<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE CIMC software strategy in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3730391#M489258</link>
    <description>&lt;P&gt;Hey Mohammed,&lt;/P&gt;
&lt;P&gt;yeah - I see it exactely the same way (except the fact that there is no CIMC in VM deployments because it is purely Cisco UCS related &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However I don't get the point why there is exactely one offered version in the ISE download section. This implies that this is the only version to use in combination with ISE. Why isn't there just a download hint to the corresponding UCS model and the statement "use the software you want" ? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Oct 2018 05:24:17 GMT</pubDate>
    <dc:creator>Johannes Luther</dc:creator>
    <dc:date>2018-10-23T05:24:17Z</dc:date>
    <item>
      <title>ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3730379#M489256</link>
      <description>&lt;P&gt;Hi board,&lt;/P&gt;
&lt;P&gt;I'm wondering how others handle the CIMC in the Cisco ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the ISE downloads, there is one BIOS and CIMC software (3.0.3a). However, there are lot's of CIMC vulnerabilities, which needs to be closed. The hardware installation guide does not state that the 3.0.3a is the only supported BIOS.&lt;/P&gt;
&lt;P&gt;In fact the guide states:&lt;/P&gt;
&lt;P class="p"&gt;T&lt;FONT color="#3366FF"&gt;&lt;EM&gt;he following procedure is for upgrading the BIOS and Cisco IMC to version 3.0(3a). However, this procedure is generic and is applicable for newer firmware releases that are posted on Cisco.com.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p"&gt;&lt;FONT color="#000000"&gt;Does this statement apply to the firmware posted in the "Identity Services Engine" download section or is it also supported to use a newer firmware in the downloads section of the corresponding UCS server model?&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="p"&gt;&lt;FONT color="#000000"&gt;I know that other firmwares also work - the question is whether this is supported as well.&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="p"&gt;&lt;FONT color="#000000"&gt;How you do handle the software of the CIMC?&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p"&gt;&lt;FONT color="#000000"&gt;My question also applies to other UCS based appliances like the WLC5520 etc. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 05:06:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3730379#M489256</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2018-10-23T05:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3730387#M489257</link>
      <description>CIMC is completely related to UCS out of band management which is similar&lt;BR /&gt;to iLO in HP. It has nothing to do with ISE or WLC or any other VM.&lt;BR /&gt;&lt;BR /&gt;CIMC version is completely independent from the VM. In fact the VM is a&lt;BR /&gt;process running in ESXi and CIMC isn't aware about it.&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Oct 2018 05:21:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3730387#M489257</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-10-23T05:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3730391#M489258</link>
      <description>&lt;P&gt;Hey Mohammed,&lt;/P&gt;
&lt;P&gt;yeah - I see it exactely the same way (except the fact that there is no CIMC in VM deployments because it is purely Cisco UCS related &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However I don't get the point why there is exactely one offered version in the ISE download section. This implies that this is the only version to use in combination with ISE. Why isn't there just a download hint to the corresponding UCS model and the statement "use the software you want" ? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 05:24:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3730391#M489258</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2018-10-23T05:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3730406#M489259</link>
      <description>&lt;P&gt;I think &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/316548"&gt;@Johannes Luther&lt;/a&gt;&amp;nbsp;is referring to the software lifecycle management of the entire system (UCS server + ISE application) because when you purchase the SNS-3595 you should consider the life cycle management of CIMC as well.&amp;nbsp; Yes of course an attacker on the ISE gig0 will never reach the CIMC (if the CIMC is running on dedicated Management Eth port) but the hacker may already be on the management network - and if they get to your CIMC then they can hose the entire server.&amp;nbsp;&amp;nbsp; Therefore it's probably sensible to keep patching the CIMC whenever possible.&amp;nbsp; If you run CIMC and ISE application on the same GigE port, then who know what might happen (from a security risk point of view).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Server appliances are a pain in that respect because of this additional compute layer.&amp;nbsp; Nevertheless, I think Johannes has an excellent question and when I recently commissioned 6 SNS-3595 servers I also looked at the CIMC version and didn't dare touch it.&amp;nbsp; Not much guidance around this topic.&amp;nbsp; It would be nice to know from Cisco how to maintain the SNS server CIMC software if a CVE is announced.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 05:49:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3730406#M489259</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-10-23T05:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3730453#M489260</link>
      <description>&lt;P&gt;&amp;nbsp;Hi Arne,&lt;/P&gt;
&lt;P&gt;thanks for the feedback! At least someone understands me &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So what I do with the CIMC boards at the moment is to keep the recommended (downloadable) software, but I do a full blown configuration of the CIMC (SNMP, Syslog, LDAPs for admin auth, SSL certificates, SoL etc.).&lt;/P&gt;
&lt;P&gt;I think this is &lt;STRONG&gt;really&lt;/STRONG&gt; important in the ISE, because the ISE application and ADE-OS doesn't monitor all hardware related issues. I guess simple things like a power supply failure is recognized by ADE-OS (operating system).&lt;/P&gt;
&lt;P&gt;But more complex situations like an HDD failure of the RAID-10 cluster are only recognized by the CIMC. Even if hardware failures of HDDs are recognized by ADE-OS, there are much more complex failure situations regarding storage, memory and CPU.....&lt;/P&gt;
&lt;P&gt;So bottom line is, that the CIMC is a very very crucial part to fully monitor the SLA of the ISE service.&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;And no ... Configuring the CIMC is not fun &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; It took me some time to build a good CLI template for my use case....&lt;/P&gt;
&lt;P&gt;However, I'm still not sure about the SW version ...&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 06:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3730453#M489260</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2018-10-23T06:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732312#M489261</link>
      <description>&lt;P&gt;If your SNS appliances are of 3515 or 3595, they need signed binaries for secure boot. CSCvj90778 or CSCvm14331 are addressed recently with a secure signed CIMC 3.0(4j) and I believe it soon available at Cisco software download.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 05:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732312#M489261</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-25T05:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732371#M489362</link>
      <description>&lt;P&gt;Don't try corresponding UCS CIMC, I ruined 2 SNS3495 appliances this way. One time with host upgrade utility and one time with manual upgrade, it doesn't work. Probably there are some differences between CIMC on SNS Appliance and UCS&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 07:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732371#M489362</guid>
      <dc:creator>Tima_20</dc:creator>
      <dc:date>2018-10-25T07:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732422#M489438</link>
      <description>&lt;P&gt;Hi Everyone&lt;/P&gt;
&lt;P&gt;Just to add to this thread, I have recently deployed SNS-3515 with Cisco ISE&amp;nbsp; 2.4 which comes with default CIMC firmware version&amp;nbsp;&lt;FONT&gt;3.0&lt;/FONT&gt; and w&lt;FONT&gt;hen I'm tried to update the SNS-3515-K9 C220M4 Appliance Firmware from 3.0 to 4.0.1a (Cisco Recommended) using the HUU ISO, it won't allow me to boot with an error "Invalid signature detected. Check Secure Boot Policy in Setup".&lt;BR /&gt;So when I tried to disable the Secure boot option under the CIMC Utility, it shows another error "In ISE mode BIOS secure boot can not be disabled." &lt;/FONT&gt;&lt;/P&gt;
&lt;DIV&gt;&lt;FONT&gt;So I have opened a TAC case to assist into providing the special HUU iso that can work for this ISE box.&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;a&lt;FONT&gt;nd below is their reply stating that “For 35xx servers, we do not recommend firmware upgrade unless absolutely necessary, Please let me know the reason why you would like to upgrade the firmware?”&lt;BR /&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT&gt;So it seems that the CIMC firmware image for UCS servers purpose-built for Cisco ISE software is somehow secure-boot&amp;nbsp;locked with special signature to prevent inappropriate boot even with physical access to the box.&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT&gt;However, that make it a pain as you mentioned to maintain the CIMC firmware update to date against vulnerabilities and security flaws and the only way to my knowledge to obtain and upgrade the CIMC for SNS-35xx is through special signed image given by Cisco TAC.&amp;nbsp;&lt;/FONT&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 25 Oct 2018 08:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732422#M489438</guid>
      <dc:creator>Mohamed Abd Elnaser Mohamed Mohamed Ali</dc:creator>
      <dc:date>2018-10-25T08:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732676#M489441</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/513537"&gt;@Tima_20&lt;/a&gt; / &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325205"&gt;@Mohamed Abd Elnaser Mohamed Mohamed Ali&lt;/a&gt; - your experience reminds me of myself when I was starting out my IT career in my mid 20's - at that time I probably would have gone ahead and tried to do the same as you and also failed (because I thought I was "just doing an upgrade" - what could possibly go wrong? - and besides, I am doing the customer a big favour by putting them on the latest and greatest software, right?).&lt;/P&gt;
&lt;P&gt;I think many of us have been in that situation too - I have been there and also made those mistakes - left with sick feeling in my stomach when the customer's server is turned into a thousand dollar brick of nothing.&amp;nbsp; And then the pain of the TAC case etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I can say that getting older (and more grey hairs) has some benefits after all.&amp;nbsp; Last week when I sat across 6 SNS-3595 and I looked at the CIMC, I was tempted to update them.&amp;nbsp; I went to UCS web site and studied all their notes.&amp;nbsp; But all the release notes there mentioned that 3.0.3 was latest for M4 model.&amp;nbsp; So I Ieft it alone - thank goodness.&amp;nbsp; And, as I said above, my grey hairs were telling me to stay away from this stuff because it's going to end badly.&amp;nbsp; ISE servers were running just fine.&amp;nbsp; Leave it alone!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No more trigger-happy fingers for me when it comes to Cisco products.&amp;nbsp; Best to just follow orders.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 12:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732676#M489441</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-10-25T12:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732682#M489443</link>
      <description>&lt;P&gt;Good point - however the last SNS-35XX appliances I got have "secure boot" disabled by default.&lt;/P&gt;
&lt;P&gt;Furthermore, does the "secure boot" setting actually restrict CIMC/BIOS updates?&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;"The SNS 3515 and SNS 3595 appliances support the Unified Extensible Firmware Interface (UEFI) secure boot feature. This feature ensures that only a Cisco-signed ISE image can be installed on the SNS 3515 and SNS 3595 appliances, and prevents installation of any unsigned operating system even with physical access to the device. For example, generic operating systems, such as Red Hat Enterprise Linux or Microsoft Windows cannot boot on this appliance. "&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Edit&lt;/STRONG&gt; after I read some other topics:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT color="#0000FF"&gt;&amp;gt;&amp;gt; Furthermore, does the "secure boot" setting actually restrict CIMC/BIOS updates?&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;&lt;FONT color="#000000"&gt;&lt;FONT color="#0000FF"&gt;&lt;FONT color="#000000"&gt;==&amp;gt; Yes it does &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 12:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732682#M489443</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2018-10-25T12:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732686#M489444</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;FONT&gt;&lt;FONT color="#0000FF"&gt;&amp;gt;&amp;gt; So when I tried to disable the Secure boot option under the CIMC Utility, it shows another error "In ISE mode BIOS secure boot can not be disabled."&lt;/FONT&gt; &lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Strange ... I have pretty new ISE SNS-35XX appliances here without enabled secure boot. So factory default was (in my case) disabled secure boot.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Did you enable it manually or were the ISE appliances delivered this way&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/54571"&gt;@Kirk J&lt;/a&gt; outlined in another topic:&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#3366FF"&gt;&lt;EM&gt;Also,once the secure boot is enabled, it cannot be disabled (by design).&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/unified-computing-system/ucs-upgrade-fails-invalid-signature-detected/m-p/2983835/highlight/true#M22244" target="_blank"&gt;https://community.cisco.com/t5/unified-computing-system/ucs-upgrade-fails-invalid-signature-detected/m-p/2983835/highlight/true#M22244&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question is: How are the ISE appliances shipped by default?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 12:37:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732686#M489444</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2018-10-25T12:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732689#M489445</link>
      <description>&lt;P&gt;First of all thank you for the very helpful replies. Let's summarize:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ISE SNS-35XX: Only the ISE certified CIMC/BIOS images (from the ISE download section) can be used, because of SecureBoot. The SNS-35XX appliance verifies if the CIMC/BIOS images are signed for the use on SNS-35XX&lt;BR /&gt;==&amp;gt; SecureBoot cannot be disabled once it has been enabled!&lt;/LI&gt;
&lt;LI&gt;For other appliances it is maybe the same. It all depends on the SecureBoot feature&lt;/LI&gt;
&lt;LI&gt;We have to live with "later" or no patches for vulnerable CIMC/BIOS versions on UCS based Cisco appliances (not a very good idea if you ask me - but maybe that's just me opinion &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; )&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 12:40:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3732689#M489445</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2018-10-25T12:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3734518#M489446</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/316548"&gt;@Johannes Luther&lt;/a&gt; - where exactly in the ISE Download section does one find the CIMC code?&amp;nbsp; I have looked at every ISE version and can only find .iso/.ova/patches/certs.&amp;nbsp; But no CIMC.&lt;/P&gt;
&lt;P&gt;If I have a SNS-3595 that was shipped from Cisco this year May, and in the version is 3.0.3a, then this is the latest available version, right?&amp;nbsp; Am I also correct in saying this is a UCS-220 M4 ?&lt;/P&gt;
&lt;P&gt;I thought firmware is kept here&lt;/P&gt;
&lt;P&gt;Downloads Home / Servers - Unified Computing / UCS C-Series Rack-Mount Standalone Server Software / UCS C220 M4 Rack Server Software&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Oct 2018 22:28:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3734518#M489446</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-10-28T22:28:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3734631#M489447</link>
      <description>&lt;P&gt;Hi Arne,&lt;/P&gt;
&lt;P&gt;yeah - it's a little bit hidden:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://software.cisco.com/download/home/283801620/type/283802505/release/SNS-35X5%20Firmware" target="_blank"&gt;https://software.cisco.com/download/home/283801620/type/283802505/release/SNS-35X5%20Firmware&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 06:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3734631#M489447</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2018-10-29T06:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3734932#M489448</link>
      <description>&lt;P&gt;Our customer bought to SNS3515 couple of weeks ago and I WAS so tempted to upgrade the CIMC and thank god I didn't, other wise I'd be pulling my hairs one by one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These came update with the latest 3.0.3S2, at first I was not sure if I need to update them or not since I couldn't find any newer version but I let it be and now I am happy that I didn't touch it. &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Valuable lesson learnt from this thread!&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 14:20:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3734932#M489448</guid>
      <dc:creator>walwar</dc:creator>
      <dc:date>2018-10-29T14:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3735395#M489449</link>
      <description>Hi Johannes&lt;BR /&gt;Sorry for late reply...&lt;BR /&gt;Yes, the secure boot was enabled on that new SNS-3515 out of the box. So the appliance were delivered in that way.&lt;BR /&gt;regards.&lt;BR /&gt;Mohamed Naser</description>
      <pubDate>Tue, 30 Oct 2018 07:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3735395#M489449</guid>
      <dc:creator>Mohamed Abd Elnaser Mohamed Mohamed Ali</dc:creator>
      <dc:date>2018-10-30T07:19:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3735397#M489450</link>
      <description>Hi Arnie&lt;BR /&gt;Thanks for sharing your experience with us, but believe me when I say it was the customer who insisted into upgrading the CIMC since it was ACS to ISE migration ( Green field implementation). So they wanted all Cisco recommended and latest software in place, although I advised them not to touch the CIMC but they wanted Cisco official response to stay on the default CIMC image that came with the box.&lt;BR /&gt;That why I opened a TAC case under which they confirmed that "For 35xx servers, we do not recommend firmware upgrade unless absolutely necessary".&lt;BR /&gt;After sharing that with the customer, they got relaxed and closed the TAC case and we moved on.&lt;BR /&gt;But it was an interesting thing to know about CIMC complications on SNS-35xx purpose-built for Cisco ISE.</description>
      <pubDate>Tue, 30 Oct 2018 07:28:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3735397#M489450</guid>
      <dc:creator>Mohamed Abd Elnaser Mohamed Mohamed Ali</dc:creator>
      <dc:date>2018-10-30T07:28:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3736367#M489451</link>
      <description>&lt;P&gt;Funny - just as we're talking about it, a new CIMC SW version is published for the ISE &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://software.cisco.com/download/home/283801620/type/283802505/release/SNS%2035x5" target="_blank"&gt;https://software.cisco.com/download/home/283801620/type/283802505/release/SNS%2035x5&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm wondering why they released an update&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 12:04:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3736367#M489451</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2018-10-31T12:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3736848#M489452</link>
      <description>&lt;P&gt;CIMC 3.0(4j) and BIOS 3.0.4(b) are to address&amp;nbsp;CSCvj90778 / CSCvm14331 while the other set is due to upgrade path. The associated upgrade guide is still being&amp;nbsp;updated and will be posted once it ready.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 20:38:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3736848#M489452</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-10-31T20:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE CIMC software strategy</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3746793#M489453</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;CIMC 3.0(4j) and BIOS 3.0.4(b) are to address&amp;nbsp;CSCvj90778 / CSCvm14331 while the other set is due to upgrade path. The associated upgrade guide is still being&amp;nbsp;updated and will be posted once it ready.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;So, what I’m supposed to do with CIMC 3.0.3(S2)?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I’m on delivery, I hardly prefer to update now in my lab then when it will be on prod.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 18:31:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-cimc-software-strategy/m-p/3746793#M489453</guid>
      <dc:creator>TommasoOlmastroni1347</dc:creator>
      <dc:date>2018-11-14T18:31:13Z</dc:date>
    </item>
  </channel>
</rss>

