Table Of Contents
Cisco Nexus 1010 Management Software Release Notes, Release 4.2(1)SP1(4)
Published: February 20, 2012Part Number: OL-26550-01 C0
This document describes the features, limitations, and caveats for the Cisco Nexus 1010 management software. Use this document in combination with documents listed in the "Related Documentation" section.
Part Number Revision Date Description
Created Release Notes for Release 4.2(1)SP1(4)
Revised the headline for caveat CSCtx97149.
Revised the deployment guidelines in the "High Availability With the Cisco Nexus 1010-X Appliance" section.
This document includes the following information about the Cisco Nexus 1010 management software.
The Cisco Nexus 1010-X appliance (N1K-C1010-X) is a new version of the Cisco Nexus 1010 Virtual Services Appliance. Like the Cisco Nexus 1010, the Cisco Nexus 1010-X appliance is a hardware shell that can host multiple virtual service blades (VSBs), including up to four Cisco Nexus 1000V virtual supervisor modules (VSMs) and a network analysis module (NAM). From a network management perspective, the hosted VSMs appear as a cluster. Each VSM and its associated VEMs make up one virtual switch.
Both the Cisco Nexus 1010 and the Nexus 1010-X can host the VSM, the VSG, the NAM, and Cisco DCNM.
Cisco Nexus 1010-X Features
The Cisco Nexus 1010-X appliance has the following features:
•Memory: 48 GB
•Hard disk: Two 2-TB SAS drives
•Support for up to 10 VSBs
By comparison, the Cisco Nexus 1010 appliance has the following features:
•Memory: 16 GB
•Hard disk: One TB SATA
•Support for up to 6 VSBs (limited by the available RAM on the Cisco Nexus 1010.
All other features and specifications match those listed for the Cisco Nexus 1010 appliance in the Cisco Nexus 1010 Virtual Services Appliance Hardware Installation Guide.
High Availability With the Cisco Nexus 1010-X Appliance
The Cisco Nexus 1010-X appliance must be deployed in a highly-available (HA) configuration with another Cisco Nexus 1010-X appliance. Standalone deployments of the Cisco Nexus 1010-X are not supported.
The Cisco Nexus 1010-X appliance and a Cisco Nexus 1010 appliance, cannot be deployed together to form an HA pair. The hardware must be the same for the HA pair.
After you install the Cisco Nexus 1010-X, you can move, or migrate your VSBs from a Cisco Nexus 1010 to the Cisco Nexus 1010-X appliance. The migration includes the following steps:
1. Verify that the Cisco Nexus 1010 has the VSBs configured that need to be migrated to the Cisco Nexus 1010-X.
2. Set up the Cisco Nexus 1010-X in a redundant HA pair.
3. Migrate the HA VSBs like VSM and VSG to a Cisco Nexus 1010-X.
4. Migrate the non-HA VSBs like NAM and Cisco DCNM to the Cisco Nexus 1010-X.
For detailed information about these steps, see the Cisco Nexus 1010 Software Configuration Guide.
This section describes the following new or changed software features:
ISSU from Cisco NX-OS Release 4.2(1)SP1(3) to Release 4.2(1)SP1(4)
The Cisco Nexus 1010 upgrade is a hitless in-service software upgrade (ISSU). When you upgrade the software, the operational data is retained without loss of persistent information. The availability of VSBs is not affected during the upgrade process.
Once you enter the command to upgrade, the entire procedure is automated. The upgrade process follows this sequence:
•The ISO image components are extracted, verified, and synchronized to the standby Cisco Nexus 1010 or Cisco Nexus 1010-X.
•The standby Cisco Nexus 1010 is upgraded first.
•The VSBs on the standby are restarted.
•The upgrade of the active is initiated.
•Once the upgrade of the active and standby switches is complete, both switches form an HA pair running the upgraded software.
•The ISSU is complete when both Cisco Nexus 1010s form an HA pair with the new software version.
For additional information, see the Cisco Nexus 1010 Software Installation and Upgrade Guide, Release 4.2(1)SP1(4).
Flexible Network Uplink Configuration
The Cisco Nexus 1010 Management Software provides complete flexibility for port configuration and usage, and includes these capabilities:
•Flexible bundling of ports into a port channel
Physical ports can be bundled in a port channel. A port channel can be formed either in HA (active-backup) or LACP mode. Only free ports—those that are not used in any port channel or used by any VSB interface—can be used to configure a port channel.
•Flexible assignment of a port or port channel to a VSB interface
By default, the uplink is assigned to the first interface of the VSB or the first free port or port channel. If no free ports or port channel is available, you can manually assign the uplink. The same VSB can have different uplinks for each interface.
•Easy uplink configuration
For a fresh installation, the Cisco Nexus 1010 wizard provides a flexible network uplink option. Control and management can be assigned to one of six individual ports of on the Cisco Nexus 1010 switch. Once the system is up in the flexible network type, you can configure a port channel and an explicit uplink assignment for VSB interfaces.
For systems that are upgraded to Cisco NX-OS Release 4.2(1)SP1(4), a flexible migration procedure is available. When the network uplink type changes from static to flexible, all the port channels, native VLANs, and port state configuration are saved in the flexible uplink configuration. Once the system is up with the flexible network uplink type, you can manually assign port channels and the uplink. The change to the flexible uplink configuration is disruptive and leads to a service interruption because both active and standby supervisors needs to be reloaded at the same time.
Native VLAN Support
Native VLAN support removes one of the limitations for upstream switch configuration. The native VLAN configuration is valid for both flexible and static network uplink types. When the network uplink changes from flexible to static, all Ethernet ports and port channels lose any native VLAN configuration. If two Ethernet interfaces are in the same port channel, then the native VLAN configuration should be allowed only on a port channel and not directly on an Ethernet interface. An Ethernet interface can be a part of port channel only if it has same native VLAN configuration. When an Ethernet interface is removed from a port channel, it retains the same native VLAN configuration.
Shut and No Shut Commands on Physical or Port-Channel interfaces
The Cisco Nexus 1010 Management Software allows you to enter the shut and no shut commands on Ethernet interfaces and port channels to put them up or down. This capability is useful for troubleshooting. Syslog messages are generated when a physical port goes down or up.
OVA Deployment Support
VSBs can be deployed with their corresponding OVA files. This feature provides more standard options for deployment; in earlier releases, only ISO files were supported. This feature uses the virtual-service-blade command, and is available only on an active Cisco Nexus 1010 switch.
OVA Migration Support
Supported VSBs can be migrated from ESX to the Cisco Nexus 1010 switch. The migration requires that you export a VSB from ESX. The migration tool uses the exported file to generate a Cisco Nexus 1010 support import format. Using the import command, you can import this file into the Cisco Nexus 1010 switch. The migration tool runs in a Linux environment and needs VMware Vdisk tool to be installed.
The Cisco Nexus 1010 management software controls the virtual services and blades running on the Cisco Nexus 1010 Virtual Services Appliance. These include up to six Cisco Nexus 1000V VSMs, a NAM, and up to three VSGs.
For more information about modules, see the Cisco Nexus 1010 Software Configuration Guide, Release 4.2(1)SP1(4).
Cisco Nexus 1010 software is pre installed as an ISO image that includes the following components:
•Cisco Nexus 1010 kickstart image
This is the Cisco Nexus 1010 Management Software.
The Cisco Nexus 1010 management software is compatible with the following minimum software versions:
•Cisco Nexus 1000V Release 4.0(4)SV1(3)
•Cisco Network Analysis Module Release 4.2.1
•Cisco Virtual Security Gateway Module Release 4.2(1)VSG1(2)
The Cisco Nexus 1010 management software works with all Ethernet switches.
Limitations and Restrictions
Use the following configuration limits for the Cisco Nexus 1010:
Component Supported Limit
6 Cisco Nexus 1000V VSM (2 GB RAM each) 1
1 Cisco Network Analysis Module (2 GB RAM) 1
1 Cisco Virtual Services Gateway(2 GB RAM) 1
(ESX or ESXi)
Data Center per Cisco Nexus 1010 HA pair
1 Limited by available RAM on the Cisco Nexus 1010.
Domain ID and HA Role Cannot Be Changed
The configured domain ID and high availability (HA) role (standalone, primary, or secondary) can never be changed. To change the domain ID or the HA role, you must use the write erase command.
Boot Variables Cannot Be Manually Configured
The boot variables cannot be configured manually. To change the boot variables, you must enter the install nexus1010 command. This command installs the software from the bootflash:/repository directory and updates the boot variables with the name of the software image.
Changing the Control or Mgmt VLAN Requires a Reload
If you change the control or management VLAN, you must reload the software before the change takes effect.
The Cisco Nexus 1010 (1000V) cannot resolve a domain name or hostname to an IP address.
No Local Copy in bootflash:export-import
Do not make a copy of the tar files in the export-import folder. Copying files locally might cause a split-brain condition and lead to HA issues.
Always copy the tar files to remote storage after entering the export command and then delete it from export-import folder.
This section includes the following topics:
The following are descriptions of the open caveats in Cisco Nexus 1010 Release 4.2(1)SP1(4). The Bug ID will link you into the Cisco Bug Toolkit.
The following are descriptions of the caveats that were resolved in Cisco Nexus 1010 Release 4.2(1)SP1(4). The Bug ID will link you into the Cisco Bug Toolkit.
Bug ID Caveat Headline
The show cdp neighbors command does not display the uplink switch.
This section lists the documents used with the Cisco Nexus 1000V and available on Cisco.com at the following URL:
Install and Upgrade
Troubleshooting and Alerts
Virtual Security Gateway Documentation
Virtual Network Management Center
Network Analysis Module Documentation
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.
This document is to be used in conjunction with the documents listed in the "Related Documentation" section.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
©2010-2012 Cisco Systems, Inc. All rights reserved.