The Cisco NX-OS software is a data center-class operating system built with modularity, resiliency, and serviceability at its foundation. Based on the industry-proven Cisco NX-OS software, Cisco NX-OS helps ensure continuous availability and sets the standard for mission-critical data center environments. The highly modular design of Cisco NX-OS makes zero-effect operations a reality and enables exceptional operational flexibility.
Several new hardware and software features are introduced for the Cisco Nexus 5600 Series device and the Cisco Nexus 2000 Series Fabric Extender (FEX) to improve the performance, scalability, and management of the product line.
Cisco Nexus 5600 Series Devices
The Cisco Nexus 5600 Series includes 10- and 40-Gigabit Ethernet density in energy-efficient compact form factor switches. The Cisco Nexus 5600 Series Layer 2 and Layer 3 set allow for multiple scenarios such as direct-attach 10- and 40-Gigabit Ethernet access and high-density Cisco Fabric Extender (FEX) aggregation deployments, leaf and spine architectures, or compact aggregation to build scalable Cisco Unified Fabric in the data centers.
Cisco Nexus 5600 Series products use the same set of Cisco application-specific integrated circuits (ASICs) and a single software image across the products within the family, which offers feature consistency and operational simplicity. Cisco Nexus 5600 Series switches support robust Layer 2 and Layer 3 functions, industry-leading FEX architecture with Cisco Nexus 2000 and Cisco Nexus B22 Blade FEX, in-service software upgrades (ISSUs), and Cisco FabricPath. Operational efficiency and programmability are enhanced on the Cisco Nexus 5600 Series through advanced analytics, PowerOn Auto Provisioning (POAP), and Python/Tool Command Language (Tcl) scripting.
The Cisco Nexus devices include a family of line-rate, low-latency, lossless 10-Gigabit Ethernet, Cisco Data Center Ethernet, Fibre Channel over Ethernet (FCoE), and native Fibre Channel devices for data center applications.
For information about the Cisco Nexus 5600 Series, see the Cisco Nexus 5600 Series Platform Hardware Installation Guide.
Cisco Nexus 2000 Series Fabric Extenders
The Cisco Nexus 2000 Series Fabric Extender (FEX) is a highly scalable and flexible server networking solution that works with the Cisco Nexus 5600 Series devices to provide high-density and low-cost connectivity for server aggregation. Scaling across 1-Gigabit Ethernet, 10-Gigabit Ethernet, and 40-Gigabit Ethernet, unified fabric, rack, and blade server environments, the FEX is designed to simplify data center architecture and operations.
The FEX integrates with its parent Cisco Nexus device, which allows zero-touch provisioning and automatic configuration. The FEX provides a single point of management that supports a large numbers of servers and hosts that can be configured with the same feature set as the parent Cisco Nexus 5600 switch, including security and quality of service (QoS) configuration parameters. Spanning Tree Protocol (STP) is not required between the Fabric Extender and its parent switch, because the Fabric Extender and its parent switch allow you to enable a large multi-path, loop-free, active-active topology.
Software is not included with the Fabric Extender. Cisco NX-OS software is automatically downloaded and upgraded from its parent switch. For information about configuring the Cisco Nexus 2000 FEX, see the “Configuring the Fabric Extender” chapter in the Cisco Nexus 5600 Series Layer 2 Switching Configuration Guide.
Restricting Sessions Per User (Per User Per login)
Password should use algorithm (Hash or Symmetric-key) for secure writing (SHA256 password hashing).
Password length configuration (Min, Max)
Enabling the password prompt for user name.
Configuring Shared Key Value for using RADIUS/TACACS.
Auto-Config: Support for Routable Loopback Address
This feature provides support for the VRF profile to be updated on the leaf resulting in the loopback routable IP address being auto-configured under that vrf as well as advertised using MP-BGP to all leaf nodes.
Extend DHCP Server Support
This feature enables you to have common DHCP servers (for example, Microsoft Windows) for IP address assignments within dynamic fabric automation (DFA).
LLDP Support for VM Tracker
Starting with Cisco NX-OS release 7.2(0)N1(1), Link Layer Discovery Protocol (LLDP) is supported on VM Tracker.
PoAP failure can be detected with locator LED. When the PoAP process starts, the locator-LED will flash the pattern 21 (flashing twice, short pause, flashing once, long pause) to indicate that PoAP is in progress.
On Cisco Nexus devices, command-line interfaces (CLIs) are run only on the device. NX-API improves the accessibility of these CLIs by making them available outside of the switch by using HTTP/HTTPS. You can use this extension to the existing Cisco Nexus CLI system on the Cisco Nexus 5000 and 6000 Series devices. NX-API supports show commands and configurations.
NX-API supports JSON-RPC.
Dynamic VLAN Based on MAC-Based Authentication (MAB)
The Cisco Nexus 5000 and 6000 series switches supports dynamic VLAN assignment. After the 802.1x authentication or MAB is completed; before bringing up the port, you may want to (as part of authorization) allow the peer/host to be placed into a particular VLAN based as a result of the authentication. The RADIUS server typically indicates the desired VLAN by including tunnel attributes within the Access-Accept message. This procedure of getting the VLAN an binding it to the port constitutes to Dynamic VLAN assignment.
NTP over IPv6 Support
The Network Time Protocol (NTP) is a protocol designed to time-synchronize a network of machines. IPv6 support is added for NTP in the Nexus 5000 and 6000 series switches. This allows IPv6 NTP servers/peers to be configured for time synchronization.
ACL-Based QoS Classification Offload
The ACL-based QoS Policy Offload is supported on N2348UPQ Fabric Extender 6x40G QSFP 48x10G SFP+ FEX.
Shared Buffer QoS Command
The queue-limit queue-size bytes is extended to set the queue limit size for 40G interfaces also.
vIP HSRP Enhancement
This feature is enhanced to support the following:
Support for HSRP VIP configuration to be in a different subnet than that of interface subnet.
Enhanced ARP to source with VIP from SUP for hosts when hosts are in VIP subnet or referenced by static route to VLAN configuration.
Periodic ARP synchronization support to VPC peer.
Allows use of the VIP address as L3 source address and gateway address for all communications with DHCP server.
QoS Drop Counter History
To correlate the QoS drops with the potential buffer usage, a new set of commands are introduced. The drop history on each interface is recorded and implemented in the following commands:
show hardware internal bigsur port interface qos-drop-history brief
show hardware internal bigsur all-ports qos-drop-history brief
show hardware internal bigsur port interface qos-drop-history details
clear hardware internal bigsur port interface qos-drop-history details
FEX HIF as SPAN Destination
This feature enables HIF and Virtual Ethernet (Veth) ports as SPAN destination.
VTP Version 3 (VTPv3) was introduced in Cisco NX-OS release 7.2(0)N1(1) and has the following features:
Provides interoperability with switches configured with VTP version 1 or 2.
Allows only the primary server to make VTP configuration changes.
Supports 4K VLANs.
Permits feature-specific primary servers. A switch can be a primary server for a specific feature database such as MST or for the entire VLAN database.
Provides enhanced security with hidden and secret passwords.
Provides interoperability with private VLANs (PVLAN). PVLANs and VTPs are no longer mutually exclusive.
QoS ACL Statistics Per Entry
This feature supports QoS ACL statistics per-entry to verify per QoS class-map classification. Counters are shown per ACE for QoS ACL, and statistics per QoS ACL entry can be viewed.
Queue Limit Change
Cisco Nexus N2348UPQ Fabric Extender (48x10G SFP+ 6x40G QSFP Module) is supported from Cisco NX-OS release 7.2(0)N1(1).
Auto-Config: Logging of Profile Instantiation for Compliance and Accounting
The enhanced syslogs are generated when profile apply, profile un-apply, and profile refresh are performed and it contains details about the host that triggers the profile events.
Border Leaf Conversational Learning
You can enable conversational learning on all leaf nodes by using the fabric forwarding conversational-learning all command. For this to work, the subnet needs to be instantiated on the leaf. But in case of a border leaf, this is not true as the border leaf might not have any hosts connected to it.
In Cisco Nexus 5600 and 6000 Series Switches, the 4-port vPC provides the capability to associate the vFC interface to an individual member of a port-channel that has multiple port members. This feature is supported only for Cisco Nexus 2300 Series switches that are connected to Cisco Nexus 5600 and 6000 Series switches.
Egress Multicast Buffering
The Cisco Nexus 5600 and 6000 Series Switches support Egress Multicast Buffering, which is a process that provides additional cells to multicast traffic at Egress. When there is heavy multicast traffic at Egress, buffer space (cells) is borrowed from the unicast pool. The pool provides a specific number of cells to enhance the traffic and minimize traffic drops at Egress side.
On Cisco Nexus 5600 and 6000 series switches, the RMAC Learning feature allows the default MAC address (RMAC) of a VLAN interface to be dynamically learned on another VLAN interface over a bridged interface.l
New Hardware Features in Cisco NX-OS Release 7.2(0)N1(1)
There are no new hardware features in this release.
New Software Features in Cisco NX-OS Release 7.1(1)N1(1)
Cisco NX-OS Release 7.1(1)N1(1) includes bug fixes and the following software features and enhancements:
Flex links are a pair of a Layer 2 interfaces (switch ports or port channels) where one interface is configured to act as a backup to the other. The feature provides an alternative solution to the Spanning Tree Protocol (STP). You can disable STP and still retain basic link redundancy. Flex links are typically configured in service provider or enterprise networks where customers do not want to run STP on the switch. If the switch is running STP, flex links are not necessary because STP already provides link-level redundancy or backup. Flex Links are supported only on Layer 2 ports and port channels, not on VLANs or on Layer 3 ports.
IEEE 1588v2 PTP
PTP is a time synchronization protocol for nodes distributed across a network. Its hardware timestamp feature provides greater accuracy than other time synchronization protocols such as the Network Time Protocol (NTP). PTP is a distributed protocol that specifies how real-time PTP clocks in the system synchronize with each other.
Note PTP is not supported on 100G CLEM.
ERSPAN v3 with PTP Timestamp
Encapsulated remote switched port analyzer (ERSPAN) is used to transport mirrored traffic in an IP network. ERSPAN supports source ports, source VLANs, and destinations on different switches, which provide remote monitoring of multiple switches across your network. ERSPAN uses a generic routing encapsulation (GRE) tunnel to carry traffic between switches.
ERSPAN consists of an ERSPAN source session, routable ERSPAN GRE-encapsulated traffic, and an ERSPAN destination session. You separately configure ERSPAN source sessions and destination sessions on different switches.
There are two types of ERSPAN—Type II (default) and type III. Type III supports all of ERSPAN type II features and adds the following enhancements:
Provides timestamp information in the ERSPAN Type III header that can be used to calculate the packet latency among edge, aggregate, and core switches.
Identifies possible traffic sources using the ERSPAN Type III header fields.
ERSPAN Type III provides configurable switch IDs that can be used to identify traffic flows across multiple switches.
CoPP (Control Plane Policing) Extended Rate
Beginning with Cisco Nexus 7.1(1)N1(1) release, you can configure an extended CoPP committed information rate (CIR) limit of up to 61,440 Kbps for each customized CoPP profile.
Class-Based Quality-of-Service MIB (cbQoSMIB)
This feature provides the Simple Network Management Protocol (SNMP) MIB that enables retrieval of class-map and policy-map configuration and statistics.
Intelligent Traffic Director (ITD)
Intelligent Traffic Director (ITD) is an intelligent, scalable clustering and load-balancing engine that addresses the performance gap between a multi-terabit switch and gigabit servers and appliances. The ITD architecture integrates Layer 2 and Layer 3 switching with Layer 4 to Layer 7 applications for scale and capacity expansion to serve high-bandwidth applications.
ITD provides adaptive load balancing to distribute traffic to an application cluster. With this feature on the Cisco Nexus 5000 Series switches, you can deploy servers and appliances from any vendor without a network or topology upgrade.
Remote Integrated Service Engine (RISE)
Cisco RISE is an architecture that logically integrates an external (remote) service appliance, such as a Citrix NetScaler Application Delivery Controller (ADC), so that the appliance appears and operates as a service module (remote line card) within the Cisco Nexus switch. The Cisco NX-OS software in which RISE is supported supports the Cisco Nexus 5500, 5600, and 6000 Series switches.
100 Mbps Support on 2348TQ and 2332TQ
The Cisco Nexus 7.1(1)N1(1) release supports 100 Mbps speed on the host interfaces of Cisco Nexus 2348TQ and 2332TQ.
To see the autonegotiation matrix details for the N2K-C2348TQ-10GE and N2K-C2332TQ-10GE fabric extenders, refer to the section titled Speed and Duplex Mode in the “Configuring the Fabric Extenders” chapter of Cisco Nexus 5600 Series NX-OS Layer 2 Switching Configuration Guide, Release 7.x.
New Hardware Features in Cisco NX-OS Release 7.1(1)N1(1)
Cisco NX-OS Release 7.1(1)N1(1) supports the following new hardware:
Cisco Nexus N5648Q—Support for 48 QSFP 40G ports. It has 24 fixed QSFP ports and support for two GEM slots that can support an additional 12 QSFP ports per GEM slot.
BPDU Guard can be can be activated on disallowed edge trunk VLANs. This is done by configuring both sides of the link as either trunks or access interfaces.
CTS with FabricPath
The Cisco TrustSec security architecture has been extended to support Cisco FabricPath environments including those using VPC+. CTS packet classification can occur before or as traffic enters the fabric, at which point packet tags are preserved through the fabric for the purpose of applying security policy to the data path.
Dynamic ARP Inspection Enhancement
Dynamic ARP Inspection (DAI) can validate ARP packets against user-configured ARP access control lists (ACLs). DAI can be configured to drop ARP packets when the IP/MAC addresses in the packets are invalid. This is done by configuring ARP based ACLs.
IPv6 vPC/vPC+ Keepalive Support
IPv6 support for vPC/vPC+ provides IPv6 capabilities for the vPC/vPC+ keepalive from the mgmt0 out-of-band interface and also from the built-in front ports using SVI.
Isolate and Maintenance Mode Enhancement
Provides the ability to gracefully eject a switch and isolate it from the network so that debugging or an upgrade can be performed. The switch is removed from the regular switching path and put into a maintenance mode. Once maintenance on the switch is complete, you can bring the switch into full operational mode.
In service software updates (ISSUs) are limited to the three previous releases.
Long Distance Support
Long distance support (20 km/10G & 3 km/40G) for FCoE.
Improves efficiency in the usage of Multicast Expansion Table (MET) entries in the hardware.
Open Management Infrastructure
Open Management Infrastructure (OMI) is no longer supported.
Password Length Enhancement
The following commands have been added to provide the ability to configure the minimum and maximum length of a password:
userpassphrase min-length length
userpassphrase max-length length
show userpassphrase length
Syslog Message as SNMP Trap
The following features has been added:
User Interface for Persistent Logging
Syslog SNMP Traps
Syslog Message Format
Unified Fabric Solution (previously called Dynamic Fabric Automation (DFA))
This software release is the second release to support enhancements to Cisco's Unified Fabric Solution.
Unified Fabric focuses on simplifying, optimizing, and automating data center fabric environments by offering an architecture based on four major pillars: Fabric Management, Workload Automation, Optimized Networking, and Virtual Fabrics.
Each of these pillars provides a set of modular functions which can be used together, or independently, for ease of adoption of new technologies in the data center environment.
Allows for the merging of separate Layer 2 domains that might reside in a two data centers that are connected through some form of Data Center Interconnect (DCI).
Supports automatic VLAN provisioning.
VXLAN Bridging and Routing
VXLAN technology provides a mechanism to extend the reachability of virtual segments within a data center and increases scale of number of segments by removing the restriction of 4096 VLANs that can be deployed in a data center. The feature provides the ability to switch traffic in a VXLAN segment as well as route traffic between VXLAN segments as well as between VXLAN and VLAN segments.
New Hardware Features in Cisco NX-OS Release 7.1(0)N1(1a)
Cisco NX-OS Release 7.1(0)N1(1a) supports the following new hardware:
– To enable 100G LEM N5696-M4C, the required BIOS version is 2.8.0 or above for EF chassis. If the LEM’s BIOS version is lower than 2.8.0, ISSU is required as it facilitates a built-in BIOS update procedure.
– For EF-CR chassis, the required BIOS version is 2.1.0 or above.
– For Microcontroller Firmware—The required version is 18.104.22.168 or above for EF-CR chassis and 22.214.171.124 or above for EF chassis.
– For N5696Q, native support has been added for 100G LEM N5696-M4C.
– Added support for 100G LEM N5696-M4C with N6004EF chassis. 100G LEM N5696-M4C module must have BIOS version 2.8.0 or above for N6004EF chassis.
H7 Power Supply Support—support for forward air flow (FAF) (NXA-PHV-1100W) and reverse air flow (RAF) (NXA-PHV-1100W-B) with both AC and DC power source.
10 G Dense Wave Division Multiplexing (DWDM)—
LR4 Optics—WSP-Q40GLR4L (QSFP40G-LR4-LITE)
New Software Features in Cisco NX-OS Release 7.0(6)N1(1)
There are no new software features in this release.
New Hardware Features in Cisco NX-OS Release 7.0(6)N1(1)
There are no new hardware features in this release.
New Software Features in Cisco NX-OS Release 7.0(5)N1(1a)
There are no new software features in this release.
New Hardware Features in Cisco NX-OS Release 7.0(5)N1(1a)
There are no new hardware features in this release.
New Software Features in Cisco NX-OS Release 7.0(5)N1(1)
There are no new software features in this release.
New Hardware Features in Cisco NX-OS Release 7.0(5)N1(1)
There is no new hardware in this release.
New Software Features in Cisco NX-OS Release 7.0(4)N1(1)
There are no new software features in this release.
New Hardware Features in Cisco NX-OS Release 7.0(4)N1(1)
Cisco NX-OS Release 7.0(4)N1(1) supports the following new hardware:
Dynamic Fibre Channel over Ethernet (FCoE) over DFA enables I/O consolidation. It permits both LAN and SAN traffic to coexist on the same switch and the same wire.
FEX Based ACL Classification
The FEX-based ACL Classification feature uses TCAM resources on a FEX to perform ACL-based packet classification of incoming packets on the switch. When QoS policies are processed on a FEX, the policies are enforced on the switch and on the associated FEX or FEXes.
New Hardware Features in Cisco NX-OS Release 7.0(3)N1(1)
Cisco NX-OS Release 7.0(3)N1(1) supports the following new hardware:
The ACL logging feature allows you to monitor IPv6 ACL flows and to log dropped packets on an interface.
Dynamic FCoE Using FabricPath
Dynamic FCoE extends the capability and reliability of storage networks by leveraging FabricPath technology to create logical separation of SAN A and SAN B. FCoE VFCs and Interswitch-Links (ISLs) are dynamically configured, simplifying multihop FCoE deployments in leaf-spine topologies.
Layer 2 CTS Support
The Cisco TrustSec security architecture builds secure networks by establishing clouds of trusted network devices. Cisco TrustSec also uses the device information acquired during authentication for classifying, or coloring, the packets as they enter the network. This packet classification is maintained by tagging packets on ingress to the Cisco TrustSec network so that they can be properly identified for the purpose of applying security and other policy criteria along the data path.
New Hardware Features in Cisco NX-OS Release 7.0(1)N1(1)
Cisco NX-OS Release 7.0(1)N1(1) supports the following new hardware:
Cisco Nexus 5672UP N5K-C5672UP
Nexus 6004 20UP LEM N6004X-M20UP
Upgrading or Downgrading to a New Release
This section describes the upgrade and downgrade paths that are supported for Cisco NX-OS Release 7.2(0)N1(1) on the Cisco Nexus device.
Table 4 shows the upgrade and downgrade possibilities for Cisco NX-OS Release 7.2(0)N1(1). For more information, see the Cisco Nexus 5600 Series NX-OS Software Upgrade and Downgrade Guide, Release 7. 2(0)N1(1).
NoteDoing a disruptive upgrade between incompatible images will result in loss of certain configurations such as unified ports, breakout, and FEX configurations. See CSCul22703 for details.
Note Disruptive upgrade is required before configuring VLAN translation on FEX for 7.1(0)N1(1a).
Table 5 shows the upgrade and downgrade possibilities for Cisco NX-OS Release 7.0(6)N1(1). For more information, see the Cisco Nexus 5500 Series NX-OS Software Upgrade and Downgrade Guide, Release 7.0(6)N1(1).
This section describes the limitations for Cisco NX-OS Release 7.x.
If you are migrating from Cisco NX-OS Release 7.1(0)N1(1a) or 7.1(0)N1(1b) to Cisco NX-OS Release 7.2(0)N1(1) or to 7.1(1)N1(1) (which is supposed to be a non-disruptive ISSU) for the switches that have the N2348TQ FEX connected, then the ISSU might fail and upgrade to Cisco NX-OS Release 7.2(0)N1(1) or to 7.1(1)N1(1) will be disruptive. This will result in loss of certain configurations such as unified ports, breakout, and FEX configurations. For details, see CSCuu76648. Refer to the “Restoring the Configuration” section in the Cisco Nexus 5600 Series Software Upgrade and Downgrade Guide, Release 7.2(0)N1(1) to restore the configuration if the configurations contain interface breakout or unified port configurations.
Loading a new license or reloading existing license on a Cisco Nexus 5624Q switch is not supported. For details, see CSCus41273.
The Server Virtualization Switch (SVS) connection is not deleted during a rollback when NIV is enabled. To resolve this issue, delete the current SVS connection and reapply the original SVS connection. For details, see CSCts17033.
If you configure a Cisco Nexus 2248TP port to 100 Mbps instead of autonegotiation, then autonegotiation does not occur, which is the expected behavior. Both sides of the link should be configured to both hardwired speed or both autonegotiate.
no speed —Autonegotiates and advertises all speeds (only full duplex).
speed 1000 —Autonegotiates only for an 802.3x pause.
speed 100 —Does not autonegotiate; pause cannot be advertised. The peer must be set to not autonegotiate and fix at 100 Mbps (similar to the N2248TP). For details, see CSCte81998.
When a private VLAN port is configured as a TX (egress) SPAN source, the traffic seen at the SPAN destination port is marked with the VLAN of the ingressed frame. There is no workaround.
In large-scale configurations, some Cisco Nexus 2000 Series Fabric Extenders might take up to 3 minutes to appear online after entering the reload command. A configuration can be termed large scale when the maximum permissible Cisco Nexus 2000 Series Fabric Extenders are connected to a Cisco Nexus 5600 Series switch, all host-facing ports are connected, and each host-facing interface has a large configuration that supports the maximum permissible ACEs per interface.
The Cisco Nexus 2148 Fabric Extender does not support frames with the dot1q vlan 0 tag.
VACLs of more than one type on a single VLAN are unsupported. Cisco NX-OS software supports only a single type of VACL (either MAC, IPv4, or IPv6) applied on a VLAN. When a VACL is applied to a VLAN, it replaces the existing VACL if the new VACL is a different type. For instance, if a MAC VACL is configured on a VLAN and then an IPv6 VACL is configured on the same VLAN, the IPv6 VACL is applied, and the MAC VACL is removed.
A MAC ACL is applied only on non-IP packets. Even if there is a match eth type = ipv4 statement in the MAC ACL, it does not match an IP packet. To avoid this situation, use IP ACLs to apply access control to the IP traffic instead of using a MAC ACL that matches the EtherType to IPv4 or IPv6.
Multiple boot kickstart statements in the configuration are not supported.
If you configure Multiple Spanning Tree (MST) on a Cisco Nexus 5600 Series switch, avoid partitioning the network into a large number of regions.
By design, vEth interfaces do not share the underlying behavior of a vPC port. As a result, a VLAN is not suspended when the peer switch suspends it. For example, when you shut a VLAN on a primary switch, the VLAN continues to be up on the secondary switch when the vEth interface is on a FEX. When the VLAN on the primary switch goes down, the VLAN on the vEth interface on the primary is suspended, but the vEth on the secondary switch remains up because it is an active VLAN on the secondary switch.
The packet length in the IP GRE header of a packet exiting from the switch is not equal to the MTU value configured in the ERSPAN source session. This is true for SPAN or ERSPAN. The Cisco Nexus 5600 switch terminates in multiples of 16 bytes. If MTU is configured as 100 bytes, then the actual truncated packet is 96 bytes.
Unknown unicast packets in FabricPath ports are counted as multicast packets in interface counters. This issue occurs when unknown Unicast packets are sent and received with a reserved multicast address (that floods to a VLAN) in the outer FabricPath header, and the Cisco Nexus 5600 Series switch increments the interface counter based on the outer FabricPath header. As a result, Multicast counters are incremented. There is no workaround for this issue.
In an emulated switch setup, an inband keepalive does not work. The following steps are recommended for peer keepalive over SVI when a switch is in FabricPath mode:
– Use a dedicated front panel port as a vPC+ keepalive. The port should be in CE mode.
– Use a dedicated VLAN to carry the keepalive interface. The VLAN should be a CE VLAN.
– Enter the dual-active exclude interface-vlan keepalive-vlan command to prevent the SVI from going down on the secondary when a peer-link goes down.
The limit of the table that holds the Router MAC and Virtual MAC entries for determining packet routing or switching is 500 entries. The Virtual MAC entries, the MAC used for HSRP/VRRP that is also programmed in this table, can be shared across multiple Layer 3 interfaces. If SVIs 1–100 all have the same group number configured, just one entry needs to be programmed in this table. We recommend that you configure the same group ID across all or multiple Layer 3 interfaces/SVIs. If multiple group IDs are configured on an Layer 3 interface, we recommend that you configure the same set of group IDs across all or multiple Layer 3 interfaces. This configuration supports HSRP/VRRP on more interfaces.
The maximum IP MTU that can be set on Layer 3 interfaces running Layer 3 protocols is 9192 because of the internal header used inside the switch. The related network-qos policy must be set to 9216.
If there are unified ports configured as fiber channel (FC) and a disruptive upgrade is performed, then the FC interfaces must be reconfigured, and the switch will require a second reload.
Limitations on the Cisco Nexus 5600
The limitations on the Cisco Nexus 5600 switch are as follows:
The SPAN limitations on Fabric Extender ports are as follows:
On a Cisco Nexus device, if the SPAN source is a FEX port, the frames will always be tagged when leaving the SPAN destination.
On a Cisco Nexus 5600 switch, if the SPAN source is an access port on a switch port or FEX port, the spanned frames at the SPAN destination will be tagged.
On a Cisco Nexus 5600 switch, if the SPAN source is on an access port on the switch port, the frames will not be tagged when leaving the SPAN destination.
Ports on a FEX can be configured as a tx-source in one session only.
If two ports on the same FEX are enabled to be tx-source, the ports need to be in the same session. If you configure a FEX port as a tx-source and another port belonging to the same FEX is already configured as a tx-source on a different SPAN session, an error is displayed on the CLI.
In the following example, Interface Ethernet100/1/1 on a FEX 100 is already configured as a tx-source on SPAN session-1:
swor28(config-monitor)# show running-config monitor
monitor session 1
source interface Ethernet100/1/1 tx
destination interface Ethernet1/37
If you add an interface Ethernet100/1/2 as a tx-source to a different SPAN session (session-2) the following error appears:
ERROR: Eth100/1/2: Ports on a fex can be tx source in one session only
When a FEX port is configured as a tx-source, the multicast traffic is spanned on all VLANs that the tx-source port is a member of. The FEX port sends out only multicast packets that are not filtered by IGMP snooping. For example, if FEX ports 100/1/1–12 are configured on VLAN 11 and the switch port 1/5 sends multicast traffic on VLAN 11 in a multicast group, and hosts connected to FEX ports 100/1/3–12 are interested in receiving that multicast traffic (through IGMP), then that multicast traffic goes out on FEX ports 100/1/3–12, but not on 100/1/1–2.
If you configure SPAN Tx on port 100/1/1, although the multicast traffic does not egress out of port 100/1/1, the SPAN destination does receive that multicast traffic, which is due to a design limitation.
When a FEX port is configured as both SPAN rx-source and tx-source, broadcast non-IGMP Layer-2 multicast frames as well as unknown unicast frames originating from that port might be seen twice on the SPAN destination: once on the ingress and once on the egress path. On the egress path, the frames are filtered by the FEX to prevent them from going out on the same port on which they were received. For example, if FEX port 100/1/1 is configured on VLAN 11 and is also configured as SPAN rx-source and tx-source and a broadcast frame is received on that port, the SPAN destination recognizes two copies of the frame, even though the frame is not sent back on port 100/1/1.
A FEX port cannot be configured as a SPAN destination. Only a switch port can be configured and used as a SPAN destination.
With a SPAN on Latency session, FEX ports cannot be configured as source or destination.
Layer 3 Limitations
In a vPC topology, two Cisco Nexus 5600 switches configured as vPC peer switches need to be configured symmetrically for Layer 3 configurations such as SVIs, a peer gateway, routing protocol and policies, and RACLs.
Note vPC consistency check does not include Layer 3 parameters.
This section includes the open and resolved caveats for this release. Each caveat has a link to the Bug Toolkit, where you can find details.
MTU option in SOL throws an error message when configured.
The Cisco Management Information Base (MIB) list includes Cisco proprietary MIBs and many other Internet Engineering Task Force (IETF) standard MIBs. These standard MIBs are defined in Requests for Comments (RFCs). To find specific MIB information, you must examine the Cisco proprietary MIB structure and related IETF-standard MIBs supported by the Cisco Nexus 5600 Series switch.
The MIB Support List is available at the following FTP site:
Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation as an RSS feed and delivers content directly to your desktop using a reader application. The RSS feeds are a free service.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)