cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
219
Views
0
Helpful
1
Replies

Difference in BIOS versions between SNS 3615 and C220M5

SaschaS
Level 1
Level 1

Hey folks,

we recently replaced a mainboard on an ISE 3615 server. Due to the fact that we had already replaced the HDD beforehand, the ISE had to be reimaged. The installation was successful, but it was not possible to boot the ISE with the replacement mainboard. Even the TAC was only able to replace the mainboard again. With the mainboard replaced again, the installation and booting worked. What I noticed: a "normal" bios for the C220M5 was installed on the first new mainboard, the second new mainboard came with a special ISE bios installed.

Could this have been the reason for the boot problem with the first mainboard? What is the difference between the bios for the C220M5 rack server and the bios for the SNS 3615 (which is based on the C220m5)?

Maybe someone here knows the answer.

Cheers, Sascha

1 Reply 1

Arne Bier
VIP
VIP

SNS servers are effectively a one-trick-pony server - they will never boot any application other than ISE. How exactly Cisco does this is a mystery to me and many others. I don't have an old SNS server to try hack it to load ESXi or Linux etc. But if you trawl the web forums long enough you will find articles of folks who have tried. I thought it was as simple as UEFI Secure Boot ... just disable that and then you should be able to load any other OS. But it's not that simple. Many OS's will boot with UEFI Secure Boot enabled - yet, on an SNS they refuse to boot. If you login to the CIMC of the UCS you will see there are hundreds of settings you can tweak - but I also bet that there is something hard coded in the BIOS that ordinary users don't have easy access to.

As for, why ISE didn't boot on the generic UCS mainboard - most likely because that magic sauce was missing in the BIOS and the detection logic in the ISE bootloader refused to boot. Cisco will argue that they did this because they want to ensure that ISE only boots on a trusted platform - i.e. their super secure SNS server. 

My personal opinion is that the SNS server should be allowed to be repurposed once newer ISE versions no longer boot on them. The current situation is that once a version of ISE no longer boots/installs on older hardware, you effectively have to scrap the server. That's a terrible situation for sustainability.   

It's also important to note that if you plan to update the firmware of your CIMC/BIOS then you MUST always use the firmware on the ISE downloads page - do NOT use the firmware on the Cisco UCS page. You will make ISE unbootable.

I wonder if the TAC should have applied the latest ISE UCS HUU firmware on the generic mainboard - that might have got ISE to boot up. That would have been my suggestion.