Guest

Cisco Nexus 5000 Series Switches

Cisco Nexus 5500 Series Release Notes, Cisco NX-OS Release 7.x

  • Viewing Options

  • PDF (535.1 KB)
  • Feedback

Table of Contents

Cisco Nexus 5500 Series Release Notes, Release 7.x

Contents

Introduction

Cisco Nexus Devices

Cisco Nexus 2000 Series Fabric Extenders

System Requirements

Hardware Supported

Online Insertion and Removal Support

New and Changed Features

New Software Features in Cisco NX-OS Release 7.1(1)N1(1)

Flex link Support

IEEE 1588v2 PTP

ERSPAN v3 with PTP Timestamp

Class-Based Quality-of-Service MIB (cbQoSMIB)

Intelligent Traffic Director (ITD)

Remote Integrated Service Engine (RISE)

100 Mbps Support on 2348TQ and 2332TQ

New Hardware Features in Cisco NX-OS Release 7.1(1)N1(1)

New Software Features in Cisco NX-OS Release 7.1(0)N1(1b)

New Hardware Features in Cisco NX-OS Release 7.1(0)N1(1b)

New Software Features in Cisco NX-OS Release 7.1(0)N1(1a)

BPDU Guard Enhancement

CTS with FabricPath

Dynamic ARP Inspection Enhancement

IPv6 vPC/vPC+ Keepalive Support

Isolate and Maintenance Mode Enhancement

ISSU Modifications

MET Sharing

Open Management Infrastructure

Password Length Enhancement

Syslog Message as SNMP Trap

Unified Fabric Solution (previously called Dynamic Fabric Automation (DFA))

VM Tracker

New Hardware Features in Cisco NX-OS Release 7.1(0)N1(1a)

New Software Features in Cisco NX-OS Release 7.0(6)N1(1)

New Hardware Features in Cisco NX-OS Release 7.0(6)N1(1)

New Software Features in Cisco NX-OS Release 7.0(5)N1(1a)

New Hardware Features in Cisco NX-OS Release 7.0(5)N1(1a)

New Software Features in Cisco NX-OS Release 7.0(5)N1(1)

New Software Features in Cisco NX-OS Release 7.0(4)N1(1)

New Hardware Features in Cisco NX-OS Release 7.0(4)N1(1)

New Software Features in Cisco NX-OS Release 7.0(3)N1(1)

Dynamic FCoE Over DFA

FEX Based ACL Classification

New Hardware Features in Cisco NX-OS Release 7.0(3)N1(1)

New Software Features in Cisco NX-OS Release 7.0(2)N1(1)

Dynamic Fabric Automation

New Software Features in Cisco NX-OS Release 7.0(1)N1(1)

ACL Logging for IPv6 ACLs

Dynamic FCoE Using FabricPath

New Software Features in Cisco NX-OS Release 7.0(0)N1(1)

Anycast Routing

Early Warning for Forwarding Information Base Exhaustion

Explicit Congestion Notification with Weighted Random Early Detection

FabricPatch Operations, Administration, and Management

Fibre Channel and Fibre Channel Over Ethernet Slow Drain

Multi-Destination Tree

OpenFlow v1.0

One Platform Kit (OnePK)

Overload Bit

Port Channel Max Links

Switch Port Analyzer with Access Control List Filtering

TCAM Carving

Upgrading or Downgrading to a New Release

Upgrade and Downgrade Guidelines

Supported Upgrade and Downgrade Paths

Limitations

Limitations on the Cisco Nexus Device

SPAN Limitations on Fabric Extender Ports

Layer 3 Limitations

Asymmetric Configuration

SVI

Cisco Nexus 5548P Daughter Card (N55-D160L3)

Caveats

Open Caveats

Resolved Caveats in Cisco NX-OS Release 7.1(1)N1(1)

Resolved Caveats in Cisco NX-OS Release 7.1(0)N1(1b)

Resolved Caveats in Cisco NX-OS Release 7.1(0)N1(1a)

Resolved Caveats in Cisco NX-OS Release 7.0(6)N1(1)

Resolved Caveats in Cisco NX-OS Release 7.0(5)N1(1a)

Resolved Caveats in Cisco NX-OS Release 7.0(5)N1(1)

Resolved Caveats in Cisco NX-OS Release 7.0(4)N1(1)

Resolved Caveats in Cisco NX-OS Release 7.0(3)N1(1)

Resolved Caveats in Cisco NX-OS Release 7.0(2)N1(1)

Resolved Caveats in Cisco NX-OS Release7.0(1)N1(1)

Resolved Caveats in Cisco NX-OS Release7.0(0)N1(1)

MIB Support

Related Documentation

Documentation Feedback

Cisco Nexus 5500 Series Release Notes,
Release 7.x

Release Date: January 29, 2014
Last Modified: April 16, 2015
Current Release: NX-OS Release 7.1(1)N1(1)

 

This document describes the features, caveats, and limitations for the Cisco Nexus 5500 devices and the Cisco Nexus 2000 Series Fabric Extenders. Use this document in combination with documents listed in the .


Note Release notes are sometimes updated with new information about restrictions and caveats. See the following website for the most recent version of the Cisco Cisco Nexus 5500 and Cisco Nexus 2000 Series release notes: http://www.cisco.com/en/US/docs/switches/datacenter/nexus5500/sw/release/notes/Nexus_5500_Release_Notes.html



Note Table 1 shows the online change history for this document.


Table 1 Online History Change

Date
Description

April 16, 2015

Created NX-OS Release 7.1(1)N1(1) release notes.

April 7, 2015

Created NX-OS Release 7.0(6)N1(1) release notes.

March 2, 2015

Created NX-OS Release 7.1(0)N1(1b) release notes.

January 28, 2015

Removed VLAN Translation write up. This is not supported on this platform.

January 9, 2015

Created NX-OS Release 7.1(0)N1(1a) release notes.

January 6, 2015

Added CSCus22741 to Open Caveats.

Added Open Management Infrastructure to New and Changed Features.

December 22, 2014

5672UP unable to read sensors temperature

December 22, 2014

Created NX-OS Release 7.0(5)N1(1a) release notes.

October 24, 2014

Created NX-OS Release 7.0(5)N1(1)) release notes.

October 2, 2014

Added CSCur09549 to Open Caveats.

September 29, 2014

Created NX-OS Release 7.0(4)N1(1) release notes.

July 25, 2014

Created NX-OS Release 7.0(3)N1(1) release notes.

May 5, 2014

Created NX-OS Release 7.0(2)N1(1) release notes.

April 1, 2014

Added CSCuo02594 to Open Caveats.

March 20, 2014

Created NX-OS Release 7.0(1)N1(1) release notes.

January 29, 2014

Created NX-OS Release 7.0(0)N1(1) release notes.

Introduction

The Cisco NX-OS software is a data center-class operating system built with modularity, resiliency, and serviceability at its foundation. Based on the industry-proven Cisco MDS 9000 SAN-OS software, Cisco NX-OS helps ensure continuous availability and sets the standard for mission-critical data center environments. The highly modular design of Cisco NX-OS makes zero-effect operations a reality and enables exceptional operational flexibility.

Several new hardware and software features are introduced for the Cisco Nexus 5500 Series device and the Cisco Nexus 2000 Series Fabric Extender (FEX) to improve the performance, scalability, and management of the product line.

Cisco Nexus Devices

The Cisco Nexus devices include a family of line-rate, low-latency, lossless 10-Gigabit Ethernet, Cisco Data Center Ethernet, Fibre Channel over Ethernet (FCoE), and native Fibre Channel devices for data center applications.

For information about the Cisco Nexus 5500 Series, see the Cisco Nexus 5500 Series Platform Hardware Installation Guide.

Cisco Nexus 2000 Series Fabric Extenders

The Cisco Nexus 2000 Series Fabric Extender (FEX) is a highly scalable and flexible server networking solution that works with the Cisco Nexus 5500 Series devices to provide high-density and low-cost connectivity for server aggregation. Scaling across 1-Gigabit Ethernet, 10-Gigabit Ethernet, unified fabric, rack, and blade server environments, the FEX is designed to simplify data center architecture and operations.

The FEX integrates with its parent Cisco Nexus device, which allows zero-touch provisioning and automatic configuration. The FEX provides a single point of management that supports a large number of servers and hosts that can be configured with the same feature set as the parent Cisco Nexus 5500 Series switch, including security and quality of service (QoS) configuration parameters. Spanning Tree Protocol (STP) is not required between the Fabric Extender and its parent switch, because the Fabric Extender and its parent switch allow you to enable a large multi-path, loop-free, active-active topology.

Software is not included with the Fabric Extender. Cisco NX-OS software is automatically downloaded and upgraded from its parent switch. For information about configuring the Cisco Nexus 2000 FEX, see the “Configuring the Fabric Extender” chapter in the Cisco Nexus 5500 Series NX-OS Layer 2 Switching Configuration Guide, Release 7.x.

System Requirements

This section includes the following topics:

Hardware Supported

The Cisco NX-OS software supports the Cisco Nexus devices. Starting with Cisco NX-OS Release 7.0(0)N1(1), the Cisco Nexus 5010 and 5020 switches are not supported. You can find detailed information about supported hardware in the Cisco Nexus 5500 Series Hardware Installation Guide.

Table 2 shows the hardware supported by Cisco NX-OS Release 7.x software.

 

Table 2 Hardware Supported by Cisco NX-OS Release 7.x Software

Cisco NX-OS Release Support
Hardware
Part Number
7.0(0)N1(1)
7.0(2)N1(1)
7.0(1)N1(1)
7.0(6)N1(1)
7.0(5)N1(1a)
7.0(5)N1(1)
7.0(4)N1(1)
7.0(3)N1(1)
7.1(1)N1(1)
7.1(0)N1(1b)
7.1(0)N1(1a)
Cisco Nexus 5500 Series

 

 

 

 

 

Cisco Nexus 5596T switch1

N5K-C5596T-FA

X

X

X

X

Cisco Nexus 5596UP switch

N5K-C5596UP-FA

X

X

X

X

Cisco Nexus 5548UP switch

N5K-C5548UP-FA

X

X

X

X

Cisco Nexus 5548P switch

N5K-C5548P-FA

X

X

X

X

Cisco Nexus 2000 Series

 

 

 

 

 

Cisco Nexus 2348UPQ FEX

N2K-C2348UPQ

X

X

Cisco Nexus 2332TQ FEX

N2K-C2332TQ-10GE

7.1(1)N1(1)

Cisco Nexus 2348TQ FEX

N2K-C2348TQ-10GE

X

Cisco Nexus 2248PQ FEX2

N2K-C2248PQ-10GE

X

X

X

X

Cisco Nexus B22DELL FEX3

N2K-B22DELL-P

X

X

X

X

Cisco Nexus B22IBM FEX4 5

N2K-B22IBM-P

X

X

X

X

Cisco Nexus 2232TM-E FEX6

N2K-C2232TM-E-
10GE

X

X

X

X

Cisco Nexus B22F FEX

N2K-B22FTS-P

X

X

X

X

Cisco Nexus B22HP FEX7

N2K-B22HP-P

X

X

X

X

Cisco Nexus 2232TM FEX

N2K-C2232TM-
10GE

X

X

X

X

Cisco Nexus 2232PP FEX

N2K-C2232PP-10GE

X

X

X

X

Cisco Nexus 2248TP-E FEX

N2K-C2248TP-E-
1GE

X

X

X

X

Cisco Nexus 2248TP FEX

N2K-C2248TP-1GE

X

X

X

X

Cisco Nexus 2224TP FEX

N2K-C2224TP-1GE

X

X

X

X

Cisco Nexus 2148T FEX

N2K-C2148T-1GE

8

9

10

 

Expansion Modules

 

 

 

 

 

4-port QSFP+ 10GBE GEM

N55-M4Q

X

X

X

X

12-port 10GBASE-T GEM11

N55-M12T

X

X

X

X

16-port Universal GEM

N55-M16UP(=)

X

X

X

X

N5596 Layer 3 GEM

N55-M160L3(=)

X

X

X

X

N5548 Layer 3 daughter card

N55-D160L3(=)

X

X

X

X

Layer 3 GEM

N55-M160L3-V2

X

X

X

X

Version 2 Layer 3 daughter card

N55-D160L3-V2

X

X

X

X

16-port SFP+ Ethernet

N55-M16P(=)

X

X

X

X

8 10-Gigabit Ethernet and 8 10-Gigabit FCoE ports

N55-M8P8FP(=)

X

X

X

X

Transceivers

 

 

 

 

 

Fabric Extender Transceivers

 

 

 

 

 

10-Gigabit Ethernet SFP (for Cisco Nexus 2000 Series to Cisco Nexus 5500 Series connectivity)

FET-10G(=)

X

X

X

X

SFP+ Optical

 

 

 

 

 

LR4 Optics—WSP-Q40GLR4L

QSFP40G-LR4-LITE

X

Cisco 40GBASE ER4 Optics

QSFP-40G-ER4

7.1(1)N1(1)

Cisco 40GBASE-LR4 QSFP+ Module for SMF

QSFP-40GE-LR4

6.0(2)N1(2)

6.0(2)N1(2)

6.0(2)N1(2)

6.0(2)N1(2)

4x10-Gigabit QSFP module

QSFP-4SFP10G-
CU1M

X

X

X

X

4x10-Gigabit QSFP module

QSFP-4SFP10G-
CU3M

X

X

X

X

4x10-Gigabit QSFP module

QSFP-4SFP10G-
CU5M

X

X

X

X

4x10-Gigabit QSFP module

QSFP-4SFP10G-
ACu7M

X

X

X

X

4x10-Gigabit QSFP module

QSFP-4SFP10G-
ACu10M

X

X

X

X

Cisco 40GBASE-CR4 QSFP+ to 4 10GBASE-CU SFP+ direct-attach breakout 7-meter cable, active

QSFP-4X10G-AC7M

6.0(2)N1(2) and later

6.0(2)N1(2) and later

6.0(2)N1(2) and later

6.0(2)N1(2) and later

Cisco 40GBASE-CR4 QSFP+ to 4 10GBASE-CU SFP+ direct-attach breakout 10-meter cable, active

QSFP-4X10G-
AC10M

6.0(2)N1(2) and later

6.0(2)N1(2) and later

6.0(2)N1(2) and later

6.0(2)N1(2) and later

Gigabit Ethernet SFP, LH transceiver12

GLC-LH-SMD

X

X

X

X

Gigabit Ethernet SFP, EX transceiver13

GLC-EX-SMD

X

X

X

X

1000BASE-ZX SFP transceiver module for SMF

GLC-ZX-SM(=)

X

X

X

X

10-Gigabit Ethernet—short range SFP+ module

SFP-10G-SR(=)

X

X

X

X

10-Gigabit Ethernet—long range SFP+ module

SFP-10G-LR(=)

X

X

X

X

10-Gigabit Ethernet—extended range SFP+ module

SFP-10G-ER(=)

X

X

X

X

1000BASE-T standard

GLC-T(=)

X

X

X

X

Gigabit Ethernet SFP, LC connector SX transceiver (MMF)

GLC-SX-MM

X

X

X

X

Gigabit Ethernet SFP, LC connector SX transceiver (MMF), extended temperature range and DOM

GLC-SX-MMD

X

X

X

X

Gigabit Ethernet SFP, LC connector LX/LH transceiver (SMF)

GLC-LH-SM

X

X

X

X

Gigabit Ethernet SFP, LC connector LX/LH transceiver (SMF), extended temperature range and DOM

GLC-LH-SMD

X

X

X

X

SFP+ Copper

 

 

 

 

 

10GBASE-CU SFP+ Cable (1 meter)

SFP-H10GB-
CU1M(=)

X

X

X

X

10GBASE-CU SFP+ Cable (3 meters)

SFP-H10GB-
CU3M(=)

X

X

X

X

10GBASE-CU SFP+ Cable (5 meters)

SFP-H10GB-
CU5M(=)

X

X

X

X

10GBASE-CU SFP+ Cable (7 meters)

SFP-H10GB-
ACU7M(=)

X

X

X

X

10GBASE-CU SFP+ Cable (10 meters)

SFP-H10GB-
ACU10M(=)

X

X

X

X

10GBASE CU SFP+ cable14

SFP-H10GB-CU1.5M

X

X

X

X

10GBASE CU SFP+ cable15

SFP-H10GB-CU2M

X

X

X

X

10GBASE CU SFP+ cable16

SFP-H10GB-CU2.5M

X

X

X

X

Fibre Channel

 

 

 

 

 

8-Gbps Fibre Channel—short wavelength

DS-SFP-FC8G-
SW(=)

X

X

X

X

8-Gbps Fibre Channel—long wavelength

DS-SFP-FC8G-
LW(=)

X

X

X

X

4-Gbps Fibre Channel—short wavelength

4DS-SFP-FC4G-
SW(=)

X

X

X

X

4-Gbps Fibre Channel—long wavelength

4DS-SFP-FC4G-
LW(=)

X

X

X

X

Extended Temperature Range

 

 

 

 

 

1000BASE-T SFP, extended temperature range

SFP-GE-T(=)

X

X

X

X

Gigabit Ethernet SFP, LC connector SX transceiver (MMF), extended temperature range and digital optical monitoring (DOM)

SFP-GE-S(=)

X

X

X

X

Gigabit Ethernet SFP, LC connector LX/LH transceiver (SMF), extended temperature range and DOM

SFP-GE-L(=)

X

X

X

X

Converged Network Adapters

 

X

X

X

X

Generation-1 (Pre-FIP) CNAs17

 

X

X

X

X

1.The Cisco Nexus 5596T and the 12-port 10-GBase-T GEM are supported starting with Cisco NX-OS Release 5.2(1)N1(1b).

2.The Cisco Nexus 2248PQ FEX does not support Gen1 cables.

3.The Cisco Nexus B22DELL P FEX is supported starting with Cisco NX-OS Release 5.2(1)N1(3).

4.The Cisco Nexus B22IBM FEX is supported with Cisco NX-OS Release 6.0(2)N2(1b)

5.The Cisco Nexus B22IBM FEX is not supported with Cisco NX-OS Release 6.0(2)N2(2) and Cisco NX-OS Release 7.0(0)N1(1).

6.The Cisco Nexus 2232TM-E FEX is supported starting with Cisco NX-OS Release 5.2(1)N1(1a).

7.The Cisco Nexus B22HP FEX is supported starting with Cisco NX-OS Release 5.0(3)N2(2).

8.Starting with Cisco NX-OS Release 6.0(2)N1(1), 2148T FEX is not supported on Cisco Nexus 5500 series devices.

9.Starting with Cisco NX-OS Release 6.0(2)N1(1), 2148T FEX is not supported on Cisco Nexus 5500 series devices.

10.Starting with Cisco NX-OS Release 6.0(2)N1(1), 2148T FEX is not supported on Cisco Nexus 5500 series devices.

11.The 12 port 10-GBASE-T GEM is only supported on the Cisco Nexus 5596T starting with Cisco NX-OS Release 5.2(1)N1(1b).

12.Added support for Gibabit Ethernet SFP LX transceiver starting with Cisco NX-OS Release 6.0(2)N1(2).

13.Added support for Gibabit Ethernet SFP EX transceiver starting with Cisco NX-OS Release 6.0(2)N1(2).

14.Added support for 10GBASE CU SFP+ cable starting with Cisco NX-OS Release 6.0(2)N1(2).

15.Added support for 10GBASE CU SFP+ cable starting with Cisco NX-OS Release 6.0(2)N1(2).

16.Added support for 10GBASE CU SFP+ cable starting with Cisco NX-OS Release 6.0(2)N1(2).

17.Generation-1 (Pre-FIP) CNAs are supported on the Nexus 5000 Platform switches; however, they are not supported on the Nexus 5500 Series.

Online Insertion and Removal Support

Table 3 shows the hardware and Cisco NX-OS Release 7.x software that supports online insertion and removal (OIR).

Table 3 Online Insertion and Removable Support by Cisco NX-OS Release 7.x Software

Hardware
Part Number
Cisco NX-OS Release Support
7.0(0)N1(1)
7.0(6)N1(1)
7.0(5)N1(1a)
7.0(5)N1(1)
7.0(4)N1(1)
7.0)3)N1(1)
7.0(2)N1(1)
7.0(1)N1(1)

7.1(1)N1(1)
7.1(0)N1(1b)
7.1(0)N1(1a)
Cisco Nexus 5500 Series
 

 

 

 

Cisco Nexus 5596T switch

N5K-C5596T-FA

X

X

X

Cisco Nexus 5596UP switch

N5K-C5596UP-FA

X

X

X

Cisco Nexus 5548UP switch

N5K-C5548UP-FA

X

X

X

Cisco Nexus 5548P switch

N5K-C5548P-FA

X

X

X

Expansion Modules

 

 

 

 

16-port Universal GEM

N55-M16UP(=)

X

X

X

Layer 3 GEM 1

N55-M160L3-V218

Version 2 Layer 3 daughter card 1

N55-D160L3-V2 1

16-port SFP+ Ethernet

N55-M16P(=)

X

X

X

8-port SFP+ Ethernet ports and 8-port SFP+ Fibre Channel ports

N55-M8P8FPL(=)

X

X

X

N5596 Layer 3 GEM 1

N55-M160L3(=) 1

N5548 Layer 3 daughter card 1

N55-D160L3(=) 1

18.Does not support online insertion and removal. You must power down the Cisco Nexus 5500 Series switch before removing or inserting a Layer 3 GEM or Version 2 Layer 3 daughter card expansion module.

New and Changed Features

This section describes the new features introduced in Cisco NX-OS Release 7.x. This section includes the following topics:

New Software Features in Cisco NX-OS Release 7.1(1)N1(1)

Cisco NX-OS Release 7.1(1)N1(1) includes bug fixes and the following software features and enhancements:

Flex link Support

Flex links are a pair of a Layer 2 interfaces (switch ports or port channels) where one interface is configured to act as a backup to the other. The feature provides an alternative solution to the Spanning Tree Protocol (STP). You can disable STP and still retain basic link redundancy. Flex links are typically configured in service provider or enterprise networks where customers do not want to run STP on the switch. If the switch is running STP, flex links are not necessary because STP already provides link-level redundancy or backup. Flex Links are supported only on Layer 2 ports and port channels, not on VLANs or on Layer 3 ports.

IEEE 1588v2 PTP

PTP is a time synchronization protocol for nodes distributed across a network. Its hardware timestamp feature provides greater accuracy than other time synchronization protocols such as the Network Time Protocol (NTP). PTP is a distributed protocol that specifies how real-time PTP clocks in the system synchronize with each other.


Note PTP is not supported on 100G CLEM.


ERSPAN v3 with PTP Timestamp

Encapsulated remote switched port analyzer (ERSPAN) is used to transport mirrored traffic in an IP network. ERSPAN supports source ports, source VLANs, and destinations on different switches, which provide remote monitoring of multiple switches across your network. ERSPAN uses a generic routing encapsulation (GRE) tunnel to carry traffic between switches.

ERSPAN consists of an ERSPAN source session, routable ERSPAN GRE-encapsulated traffic, and an ERSPAN destination session. You separately configure ERSPAN source sessions and destination sessions on different switches.

There are two types of ERSPAN—Type II (default) and type III. Type III supports all of ERSPAN type II features and adds the following enhancements:

  • Provides timestamp information in the ERSPAN Type III header that can be used to calculate the packet latency among edge, aggregate, and core switches.
  • Identifies possible traffic sources using the ERSPAN Type III header fields.
  • ERSPAN Type III provides configurable switch IDs that can be used to identify traffic flows across multiple switches.

Class-Based Quality-of-Service MIB (cbQoSMIB)

This feature provides the Simple Network Management Protocol (SNMP) MIB that enables retrieval of class-map and policy-map configuration and statistics.

Intelligent Traffic Director (ITD)

Intelligent Traffic Director (ITD) is an intelligent, scalable clustering and load-balancing engine that addresses the performance gap between a multi-terabit switch and gigabit servers and appliances. The ITD architecture integrates Layer 2 and Layer 3 switching with Layer 4 to Layer 7 applications for scale and capacity expansion to serve high-bandwidth applications.

ITD provides adaptive load balancing to distribute traffic to an application cluster. With this feature on the Cisco Nexus 5000 Series switches, you can deploy servers and appliances from any vendor without a network or topology upgrade.

Remote Integrated Service Engine (RISE)

Cisco RISE is an architecture that logically integrates an external (remote) service appliance, such as a Citrix NetScaler Application Delivery Controller (ADC), so that the appliance appears and operates as a service module (remote line card) within the Cisco Nexus switch. The Cisco NX-OS software in which RISE is supported supports the Cisco Nexus 5500, 5600, and 6000 Series switches.

100 Mbps Support on 2348TQ and 2332TQ

The Cisco Nexus 7.1(1)N1(1) release supports 100 Mbps speed on the host interfaces of Cisco Nexus 2348TQ and 2332TQ.

New Hardware Features in Cisco NX-OS Release 7.1(1)N1(1)

Cisco NX-OS Release 7.1(1)N1(1) supports the following new hardware:

  • Cisco Nexus N5648Q—Support for 48 QSFP 40G ports. It has 24 fixed QSFP ports and support for two GEM slots that can support an additional 12 QSFP ports per GEM slot.
  • Cisco Nexus N2332TQ—FEX supporting 32 10GBaseT host ports and 4 QSFP+ network ports.

New Software Features in Cisco NX-OS Release 7.1(0)N1(1b)

There are no new software features in this release.

New Hardware Features in Cisco NX-OS Release 7.1(0)N1(1b)

There are no new hardware features in this release.

BPDU Guard Enhancement

BPDU Guard can be can be activated on disallowed edge trunk VLANs. This is done by configuring both sides of the link as either trunks or access interfaces.

CTS with FabricPath

The Cisco TrustSec security architecture has been extended to support Cisco FabricPath environments including those using VPC+. CTS packet classification can occur before or as traffic enters the fabric, at which point packet tags are preserved through the fabric for the purpose of applying security policy to the data path.

Dynamic ARP Inspection Enhancement

Dynamic ARP Inspection (DAI) can validate ARP packets against user-configured ARP access control lists (ACLs). DAI can be configured to drop ARP packets when the IP/MAC addresses in the packets are invalid. This is done by configuring ARP based ACLs.

IPv6 vPC/vPC+ Keepalive Support

IPv6 support for vPC/vPC+ provides IPv6 capabilities for the vPC/vPC+ keepalive from the mgmt0 out-of-band interface and also from the built-in front ports using SVI.

Isolate and Maintenance Mode Enhancement

Provides the ability to gracefully eject a switch and isolate it from the network so that debugging or an upgrade can be performed. The switch is removed from the regular switching path and put into a maintenance mode. Once maintenance on the switch is complete, you can bring the switch into full operational mode.

ISSU Modifications

In service software updates (ISSUs) are limited to the three previous releases.

MET Sharing

Improves efficiency in the usage of Multicast Expansion Table (MET) entries in the hardware.

Open Management Infrastructure

Open Management Infrastructure (OMI) is no longer supported.

Password Length Enhancement

The following commands have been added to provide the ability to configure the minimum and maximum length of a password:

  • userpassphrase min-length length
  • userpassphrase max-length length
  • show userpassphrase length

Syslog Message as SNMP Trap

The following features have been added:

  • User Interface for Persistent Logging
  • Syslog SNMP Traps
  • History Logging
  • Syslog Message Format

Unified Fabric Solution (previously called Dynamic Fabric Automation (DFA))

This software release is the second release to support enhancements to Cisco's Unified Fabric Solution.

Unified Fabric focuses on simplifying, optimizing, and automating data center fabric environments by offering an architecture based on four major pillars: Fabric Management, Workload Automation, Optimized Networking, and Virtual Fabrics.

Each of these pillars provides a set of modular functions which can be used together, or independently, for ease of adoption of new technologies in the data center environment.

Complete details on the Unified Fabric Solution architecture can be found at: http://www.cisco.com/go/dfa

VM Tracker

Supports automatic VLAN provisioning.

New Hardware Features in Cisco NX-OS Release 7.1(0)N1(1a)

Cisco NX-OS Release 7.1(0)N1(1a) supports the following new hardware:

  • H7 Power Supply Support—support for forward air flow (FAF) (NXA-PHV-1100W) and reverse air flow (RAF) (NXA-PHV-1100W-B) with both AC and DC power source.
  • 10 G Dense Wave Division Multiplexing (DWDM)
  • LR4 Optics—WSP-Q40GLR4L (QSFP40G-LR4-LITE)

New Software Features in Cisco NX-OS Release 7.0(6)N1(1)

There are no new software features in this release.

New Hardware Features in Cisco NX-OS Release 7.0(6)N1(1)

There are no new hardware features in this release.

New Software Features in Cisco NX-OS Release 7.0(5)N1(1a)

There are no new software features in this release.

New Hardware Features in Cisco NX-OS Release 7.0(5)N1(1a)

There are no new hardware features in this release.

New Software Features in Cisco NX-OS Release 7.0(5)N1(1)

There are no new software features in this release.

New Software Features in Cisco NX-OS Release 7.0(4)N1(1)

There are no new software features in this release.

New Hardware Features in Cisco NX-OS Release 7.0(4)N1(1)

Cisco NX-OS Release 7.0(4)N1(1) supports the following new hardware feature:

  • Cisco Nexus 2348UPQ support for QSA (FET-10G, SFP-10G-SR, SFP-10G-ER)

New Software Features in Cisco NX-OS Release 7.0(3)N1(1)

Cisco NX-OS Release 7.0(3)N1(1) is a maintenance release that includes bug fixes and the following software features and enhancements:

Dynamic FCoE Over DFA

Dynamic Fibre Channel over Ethernet (FCoE) over DFA enables I/O consolidation. It permits both LAN and SAN traffic to coexist on the same switch and the same wire.

FEX Based ACL Classification

The FEX-based ACL Classification feature uses TCAM resources on a FEX to perform ACL-based packet classification of incoming packets on the switch. When QoS policies are processed on a FEX, the policies are enforced on the switch and on the associated FEX or FEXes.

New Hardware Features in Cisco NX-OS Release 7.0(3)N1(1)

Cisco NX-OS Release 7.0(3)N1(1) supports the following new hardware:

  • Cisco Nexus 2348UPQ FEX (N2K-C2348UPQ)

New Software Features in Cisco NX-OS Release 7.0(2)N1(1)

Dynamic Fabric Automation

This software release is the first release to support Cisco's Evolutionary Data Center Fabric solution called Dynamic Fabric Automation (DFA). DFA is evolutionary and is based on the industry leading Unified Fabric solution.

DFA focuses on simplifying, optimizing and automating data center fabric environments by offering an architecture based on four major pillars namely Fabric Management, Workload Automation, Optimized Networking and Virtual Fabrics. Each of these pillars provide a set of modular functions which can be used together or independently for easiness of adoption of new technologies in the data center environment.

Complete details on the DFA architecture can be found at: http://www.cisco.com/go/dfa.

New Software Features in Cisco NX-OS Release 7.0(1)N1(1)

Cisco NX-OS Release 7.0(1)N1(1) is a maintenance release that includes bug fixes and the following software features and enhancements:

ACL Logging for IPv6 ACLs

The ACL logging feature allows you to monitor IPv6 ACL flows and to log dropped packets on an interface.

Dynamic FCoE Using FabricPath

Dynamic FCoE extends the capability and reliability of storage networks by leveraging FabricPath technology to create logical separation of SAN A and SAN B. FCoE VFCs and Interswitch-Links (ISLs) are dynamically configured, simplifying multihop FCoE deployments in leaf-spine topologies.

Anycast Routing

Allows you to add more nodes at the spine layer as the numbers of servers increases.

Early Warning for Forwarding Information Base Exhaustion

When the Forwarding Information Base (FIB) table is 100% full, the following messages is displayed:

FIB_TCAM_RESOURCE_EXHAUSTION:FIB TCAM usage is at 90 percent.

Explicit Congestion Notification with Weighted Random Early Detection

Explicit Congestion Notification (ECN) with Weighted Random Early Detection (WRED) solves the delay and packet loss problems for applications that are sensitive to these issues.

FabricPatch Operations, Administration, and Management

Support for Fabric Path Operations, Administration and Management has been added in this software release.

Fibre Channel and Fibre Channel Over Ethernet Slow Drain

Fiber Channel (FC) and Fibre Channel over Ethernet (FCoE) slow drain addressed the issue of slow drain devices that cause congestion in the network.

Multi-Destination Tree

A Multi-Destination Tree (MDT), also referred to as a forwarding tag or ftag, is a spanning-tree used for forwarding packets within a topology. By default, a topology has two MDTs/ ftags: topology 0 has ftag 1 and 2, topology 1 has ftag 3 and 4, topology 2 has ftag 5 and 6, up to a maximum supported 64 topologies.

OpenFlow v1.0

The OpenFlow feature is a specification from the Open Networking Foundation (ONF) that defines a flow-based forwarding infrastructure (L2-L4 Ethernet switch model) and a standardized application programmatic interface (protocol definition) to learn capabilities, add and remove flow control entries and request statistics. OpenFlow allows a controller to direct the forwarding functions of a switch through a secure channel.

One Platform Kit (OnePK)

Support has been added for One Platform Kit (onePK) Turbo API. OnePK is a cross-platform API and software development kit that enables you to develop applications that interact directly with Cisco networking devices. onePK provides you access to networking services by using a set of controlled APIs that share the same programming model and style. For more information, see the following URL:

http://www.cisco.com/en/US/partner/prod/iosswrel/onepk.html

Overload Bit

Intermediate System to Intermediate System (IS-IS) uses the overload bit to tell other routers not to use the local router to forward traffic but to continue routing traffic destined for that local router.

Port Channel Max Links

The Port Channel Max Links feature defines the maximum number of bundled ports allowed in an LACP port channel.

Switch Port Analyzer with Access Control List Filtering

The Switch Port Analyzer (SPAN) with Access Control List (ACL) filtering feature allows you to filter SPAN traffic so that you can reduce bandwidth congestion. To configure SPAN with ACL filtering, you use ACL’s for the session to filter out traffic that you do not want to span. An ACL is a list of permissions associated to any entity in the system; in the context of a monitoring session, an ACL is a list of rules which results in spanning only the traffic that matches the ACL criteria, saving bandwidth for more meaningful data. The filter can apply to all sources in the session.

TCAM Carving

You can create and administer up to 16 templates to resize the regions in ternary content-addressable memory (TCAM).

Upgrading or Downgrading to a New Release

This section describes the upgrade and downgrade paths that are supported for Cisco NX-OS Release 7.1(0)N1(1a) on the Cisco Nexus device.

The section includes the following topics:

Upgrade and Downgrade Guidelines

The following guidelines apply to Cisco NX-OS Release 7.1(0)N1(1b) for Cisco Nexus devices:

  • When a Layer 3 license is installed, the Cisco Nexus 5500 Platform does not support an ISSU. Hot swapping a Layer 3 module, for example, the Layer 3 GEM (N55-M160L3-V2) or Version 2 Layer 3 daughter card (N55-D160L3-V2), is not supported. You must power down the Cisco Nexus device before removing or inserting a Layer 3 expansion module.

Supported Upgrade and Downgrade Paths

Table 4 shows the upgrade and downgrade possibilities for Cisco NX-OS Release 7.1(1)N1(1). For more information, see the Cisco Nexus 5500 Series NX-OS Software Upgrade and Downgrade Guide, Release 7.1(1)N1(1).

 

Table 4 Cisco NX-OS Release 7.1(1)N1(1) Supported Upgrade and Downgrade Paths

Current Cisco NX-OS Release
Upgrade to NX-OS Release 7.1(1)N1(1)
Downgrade from NX-OS Release 7.1(1)N1(1)

7.0(4)N1(1)—7.0(6)N1(1)

7.1(0)N1(1b)
7.1(0)N1(1a)

Nondisruptive upgrade (ISSU)

Disruptive downgrade


Note Doing a disruptive upgrade between incompatible images will result in loss of certain configurations such as unified ports, breakout, and FEX configurations. See CSCul22703 for details.


Table 5 shows the upgrade and downgrade possibilities for Cisco NX-OS Release 7.0(6)N1(1). For more information, see the Cisco Nexus 5500 Series NX-OS Software Upgrade and Downgrade Guide, Release 7.0(6)N1(1).

 

Table 5 Cisco NX-OS Release 7.0(6)N1(1) Supported Upgrade and Downgrade Paths

Current Cisco NX-OS Release
Upgrade to NX-OS Release 7.0(6)N1(1)
Downgrade from NX-OS Release 7.0(6)N1(1)

5.2(1)N1(5)—5.2(1)N1(9)
6.0(2)N1(2)—6.0(2)N2(7)
7.0(1)N1(1a)—7.0(5)N1(1a)

Nondisruptive upgrade (ISSU)

Disruptive downgrade

Limitations

This section describes the limitations for Cisco NX-OS Release 7.x.

  • Loading a new license or reloading existing license on a Cisco Nexus 5624Q switch is not supported. For details, see CSCus41273.
  • Ingress inter-VLAN-routed Layer3 multicast packets are treated as “unknown multicast” by the storm-control feature. This is due to the Layer 3 forwarding design in the Cisco Nexus 5500 Series switch. For details, see CSCuh34068.
  • The Server Virtualization Switch (SVS) connection is not deleted during a rollback when NIV is enabled. To resolve this issue, delete the current SVS connection and reapply the original SVS connection. For details, see CSCts17033.
  • If SPAN traffic is rate-limited by entering the switchport monitor rate-limit 1G command, then a maximum transmission unit (MTU) truncation size cannot be used to truncate SPAN packets. For details, see CSCua05799.
  • When an FC SPAN destination port is changed from SD to F mode and back to SD mode on an NPV switch, the port goes into an error-disabled state. Perform a shut/no-shut after the mode change recovers the port. This issue occurs only in NPV mode. For details, see CSCtf87701.
  • If you configure a Cisco Nexus 2248TP port to 100 Mbps instead of autonegotiation, then autonegotiation does not occur, which is the expected behavior. Both sides of the link should be configured to both hardwired speed or both autonegotiate.

no speed —Autonegotiates and advertises all speeds (only full duplex).

speed 1000 —Autonegotiates only for an 802.3x pause.

speed 100 —Does not autonegotiate; pause cannot be advertised. The peer must be set to not autonegotiate and to fix at 100 Mbps (similar to the N2248TP)

For details, see CSCte81998.

  • Given the implementation of a single CPU ISSU, the STP root on the PVST region with switches on an MST region is not supported. The PVST simulation on the boundary ports goes into a PVST SIM inconsistent blocked state that breaks the STP active path. To work around this issue, move all STP roots to the MST region. However, the workaround causes a nondisruptive ISSU to fail because nonedge designated forwarding ports are not allowed for an ISSU. For additional information, see CSCtf51577.
  • IGMP queries sent in CSCtf94558 are group-specific queries that are sent with the destination IP/MAC address as the group's address.

GS queries are sent for IP address: 224.1.14.1 to 224.1.14.100 [0100.5E01.0E01 to 0100.5E01.0E64]

These are not link-local addresses. By default, they are not flooded by the hardware into the VLAN. They are sent only to the ports that have joined this group.

This is expected behavior during an ISSU.

In another scenario, the IGMP global queries [dest IP 224.0.0.1] get flooded correctly in the VLAN.

Group-specific queries are not forwarded to ports other than the one that joined the group during ISSU. The reason to forward group-specific queries toward hosts is to avoid having them leave the group. However, if a port has not joined the group, then this is not an issue. If there is an interface that has joined the group, the queries are expected to make it to the host. While the behavior is different when ISSU is not occurring, it is sufficient and works as expected and there is no impact to the traffic. For details, see CSCtf94558.

  • When a private VLAN port is configured as a TX (egress) SPAN source, the traffic seen at the SPAN destination port is marked with the VLAN of the ingressed frame. There is no workaround.
  • In large-scale configurations, some Cisco Nexus 2000 Series Fabric Extenders might take up to 3 minutes to appear online after entering the reload command. A configuration can be termed large-scale when the maximum permissible Cisco Nexus 2000 Series Fabric Extenders are connected to a Cisco Nexus device, all host-facing ports are connected, and each host-facing interface has a large configuration (that supports the maximum permissible ACEs per interface).
  • Egress scheduling is not supported across the drop/no-drop class. Each Fabric Extender host port does not support simultaneous drop and no drop traffic. Each Fabric Extender host port can support drop or no drop traffic.
  • The Cisco Nexus 2148 Fabric Extender does not support frames with the dot1q vlan 0 tag.
  • VACLs of more than one type on a single VLAN are unsupported. Cisco NX-OS software supports only a single type of VACL (either MAC, IPv4, or IPv6) applied on a VLAN. When a VACL is applied to a VLAN, it replaces the existing VACL if the new VACL is a different type. For instance, if a MAC VACL is configured on a VLAN and then an IPv6 VACL is configured on the same VLAN, the IPv6 VACL is applied and the MAC VACL is removed.
  • A MAC ACL is applied only on non-IP packets. Even if there is a match eth type = ipv4 statement in the MAC ACL, it does not match an IP packet. To avoid this situation, use IP ACLs to apply access control to the IP traffic instead of using a MAC ACL that matches the EtherType to IPv4 or IPv6.
  • Multiple boot kickstart statements in the configuration are not supported.
  • If you remove an expansion module with Fibre Channel ports, and the cable is still attached, the following FCP_ERRFCP_PORT errors appear:
2008 May 14 15:55:43 switch %KERN-3-SYSTEM_MSG: FCP_ERRFCP_PORT: gat_fcp_isr_ip_fcmac_sync_intr@424, jiffies = 0x7add9a:Unknown intr src_id 42 - kernel
2008 May 14 15:55:43 switch %KERN-3-SYSTEM_MSG: FCP_ERRFCP_PORT: gat_fcp_isr_ip_fcmac_sync_intr@424, jiffies = 0x7add9a:Unknown intr src_id 41 - kernel
 

These messages are informational only and result in no loss of functionality.

  • If you configure Multiple Spanning Tree (MST) on a Cisco Nexus device, we recommend that you avoid partitioning the network into a large number of regions.
  • By design, vEth interfaces do not share the underlying behavior of a vPC port. As a result, a VLAN does not get suspended when the peer switch suspends it. For example, when you shut a VLAN on a primary switch, the VLAN continues to be up on the secondary switch when the vEth interface is on a FEX. When the VLAN on the primary switch goes down, the VLAN on the vEth interface on the primary is suspended, but the vEth on the secondary switch is up because it is an active VLAN on the secondary switch.
  • Role-based Access Control List (RBACL) policy enforcement is performed on VLANs on which Cisco Trusted Security (CTS) enforcement is not configured. This situation occurs when there is at least one VLAN in the switch where CTS is enforced. On a VLAN where CTS is not enforced, RBACL policy lookup occurs for ingress packets and the packet is denied or permitted according to the policies in the system. To work around this issue, make sure that all VLANs on which SGT tagged packets ingress enforce CTS.
  • The packet length in the IP GRE header of a packet exiting from the switch is not equal to the MTU value configured in the ERSPAN source session. This is true for SPAN or ERSPAN. This situation can occur whenever the MTU value that is configured in an ERSPAN or SPAN session is smaller than the SPAN packet, such as when the packet is truncated. The IP GRE packet is truncated to a value that differs by –2 to 10 bytes from the expected MTU.
  • When you configure a Layer 3 interface as an ERSPAN source, and configure the ERSPAN termination on a Catalyst 5500 switch or a Cisco Nexus 7000 Series switch, you cannot terminate the Layer 3 interface ERSPAN source on the Cisco Nexus 7000 Series switch or the Catalyst 5500 switch. To work around this issue, configure VLAN 1 to 512 on the Cisco Nexus 7000 Series switch or the Catalyst 6000 switch.
  • Unknown unicast packets in FabricPath ports are counted as multicast packets in interface counters. This issue occurs when unknown unicast packets are sent and received with a reserved multicast address (that floods to a VLAN) in the outer FabricPath header, and the Cisco Nexus device increments the interface counter based on the outer FabricPath header. As a result, multicast counters are incremented. In the case of a Cisco Nexus 7000 Series switch, unicast counters are incremented as they are based on an inner Ethernet header. There is no workaround for this issue.
  • In an emulated switch setup, inband keepalive does not work. The following steps are recommended for peer keepalive over switch virtual interface (SVI) when a switch is in FabricPath mode:

Use a dedicated front panel port as a vPC+ keepalive. The port should be in CE mode.

Use a dedicated VLAN to carry the keepalive interface. The VLAN should be a CE VLAN.

Add the management keyword to the corresponding SVI so that the failure of a Layer 3 module will not bring down the SVI interface.

Enter the dual-active exclude interface-vlan keepalive-vlan command to prevent the SVI from going down on the secondary when a peer-link goes down.

  • FabricPath requires 802.1Q tagging of the inner Ethernet header of the packet. Native VLAN packets that are sent by a Cisco Nexus 7000 Series switch are not tagged. As a result, a Cisco Nexus device drops packets due to packet parsing errors. To work around this issue, enter the vlan dot1q tag native command on the Cisco Nexus 7000 Series switch to force 802.1Q tagging of native VLAN packets.
  • A nondisruptive ISSU is not supported when ingress policing is configured.
  • The maximum IP MTU that can be set on Layer 3 interfaces on which Layer 3 protocols are running is 9196, because of the internal header used inside the switch. The network-qos policy must be set to 9216.
  • If there are unified ports configured as fiber channel (FC) and a disruptive upgrade is performed, then the FC interfaces must be reconfigured, and the switch will require a second reload.

Limitations on the Cisco Nexus Device

The limitations on the Cisco Nexus device 5500 Series devices are as follows:

SPAN Limitations on Fabric Extender Ports

The SPAN limitations on Fabric Extender ports are as follows:

  • On a Cisco Nexus device, if the SPAN source is a FEX port, the frames will always be tagged when leaving the SPAN destination.
  • On a Cisco Nexus 5500 Platform switch, if the SPAN source is on an access port on the switch port, the frames will not be tagged when leaving the SPAN destination.
  • Ports on a FEX can be configured as a tx-source in one session only.

If two ports on the same FEX are enabled to be tx-source, the ports need to be in the same session. If you configure a FEX port as a tx-source and another port belonging to the same FEX is already configured as a tx-source on a different SPAN session, an error is displayed on the CLI.

In the following example, Interface Ethernet100/1/1 on a FEX 100 is already configured as a tx-source on SPAN session-1:

swor28(config-monitor)# show running-config monitor
version 4.0(1a)N2(1)
monitor session 1
source interface Ethernet100/1/1 tx
destination interface Ethernet1/37
no shut
 

If you add an interface Ethernet100/1/2 as a tx-source to a different SPAN session (session-2) the following error appears:

swor28(config)# monitor session 2
swor28(config-monitor)# source interface ethernet 100/1/2 tx
ERROR: Eth100/1/2: Ports on a fex can be tx source in one session only
swor28(config-monitor)#
 
  • When a FEX port is configured as a tx-source, the multicast traffic on all VLANs for which the tx-source port is a member, is spanned. The FEX port sends out only multicast packets that are not filtered by IGMP snooping. For example, if FEX ports 100/1/1–12 are configured on VLAN 11 and the switch port 1/5 sends multicast traffic on VLAN 11 in a multicast group, and hosts connected to FEX ports 100/1/3-12 are interested in receiving that multicast traffic (through IGMP), that multicast traffic goes out on FEX ports 100/1/3–12, but not on 100/1/1–2.

If you configure SPAN Tx on port 100/1/1, although the multicast traffic does not egress out of port 100/1/1, the SPAN destination does receive that multicast traffic, which is due to a design limitation.

  • When a FEX port is configured as both SPAN rx-source and tx-source, the broadcast, non-IGMP Layer-2 multicast, and unknown unicast frames originating from that port might be seen twice on the SPAN destination: once on the ingress and once on the egress path. On the egress path, the frames are filtered by the FEX to prevent them from going out on the same port on which they were received. For example, if FEX port 100/1/1 is configured on VLAN 11 and is also configured as SPAN rx-source and tx-source and a broadcast frame is received on that port, the SPAN destination recognizes two copies of the frame, even though the frame is not sent back on port 100/1/1.
  • A FEX port cannot be configured as a SPAN destination. Only a switch port can be configured and used as a SPAN destination.

Layer 3 Limitations

Asymmetric Configuration

In a vPC topology, two Cisco Nexus devices configured as vPC peer switches need to be configured symmetrically for Layer 3 configurations such as SVIs, the peer gateway, routing protocol and policies, VRF, and RACLs.


Note The vPC consistency check does not include Layer 3 parameters.


SVI

When a Layer 3 module goes offline, all non-management SVIs are shut down. To maintain connectivity when a Layer 3 module fails, you can configure an SVI as a management SVI using the command management under i nterface vlan. This prevents traffic to the management SVI from passing through the failed Layer 3 module.

Cisco Nexus 5548P Daughter Card (N55-D160L3)

Before installing a Layer 3 daughter card (N55-D160L3) into a Cisco Nexus 5548P switch, you must upgrade to Cisco NX-OS Release NX-OS Release 5.0(3)N1(1c) or a later release, and then install the card into the chassis.

Caveats

This section includes the open and resolved caveat record numbers for this release. Links are provided to the Bug Toolkit where you can find details about each caveat.

This section includes the following topics:

Open Caveats

Table 6 lists descriptions of open caveats in Cisco NX-OS Release 7.x.

The record ID links to the Cisco Bug Toolkit where you can find details about the caveat.

 

Table 6 Cisco NX-OS Release 7.x Open Caveats

Record Number
Open Caveat Headline

CSCuo28747

N5K/6K: FWM core during ISSU.

CSCuu07598

Nexus 5548P/N55-M16P: After Upgrade Interface Down & Unrecoverable.

CSCus78963

Twinpeak: Inconsistent behavior of System LED during error state.

CSCut35369

100M link not up after changing remote end from auto to 100M.

CSCut55443

FWM mac trace buffer memory corruption.

CSCut60406

Discover packets not reaching to server in L2MP and dhcp snoop enabled

CSCur07245

Nexus switch may see repeated crashes of ntpd process.

CSCur12364

N5K: ISSU fails 5.1(3)Nx(x)/5.2(1)N1(x) -> 6.0(2)Nx(x) -> 7.0(x)N1(1)

CSCuj87061

Unified FC interfaces come up as Ethernet after disruptive upgrades.

CSCts71048

On an NPV switch, VFCs do not come up after delete/add VLAN/VSAN.

CSCtx84752

The MVR receiver-port output for an AA FEX port displays ACTIVE after a switchover.

CSCtx99080

The FEX temperature does not reflect the correct value.

CSCty33678

MACs not synced after ISSU on AA HIF trink with PSEC;non-default timers.

CSCty43038

After a rollback, the show tech-support ethpm command displays unconfigured VLANs, and FWM forwards unconfigured VLANs.

CSCtz78363

If you change the VLAN mode from FabricPath to Classical Ethernet and then back to FabricPath, some Hot Standby Router Protocol (HSRP) gateway-based traffic may be affected.

CSCua27097

The no feature private-vlan command does not remove the entire configuration.

CSCuc12211

Channel-group configuration missing after reload on HIF port.

CSCuc25187

The config-sync process does not remove the VLAN QoS policy and offset configuration.

CSCuc26047

Nexus 5000 reset due to kernel panic.

CSCuc43503

The IGMP vPC optimization knob does not work when feature-set virtualization is configured.

CSCud43962

CDPv6 shows the address of different interfaces, not the connected interfaces.

CSCud53059

DAI is blocking traffic for FEX HIF ports.

CSCue22038

After a module is powered off, a timeout occurs for the line card removal sequence. As a result, the slot becomes unusable and must be reloaded.

CSCuf16457

On a Cisco Nexus 5500 switch, applying policy maps fails with the error %RPM-2-PPF_SES_VERIFY.

CSCuf47724

On a Cisco Nexus 5500 switch, SVI Counters show incorrect results.

CSCuf52331

The minimum suppression value needs to be handled properly in switch/HIF/NIF storm-control.

CSCuf82183

In some scenarios, policy statistics are not enabled when a service policy is applied to ports.

CSCug72465

A test harness does not properly treat closing of the TCP flow.

CSCug90859

On the Cisco Nexus 5500 switch, PBR does not work on a PVLAN SVI.

CSCug98105

Cisco Nexus 5500-BGP v6 peering is not coming up if the same address in a different VRF uses MD5.

CSCuh04973

The default-interface command is not resetting the speed command on an HIF port-channel interface.

CSCuh17828

On a Cisco Nexus 5500 switch, when the command sequence copy file start is used, copying the saved configuration to the running configuration takes too long.

CSCuh34068

Ingress inter-VLAN-routed Layer 3 multicast packets are treated as “unknown multicast” by the storm-control feature.

CSCuh36797

PIM process restart CLI is visible but not supported on the Cisco Nexus 5500.

CSCuh44777

Support should be available to log enabled IP ACL as a class-map match.

CSCui56698

Slow drain: Need support for non-default CoS value for class-fcoe.

CSCui94565

Service not responding under certain CTS scale scenarios.

CSCuj12958

U6RIB structure errors seen during withdraw/add routes.

CSCuj12998

FCOE/EEM - 100% CPU for EEM actions with low timeout/high pause rate.

CSCuj13018

FCoE/EEM - Only 18 actions are taken when 19 actions are accepted.

CSCuj43607

NAT: With same static and dynamic NAT policy, packets punted to CPU.

CSCuj54486

Multicast packets drop for certain flows after FEX reload.

CSCuj58467

Router MAC is not getting installed when changing the ASID.

CSCuj69824

Python script is not working when called using the python script_name command.

CSCuj78048

Interface VLAN shows up in the show run command after creating a configuration profile.

CSCuj83153

POAP: Addition of python-run and python-exec files to bootflash.

CSCul23467

Port-monitor and FC slow drain configurable on NPV switch.

CSCul48098

Unable to remove or add “system default interface pause mode edge/Core”

FP-POAP: Interface not locked on converting FP port to CE.REOP.

CSCul82850

While configuring no IPv6 access-list acl_pbrIpv6L3PO_N5K getting error.

CSCul99528

Openflow: default-miss cascade normal not working in pipeline 201.

CSCum08767

WCCP: Interfaces level CLI configurations removed after invalid ID to spm.

CSCum11052

MAC address out of sync between two switches.

CSCum64907

FCOE Slowdrain: Pause Events not triggered on sh/no shut PO mem.

Entering the shutdown/no shutdown commands is needed to bring up the FC scale setup.

CSCun88858

Duplicate DHCPv4 discover packets seen on PVLAN with DHCP relay.

CSCuo02594

mgmt0 connectivity issues after non-disruptive ISSU to 7.0(1)N1(1).

CSCuo08054

FEX interface does not reflect the correct traffic rate.

CSCuo23388

After non-disruptive issue auto-config not working.

CSCuo28351

Pulled VLAN stuck in delete hold down state after rollback.

CSCuo40189

Discards and error counter for DVFC.

CSCuo49139

Locally sourced multicast SM traffic needs mandatory PIM RP configuration.

CSCuo76832

DVFC counters are not visible immediately after clear counters.

CSCup19403

AA FEX flogi failure.

Multiple vulnerabilities in OpenSSL.

CSCup35829

QSFP Finisar NIF link takes more than 6 minutes to come up.

CSCup60352

Multicast traffic not received equally on HIF ports spread across ss blocks.

CSCup70305

Queuing policy on HIF not working for Layer 2 multicast traffic.

CSCuq09848

SPOM: When appmgr deletes a group, the switch does not unsubscribe.

CoS does not get mapped to correct queue if policy is applied at inter.

Secure LDAP does not work over LDAPS port.

FEXes go offline when removing the detachable VLAN command.

FC4 type missing for hosts in the FCNS table.

ISSU failed. Maximum downtime exceeded.

Upgrade failed. Return code 0x4093003B (max downtime exceeded)

CSCur05017

Product evaluation for CVE-2014-6271 and CVE-2014-7169.

CSCur05609

CLIs missing after upgrade from 5.2.1.N1.1 to 7.0.4.N1.1.

CSCur09549

Config sync rollback failure for failed port-channel member.

CSCur42783

N5696Q: Fex goes offline while ISSU from ImaintMR3 to Imaint MR4.

“Ethpm Internal Error” message while disabling dot1q-tunnel on HIF ports.

FEX takes more than six minutes to come online in AA mode.

FEXs get stuck in AA version mismatch when ISSD back to 7.0(5)N1(1) image.

VLAN map configuration through switch profile, offline/online on secondary.

Unicast TX and RX counters incrementing on HIF without traffic.

CSCur72846

Multi mobility domain and FCoE coexistance does not work.

CSCur86478

With per-port VLAN mapping on an FCoE VLAN, FCoE traffic stopped.

CSCur89671

Cannot add ports into port-channel with Multi-MD using device conformance.

CSCur95371

VXLAN for working on N5696-M4C.

CSCus04748

Mapping for installed on one of the FEXes for 2lvpc PO.

CSCus22741

DRAP process crash after FP domain restart.

Resolved Caveats in Cisco NX-OS Release 7.1(1)N1(1)

Table 7 Cisco NX-OS Release 7.1(1)N1(1) Resolved Caveats

Record Number
Resolved Caveat Headline

CSCut85787

N5K/6K: NTP received time not to used to update clock.

CSCur89241

N2K-C2348TQ FEX does not come up due to "SDP timeout/SFP Mismatch"

CSCud02139

Access to nexus7k via vty may get lost at random times with tacacs+

CSCue31348

tacacsd process crash during authentication/authorization

CSCtw85051

Nexus FEX ISSU upgrade fails if FEX link flaps

CSCus23186

CDP gets automatically re-enabled after a reload

CSCur39862

Port-profile config is truncated - "show port-profile" crashes switch

CSCup77720

cts manual command not allowed with fex pre provisioning

CSCus03494

N5K/6K: Cannot import certain config lines longer than 132 characters

CSCur43289

COPP - Ipv6 NA, RA and RS goes to wrong CoPP queue affecting icmpv4

CSCus28101

N5K/6K: Inband TACACS traffic matched against exception-class in CoPP

CSCur41721

DHCP relay is broken over L3 sub-int port-channel

CSCus89196

Trunk ports move to BKN state for native vlan

CSCus19792

"show fcns database", "show fcs ie" not correctly populated after ISSU

CSCuo34512

fwm hap reset with traffic running over the weekend

CSCus95396

fcoe_mgr leak cause a crash

CSCuq31499

N7K FEX satctrl hap reset

CSCua77932

N5k crashes due to fwm hap reset

CSCur30631

Nexus 6000: FWM crash with not enough core files saved

CSCus38422

fwm core triggered due to fex port-channel flap

CSCus94447

DFA-auto-config-recovery-does-not-work

CSCur30305

HMM should learn multiple IPV4/IPV6 address with same MAC

CSCus78223

profile stuck in "Profile halt" status

CSCus52281

Add a PTPLC mem-stats command to Nexus switches

CSCus36208

PTPLC core due to mem leak

CSCuo34379

N5K/6K:NXOS upgrade by changing bootvariables & reload isn't recommended

CSCus22741

DRAP process crash after FP domain restart

CSCus04851

N5k/6k -FP BCAST/MCAST broken on VPC edge ports after remote root change

CSCur01470

N5K/6K fails to respond to unicast ARP request and may loop it back

CSCus16074

N6K: FPOAM process crash

CSCuq45187

L2vpn - Local access circuit DOWN after RELOAD

CSCuq81861

Enabling peer-gateway breaks the fix for CSCui48861

CSCus58726

LACP core + reload on N5K /N6K

CSCuc61695

port-channel members error disabled due to eltm seq timeout

CSCup85771

Nexus 6000 resets SSH intermittently

CSCuq78422

Fabricpath - 1st CE port bringup places interface in L2G Blocking state

CSCur14220

Netstack core after modifying PBR deleting SVIs and adding back in scale

CSCus11451

N5K: PTP: Core detected due to hwclock crash

CSCuq76383

Can not exit from VTY after using onePK VTY SS

CSCug29190

'ethpc' hap reset tied to SFP diagnostics

CSCun69369

Bigsur FAULTY slot 0 asic 0, bigsur_stm_dma_monitor_timer_hdlr error

CSCun91863

N5K: NOHMS-2-NOHMS_DIAG_ERR_PS_FAIL with DC Power Supply

CSCus70491

N6004 bigsurusd hap reset

CSCuq96902

N6K QSFP-40G-CSR4 shows up as "transceiver is not supported"

CSCur76751

N6K/5K: Need knob to configure mgmt0 interface to operate at auto 10/100

CSCuo23668

N6K: errors "clk_flush: Couldn't Clear Bus" and console unresponsive

CSCus39651

N6k:CRC errors on random 40gig port after reload

CSCuj84269

Nexus 5000 switch reloaded due to gatosusd hap reset

CSCur11599

Nexus 5k/6k - Memory leak in pfstat process causing hap reset

CSCuq66628

VDC-MGR crash on N5k

CSCuq86032

N5k - Same "match cos" value shared between class-fcoe and another class

CSCuq00161

Verizon CoPP: Nexus 5600 Support for CB-QOS MIB

CSCus97571

Rollback Broken in PPM, Auto config breaks while VRF in Delete holddown

CSCus98916

BGP Vinci: For 0.0.0.0/0, BGP installs non-best/multi paths in URIB

CSCus66218

Deleted vlans are still showing in show fabricpath output

CSCup75270

FC interfaces are not listed in IF-MIB snmp walk

CSCus65288

ERSPAN outer ip header length exceeds the maximum limit for a packet

CSCur54642

N5K with ERSPAN enabled may face a slow leak in 'monitor' process

CSCuo71613

IPLUS 152: ISSU ND upg -> bin - FEX module preload failed

CSCus68591

Assess GHOST vulnerability for Nexus 5k (CVE-2015-0235)

CSCup22663

Multiple Vulnerabilities in OpenSSL - June 2014

CSCur05017

N5K/N6K evaluation for CVE-2014-6271 and CVE-2014-7169

CSCur30094

Nexus 5000 : evaluation of SSLv3 POODLE vulnerability

CSCur25570

Defined VLANs do not appear in configuration

CSCut09166

fwm hap reset on vlan delete

CSCur39582

vlan_mgr unresponsive on creating or deleting VLAN

CSCus55778

A Nexus 6000 may reload unexpectedly due to a vPC hap reset

CSCup74458

few seconds of packet loss on vpc secondary link bringup

CSCuq42482

N5K dual homed vpc fex, hif speed change not always picked up N5K's

CSCuq27230

IBM Fex: upgrade cmmuc version to 1.10

CSCuq37872

Iplus: Crash in urib segfault in urib_chlist_add_rnh()

CSCuq64886

fabricpath isis bfd requires L3 bfd interval command to adjust timers

CSCuq88206

Increase FCF MAC Allocation for Nexus 6004 Platform to 48.

CSCuq91075

DFA: DHCP fix for Infoblox.

Configuration sync rollback failure for failed port channel member.

CSCur16747

satctrl cored after write-erase& applying config with 'FEX-QoS-offload'

CSCur47731

5596UP / Crash, Reload after setting a FC Port shut/no shut

CSCur59789

While configuring vrf Unrecognized IP message minor type 33

CSCur64428

ISIS fails to push MAC entry learned from ISIS peer into local M2RIB

CSCur66262

DFA Leaf should NOT allow auto-pull for core-vlan range/backbone vlan.

CSCur86210

Iplus: motd banner not displayed upon login

CSCus01129

Iplus : vpc status shows "DOWN" in the fex uplink port PoCH output.

CSCus16847

HIF ports are down after ISSU

CSCus56036

BGP tracebacks or FD read errors along with session flaps

CSCus64947

Vinci Fabric Anchor and Anycast-GW cause ARP-3-DUP_VADDR_SRC_IP msg.

CSCus72900

Knob to Disbable ports after loop is detected not working as expected

CSCus74412

SunnySide fex:Fan is going to 'failure state' even though fan is present

CSCus78102

N6K crashed due to "kernel panic" @ stale pointer

CSCut06901

Traffic blackholing for around 60 secs after new RPF intf comes up

CSCut17968

res mgr crash in n6k/n5k when "show vdc resource" command is given

CSCus77310

vpc hap reset vpc process crashed

CSCua71532

AAA PAM config file world-writable

CSCus64400

%STP-2-VLAN_PORT_LIMIT_EXCEEDED is output even under verified scalabilty

CSCuq86047

Nexus5k ipForward Object not giving correct results for snmpwalk

CSCuq04309

nexus snmpd crash after mts queue full

CSCur26119

EIGRP prefixes missing after interface flap

CSCuq79790

EIGRP Internal Route does not carry tag that is in the topology

CSCuq68431

EIGRP crash in eigrp_cmi_enqueue

CSCut22554

Workaround for CSCuo46284: Nexus 5500 showing SFP uC: Module 1: v0.0.0.0

CSCus16410

Sometime N6K export as a TCP Src/Dst port is zero.

CSCus68610

N5K/N6K - Silent reset with uC reset code: 0x4800

CSCut35476

Bigsur FAULTY slot 0 asic 3, bigsur_stm_dma_monitor_timer_hdlr

CSCur07245

Nexus switch may see repeated crashes of ntpd process

CSCus26870

December 2014 ntpd CVEs for Nexus 5k/6k/7k/MDS

CSCue56335

N7k - snmpd core dumps during vlanTrunkPortVlansXmitJoined mibwalk

CSCus28969

Nexus 5000 ICMP redirects send with wrong redirect IP gateway

CSCuq56923

Logging level virtual-service reverts to default after a NX-OS upgrade..

CSCut55443

FWM mac trace buffer memory corruption

CSCut03537

QinQ - Double-tag for native/untagged vlan traffic

CSCut74135

Fabricpath mode transit - control packets tagged with internal vlan 4041

CSCut19714

N2H traffic can drop on a HIF port-channel when another is down

CSCut12023

Port channel service crashes after many 'show run' commands

CSCus29400

FCPC cores and triggers hap reset while allocating response payload

CSCus20646

N5K crash on CDP process

Resolved Caveats in Cisco NX-OS Release 7.1(0)N1(1b)

 

Table 8 Cisco NX-OS Release 7.1(0)N1(1b) Resolved Caveats

Record Number
Resolved Caveat Headline

CSCus41273

Loading a new license or reloading existing license on 5624Q gives error.

Resolved Caveats in Cisco NX-OS Release 7.1(0)N1(1a)

 

Table 9 Cisco NX-OS Release 7.1(0)N1(1a) Resolved Caveats

Record Number
Resolved Caveat Headline

CSCup75270

FC interfaces are not listed in IF-MIB snmp walk

CSCul35819

BPDUGuard not activated on disallowed edge trunk VLANs.

Does not advertise Anycast SID when overload asserted.

HIF vPC in suspended state after removing global mobility-domain detect VLANs.

Resolved Caveats in Cisco NX-OS Release 7.0(6)N1(1)

 

Table 10 Cisco NX-OS Release 7.0(6)N1(1) Resolved Caveats

Identifier
Description

CSCur15901

N2K-C2348UPQ FEX does not come up due to "SDP timeout/SFP Mismatch"

CSCup75270

FC interfaces are not listed in IF-MIB snmp walk

CSCud02139

Access to nexus7k via vty may get lost at random times with tacacs+

CSCuc62084

CSCuc62084 Sh accounting log / show log output is missing initial

CSCtw85051

Nexus FEX ISSU upgrade fails if FEX link flaps

CSCuo67919

SCH : SR creation delayed for more than 6 hours for PSU failure on N5k

CSCuq85982

N55xx link debounce time not working as expected

CSCub20644

cdp core dump in 5.0.3

CSCun70630

Filtering "sh cdp neigh" output does not yield all the entries

CSCun92485

Unable to modify VLAN Failed to run the commands. Please try again later

CSCuq20915

Display of allowed vlan range for FEX HIF breaks in running-config

CSCup77720

cts manual command not allowed with fex pre provisioning

CSCus03494

N5K/6K: Cannot import certain config lines longer than 132 characters

CSCur43289

COPP - Ipv6 NA, RA and RS goes to wrong CoPP queue affecting icmpv4

CSCus28101

N5K/6K: Inband TACACS traffic matched against exception-class in CoPP

CSCul89905

L2 control packets dropped on CTS links with SGT encapsulation

CSCur77280

N6k m2rib missing interfaces from OIFL

CSCun83889

Dual homed FEX interface inactive in FP env.

CSCuf82423

Nexus 5596 ethpm hap reset

CSCur29789

N5k/N6k might unexpectedly reload due to "eth_port_sec hap reset"

CSCuq61301

FEX FCOE FCNS FC4-TYPE:FEATURE incomplete, empty.

CSCue62640

N5K/6K: TCP ports 21, 512-514 are opened after enabling FCoE

CSCun98175

N6K nfp process crash

CSCun80333

pbr-statistics counter issue in multi-sequence PBR

CSCur11378

fwm hap reset with %FWM-2-FWM_ASSERT_FAILURE

CSCuq72386

N5k/6k: Static MAC entries deleted upon STP CBL update

CSCur30631

Nexus 6000: FWM crash with not enough core files saved

CSCuj22176

traffic loss on vPC trunk with 1K vlans after the reload of vPC+ primary

CSCus38422

fwm core triggered due to fex port-channel flap

CSCur30305

HMM should learn multiple IPV4/IPV6 address with same MAC

CSCus36208

PTPLC core due to mem leak

CSCun69659

"m2rib_delete_my_bd_mroutes() failed" when creating FP vlans

CSCuq98419

N5K crash due to kernel panic during ISSU 5.2(1)N1(7)

CSCuo34379

N5K/6K:NXOS upgrade by changing bootvariables & reload isn't recommended

CSCur08894

N5k/6k - FP BCAST broken on VPC edge port after root change on VPC+ peer

CSCus04851

N5k/6k -FP BCAST/MCAST broken on VPC edge ports after remote root change

CSCur01470

N5K/6K fails to respond to unicast ARP request and may loop it back

CSCus16074

N6K: FPOAM process crash

CSCus58726

LACP core + reload on N5K /N6K

CSCuc61695

port-channel members error disabled due to eltm seq timeout

CSCuq70337

N5K/6K: Bound vrfs lost after upgrade to 7.0

CSCup85771

Nexus 6000 resets SSH intermittently

CSCue56335

N7k - snmpd core dumps during vlanTrunkPortVlansXmitJoined mibwalk

CSCuo39797

fpoam: ping goes into endless loop when max sweep <= min sweep

CSCus26870

Assess December 2014 ntpd CVEs for Nexus 5k/6k/7k/MDS

CSCus15505

clk_mgr process crash due to a memory leak

CSCub90520

CLI threads not exited if 'sh tech <routing_protocol>' is interrupted

CSCug29190

'ethpc' hap reset tied to SFP diagnostics

CSCur12427

5672UP unable to read sensors temperature

CSCun69369

Bigsur FAULTY slot 0 asic 0, bigsur_stm_dma_monitor_timer_hdlr error

CSCum13332

N5K: Changes to input voltage logging

CSCun91863

N5K: NOHMS-2-NOHMS_DIAG_ERR_PS_FAIL with DC Power Supply

CSCus70491

N6004 bigsurusd hap reset

CSCur76751

N6K/5K: Need knob to configure mgmt0 interface to operate at auto 10/100

CSCuo23668

N6K: errors "clk_flush: Couldn't Clear Bus" and console unresponsive

CSCus39651

N6k:CRC errors on random 40gig port after reload

CSCuc26047

Nexus 5000 reset due to Kernel Panic

CSCuj84269

Nexus 5000 switch reloaded due to gatosusd hap reset

CSCur11599

Nexus 5k/6k - Memory leak in pfstat process causing hap reset

CSCuh44248

Nexus 6000: Need to map "reload power-cycle" option to regular reload

CSCuo44979

Nexus 6004: Bios corrupt during reload/power cycle

CSCur02975

Nexus56xx/6k switches may take ~25 sec to respond to some show CLI's

CSCus16410

Sometime N6K export as a TCP Src/Dst port is zero.

CSCuq66628

VDC-MGR crash on N5k

CSCur82368

port-profile hap reset with long trunk allowed vlan list

CSCuq37768

'qd' Segfault at qd_bigsur_print_voq_asic_stats

CSCup64606

FCOE Slow Performance with Nexus N6004.

CSCuq86032

N5k - Same "match cos" value shared between class-fcoe and another class

CSCus97571

Rollback Broken in PPM, Auto config breaks while VRF in Delete holddown

CSCuq68431

EIGRP crash in eigrp_cmi_enqueue

CSCur26119

EIGRP prefixes missing after interface flap

CSCuq39448

Nexus 5K EIGRP crash when distribute list is configured under interface

CSCuq86047

Nexus5k ipForward Object not giving correct results for snmpwalk

CSCus65288

ERSPAN outer ip header length exceeds the maximum limit for a packet

CSCup99146

Iplus:ERSPAN Type2 & Type3 packet have incorrect outer IP length.

CSCur54642

N5K with ERSPAN enabled may face a slow leak in 'monitor' process

CSCus64400

%STP-2-VLAN_PORT_LIMIT_EXCEEDED is output even under verified scalabilty

CSCuo74024

STP BPDU received on vPC secondary not tunneled to vPC primary

CSCus68591

Assess GHOST vulnerability for Nexus 5k (CVE-2015-0235)

CSCup22663

Multiple Vulnerabilities in OpenSSL - June 2014

CSCum40651

Tacacs+ per CLI authorization failure upon entering CLI > 64 char

CSCuj90930

Nexus 55xx: crash in ipfib when FIB is exhausted.

CSCur25570

Defined Fabricpath VLANs do not appear in configuration

CSCut09166

fwm hap reset on vlan delete

CSCur39582

vlan_mgr unresponsive on creating or deleting VLAN

CSCup74458

few seconds of packet loss on vpc secondary link bringup

CSCuq42482

N5K dual homed vpc fex, hif speed change not always picked up N5K's

CSCus77310

vpc hap reset vpc process crashed.

CSCua71532

AAA PAM config file world-writable.

CSCum82485

Nexus 5500/6000: L2FM messages seen.

CSCun13245

NX-OS: Vulnerabilities found in Nexus5000

CSCuq39353

IMAINT 133: ascii-cfg hap reset

CSCuq64886

fabricpath isis bfd requires L3 bfd interval command to adjust timers

CSCuq89851

Nexus5672 DFA reboot when mandatory fields in the DCNM are not populated

CSCur16747

satctrl cored after write-erase& applying config with 'FEX-QoS-offload'

CSCur47731

5596UP / Crash, Reload after setting a FC Port shut/no shut

CSCus16847

HIF ports are down after ISSU

CSCus56036

BGP tracebacks or FD read errors along with session flaps

CSCus66218

Deleted vlans are still showing in show fabricpath output

CSCus78102

N6K crashed due to "kernel panic" @ stale pointer

CSCut06901

Traffic blackholing for around 60 secs after new RPF intf comes up

Logging level virtual-service reverts to default after an NX-OS upgrade.

CSCus20646

N5K crash on CDP process

CSCus29400

FCPC cores and triggers hap reset while allocating response payload

CSCuq18021

SNMPset to community strings with special characters cause hap reset

CSCut12023

Port channel service crashes after many 'show run' commands

CSCut17968

res mgr crash in n6k/n5k when "show vdc resource" command is given

CSCut19714

N2H traffic can drop on a HIF port-channel when another is down

CSCut35476

Bigsur FAULTY slot 0 asic 3, bigsur_stm_dma_monitor_timer_hdlr

CSCut03537

QinQ - Double-tag for native/untagged vlan traffic

Resolved Caveats in Cisco NX-OS Release 7.0(5)N1(1a)

There are no resolved caveats in this release.

Resolved Caveats in Cisco NX-OS Release 7.0(5)N1(1)

 

Table 11 Cisco NX-OS Release 7.0(5)N1(1) Resolved Caveats

Record Number
Resolved Caveat Headline

Python asking for password after write erase reload.

Config stuck after interface down during vPC bringup.

First port on N2K-B22HP-P fails on upgrade to 7.0(3)N1(1).

N5K/N6K evaluation for CVE-2014-6271 and CVE-2014-7169.

Configuration sync rollback failure for failed port channel member.

Resolved Caveats in Cisco NX-OS Release 7.0(4)N1(1)

 

Table 12 Cisco NX-OS Release 7.0(4)N1(1) Resolved Caveats

Record Number
Resolved Caveat Headline

CSCty86291

MTS buffer exhaustion with sequential add of large VLANs.

CSCun66310

System fails to boot after a power cycle.

QSA transceiver support needed on NIF.

Programming of updated FabricPath FWD entries to hardware delayed.

Scale setup error message when clear stats.

FEX process crash after switches in fabric-path are reset.

Configuration sync failures with no cpd enable and pre-provisioning.

QD process crash.

The clear copp stats command also clears qos statistics.

Routing unknown u/c and link local b/c packets.

vPC auto-recovery reverts to default delay value after switch reload.

ACLMGR crash when show startup-configuration command is entered after access-list deletion.

Configuration sync failed for storm-control under FEX interface.

The inherit command on Nexus is not working with TACACS authorization.

Resolved Caveats in Cisco NX-OS Release 7.0(3)N1(1)

 

Table 13 Cisco NX-OS Release 7.0(3)N1(1) Resolved Caveats

Record Number
Resolved Caveat Headline

CSCun57615

FP topo includes nonFP VLAN if newly created after non-destructive ISSU from 6.0.2.N2.3.

CSCun74416

Shut/no shut of VE, VF is required after non-disruptive ISSU to release 7.0(1)N1(1).

CSCuo63486

LLDP - link err-disabled upon reload when dcbx tlv is disabled.

Resolved Caveats in Cisco NX-OS Release 7.0(2)N1(1)

 

Table 14 Cisco NX-OS Release 7.0(2)N1(1) Resolved Caveats

CSCue33173

IPSG blocks traffic for private VLAN isolated trunk ports, even when a valid DHCP snooping binding entry exists.

CSCuj75434

DHCP relay do not work for secondary VLANs for both IPv4 and IPv6.

CSCun26512

DHCP relay support with URPF causes drop at ingress using customer topology.

CSCun77758

Output of ip dhcp relay statistics does not display Discover and Request

Resolved Caveats in Cisco NX-OS Release 7.0(1)N1(1)

 

Table 15 Cisco NX-OS Release 7.0(1)N1(1) Resolved Caveats

CSCuh30885

RBACL update and programming fails in certain scenarios.

CSCul27686

Interfaces might go down after upgrade and cannot be recovered.

CSCul49154

Flow match statistics are displaying 0 for default frop flow.

CSCum83908

Port-security is not learning all addresses upon changing the port mode.

CSCun88858

Duplicate DHCPv4 discover packets seen on PVLAN with DHCP relay.

Resolved Caveats in Cisco NX-OS Release 7.0(0)N1(1)

 

Table 16 Cisco NX-OS Release 7.0(0)N1(1) Resolved Caveats

Record Number
Resolved Caveat Headline

CSCtu31087

BGP update generation blocked because of large number of idle/active peers.

CSCud48710

Layer 2 multicast traffic can be lost up to 1 to 2 minutes upon unshut of the fabric PO in an AA topology. This happens only under the following conditions:

  • AA topology.
  • The group is downgraded to V2 of a V3 receiver.
  • The FEX fabric port is shut on one side.
  • When the fabric port is unshut, Layer 2 multicast traffic loss may be seen until the next join comes in.

CSCud72942

When all the FEXs are reloaded at the same time, Layer 2 multicast traffic may not recover on one of the HIF ports.

CSCud73169

The policer stats are not enabled if police action is added after it is applied to the interface configuration.

CSCuh36961

A QoS policy with qos-group 1 cannot be applied on a non-FCoE class.

CSCui77868

Add support for 10M speed on FEX interfaces.

CSCul81869

10Mb FEX:ISSU downgrade from 7.0(0)N1(1) to 6.0(2)N2(1) should be incompatible with Speed 10.

CSCum14020

dot1x: traffic flooding due to miss mac address in MAC table

MIB Support

The Cisco Management Information Base (MIB) list includes Cisco proprietary MIBs and many other Internet Engineering Task Force (IETF) standard MIBs. These standard MIBs are defined in Requests for Comments (RFCs). To find specific MIB information, you must examine the Cisco proprietary MIB structure and related IETF-standard MIBs supported by the Cisco Nexus 5500 Series switch.

The MIB Support List is available at the following FTP site:

ftp://ftp.cisco.com/pub/mibs/supportlists/nexus5000/Nexus5000MIBSupportList.html

Related Documentation

Documentation for Cisco Nexus 5500 Series Switches and Cisco Nexus 2000 Series Fabric Extenders is available at the following URL:

http://www.cisco.com/en/US/products/ps9670/tsd_products_support_series_home.html

The documentation set includes the following types of documents:

  • Licensing Information Guide
  • Release Notes
  • Installation and Upgrade Guides
  • Configuration Guides
  • Configuration Examples and TechNotes
  • Programming Guides
  • Operations Guides
  • Error and System Message Guides
  • Field Notices
  • Security Advisories, Responses and Notices
  • Troubleshooting Guide
  • Command References
  • MIB Reference Guide

Documentation Feedback

To provide technical feedback on this document or to report an error or ommission, please send your comments to nexus5k-docfeedback@cisco.com. We appreciate your feedback.