAG interfaces.&lt;br /&gt;
* Plumb the management VLAN to the blade servers&#039; CIMC network.&lt;br /&gt;
=== Brocade config ===&lt;br /&gt;
Fairly simple, really.  Add this to the switch&#039;s config (from elevated privileges prompt (enable mode) do &amp;lt;code&amp;gt;configure terminal&amp;lt;/code&amp;gt; and save (&amp;lt;code&amp;gt;write memory&amp;lt;/code&amp;gt;) when done.&lt;br /&gt;
 lag rack-2-to-ucs-fi-6248up-0 dynamic id 3&lt;br /&gt;
  ports ethernet 1/3/2 ethernet 2/3/2 &lt;br /&gt;
  primary-port 1/3/2&lt;br /&gt;
  deploy&lt;br /&gt;
And to validate:&lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&#039;&#039;&#039;show lag rack-2-to-ucs-fi-6248up-0&#039;&#039;&#039;&lt;br /&gt;
 Total number of LAGs:          3&lt;br /&gt;
 Total number of deployed LAGs: 3&lt;br /&gt;
 Total number of trunks created:3 (117 available)&lt;br /&gt;
 LACP System Priority / ID:     1 / 748e.f8dd.6228&lt;br /&gt;
 LACP Long timeout:             120, default: 120&lt;br /&gt;
 LACP Short timeout:            3, default: 3&lt;br /&gt;
 &lt;br /&gt;
 === LAG &amp;quot;rack-2-to-ucs-fi-6248up-0&amp;quot; ID 3 (dynamic Deployed) ===&lt;br /&gt;
 LAG Configuration:&lt;br /&gt;
    Ports:         e 1/3/2 e 2/3/2 &lt;br /&gt;
    Port Count:    2&lt;br /&gt;
    Primary Port:  1/3/2&lt;br /&gt;
    Trunk Type:    hash-based&lt;br /&gt;
    LACP Key:      20003&lt;br /&gt;
 Deployment: HW Trunk ID 3&lt;br /&gt;
 Port       Link    State   Dupl Speed Trunk Tag Pvid Pri MAC             Name&lt;br /&gt;
 1/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 2/3/2      Down    None    None None  3     Yes N/A  0   748e.f8dd.6264                 &lt;br /&gt;
 &lt;br /&gt;
 Port       [Sys P] [Port P] [ Key ] [Act][Tio][Agg][Syn][Col][Dis][Def][Exp][Ope]&lt;br /&gt;
 1/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 2/3/2           1        1   20003   Yes   S   Agg  Syn  No   No   Def  No   Dwn&lt;br /&gt;
 &lt;br /&gt;
                                                                  &lt;br /&gt;
  Partner Info and PDU Statistics &lt;br /&gt;
 Port          Partner         Partner     LACP      LACP     &lt;br /&gt;
              System ID         Key     Rx Count  Tx Count  &lt;br /&gt;
 1/3/2    1-0000.0000.0000      129        0         0&lt;br /&gt;
 2/3/2    1-0000.0000.0000      385        0         0&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 SSH@brocade-icx6610-48p-rack-2#&lt;br /&gt;
So that was not terrible.&lt;br /&gt;
=== UCS Fabric Interconnect uplink ports ===&lt;br /&gt;
&lt;br /&gt;
Need to make some.  Kinda like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-uplink&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id&lt;br /&gt;
     --&lt;br /&gt;
     A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task 1:&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;show fabric a expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 17&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;create interface 1 19&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface* # &#039;&#039;&#039;commit-buffer &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric # &#039;&#039;&#039;show interface &#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Slot Id    Port Id    Admin State Oper State       Lic State            Grace Period    State Reason Ethernet Link Profile name Oper Ethernet Link Profile name&lt;br /&gt;
 ---------- ---------- ----------- ---------------- -------------------- --------------- ------------ -------------------------- -------------------------------&lt;br /&gt;
 1          17         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 1          19         Enabled     Up               License Ok                         0              default                    fabric/lan/eth-link-prof-default&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-uplink/fabric #&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Cisco_UCS_Rack_servers&amp;diff=1575</id>
		<title>Cisco UCS Rack servers</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Cisco_UCS_Rack_servers&amp;diff=1575"/>
		<updated>2026-03-24T21:13:51Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* JBOD operations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Acquired a Cisco UCS C220 M5 on 2026-03-10.  Here are some notes.&lt;br /&gt;
&lt;br /&gt;
== Network based management ==&lt;br /&gt;
CIMC, the Cisco Integrated Management Controller.  On the machine I have obtained, this was not configured to use the dedicated management Ethernet interface on the back of the server.  This is easily corrected while the machine starts up.  Pressing F8 from a USB keyboard during the server&#039;s power on self test sequence will bring up the CIMC configuration screen.  From there, the dedicated NIC option, IPv4 option, and DHCP enabled can be selected to do the expected things.  After those are selected, press the &amp;lt;code&amp;gt;&amp;amp;lt;F1&amp;amp;gt;&amp;lt;/code&amp;gt; key and fix the dedicated NIC port properties if the need any adjustment.&lt;br /&gt;
&lt;br /&gt;
The CIMC is accessible over https and SSH. At first login (at least by HTTPS), a new password must be set.  None of Dell&#039;s just warning &amp;quot;Heh, you have the default credentials.  Not recommended!&amp;quot; warning stuff.&lt;br /&gt;
&lt;br /&gt;
== Firmware updates ==&lt;br /&gt;
As acquired, server s/n WZP22040X50 is running BIOS version C220M5.3.1.2b.0.1025170315 and CIMC version 3.1(2c).  Cisco&#039;s firmware update process is heavier weight than some other vendors&#039;.  More like HP(E)&#039;s Service Pack for Proliant than Dells &amp;quot;get iDRAC to download update images from an FTP or web server.&amp;quot;  An ISO image must be downloaded and booted from.  (This is maybe avoidable.  And if is, updates will be made to document the process here.)  As we are running 3.1 release code now, download the final update ISO image, 3.1(3k).  This is free-as-in-beer with an account on Cisco&#039;s support site.  No $$$ required.  I have not read every line of the release notes to understand whether entire release trains can be skipped in the upgrade process.&lt;br /&gt;
&lt;br /&gt;
One thing that is nice about getting the account created: they have a notification system a customer can sign up for when sends an email when new firmware is released.  With options for weekly, daily, or monthly notications.&lt;br /&gt;
&lt;br /&gt;
After the ISO is downloaded, open the KVM on the server&#039;s CIMC and attach it to the server using the appropriate item in the &amp;quot;Virtual Media&amp;quot; menu.  Reboot server and press the &amp;lt;code&amp;gt;&amp;amp;lt;F6&amp;amp;gt;&amp;lt;/code&amp;gt; key at the appropriate time to invoke the boot device selection menu.  From there, boot from the Cisco vKVM attached ISO image.  Wait patiently.  After several minutes, you might catch Linux kernel boot messages.  And shortly after that, something about the Cisco UCS Host Upgrade Utility Version 3.1.3k doing its work.  Then wait some more.  The Host Update Utility is not very good about giving progress updates.  At least not this version.  After 5-10 minutes an &amp;quot;accept the license&amp;quot; screen will appear.  Do the obvious.  And then, the easy thing is to use the &amp;quot;Update All&amp;quot; button and get all updates applied.  Wait patiently some more.  But at least we get some progress reports as the actual updates are applied.  After all desired updates are complete, select &amp;quot;Exit&amp;quot;  The CIMC will reboot if its code was updated.  And the server will as well.&lt;br /&gt;
&lt;br /&gt;
If the paranoia is very strong with you, Host Upgrade Utility ISO can be booted from a second time, and all updates verified.  The boot and utility loading are just as excruciatingly slow as the actual update, but the verification itself goes swiftly.&lt;br /&gt;
&lt;br /&gt;
First thing of note with going from CIMC 3.1(2c) to 3.1(3k) is that the CIMC&#039;s SSH server now supports more modern SSH host keys.  No more need for &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; when pointing an SSH client at the CIMC.&lt;br /&gt;
&lt;br /&gt;
Also, following the release notes, jumping straight from 3.1(2c) to the most recent 4.3(2.260007) is almost certainly not a thing.  I have been doing it in increments so far: 3.1(2c) -&amp;gt; 3.1(3k) -&amp;gt; 4.0(4n) -&amp;gt; 4.1(3n) -&amp;gt; 4.2(3l)&lt;br /&gt;
&lt;br /&gt;
4.1(3n) includes some sort of cloud management functionality which I probably don&#039;t want.  It is called &amp;quot;Cisco Intersight.&amp;quot;  It will get its own section.&lt;br /&gt;
&lt;br /&gt;
== Cisco Intersight Cloud Management ==&lt;br /&gt;
Yeah, what I said just above.  I am pretty sure I don&#039;t want this.  Do not need this server&#039;s BMC phoning home to the Cisco mothership.  Need to do some reading about turning it off.&lt;br /&gt;
&lt;br /&gt;
It turns out to not to too difficult.  Kinda hidden, but here&#039;s how I did it:&lt;br /&gt;
&lt;br /&gt;
# Log into CIMC web UI.  You will be looking at the Chassis / Summary page.&lt;br /&gt;
# Click on the icon in the top left corner.  It is pretty much a three bar &amp;quot;hamburger&amp;quot; menu with a right-pointing arrow over its top.&lt;br /&gt;
# At the bottom of the just-exposed navigation pane, select the Admin / Device Connector link.&lt;br /&gt;
# On the right side of the Device Connector page, find the &amp;quot;Settings&amp;quot; link and follow it.&lt;br /&gt;
# Toggle Device Connector off, save settings, enjoy some peace about not having your server watching you quite as much.&lt;br /&gt;
&lt;br /&gt;
The above is what I did on CIMC 4.1(3n).  It may be different in newer releases.  It may also be re-activated after further firmware updates.  So make a note to check this one after more of those.&lt;br /&gt;
&lt;br /&gt;
== Doing things with the CIMC ==&lt;br /&gt;
=== Restarting the CIMC ===&lt;br /&gt;
The web UI has a &amp;quot;CIMC Reboot&amp;quot; link toward the top right of the main page.  At least while running CIMC 4.3 code.  From an SSH session, do the following after logging in:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /cimc # &#039;&#039;&#039;reboot&#039;&#039;&#039;&lt;br /&gt;
 This operation will reboot the Cisco IMC.&lt;br /&gt;
 Continue?[y|N]&#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
and wait for it to restart.&lt;br /&gt;
&lt;br /&gt;
=== Serial over LAN ===&lt;br /&gt;
This is a bit different than Dell&#039;s iDRAC or HP(E)&#039;s iLO.  It gets its own dedicated SSH port.  From an SSH connection to the CIMC, the configuration can be listed out like so:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;show sol detail&#039;&#039;&#039;&lt;br /&gt;
 Serial Over LAN:&lt;br /&gt;
     Enabled: no&lt;br /&gt;
     Baud Rate(bps): 115200&lt;br /&gt;
     Com Port: com0&lt;br /&gt;
     SOL SSH Port: 2400&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
It does need to be explicitly enabled.  Again, to do that from the CIMC SSH interface (there are maybe BIOS config and CMIC web interface toggles for this, too) do this:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope sol&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol # &#039;&#039;&#039;set enabled yes&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol *# &#039;&#039;&#039;commit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
And that is done, so connect to the SSH server on port 2400.  With OpenSSH, that is done by specifying &amp;lt;code&amp;gt;-p 2400&amp;lt;/code&amp;gt; on the &amp;lt;code&amp;gt;ssh&amp;lt;/code&amp;gt; command line.  Something like:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -p 2400 admin@172.16.10.160&#039;&#039;&#039;&lt;br /&gt;
 admin@172.16.10.160&#039;s password: &lt;br /&gt;
 CISCO Serial Over LAN:&lt;br /&gt;
 Press Ctrl+x to Exit the session&lt;br /&gt;
 &lt;br /&gt;
 CISCO Serial Over LAN exited&lt;br /&gt;
 Connection to 172.16.10.160 closed.&lt;br /&gt;
 $&lt;br /&gt;
&lt;br /&gt;
== Mass storage devices, RAID, JBOD, and such ==&lt;br /&gt;
The ECS C220 M5 has a Broadcom/LSI MegaRAID Tri-Mode SAS3516 attached to the disk backplane in the front of the chassis.&lt;br /&gt;
&lt;br /&gt;
I prefer running my disk interfaces in JBOD (just a bunch of disks) or pass-through mode, exposing the individual physical storage devices to the operating system, and using OS tooling to manage redundancy.  As this server arrived running VMware ESXi, an OS without those data redundancy management features, the server came using the SAS3516 RAID controller set up to present 2 virtual disks to the OS.  Setting the controller to JBOD mode is possible, though.  To get to the MegaRAID configuration without a running OS equipped with &amp;lt;code&amp;gt;storcli&amp;lt;/code&amp;gt; and related tools, restart the server, and enter the BIOS setup interface by hitting &amp;lt;code&amp;gt;F2&amp;lt;/code&amp;gt; before the boot loader is started.  This can be done on the VGA console, CIMC virtual VGA console, or even the serial console.  From the main screen, right arrow over to the Advanced screen and then down to the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu option.  From there, navigate down to &amp;lt;code&amp;gt;Set Factory Defaults&amp;lt;/code&amp;gt;, select it, and reboot server.  Then enter the BIOS setup screens before control is passed to the boot loader again.  This time through, the existing virtual drives will be deleted:&lt;br /&gt;
* From main BIOS config menu screen, arrow right to Advanced&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;View Server Profile&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Virtual Drive Management&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* A list of virtual drives is now presented.  For each virtual drive in the list:&lt;br /&gt;
** Press Enter to see the Virtual Drive Details&lt;br /&gt;
** Press Enter again, to open the Operation menu&lt;br /&gt;
** Arrow down to &amp;lt;code&amp;gt;Delete Virtual Drive&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
** Select the &amp;lt;code&amp;gt;Go&amp;lt;/code&amp;gt; option presented beneath the now selected &amp;lt;code&amp;gt;Delete Virtual Drive&amp;lt;/code&amp;gt; operation.&lt;br /&gt;
** Change the &amp;lt;code&amp;gt;Confirm&amp;lt;/code&amp;gt; setting in the next menu to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt;.&lt;br /&gt;
** Select &amp;lt;code&amp;gt;Yes&amp;lt;/code&amp;gt; in the menu.&lt;br /&gt;
** Select &amp;lt;code&amp;gt;OK&amp;lt;/code&amp;gt; to return to the list of existing virtual drives.&lt;br /&gt;
* When the list of virtual drives is empty, return to the top level of the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Configure&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Make JBOD&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Check All&amp;lt;/code&amp;gt; from the menu.  This option is displayed after the list of physical drives the controller has found.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;OK&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Move up and change the &amp;lt;code&amp;gt;Confirm&amp;lt;/code&amp;gt; setting to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt;&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Yes&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Return to the top level of the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu.&lt;br /&gt;
* Save configuration, reboot server, and enter the BIOS setup screen one more time (press &amp;lt;code&amp;gt;F2&amp;lt;/code&amp;gt;).&lt;br /&gt;
* From main BIOS config menu screen, arrow right to Advanced&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;View Server Profile&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Controller Management&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Advanced Controller Properties&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;JBOD Mode&amp;lt;/code&amp;gt; and set to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt; if it is not already so.&lt;br /&gt;
* Save changes and reset the system one more time&lt;br /&gt;
From here, operating system installation can commence.  Or storage device firmware updates.  Or whatever...&lt;br /&gt;
&lt;br /&gt;
== Storage media with SCSI Protection Information need not apply ==&lt;br /&gt;
Yeah, so the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; does not like these at all.  These would be drives that do not have 512-byte or 4096-byte sectors.  Often such drives are NetApp or EMC or 3PAR pulls. Drop into a Dell machine with perhaps a LSI SAS2008 instead and do something like&lt;br /&gt;
 $ &#039;&#039;&#039;sudo sg_format --verbose --verbose --format --quick --size=512 --fmtpinfo=0 --pfu=0 /dev/sg3&#039;&#039;&#039;&lt;br /&gt;
to such a drive before trying anything in the UCS server.  Ugh...&lt;br /&gt;
&lt;br /&gt;
== JBOD operations ==&lt;br /&gt;
JBOD mode, right?  Plug in a disk, maybe scan the bus, watch it go, right?  Well, no.  That would be too easy.  Instead, one can SSH to the CIMC and do something like this:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope chassis&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;scope storageadapter MRAID&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter # &#039;&#039;&#039;scope physical-drive 2&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive # &#039;&#039;&#039;make-jbod&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive # &lt;br /&gt;
And then search for it from the OS.  Hopefully.&lt;br /&gt;
&lt;br /&gt;
== Hardware Fault Resolution ==&lt;br /&gt;
Before arriving in the data center and being put into service, my first UCS C series server had a memory DIMM removed to count how much RAM was installed.  It was won at auction and no hardware specs were supplied.  The DIMM was not correctly re-seated before the server was powered on.  The POST code correctly flagged the issue, deactivated the DIMM, and made entries in the System Event Log (SEL) &#039;&#039;&#039;and&#039;&#039;&#039; a Cisco specific Fault History Log.  The SEL is easy enough to clear with &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; from the running OS, or from the CIMC.  However, the Fault History Log is separate.  &amp;lt;strike&amp;gt;Google&amp;lt;/strike&amp;gt; Duck Duck Go search results have indicated the server&#039;s Fault History Log may be clearable with the Cisco UCS Manager software.  [[UCS Manager]] is a whole separate thing and has its own page.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Cisco_UCS_Rack_servers&amp;diff=1574</id>
		<title>Cisco UCS Rack servers</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Cisco_UCS_Rack_servers&amp;diff=1574"/>
		<updated>2026-03-24T21:07:17Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Storage media with SCSI Protection Information need not apply */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Acquired a Cisco UCS C220 M5 on 2026-03-10.  Here are some notes.&lt;br /&gt;
&lt;br /&gt;
== Network based management ==&lt;br /&gt;
CIMC, the Cisco Integrated Management Controller.  On the machine I have obtained, this was not configured to use the dedicated management Ethernet interface on the back of the server.  This is easily corrected while the machine starts up.  Pressing F8 from a USB keyboard during the server&#039;s power on self test sequence will bring up the CIMC configuration screen.  From there, the dedicated NIC option, IPv4 option, and DHCP enabled can be selected to do the expected things.  After those are selected, press the &amp;lt;code&amp;gt;&amp;amp;lt;F1&amp;amp;gt;&amp;lt;/code&amp;gt; key and fix the dedicated NIC port properties if the need any adjustment.&lt;br /&gt;
&lt;br /&gt;
The CIMC is accessible over https and SSH. At first login (at least by HTTPS), a new password must be set.  None of Dell&#039;s just warning &amp;quot;Heh, you have the default credentials.  Not recommended!&amp;quot; warning stuff.&lt;br /&gt;
&lt;br /&gt;
== Firmware updates ==&lt;br /&gt;
As acquired, server s/n WZP22040X50 is running BIOS version C220M5.3.1.2b.0.1025170315 and CIMC version 3.1(2c).  Cisco&#039;s firmware update process is heavier weight than some other vendors&#039;.  More like HP(E)&#039;s Service Pack for Proliant than Dells &amp;quot;get iDRAC to download update images from an FTP or web server.&amp;quot;  An ISO image must be downloaded and booted from.  (This is maybe avoidable.  And if is, updates will be made to document the process here.)  As we are running 3.1 release code now, download the final update ISO image, 3.1(3k).  This is free-as-in-beer with an account on Cisco&#039;s support site.  No $$$ required.  I have not read every line of the release notes to understand whether entire release trains can be skipped in the upgrade process.&lt;br /&gt;
&lt;br /&gt;
One thing that is nice about getting the account created: they have a notification system a customer can sign up for when sends an email when new firmware is released.  With options for weekly, daily, or monthly notications.&lt;br /&gt;
&lt;br /&gt;
After the ISO is downloaded, open the KVM on the server&#039;s CIMC and attach it to the server using the appropriate item in the &amp;quot;Virtual Media&amp;quot; menu.  Reboot server and press the &amp;lt;code&amp;gt;&amp;amp;lt;F6&amp;amp;gt;&amp;lt;/code&amp;gt; key at the appropriate time to invoke the boot device selection menu.  From there, boot from the Cisco vKVM attached ISO image.  Wait patiently.  After several minutes, you might catch Linux kernel boot messages.  And shortly after that, something about the Cisco UCS Host Upgrade Utility Version 3.1.3k doing its work.  Then wait some more.  The Host Update Utility is not very good about giving progress updates.  At least not this version.  After 5-10 minutes an &amp;quot;accept the license&amp;quot; screen will appear.  Do the obvious.  And then, the easy thing is to use the &amp;quot;Update All&amp;quot; button and get all updates applied.  Wait patiently some more.  But at least we get some progress reports as the actual updates are applied.  After all desired updates are complete, select &amp;quot;Exit&amp;quot;  The CIMC will reboot if its code was updated.  And the server will as well.&lt;br /&gt;
&lt;br /&gt;
If the paranoia is very strong with you, Host Upgrade Utility ISO can be booted from a second time, and all updates verified.  The boot and utility loading are just as excruciatingly slow as the actual update, but the verification itself goes swiftly.&lt;br /&gt;
&lt;br /&gt;
First thing of note with going from CIMC 3.1(2c) to 3.1(3k) is that the CIMC&#039;s SSH server now supports more modern SSH host keys.  No more need for &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; when pointing an SSH client at the CIMC.&lt;br /&gt;
&lt;br /&gt;
Also, following the release notes, jumping straight from 3.1(2c) to the most recent 4.3(2.260007) is almost certainly not a thing.  I have been doing it in increments so far: 3.1(2c) -&amp;gt; 3.1(3k) -&amp;gt; 4.0(4n) -&amp;gt; 4.1(3n) -&amp;gt; 4.2(3l)&lt;br /&gt;
&lt;br /&gt;
4.1(3n) includes some sort of cloud management functionality which I probably don&#039;t want.  It is called &amp;quot;Cisco Intersight.&amp;quot;  It will get its own section.&lt;br /&gt;
&lt;br /&gt;
== Cisco Intersight Cloud Management ==&lt;br /&gt;
Yeah, what I said just above.  I am pretty sure I don&#039;t want this.  Do not need this server&#039;s BMC phoning home to the Cisco mothership.  Need to do some reading about turning it off.&lt;br /&gt;
&lt;br /&gt;
It turns out to not to too difficult.  Kinda hidden, but here&#039;s how I did it:&lt;br /&gt;
&lt;br /&gt;
# Log into CIMC web UI.  You will be looking at the Chassis / Summary page.&lt;br /&gt;
# Click on the icon in the top left corner.  It is pretty much a three bar &amp;quot;hamburger&amp;quot; menu with a right-pointing arrow over its top.&lt;br /&gt;
# At the bottom of the just-exposed navigation pane, select the Admin / Device Connector link.&lt;br /&gt;
# On the right side of the Device Connector page, find the &amp;quot;Settings&amp;quot; link and follow it.&lt;br /&gt;
# Toggle Device Connector off, save settings, enjoy some peace about not having your server watching you quite as much.&lt;br /&gt;
&lt;br /&gt;
The above is what I did on CIMC 4.1(3n).  It may be different in newer releases.  It may also be re-activated after further firmware updates.  So make a note to check this one after more of those.&lt;br /&gt;
&lt;br /&gt;
== Doing things with the CIMC ==&lt;br /&gt;
=== Restarting the CIMC ===&lt;br /&gt;
The web UI has a &amp;quot;CIMC Reboot&amp;quot; link toward the top right of the main page.  At least while running CIMC 4.3 code.  From an SSH session, do the following after logging in:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /cimc # &#039;&#039;&#039;reboot&#039;&#039;&#039;&lt;br /&gt;
 This operation will reboot the Cisco IMC.&lt;br /&gt;
 Continue?[y|N]&#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
and wait for it to restart.&lt;br /&gt;
&lt;br /&gt;
=== Serial over LAN ===&lt;br /&gt;
This is a bit different than Dell&#039;s iDRAC or HP(E)&#039;s iLO.  It gets its own dedicated SSH port.  From an SSH connection to the CIMC, the configuration can be listed out like so:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;show sol detail&#039;&#039;&#039;&lt;br /&gt;
 Serial Over LAN:&lt;br /&gt;
     Enabled: no&lt;br /&gt;
     Baud Rate(bps): 115200&lt;br /&gt;
     Com Port: com0&lt;br /&gt;
     SOL SSH Port: 2400&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
It does need to be explicitly enabled.  Again, to do that from the CIMC SSH interface (there are maybe BIOS config and CMIC web interface toggles for this, too) do this:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope sol&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol # &#039;&#039;&#039;set enabled yes&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol *# &#039;&#039;&#039;commit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
And that is done, so connect to the SSH server on port 2400.  With OpenSSH, that is done by specifying &amp;lt;code&amp;gt;-p 2400&amp;lt;/code&amp;gt; on the &amp;lt;code&amp;gt;ssh&amp;lt;/code&amp;gt; command line.  Something like:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -p 2400 admin@172.16.10.160&#039;&#039;&#039;&lt;br /&gt;
 admin@172.16.10.160&#039;s password: &lt;br /&gt;
 CISCO Serial Over LAN:&lt;br /&gt;
 Press Ctrl+x to Exit the session&lt;br /&gt;
 &lt;br /&gt;
 CISCO Serial Over LAN exited&lt;br /&gt;
 Connection to 172.16.10.160 closed.&lt;br /&gt;
 $&lt;br /&gt;
&lt;br /&gt;
== Mass storage devices, RAID, JBOD, and such ==&lt;br /&gt;
The ECS C220 M5 has a Broadcom/LSI MegaRAID Tri-Mode SAS3516 attached to the disk backplane in the front of the chassis.&lt;br /&gt;
&lt;br /&gt;
I prefer running my disk interfaces in JBOD (just a bunch of disks) or pass-through mode, exposing the individual physical storage devices to the operating system, and using OS tooling to manage redundancy.  As this server arrived running VMware ESXi, an OS without those data redundancy management features, the server came using the SAS3516 RAID controller set up to present 2 virtual disks to the OS.  Setting the controller to JBOD mode is possible, though.  To get to the MegaRAID configuration without a running OS equipped with &amp;lt;code&amp;gt;storcli&amp;lt;/code&amp;gt; and related tools, restart the server, and enter the BIOS setup interface by hitting &amp;lt;code&amp;gt;F2&amp;lt;/code&amp;gt; before the boot loader is started.  This can be done on the VGA console, CIMC virtual VGA console, or even the serial console.  From the main screen, right arrow over to the Advanced screen and then down to the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu option.  From there, navigate down to &amp;lt;code&amp;gt;Set Factory Defaults&amp;lt;/code&amp;gt;, select it, and reboot server.  Then enter the BIOS setup screens before control is passed to the boot loader again.  This time through, the existing virtual drives will be deleted:&lt;br /&gt;
* From main BIOS config menu screen, arrow right to Advanced&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;View Server Profile&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Virtual Drive Management&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* A list of virtual drives is now presented.  For each virtual drive in the list:&lt;br /&gt;
** Press Enter to see the Virtual Drive Details&lt;br /&gt;
** Press Enter again, to open the Operation menu&lt;br /&gt;
** Arrow down to &amp;lt;code&amp;gt;Delete Virtual Drive&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
** Select the &amp;lt;code&amp;gt;Go&amp;lt;/code&amp;gt; option presented beneath the now selected &amp;lt;code&amp;gt;Delete Virtual Drive&amp;lt;/code&amp;gt; operation.&lt;br /&gt;
** Change the &amp;lt;code&amp;gt;Confirm&amp;lt;/code&amp;gt; setting in the next menu to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt;.&lt;br /&gt;
** Select &amp;lt;code&amp;gt;Yes&amp;lt;/code&amp;gt; in the menu.&lt;br /&gt;
** Select &amp;lt;code&amp;gt;OK&amp;lt;/code&amp;gt; to return to the list of existing virtual drives.&lt;br /&gt;
* When the list of virtual drives is empty, return to the top level of the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Configure&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Make JBOD&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Check All&amp;lt;/code&amp;gt; from the menu.  This option is displayed after the list of physical drives the controller has found.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;OK&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Move up and change the &amp;lt;code&amp;gt;Confirm&amp;lt;/code&amp;gt; setting to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt;&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Yes&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Return to the top level of the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu.&lt;br /&gt;
* Save configuration, reboot server, and enter the BIOS setup screen one more time (press &amp;lt;code&amp;gt;F2&amp;lt;/code&amp;gt;).&lt;br /&gt;
* From main BIOS config menu screen, arrow right to Advanced&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;View Server Profile&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Controller Management&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Advanced Controller Properties&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;JBOD Mode&amp;lt;/code&amp;gt; and set to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt; if it is not already so.&lt;br /&gt;
* Save changes and reset the system one more time&lt;br /&gt;
From here, operating system installation can commence.  Or storage device firmware updates.  Or whatever...&lt;br /&gt;
&lt;br /&gt;
== Storage media with SCSI Protection Information need not apply ==&lt;br /&gt;
Yeah, so the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; does not like these at all.  These would be drives that do not have 512-byte or 4096-byte sectors.  Often such drives are NetApp or EMC or 3PAR pulls. Drop into a Dell machine with perhaps a LSI SAS2008 instead and do something like&lt;br /&gt;
 $ &#039;&#039;&#039;sudo sg_format --verbose --verbose --format --quick --size=512 --fmtpinfo=0 --pfu=0 /dev/sg3&#039;&#039;&#039;&lt;br /&gt;
to such a drive before trying anything in the UCS server.  Ugh...&lt;br /&gt;
&lt;br /&gt;
== JBOD operations ==&lt;br /&gt;
JBOD mode, right?  Plug in a disk, maybe scan the bus, watch it go, right?  Well, no.  That would be too easy.  Instead, one can SSH to the CIMC and do this:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope chassis&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;scope storageadapter MRAID&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter # &#039;&#039;&#039;scope physical-drive 2&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive # &#039;&#039;&#039;make-jbod&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive # &lt;br /&gt;
And then search for it from the OS.  Hopefully.&lt;br /&gt;
&lt;br /&gt;
== Hardware Fault Resolution ==&lt;br /&gt;
Before arriving in the data center and being put into service, my first UCS C series server had a memory DIMM removed to count how much RAM was installed.  It was won at auction and no hardware specs were supplied.  The DIMM was not correctly re-seated before the server was powered on.  The POST code correctly flagged the issue, deactivated the DIMM, and made entries in the System Event Log (SEL) &#039;&#039;&#039;and&#039;&#039;&#039; a Cisco specific Fault History Log.  The SEL is easy enough to clear with &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; from the running OS, or from the CIMC.  However, the Fault History Log is separate.  &amp;lt;strike&amp;gt;Google&amp;lt;/strike&amp;gt; Duck Duck Go search results have indicated the server&#039;s Fault History Log may be clearable with the Cisco UCS Manager software.  [[UCS Manager]] is a whole separate thing and has its own page.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Cisco_UCS_Rack_servers&amp;diff=1573</id>
		<title>Cisco UCS Rack servers</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=Cisco_UCS_Rack_servers&amp;diff=1573"/>
		<updated>2026-03-24T21:04:06Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Mass storage devices, RAID, JBOD, and such */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Acquired a Cisco UCS C220 M5 on 2026-03-10.  Here are some notes.&lt;br /&gt;
&lt;br /&gt;
== Network based management ==&lt;br /&gt;
CIMC, the Cisco Integrated Management Controller.  On the machine I have obtained, this was not configured to use the dedicated management Ethernet interface on the back of the server.  This is easily corrected while the machine starts up.  Pressing F8 from a USB keyboard during the server&#039;s power on self test sequence will bring up the CIMC configuration screen.  From there, the dedicated NIC option, IPv4 option, and DHCP enabled can be selected to do the expected things.  After those are selected, press the &amp;lt;code&amp;gt;&amp;amp;lt;F1&amp;amp;gt;&amp;lt;/code&amp;gt; key and fix the dedicated NIC port properties if the need any adjustment.&lt;br /&gt;
&lt;br /&gt;
The CIMC is accessible over https and SSH. At first login (at least by HTTPS), a new password must be set.  None of Dell&#039;s just warning &amp;quot;Heh, you have the default credentials.  Not recommended!&amp;quot; warning stuff.&lt;br /&gt;
&lt;br /&gt;
== Firmware updates ==&lt;br /&gt;
As acquired, server s/n WZP22040X50 is running BIOS version C220M5.3.1.2b.0.1025170315 and CIMC version 3.1(2c).  Cisco&#039;s firmware update process is heavier weight than some other vendors&#039;.  More like HP(E)&#039;s Service Pack for Proliant than Dells &amp;quot;get iDRAC to download update images from an FTP or web server.&amp;quot;  An ISO image must be downloaded and booted from.  (This is maybe avoidable.  And if is, updates will be made to document the process here.)  As we are running 3.1 release code now, download the final update ISO image, 3.1(3k).  This is free-as-in-beer with an account on Cisco&#039;s support site.  No $$$ required.  I have not read every line of the release notes to understand whether entire release trains can be skipped in the upgrade process.&lt;br /&gt;
&lt;br /&gt;
One thing that is nice about getting the account created: they have a notification system a customer can sign up for when sends an email when new firmware is released.  With options for weekly, daily, or monthly notications.&lt;br /&gt;
&lt;br /&gt;
After the ISO is downloaded, open the KVM on the server&#039;s CIMC and attach it to the server using the appropriate item in the &amp;quot;Virtual Media&amp;quot; menu.  Reboot server and press the &amp;lt;code&amp;gt;&amp;amp;lt;F6&amp;amp;gt;&amp;lt;/code&amp;gt; key at the appropriate time to invoke the boot device selection menu.  From there, boot from the Cisco vKVM attached ISO image.  Wait patiently.  After several minutes, you might catch Linux kernel boot messages.  And shortly after that, something about the Cisco UCS Host Upgrade Utility Version 3.1.3k doing its work.  Then wait some more.  The Host Update Utility is not very good about giving progress updates.  At least not this version.  After 5-10 minutes an &amp;quot;accept the license&amp;quot; screen will appear.  Do the obvious.  And then, the easy thing is to use the &amp;quot;Update All&amp;quot; button and get all updates applied.  Wait patiently some more.  But at least we get some progress reports as the actual updates are applied.  After all desired updates are complete, select &amp;quot;Exit&amp;quot;  The CIMC will reboot if its code was updated.  And the server will as well.&lt;br /&gt;
&lt;br /&gt;
If the paranoia is very strong with you, Host Upgrade Utility ISO can be booted from a second time, and all updates verified.  The boot and utility loading are just as excruciatingly slow as the actual update, but the verification itself goes swiftly.&lt;br /&gt;
&lt;br /&gt;
First thing of note with going from CIMC 3.1(2c) to 3.1(3k) is that the CIMC&#039;s SSH server now supports more modern SSH host keys.  No more need for &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; when pointing an SSH client at the CIMC.&lt;br /&gt;
&lt;br /&gt;
Also, following the release notes, jumping straight from 3.1(2c) to the most recent 4.3(2.260007) is almost certainly not a thing.  I have been doing it in increments so far: 3.1(2c) -&amp;gt; 3.1(3k) -&amp;gt; 4.0(4n) -&amp;gt; 4.1(3n) -&amp;gt; 4.2(3l)&lt;br /&gt;
&lt;br /&gt;
4.1(3n) includes some sort of cloud management functionality which I probably don&#039;t want.  It is called &amp;quot;Cisco Intersight.&amp;quot;  It will get its own section.&lt;br /&gt;
&lt;br /&gt;
== Cisco Intersight Cloud Management ==&lt;br /&gt;
Yeah, what I said just above.  I am pretty sure I don&#039;t want this.  Do not need this server&#039;s BMC phoning home to the Cisco mothership.  Need to do some reading about turning it off.&lt;br /&gt;
&lt;br /&gt;
It turns out to not to too difficult.  Kinda hidden, but here&#039;s how I did it:&lt;br /&gt;
&lt;br /&gt;
# Log into CIMC web UI.  You will be looking at the Chassis / Summary page.&lt;br /&gt;
# Click on the icon in the top left corner.  It is pretty much a three bar &amp;quot;hamburger&amp;quot; menu with a right-pointing arrow over its top.&lt;br /&gt;
# At the bottom of the just-exposed navigation pane, select the Admin / Device Connector link.&lt;br /&gt;
# On the right side of the Device Connector page, find the &amp;quot;Settings&amp;quot; link and follow it.&lt;br /&gt;
# Toggle Device Connector off, save settings, enjoy some peace about not having your server watching you quite as much.&lt;br /&gt;
&lt;br /&gt;
The above is what I did on CIMC 4.1(3n).  It may be different in newer releases.  It may also be re-activated after further firmware updates.  So make a note to check this one after more of those.&lt;br /&gt;
&lt;br /&gt;
== Doing things with the CIMC ==&lt;br /&gt;
=== Restarting the CIMC ===&lt;br /&gt;
The web UI has a &amp;quot;CIMC Reboot&amp;quot; link toward the top right of the main page.  At least while running CIMC 4.3 code.  From an SSH session, do the following after logging in:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope cimc&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /cimc # &#039;&#039;&#039;reboot&#039;&#039;&#039;&lt;br /&gt;
 This operation will reboot the Cisco IMC.&lt;br /&gt;
 Continue?[y|N]&#039;&#039;&#039;y&#039;&#039;&#039;&lt;br /&gt;
and wait for it to restart.&lt;br /&gt;
&lt;br /&gt;
=== Serial over LAN ===&lt;br /&gt;
This is a bit different than Dell&#039;s iDRAC or HP(E)&#039;s iLO.  It gets its own dedicated SSH port.  From an SSH connection to the CIMC, the configuration can be listed out like so:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;show sol detail&#039;&#039;&#039;&lt;br /&gt;
 Serial Over LAN:&lt;br /&gt;
     Enabled: no&lt;br /&gt;
     Baud Rate(bps): 115200&lt;br /&gt;
     Com Port: com0&lt;br /&gt;
     SOL SSH Port: 2400&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
It does need to be explicitly enabled.  Again, to do that from the CIMC SSH interface (there are maybe BIOS config and CMIC web interface toggles for this, too) do this:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope sol&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol # &#039;&#039;&#039;set enabled yes&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol *# &#039;&#039;&#039;commit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /sol # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50#&lt;br /&gt;
&lt;br /&gt;
And that is done, so connect to the SSH server on port 2400.  With OpenSSH, that is done by specifying &amp;lt;code&amp;gt;-p 2400&amp;lt;/code&amp;gt; on the &amp;lt;code&amp;gt;ssh&amp;lt;/code&amp;gt; command line.  Something like:&lt;br /&gt;
 $ &#039;&#039;&#039;ssh -p 2400 admin@172.16.10.160&#039;&#039;&#039;&lt;br /&gt;
 admin@172.16.10.160&#039;s password: &lt;br /&gt;
 CISCO Serial Over LAN:&lt;br /&gt;
 Press Ctrl+x to Exit the session&lt;br /&gt;
 &lt;br /&gt;
 CISCO Serial Over LAN exited&lt;br /&gt;
 Connection to 172.16.10.160 closed.&lt;br /&gt;
 $&lt;br /&gt;
&lt;br /&gt;
== Mass storage devices, RAID, JBOD, and such ==&lt;br /&gt;
The ECS C220 M5 has a Broadcom/LSI MegaRAID Tri-Mode SAS3516 attached to the disk backplane in the front of the chassis.&lt;br /&gt;
&lt;br /&gt;
I prefer running my disk interfaces in JBOD (just a bunch of disks) or pass-through mode, exposing the individual physical storage devices to the operating system, and using OS tooling to manage redundancy.  As this server arrived running VMware ESXi, an OS without those data redundancy management features, the server came using the SAS3516 RAID controller set up to present 2 virtual disks to the OS.  Setting the controller to JBOD mode is possible, though.  To get to the MegaRAID configuration without a running OS equipped with &amp;lt;code&amp;gt;storcli&amp;lt;/code&amp;gt; and related tools, restart the server, and enter the BIOS setup interface by hitting &amp;lt;code&amp;gt;F2&amp;lt;/code&amp;gt; before the boot loader is started.  This can be done on the VGA console, CIMC virtual VGA console, or even the serial console.  From the main screen, right arrow over to the Advanced screen and then down to the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu option.  From there, navigate down to &amp;lt;code&amp;gt;Set Factory Defaults&amp;lt;/code&amp;gt;, select it, and reboot server.  Then enter the BIOS setup screens before control is passed to the boot loader again.  This time through, the existing virtual drives will be deleted:&lt;br /&gt;
* From main BIOS config menu screen, arrow right to Advanced&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;View Server Profile&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Virtual Drive Management&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* A list of virtual drives is now presented.  For each virtual drive in the list:&lt;br /&gt;
** Press Enter to see the Virtual Drive Details&lt;br /&gt;
** Press Enter again, to open the Operation menu&lt;br /&gt;
** Arrow down to &amp;lt;code&amp;gt;Delete Virtual Drive&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
** Select the &amp;lt;code&amp;gt;Go&amp;lt;/code&amp;gt; option presented beneath the now selected &amp;lt;code&amp;gt;Delete Virtual Drive&amp;lt;/code&amp;gt; operation.&lt;br /&gt;
** Change the &amp;lt;code&amp;gt;Confirm&amp;lt;/code&amp;gt; setting in the next menu to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt;.&lt;br /&gt;
** Select &amp;lt;code&amp;gt;Yes&amp;lt;/code&amp;gt; in the menu.&lt;br /&gt;
** Select &amp;lt;code&amp;gt;OK&amp;lt;/code&amp;gt; to return to the list of existing virtual drives.&lt;br /&gt;
* When the list of virtual drives is empty, return to the top level of the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Configure&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Make JBOD&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Check All&amp;lt;/code&amp;gt; from the menu.  This option is displayed after the list of physical drives the controller has found.&lt;br /&gt;
* Select &amp;lt;code&amp;gt;OK&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Move up and change the &amp;lt;code&amp;gt;Confirm&amp;lt;/code&amp;gt; setting to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt;&lt;br /&gt;
* Select &amp;lt;code&amp;gt;Yes&amp;lt;/code&amp;gt; from the menu.&lt;br /&gt;
* Return to the top level of the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; menu.&lt;br /&gt;
* Save configuration, reboot server, and enter the BIOS setup screen one more time (press &amp;lt;code&amp;gt;F2&amp;lt;/code&amp;gt;).&lt;br /&gt;
* From main BIOS config menu screen, arrow right to Advanced&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;View Server Profile&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Controller Management&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;Advanced Controller Properties&amp;lt;/code&amp;gt; and press Enter&lt;br /&gt;
* Arrow down to &amp;lt;code&amp;gt;JBOD Mode&amp;lt;/code&amp;gt; and set to &amp;lt;code&amp;gt;Enabled&amp;lt;/code&amp;gt; if it is not already so.&lt;br /&gt;
* Save changes and reset the system one more time&lt;br /&gt;
From here, operating system installation can commence.  Or storage device firmware updates.  Or whatever...&lt;br /&gt;
&lt;br /&gt;
== Storage media with SCSI Protection Information need not apply ==&lt;br /&gt;
Yeah, so the &amp;lt;code&amp;gt;AVAGO &amp;amp;lt;Cisco 12G Modular Raid Controller with 2GB cache (max 16 drives)&amp;amp;gt; Configuration&amp;lt;/code&amp;gt; does not like these at all.  Drop into a Dell machine with perhaps a LSI SAS2008 instead and do something like&lt;br /&gt;
 $ &#039;&#039;&#039;sudo sg_format --verbose --verbose --format --quick --size=512 --fmtpinfo=0 --pfu=0 /dev/sg3&#039;&#039;&#039;&lt;br /&gt;
to such a drive before trying anything in the UCS server.  Ugh...&lt;br /&gt;
&lt;br /&gt;
== JBOD operations ==&lt;br /&gt;
JBOD mode, right?  Plug in a disk, maybe scan the bus, watch it go, right?  Well, no.  That would be too easy.  Instead, one can SSH to the CIMC and do this:&lt;br /&gt;
 C220-WZP22040X50# &#039;&#039;&#039;scope chassis&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis # &#039;&#039;&#039;scope storageadapter MRAID&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter # &#039;&#039;&#039;scope physical-drive 2&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive # &#039;&#039;&#039;make-jbod&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 C220-WZP22040X50 /chassis/storageadapter/physical-drive # &lt;br /&gt;
And then search for it from the OS.  Hopefully.&lt;br /&gt;
&lt;br /&gt;
== Hardware Fault Resolution ==&lt;br /&gt;
Before arriving in the data center and being put into service, my first UCS C series server had a memory DIMM removed to count how much RAM was installed.  It was won at auction and no hardware specs were supplied.  The DIMM was not correctly re-seated before the server was powered on.  The POST code correctly flagged the issue, deactivated the DIMM, and made entries in the System Event Log (SEL) &#039;&#039;&#039;and&#039;&#039;&#039; a Cisco specific Fault History Log.  The SEL is easy enough to clear with &amp;lt;code&amp;gt;ipmitool&amp;lt;/code&amp;gt; from the running OS, or from the CIMC.  However, the Fault History Log is separate.  &amp;lt;strike&amp;gt;Google&amp;lt;/strike&amp;gt; Duck Duck Go search results have indicated the server&#039;s Fault History Log may be clearable with the Cisco UCS Manager software.  [[UCS Manager]] is a whole separate thing and has its own page.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1572</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1572"/>
		<updated>2026-03-24T13:23:48Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* I can power on now? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;br /&gt;
&lt;br /&gt;
== Server and Infrastructure issues ==&lt;br /&gt;
So, we just saw the first one of these above.  The B200 M3 blades do not like Xeon E5-26xx v2 processors.  At least with the firmware installed at present.  Let&#039;s figure that one out first.  https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/blade-servers/B200M3.html#reference_CD3077C1064743F99C0F9A935778BC2F has a little table listing minimum versions for various components to get the Xeon E5-2600 v2 CPUs to run.  These are the required versions for E5-26xx V2 CPUs:&lt;br /&gt;
{|&lt;br /&gt;
 !Software or Firmware&lt;br /&gt;
 !Minimum Version&lt;br /&gt;
 |-&lt;br /&gt;
 |Server CIMC&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Server BIOS&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Cisco UCS Manager&lt;br /&gt;
 |2.1(3)&lt;br /&gt;
 |-&lt;br /&gt;
 |Board controller firmware&lt;br /&gt;
 |8.0&lt;br /&gt;
 |}&lt;br /&gt;
Let&#039;s see if we can see what we are running in one of the blades I have and the UCS Manager itself:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope chassis 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis # &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware cimc&#039;&#039;&#039;&lt;br /&gt;
 Server  Running-Vers    Package-Vers    Update-Status   Activate-Status&lt;br /&gt;
 ------- --------------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     3.1(23c)                        Ready           Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware bios&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     BIOS:&lt;br /&gt;
         Running-Vers: B200M3.2.2.6d.0.062220160055&lt;br /&gt;
         Package-Vers:&lt;br /&gt;
         Update-Status: Ready&lt;br /&gt;
         Activate-Status: Ready&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show firmware boardcontroller&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Management Controller:&lt;br /&gt;
 &lt;br /&gt;
 Server  Running-Vers    Package-Vers    Activate-Status&lt;br /&gt;
 ------- --------------- --------------- ---------------&lt;br /&gt;
 1/1     15.0                            Ready&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
So that is odd.  The requirements listed in Cisco&#039;s documentation for supporting Xeon E5-26xx v2 CPUs &#039;&#039;&#039;are&#039;&#039;&#039; met.  But the blade complains about &amp;quot;Board Programmable version not valid for Processor Type&amp;quot;.  Maybe the blade server&#039;s CIMC could tell us more?&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1571</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1571"/>
		<updated>2026-03-24T00:41:13Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* I can power on now? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.  I found a not obviously damaged E5-2609 in storage (er, piles in the garage) and installed that in the blade.  Let&#039;s see what we have now:&lt;br /&gt;
 ucs-fi-6248up-0-A# scope org /&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show inventory&#039;&#039;&#039;&lt;br /&gt;
 Server 1/1:&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Equipped PID: UCSB-B200-M3&lt;br /&gt;
     Equipped VID: V03&lt;br /&gt;
     Equipped Serial (SN): FCH162871NA&lt;br /&gt;
     Slot Status: Equipped&lt;br /&gt;
     Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
     Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
     Acknowledged VID: V03&lt;br /&gt;
     Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
     Acknowledged Memory (MB): 16384&lt;br /&gt;
     Acknowledged Effective Memory (MB): 16384&lt;br /&gt;
     Acknowledged Cores: 4&lt;br /&gt;
     Acknowledged Adapters: 2&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
Great Success!  The Xeon E5-2609 is a 4 core CPU.  And there are 4x 4GiByte memory DIMMs installed.  So inventory looks good.  Huzzah!  (And what an utter pain.)&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1570</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1570"/>
		<updated>2026-03-23T23:30:24Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Enter an org, see what we have for basic policies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;br /&gt;
&lt;br /&gt;
=== Create a profile and add a (blade) server to it ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory 1 expand &#039;&#039;&#039;&lt;br /&gt;
 Chassis 1:&lt;br /&gt;
     Servers:&lt;br /&gt;
         Server 1/1:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V03&lt;br /&gt;
             Equipped Serial (SN): FCH162871NA&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Acknowledged PID: UCSB-B200-M3&lt;br /&gt;
             Acknowledged VID: V03&lt;br /&gt;
             Acknowledged Serial (SN): FCH162871NA&lt;br /&gt;
             Acknowledged Memory (MB): 196608&lt;br /&gt;
             Acknowledged Effective Memory (MB): 196608&lt;br /&gt;
             Acknowledged Cores: 0&lt;br /&gt;
             Acknowledged Adapters: 2&lt;br /&gt;
 &lt;br /&gt;
         Server 1/2:&lt;br /&gt;
             Equipped Product Name: Cisco UCS B200 M3&lt;br /&gt;
             Equipped PID: UCSB-B200-M3&lt;br /&gt;
             Equipped VID: V06&lt;br /&gt;
             Equipped Serial (SN): FCH1811JELC&lt;br /&gt;
             Slot Status: Equipped&lt;br /&gt;
             Acknowledged Product Name: Cisco UCS B200 M3&lt;br /&gt;
         [...]&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;top&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;create service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;associate server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
=== I can power on now? ===&lt;br /&gt;
Well, no.  Maybe it should have worked.  But for this blade, there was a Power On Self Test (POST) failure.  Let&#039;s dig in.  To power on the server included in the service profile, do this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;scope service-profile UCS_B200_M3_FCH162871NA&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile # &#039;&#039;&#039;power up&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org/service-profile #&lt;br /&gt;
And let&#039;s have a look at its status:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope server 1/1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot    Overall Status        Service Profile      Availability&lt;br /&gt;
     ------- --------------------- -------------------- ------------&lt;br /&gt;
           1 Compute Failed                             Unavailable&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Server:&lt;br /&gt;
     Slot: 1&lt;br /&gt;
     Name:&lt;br /&gt;
     User Label:&lt;br /&gt;
     Overall Status: Compute Failed&lt;br /&gt;
     Oper Qualifier: Compute Post Failure&lt;br /&gt;
     Service Profile:&lt;br /&gt;
     Association: None&lt;br /&gt;
     Availability: Unavailable&lt;br /&gt;
     Discovery: Failed&lt;br /&gt;
     Conn Path: A&lt;br /&gt;
     Conn Status: A&lt;br /&gt;
     Managing Instance: A&lt;br /&gt;
     Admin Power: Policy&lt;br /&gt;
     Oper Power: Off&lt;br /&gt;
     Admin State: In Service&lt;br /&gt;
     Product Name: Cisco UCS B200 M3&lt;br /&gt;
     PID: UCSB-B200-M3&lt;br /&gt;
     VID: V03&lt;br /&gt;
     Vendor: Cisco Systems Inc&lt;br /&gt;
     Serial (SN): FCH162871NA&lt;br /&gt;
     HW Revision: 0&lt;br /&gt;
     Mfg Date: 2012-07-26T00:00:00.000&lt;br /&gt;
     Part Number: 73-13217-08&lt;br /&gt;
     Memory (MB): 196608&lt;br /&gt;
     Effective Memory (MB): 196608&lt;br /&gt;
     Operating Memory Speed (MHz): 1333&lt;br /&gt;
     Operating Memory Voltage: Regular Voltage&lt;br /&gt;
     Cores: 0&lt;br /&gt;
     Num Of Cores Enabled: 0&lt;br /&gt;
     Adapters: 2&lt;br /&gt;
     Eth Host Interfaces: 0&lt;br /&gt;
     FC Host Interfaces: 0&lt;br /&gt;
     Burned-In UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Dynamic UUID: 00000000-0000-0000-0000-000000000000&lt;br /&gt;
     Current Task 1: Checking hardware configuration server 1/1(FSM-STAGE:sam:dme:ComputeBladeDiscover:Sanitize)&lt;br /&gt;
     Current Task 2:&lt;br /&gt;
     Current Task 3:&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID Code      Severity  Affected Object                  Description&lt;br /&gt;
     --------- --------- --------- -------------------------------- -----------&lt;br /&gt;
     6215      POST-6215 Critical  sys/chassis-1/blade-1            Board Programmable version not valid for Processor Type&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server # &#039;&#039;&#039;show post detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 POST:&lt;br /&gt;
     Global ID: 6215&lt;br /&gt;
     Code: POST-6215&lt;br /&gt;
     Local ID: 1536&lt;br /&gt;
     Severity: Critical&lt;br /&gt;
     Affected Object: sys/chassis-1/blade-1&lt;br /&gt;
     Description: Board Programmable version not valid for Processor Type&lt;br /&gt;
     Type: server: Cisco Systems Inc UCSB-B200-M3&lt;br /&gt;
     Recoverable: Non Recoverable&lt;br /&gt;
     Recovery Action: Refer the CPU upgrade guide.&lt;br /&gt;
     Timestamp: 2026-03-22T16:17:06.001&lt;br /&gt;
 ucs-fi-6248up-0-A /chassis/server #&lt;br /&gt;
Making an inferences from &amp;quot;Board Programmable version not valid for Processor Type&amp;quot; I am thinking that it does not like the Xeon E5-2650v2 I installed.  Now to find a not v2 E5-26xx CPU and see if that works any better.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1569</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1569"/>
		<updated>2026-03-23T04:52:23Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Telling the FI to discover the blade chassis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;br /&gt;
&lt;br /&gt;
== So how do I power on a server? ==&lt;br /&gt;
Still fumbling through here.  But: servers (blade servers for sure, not sure about rack servers) belong to UCS &amp;quot;Organizations.&amp;quot;  These organizations are managed by the UCS Manager, too.  And since an organization owns a server (blade or otherwise) the organization can power servers on and off.&lt;br /&gt;
&lt;br /&gt;
=== What orgs exist? ===&lt;br /&gt;
This is what we get from a factory default UCS Manager:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name&lt;br /&gt;
     ----&lt;br /&gt;
     / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show org detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Organizations:&lt;br /&gt;
     Name: / (root)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
=== Enter an org, see what we have for basic policies ===&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope org /&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show bladeserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-conn-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Connectivity Policy:&lt;br /&gt;
     Chassis/FEX Id Chassis/FEX Name Fabric Id Link Aggregation Preference&lt;br /&gt;
     -------------- ---------------- --------- ---------------------------&lt;br /&gt;
                  1 sys/chassis-1    A         Global&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description Qualifier  Action            Rebalance         Link Aggregation Pref Multicast Hw Hash&lt;br /&gt;
     ----------- ---------- ----------------- ----------------- --------------------- -----------------&lt;br /&gt;
                 none       1 Link            User Acknowledged None                  Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show chassis-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Chassis/FEX Discovery Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Qualifier: none&lt;br /&gt;
     Action: 1 Link&lt;br /&gt;
     Rebalance: User Acknowledged&lt;br /&gt;
     Link Aggregation Pref: None&lt;br /&gt;
     Multicast Hw Hash: Disabled&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action            Scrub Policy&lt;br /&gt;
     ----------------- ------------&lt;br /&gt;
     Immediate&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-disc-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Discovery Policy:&lt;br /&gt;
     Action: Immediate&lt;br /&gt;
     Scrub Policy:&lt;br /&gt;
     Description:&lt;br /&gt;
     Current Task:&lt;br /&gt;
 ucs-fi-6248up-0-A /org # show &#039;&#039;&#039;rackserver-mgmt-policy&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action&lt;br /&gt;
     ------&lt;br /&gt;
     Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org # &#039;&#039;&#039;show rackserver-mgmt-policy detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Rack Server Management Policy:&lt;br /&gt;
     Action: Auto Acknowledged&lt;br /&gt;
 ucs-fi-6248up-0-A /org #&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1568</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1568"/>
		<updated>2026-03-23T04:25:41Z</updated>

		<summary type="html">&lt;p&gt;Adj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  Like powering on a single blade.  This is way more complicated that it needs to be.  So this document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1567</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1567"/>
		<updated>2026-03-23T04:12:28Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* SFPs go into the FI and the UCS 5108 FEXes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  This document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== Correct cabling for single FI to UCS 5108 ===&lt;br /&gt;
According to https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/chassis-install-guide/ucs5108_install/ucs5108_install_chapter_010.html, a single Fabric Interconnect can only be connected to a single Fabric Extender on a UCS chassis.  So for now, enable 6248UP ports 1 and 3, and cable to ports 1 and 2 on the left side (as seen from the rear) Fabric Extender.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1566</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1566"/>
		<updated>2026-03-22T05:01:48Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Telling the FI to discover the blade chassis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  This document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1565</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1565"/>
		<updated>2026-03-22T04:46:30Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* STOP! Don&amp;#039;t forget the other UCS things! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  This document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;br /&gt;
&lt;br /&gt;
=== SFPs go into the FI and the UCS 5108 FEXes ===&lt;br /&gt;
Pretty self explanatory, right.  Find Cisco 10GbE SR SFP+ modules, insert into port one on each of the FEXes, insert into ports 1 and 3 on the FI.  Attach nice aqua colored cable.  And don&#039;t panic as the lights don&#039;t come on.&lt;br /&gt;
&lt;br /&gt;
=== Telling the FI to discover the blade chassis ===&lt;br /&gt;
This is way more complicated that it needs to be.  I&#039;m sure it&#039;s totally amazing if you have racks full of Cisco UCS hardware.  But I have just the one blade chassis and the one C series server and the 2 fabric interconnects.  And the FI management software is all lovely out of date Java stuff.  So fumbling around the CLI, hoping to find my way out of the darkness here.&lt;br /&gt;
&lt;br /&gt;
The process for this seems to be something like:&lt;br /&gt;
* Configure FI Ethernet ports as server ports&lt;br /&gt;
* Ensure the attached chassis has been discovered and acknowledge any faults&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope eth-server&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show fabric a detail&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Fabric:&lt;br /&gt;
     Id: A&lt;br /&gt;
     Current Task:&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;scope fabric a&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 1&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;show interface detail&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;create interface 1 3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;enable&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric/interface # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server/fabric # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;show interface&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Interface:&lt;br /&gt;
 &lt;br /&gt;
 Fabric  Slot  Port  Admin State  Oper State   State Reason                    Chassis  Lic State            Grace Prd&lt;br /&gt;
 ------- ----- ----- ------------ ------------ ------------------------------- -------- -------------------- ---------&lt;br /&gt;
 A           1     1 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 A           1     3 Enabled      Up                                           1        License Ok                         0&lt;br /&gt;
 ucs-fi-6248up-0-A /eth-server # &#039;&#039;&#039;exit&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show chassis inventory&#039;&#039;&#039;&lt;br /&gt;
 Chassis    PID             Vendor            Serial (SN) HW Revision&lt;br /&gt;
 ---------- --------------- ----------------- ----------- -----------&lt;br /&gt;
          1 N20-C6508       Cisco Systems Inc FOX1808GLJG 0&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
Success!  Serial number reported in the UCS Manager matches the one I found on the label.  A little bit more inventory listing now.  And we will see what we have inside&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1564</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1564"/>
		<updated>2026-03-22T03:20:46Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Software upgrade time! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  This document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
== Software upgrade time! ==&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
&lt;br /&gt;
== STOP! Don&#039;t forget the other UCS things! ==&lt;br /&gt;
Um, yeah.  So there is this UCS 5108 blade chassis in the data center, too.  No idea what its firmware versions are.  But they are sure to also need firmware updates.  And it would be distressing if those components were left in a state where they are unusable because the FIs are so much newer than the blade enclosure and its servers.  So I guess we need to see about warming the ZIP code 5degC by attaching the blade chassis to the mains power and see what we can see.&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1563</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1563"/>
		<updated>2026-03-22T03:11:56Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Clock discipline is good */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  This document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
== Clock discipline is good ==&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
=== Software upgrade time! ===&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
	<entry>
		<id>https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1562</id>
		<title>UCS Manager</title>
		<link rel="alternate" type="text/html" href="https://wiki.fnord.greeley.co.us/mediawiki/index.php?title=UCS_Manager&amp;diff=1562"/>
		<updated>2026-03-22T03:11:35Z</updated>

		<summary type="html">&lt;p&gt;Adj: /* Basic Fabric Interconnect configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are a few pieces of Cisco UCS equipment in the data center:&lt;br /&gt;
* One UCS 5108 blade enclosure, accommodating up to 8 B200 server blades of various generations&lt;br /&gt;
* 2 UCS-FI-6248UP fabric interconnects, which sit between UCS servers or blade chassis and the rest of the network&lt;br /&gt;
* 1 UCS C220 M5 server&lt;br /&gt;
&lt;br /&gt;
Cisco UCS Manager gets installed on the Fabric Interconnects and does Cisco proprietary magic things.  This document is being written to capture knowledge of installation, upgrades, and server management tasks.&lt;br /&gt;
&lt;br /&gt;
== How to get ==&lt;br /&gt;
Much (all?) of Cisco&#039;s UCS software is available directly without a support contract.  But a customer account is required to download.  Registration is free as in beer.  I have had one since July 2021 and have not been troubled with Cisco spam or any sort of &amp;quot;are you a real person at a real company?&amp;quot; validation.&lt;br /&gt;
&lt;br /&gt;
As this is written, [https://software.cisco.com/download/home/283612660/type/283655658/release/6.0(1e) UCS Infrastructure and UCS Manager Software] is the place to get it.  As I have some older, end-of-life, end-of-support fabric interconnects (62xx series) which are not supported on the current 6.0 release train, I have instead selected the 4.2(3p) version for download.  This comes as a 1Gbyte-ish &amp;lt;code&amp;gt;ucs-k9-bundle-infra.4.2.3p.A.bin&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
== Untested Fabric Interconnect, what do we do? ==&lt;br /&gt;
5ish years ago (summer 2021), I acquired three of these 6248UP FIs.  And I think I got one of them configured for use on the management network and updated to then-current software.  I&#039;m not sure which of the three that was.  And I am sure I did no documentation at the time.  So here we are with new notes.&lt;br /&gt;
&lt;br /&gt;
=== Console and power are at the front?!?! ===&lt;br /&gt;
So, this is weird.  Console and power connections are at the front side of the chassis.  All of the connectivity is at the rear as it should be.  There is sufficient room on the back for a couple of C14 power connectors &#039;&#039;&#039;and&#039;&#039;&#039; 2 more 8P8C modular connectors for management LAN and serial console.  But they are at the front.  So cabling is kinda sorta extra fun.  &#039;&#039;sigh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Console serial cable is the usual Cisco modular pinout.  Signal on pins 3 and 6.  9600 bps, 8-n-1 are the serial port settings.  Nothing unusual there.&lt;br /&gt;
&lt;br /&gt;
Mystery solved regarding the connections at front of the chassis.  My FIs have 32 ports for traffic, but there is (well, was, back when this was a current product) a 16 port expansion module available.  See https://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-6200-series-fabric-interconnects/data_sheet_c78-675245.html for some diagrams.&lt;br /&gt;
&lt;br /&gt;
=== Basic Fabric Interconnect configuration ===&lt;br /&gt;
I might have lucked out on the first one I received, but it booted normally and started the interactive system setup dialog.  It is all pretty basic.  Set a password for the &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; user and an IP address, netmask, IPv4 gateway address, and DNS server address for the management Ethernet interface (again, on the front).  That&#039;s pretty much it.&lt;br /&gt;
&lt;br /&gt;
After this is done, make sure the management Ethernet interface is connected to a switch on the correct VLAN and subnet.  Then do all the things over an SSH connection.  At least for version 2.1, the SSH server only knows about RSA host keys, so a modern OpenSSH client will need something like &amp;lt;code&amp;gt;-o HostKeyAlgorithms=+ssh-rsa&amp;lt;/code&amp;gt; listed as a command line option.&lt;br /&gt;
&lt;br /&gt;
=== Clock discipline is good ===&lt;br /&gt;
To set the time in the FI.  Or just get it close.  NTP will come.  Eventually.&lt;br /&gt;
&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;set clock Mar 22 2026 02 53 35&#039;&#039;&#039;&lt;br /&gt;
 Sun Mar 22 02:53:35 UTC 2026&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
And now for the NTP:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope system&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system # &#039;&#039;&#039;scope services&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.2&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;create ntp-server 172.16.10.3&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services # &#039;&#039;&#039;show ntp&#039;&#039;&#039;&lt;br /&gt;
 NTP Servers:&lt;br /&gt;
     Name: 172.16.10.2&lt;br /&gt;
     Name: 172.16.10.3&lt;br /&gt;
 ucs-fi-6248up-0-A /system/services #&lt;br /&gt;
&lt;br /&gt;
=== Software upgrade time! ===&lt;br /&gt;
Again, on the first one I have tried, let&#039;s log in as &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and see what&#039;s running:&lt;br /&gt;
&lt;br /&gt;
Cisco UCS 6200 Series Fabric Interconnect&lt;br /&gt;
 ucs-fi-6248up-0-A login: &#039;&#039;&#039;admin&#039;&#039;&#039;&lt;br /&gt;
 Password: &lt;br /&gt;
 Cisco Nexus Operating System (NX-OS) Software&lt;br /&gt;
 TAC support: http://www.cisco.com/tac&lt;br /&gt;
 Copyright (c) 2009, Cisco Systems, Inc. All rights reserved.&lt;br /&gt;
 The copyrights to certain works contained in this software are&lt;br /&gt;
 owned by other third parties and used and distributed under&lt;br /&gt;
 license. Certain components of this software are licensed under&lt;br /&gt;
 the GNU General Public License (GPL) version 2.0 or the GNU&lt;br /&gt;
 Lesser General Public License (LGPL) Version 2.1. A copy of each&lt;br /&gt;
 such license is available at&lt;br /&gt;
 http://www.opensource.org/licenses/gpl-2.0.php and&lt;br /&gt;
 http://www.opensource.org/licenses/lgpl-2.1.php&lt;br /&gt;
 &lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;br /&gt;
And, more verbosely (for reasons that are beyond me, &amp;quot;brief&amp;quot; mode shows more output?):&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(1c)&lt;br /&gt;
 Package-Vers: 2.2(1c)A&lt;br /&gt;
 ucs-fi-6248up-0-A# &lt;br /&gt;
&lt;br /&gt;
So that&#039;s really very super dooper old.  I downloaded a copy of the 4.1(3i) code in August 2022.  Off do so some reading to see if I can skip all the in-between versions.&lt;br /&gt;
&lt;br /&gt;
Did not find anything authoritative in the release notes (but I only looked very briefly.)  So, we can do it stepwise.  Hopefully.  Process looks something like this:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware &#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;download image tftp://172.17.0.18/ucs-k9-bundle-infra.2.2.8m.A.bin&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;show download-task&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Download task:&lt;br /&gt;
     File Name Protocol Server          Userid          State&lt;br /&gt;
     --------- -------- --------------- --------------- -----&lt;br /&gt;
     ucs-k9-bundle-infra.2.2.8m.A.bin&lt;br /&gt;
               Tftp     172.17.0.18                     Downloaded&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &lt;br /&gt;
&lt;br /&gt;
Yes, you read that right.  I delivered the software image to the FI over TFTP.  SSH (scp and sftp) are supported protocols, but could not connect to an OpenSSH server on Debian 13.  This might be better with newer FI firmware, but for now, I already have a TFTP server handy for netbooting other machines in the environment.&lt;br /&gt;
&lt;br /&gt;
And from here, the firmware bundle can actually be installed on the Fabric Interconnect like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;install infra infra-vers 2.2(8m)A&#039;&#039;&#039;&lt;br /&gt;
 This operation upgrades firmware on UCS Infrastructure Components&lt;br /&gt;
 (UCS manager, Fabric Interconnects and IOMs). Do you want to proceed?&lt;br /&gt;
  (yes/no):&#039;&#039;&#039;yes&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 Triggering Install-Infra with:&lt;br /&gt;
    Infrastructure Pack Version: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;acknowledge primary fabric-interconnect reboot&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install* # &#039;&#039;&#039;commit-buffer&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 87&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployActivateUCSM                       Success      0&lt;br /&gt;
         6      DeployPollActivateOfUCSM                 In Progress  1&lt;br /&gt;
         7      DeployUpdateIOM                          Pending      0&lt;br /&gt;
         8      DeployPollUpdateOfIOM                    Pending      0&lt;br /&gt;
         9      DeployActivateIOM                        Pending      0&lt;br /&gt;
         10     DeployPollActivateOfIOM                  Pending      0&lt;br /&gt;
         11     DeployActivateRemoteFI                   Pending      0&lt;br /&gt;
         12     DeployPollActivateOfRemoteFI             Pending      0&lt;br /&gt;
         13     DeployWaitForUserAck                     Pending      0&lt;br /&gt;
         14     DeployActivateLocalFI                    Pending      0&lt;br /&gt;
         15     DeployPollActivateOfLocalFI              Pending      0&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install #  Connection to 172.16.10.176 closed.&lt;br /&gt;
Somewhere along the way, the SSH server hung up on me.  But that seems like the sort of thing that &#039;&#039;&#039;should&#039;&#039;&#039; happen as the FI&#039;s OS is being upgraded.  Progress can also be tracked on the serial console port like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;scope firmware&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware # &#039;&#039;&#039;scope auto-install&#039;&#039;&#039;&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &#039;&#039;&#039;show fsm status expand | no-more&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
     FSM Status:&lt;br /&gt;
 &lt;br /&gt;
         Affected Object: sys/fw-system/fsm&lt;br /&gt;
         Current FSM: Deploy&lt;br /&gt;
         Status: In Progress&lt;br /&gt;
         Completion Time:&lt;br /&gt;
         Progress (%): 98&lt;br /&gt;
 &lt;br /&gt;
         FSM Stage:&lt;br /&gt;
 &lt;br /&gt;
         Order  Stage Name                               Status       Try&lt;br /&gt;
         ------ ---------------------------------------- ------------ ---&lt;br /&gt;
         1      DeployWaitForDeploy                      Success      0&lt;br /&gt;
         2      DeployResolveDistributableNames          Skip         0&lt;br /&gt;
         3      DeployResolveDistributable               Skip         0&lt;br /&gt;
         4      DeployResolveImages                      Skip         0&lt;br /&gt;
         5      DeployDownloadImages                     Skip         0&lt;br /&gt;
         6      DeployCopyAllImagesToPeer                Skip         0&lt;br /&gt;
         7      DeployInternalBackup                     Success      0&lt;br /&gt;
         8      DeployPollInternalBackup                 Success      2&lt;br /&gt;
         9      DeployActivateUCSM                       Skip         0&lt;br /&gt;
         10     DeployPollActivateOfUCSM                 Success      0&lt;br /&gt;
         11     DeployUpdateIOM                          Success      0&lt;br /&gt;
         12     DeployPollUpdateOfIOM                    Success      0&lt;br /&gt;
         13     DeployActivateIOM                        Success      0&lt;br /&gt;
         14     DeployPollActivateOfIOM                  Success      0&lt;br /&gt;
         15     DeployActivateRemoteFI                   Skip         0&lt;br /&gt;
         16     DeployPollActivateOfRemoteFI             Skip         0&lt;br /&gt;
         17     DeployWaitForUserAck                     Skip         0&lt;br /&gt;
         18     DeployPollWaitForUserAck                 Success      0&lt;br /&gt;
         19     DeployActivateLocalFI                    Success      0&lt;br /&gt;
         20     DeployPollActivateOfLocalFI              In Progress  2&lt;br /&gt;
 ucs-fi-6248up-0-A /firmware/auto-install # &lt;br /&gt;
At some point, the FI will reboot itself.&lt;br /&gt;
&lt;br /&gt;
Confirm new code is running like so:&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 ucs-fi-6248up-0-A# &#039;&#039;&#039;show version brief&#039;&#039;&#039;&lt;br /&gt;
 System version: 2.2(8m)&lt;br /&gt;
 Package-Vers: 2.2(8m)A&lt;br /&gt;
 ucs-fi-6248up-0-A#&lt;/div&gt;</summary>
		<author><name>Adj</name></author>
	</entry>
</feed>