07-12-2014 11:49 AM - edited 03-01-2019 11:44 AM
Hi,
I am planning to upgrade our UCS B-Series server(B200M2) to 2.2(1d) from 2.1(1d).
While i was reading the Cisco document for the upgrade, they were specifying about a bug CSCuh61202 ( https://tools.cisco.com/bugsearch/bug/CSCuh61202 ) .It is saying that "If you are upgrading from a release prior to 2.1(3a) or 2.2(1b), you may be impacted by CSCuh61202.".
But while i am reading about the bug, it that it is saying that the affected version is 2.1(2a)A.
So my question is, should i bother about this bug ,since my current version is 2.1(1d). ????
07-13-2014 12:12 AM
Hi Jaa,
When upgrading your environment, you should still consider this defect. The reason for this is because when they said that it was found on 2.1(2a), it means that this is the release when it was first found, it doesn't mean that it is the only version that is affected by this defect. If any of your blades are using the 1240 or the 1280 VIC adapter, I highly recommend you to take in consideration this defect.
07-31-2014 09:54 AM
I am planning an upgrade from 2.0 3c to 2.2 1d
I do not see CSCuh61202 listed in the release notes of 2.2 or open caveats. However I do see CSCuh61202 in the release notes and open caveats for 2.1
Does this mean I can safely ignore this issue?
Thank you
07-31-2014 11:04 AM
hi,
I contacted cisco TAC prior to my upgrade..
They also confirmed that if the current version is running prior to 2.1(3a) , then i should upgrade server firmware first and then upgrade the Infrastructure Firmware.
I followed it and the upgrade was successful. I upgraded the UCS in DR first and observed for a week. Everything is working fine. Then last Sunday i upgraded the UCS in DC. Done :)
08-11-2014 07:09 AM
Jaa,
Thanks for the follow up. I was wondering about the adapter vs blade firmware application. The upgrade document says to upgrade the adapters before starting infrastructure firmware, but the bug report says to schedule adapter/blade firmware upgrade before starting the infrastructure upgrade. If I am reading your last post correclty you upgraded the blades and not just the adapters prior to your infrastructure upgrade and all went well. Did I read that correctly? Thanks.
10-22-2014 12:18 PM
We had this issue when we upgraded from 2.1 to 2.2. Now I need to upgrade to 2.2(3b) to protect from the BASH vulnerability. Does anyone know if we still have to worry about this defect or can we do the infrastructure upgrade without any 'special' concerns?
10-23-2014 06:17 AM
Hi friend,
in our environment also, its full of cisco devices and mostly all devices were affected by this shellshock bash vulnerability. i contacted cisco TAC for querying about all those devices we implemented but since each TAC engineer are specialized on a specific domain...they were unable to answer all. Other wise i need to raise separate TAC for each devices. when i checked their releases before few days, they said that there is no work around at the device side. They asked to harden the firewall and IPS. Actually they released IPS signature to prevent the shellshock attack.
Also you should upgrade both infrastructure and server firmware. Both firmwares should be of same version.
I recommend you to open a TAC request and keep the engineer on hold while you performing the upgrade process.
08-11-2014 09:40 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide