Cisco Catalyst Center Banner Messages

Available Languages

Download Options

  • PDF
    (414.1 KB)
    View with Adobe Reader on a variety of devices
Updated:December 16, 2025

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

Available Languages

Download Options

  • PDF
    (414.1 KB)
    View with Adobe Reader on a variety of devices
Updated:December 16, 2025
 

Overview of banners. 3

Explanation of each banner 3

Related resources. 10

Legal information. 11


 

Overview of banners

To ensure your network always benefits from the latest best practices, Catalyst Center automatically refines feature configurations with each release.

When an upgrade includes improved settings, you'll see a clear banner notification. apply the update instantly with a click. There's no need to reconfigure features or perform any manual steps. Catalyst Center handles the process for you.

Some banner notifications depend on specific IOS-XE versions. These banners remain inactive and do not count toward the 180-day timer until your network devices are running the required IOS-XE versions.

Not all banner notifications apply to every customer. You only see banners for updates introduced based on your feature usage. This ensures that you are notified only about configuration changes relevant to your deployment.

See the individual Catalyst Center Release Notes for any additional caveats.

Banner behavior:

Note: Existing fabric continues to work unaffected. Only new fabric provisioning is blocked.

Workflow

1.     Banner messages notify you of required CLI changes after a release upgrade.

2.     You have 180 days to apply the changes.

3.     All fabric provisioning operations are blocked after 180 days if the banner changes are not applied.

Explanation of each banner

This section describes each Catalyst Center banner and its impact.

Cluster IP change

Table 1.             Banner title: Cluster IP change

Value

Description

Release introduced

3.1.3

Full text of banner

The Catalyst Center IP address has changed. The Supplicant-Based Extended Node onboarding ACL must be updated to allow the new IP address. This update is necessary before onboarding new supplicant-based extended nodes. The update should not impact production network traffic.

Summary

After a backup and restore operation, if the Catalyst Center IP address changes and supplicant-based extended node (SBEN) onboarding is enabled in the fabric, this banner is shown.

This banner alerts you that the SBEN ACL configuration must be updated with the new Catalyst Center IP address.

Configuration details

ip access-list extended SBEN_MAB_ACL

  no 10 permit ip any host <IP_address>

  no 20 permit tcp any host <IP_address> eq www

  no 30 permit tcp any host <IP_address> eq 443

  10 permit ip any host <IP_address>

  20 permit tcp any host <IP_address> eq www

  30 permit tcp any host <IP_address> eq 443

  exit

Impact

Supplicant-based extended node onboarding doesn't work until this banner is applied. There is no impact to production network traffic.

Remove automated iBGP within the fabric

Table 2.             Banner title: Remove automated iBGP within the fabric

Value

Description

Release introduced

2.3.7.9

Full text of banner

Automated iBGP sessions between Border Nodes and Control Plane Nodes will be removed as part of a configuration simplification, as they are no longer needed for fabric operations. This change does not affect Layer 3 Handoff automated eBGP neighbors or any manually configured or templated BGP neighbors.

Summary

This banner removes iBGP configurations within the fabric on LISP/PubSub sites.

This banner ensures routes imported from LISP to BGP (on internal borders) are redistributed back to BGP on other borders, including other borders on other sites that are connected using SDA-Transit.

Configuration details

Sample configuration of external collocated border (CP + B) with SDA transit:

no ip community-list 84

no ip community-list 84 permit 844888

route-map LISP_TO_BGP permit 10

 match tag 955999

route-map LISP_TO_BGP permit 15

 description Set the BGP AS Path to AS Number of BGP Handoff Neighbor

 set as-path tag

router bgp 64001

 address-family ipv4

  no neighbor <IP_address> route-map DENY_0_FABRIC_PREFIX out

  no neighbor <IP_address> send-community both

  no neighbor <IP_address> route-map DENY_0_FABRIC_PREFIX out

  no neighbor <IP_address> send-community both

  exit

 address-family vpnv4

  no neighbor <IP_address> route-map DENY_0_FABRIC_PREFIX out

  no neighbor <IP_address> send-community both

  no neighbor <IP_address> route-map DENY_0_FABRIC_PREFIX out

  no neighbor <IP_address> send-community both

  exit

 address-family ipv6

  no neighbor <IP_address> route-map DENY_0_FABRIC_PREFIX_V6 out

  no neighbor <IP_address> send-community both

  no neighbor <IP_address> route-map DENY_0_FABRIC_PREFIX_V6 out

  no neighbor <IP_address> send-community both

  exit

 address-family vpnv6

  no neighbor <IP_address> route-map DENY_0_FABRIC_PREFIX_V6 out

  no neighbor <IP_address> send-community both

  no neighbor <IP_address> route-map DENY_0_FABRIC_PREFIX_V6 out

  no neighbor <IP_address> send-community both

  exit

 no neighbor <IP_address> remote-as 64001

 no neighbor <IP_address> remote-as 64001

router lisp

 instance-id 4097

  service ipv4

   database-mapping <IP_address>/24 locator-set rloc_537529e3-d852-4475-861a-468c66d0ec25 route-tag 955999 proxy

 instance-id 4098

  service ipv4

   database-mapping <IP_address>/24 locator-set rloc_537529e3-d852-4475-861a-468c66d0ec25 route-tag 955999 proxy

  service ipv6

   database-mapping <IP_address>/64 locator-set rloc_537529e3-d852-4475-861a-468c66d0ec25 route-tag 955999 proxy

no route-map DENY_0_FABRIC_PREFIX permit 15

no route-map DENY_0_FABRIC_PREFIX deny 10

no route-map DENY_0_FABRIC_PREFIX deny 5

no route-map DENY_0_FABRIC_PREFIX_V6 deny 10

no route-map DENY_0_FABRIC_PREFIX_V6 permit 15

no route-map DENY_0_FABRIC_PREFIX_V6 deny 7

no route-map LISP_TO_BGP deny 5

Impact

There is impact to traffic forwarding when the banner is executed. It is recommended to execute this banner only during a maintenance window.

Group-based policy enforcement update for supplicant-based extended nodes

Table 3.             Banner title: Group-based policy enforcement update for supplicant-based extended nodes

Value

Description

Release introduced

2.3.7.6

Full text of banner

The configuration standards for supplicant-based extended nodes have been revised to explicitly disable group-based policy enforcement on the uplink interfaces. This modification will improve the reliability of the onboarding process for these nodes.

Summary

Improves onboarding reliability for supplicant-based extended nodes (SBENs) by ensuring group-based policy enforcement is explicitly disabled on uplink interfaces for SBENs and APs.

Configuration details

Fabric Edge or Authenticated Extended node in daisy chained deployment:

template SWITCH_SBEN_FULL_ACCESS_TEMPLATE

 no cts role-based enforcement

 exit

Authenticated Extended Node:

interface GigabitEthernet1/0/1

 no cts role-based enforcement

 exit

Impact

Adds to the interface template for onboarding supplicant-based extended nodes.

Client not reauthenticated with Open Auth when AAA server comes back online

Table 4.             Banner title: Client not reauthenticated with Open Auth when AAA server comes back online

Value

Description

Release introduced

2.3.5.4

Full text of banner

When AAA servers become unreachable, some endpoints cannot authenticate with the SD-Access fabric. When the AAA servers become reachable, the endpoints that failed authentication cannot reauthenticate. To enable reauthentication, a new authentication template must be applied to all edge nodes and extended nodes. Applying a new authentication template may reset the active client sessions.

Summary

If the AAA server becomes unreachable or the device loses connection to it, the device enters critical voice and critical VLAN mode. When the AAA server comes back online, only the service templates for the critical voice VLAN are activated for the critical authentication class map. To allow data clients to reauthenticate, the critical VLAN for data must also be configured. This banner appears when the fabric site includes an edge or extended node device.

Configuration details

Before:

class-map type control subscriber match-any IN_CRITICAL_AUTH

match activated-service-template DefaultCriticalVoice_SRV_TEMPLATE

!

class-map type control subscriber match-none NOT_IN_CRITICAL_AUTH

match activated-service-template DefaultCriticalVoice_SRV_TEMPLATE

 

After:

class-map type control subscriber match-any IN_CRITICAL_AUTH

 match activated-service-template DefaultCriticalVoice_SRV_TEMPLATE

 match activated-service-template DefaultCriticalAuthVlan_SRV_TEMPLATE <<<< After banner application

class-map type control subscriber match-any IN_CRITICAL_AUTH_CLOSED_MODE

 match activated-service-template DefaultCriticalAuthVlan_SRV_TEMPLATE <<<< After banner application

 match activated-service-template DefaultCriticalVoice_SRV_TEMPLATE

Impact

Applying this banner might reset the active client sessions.

Explicit device provisioning capability online card addition event for edge nodes and extended nodes

Table 5.             Banner title: Explicit device provisioning capability online card addition event for edge nodes and extended nodes

Value

Description

Release introduced

2.3.4.3

Full text of banner

One or more stack members or linecards have been added to existing switches. The Site Authentication Template must be configured on these new stack members/linecards.

Summary

This banner appears when a new member stack or line card is added to a fabric edge or extended node, requiring explicit provisioning. You must manually apply this banner to initiate device provisioning for the added ports. This applies when fabric authentication is set to Closed, Open, or Low Impact.

This banner also appears when a line card is detected with ports previously used for port assignment or port channels, but whose interfaces are set to dynamic auto, instead of the expected access mode. This banner may reappear if additional new ports are detected.

Configuration details

If the authentication template is Closed Auth:

interface Forty1/1/1

 no load-interval

 no switchport voice vlan

 no switchport access vlan

 switchport mode access

 source template DefaultWiredDot1xClosedAuth

 spanning-tree portfast

 spanning-tree bpduguard enable

 dot1x timeout tx-period 7

 dot1x max-reauth-req 3

If the authentication template is Open Auth:

interface Forty1/1/1

 no load-interval

 no switchport voice vlan

 no switchport access vlan

 switchport mode access

 source template DefaultWiredDot1xOpenAuth

 spanning-tree portfast

 spanning-tree bpduguard enable

 dot1x timeout tx-period 7

 dot1x max-reauth-req 3

If Authentication Template is Low Impact:

interface Forty1/1/1

 no load-interval

 no switchport voice vlan

 no switchport access vlan

 switchport mode access

 source template DefaultWiredDot1xLowImpactAuth

 spanning-tree portfast

 spanning-tree bpduguard enable

 ipv6 traffic-filter IPV6_PRE_AUTH_ACL in

 ip access-group IPV4_PRE_AUTH_ACL in

 dot1x timeout tx-period 7

 dot1x max-reauth-req 3

Impact

This configuration change impacts newly added line cards or stack members and their ports.

Extended nodes daisy chaining enhancements

Table 6.             Banner title: Extended nodes daisy chaining enhancements

Value

Description

Release introduced

2.3.3.0

Full text of banner

This release introduces the capability to daisy chain Supplicant-Based Extended Nodes and Catalyst 9000 Series Switches operating as Policy Extended Nodes.  To support this feature, new Access-Control Lists and interface templates will be provisioned on existing Policy Extended Node devices.

Summary

This banner enables Catalyst 9000 series supplicant-based extended nodes to be onboarded in a daisy chain topology. The banner is available when upgrading to 2.3.3.0 with supplicant-based extended node enabled and existing policy extended nodes in the fabric.

Configuration details

template SWITCH_AEN_MAB_TEMPLATE

  switchport access vlan {en_vlan}

  switchport mode access

 

template SWITCH_AEN_FULL_ACCESS_TEMPLATE

  cts manual

    policy static sgt 8000 trusted

  switchport mode trunk

  access-session host-mode multi-host peer

 

template SWITCH_AEN_BPDU_TEMPLATE

  spanning-tree bpduguard enable

 

ip access-list extended AEN_DHCP_ACL

  permit udp any any eq 67

  permit udp any any eq 68

  deny ip any any

 

ip access-list extended AEN_MAB_ACL

  permit ip any host {DNAC_IP}

  permit ip any host {EN_Subnet_Gateway}

  permit ip any host {DHCP_Server}

  permit ip any host {DNS_Server}

  permit tcp any host {DNAC_IP} eq 80

  permit tcp any host {DNAC_IP} eq 443

  permit tcp any host {DNAC_IP} eq 2222

  permit udp any any eq 67

  permit udp any any eq 68

  deny ip any any

Impact

No impact. New functionality.

SD-Access Assurance banner to call out the NETCONF requirements for streaming telemetry

Table 7.             Banner title: SD-Access Assurance banner to call out the NETCONF requirements for streaming telemetry

Value

Description

Release introduced

2.3.3.x

Full text of banner

SD-Access Assurance subscribes to telemetry subscriptions from the fabric nodes to gather real-time assurance data. This requires network devices to be configured with NETCONF and telemetry enabled for Key Performance Indicators to be provisioned.

Note: To enable NETCONF, navigate to Provision > Network Devices > Inventory > FOCUS: Inventory, select devices and choose Actions > Inventory > Edit Device the network device to configure netconf.

To provision telemetry subscription, navigate to Provision > Network Devices > Inventory > FOCUS: Inventory, select devices and choose Actions > Telemetry > Update Telemetry Settings.

Summary

SD-Access Assurance requires fabric nodes to be provisioned with NETCONF to subscribe to steaming telemetry.

This banner alerts network administrators to enable NETCONF and streaming telemetry for all fabric nodes to get data in fabric Assurance.

Configuration details

None because this banner is only a read-only banner.

Impact

None because this banner is only a read-only banner.

Route map TAG_LOCAL_EIDS update

Table 8.             Banner title: Route map TAG_LOCAL_EIDS update

Value

Description

Release introduced

2.3.2.0

Full text of banner

In certain deployment topologies, a flap in the reachability between the Border Node and the Site-Local Control Plane Node or Border Nodes and the Transit Control Plane Node can create routing loops. To address this potentiality, the additive keyword is applied to an existing route-map provisioned on Border Nodes and Site-Local Control Plane Nodes. When the additive keyword is used, BGP community values are appended to existing community values rather than simply replacing them.

For deployments using the SD-Access Fabric as a transit for BGP between two or more external BGP domains, this keyword may alter the existing routing policy behavior between those domains using fabric as a transit.

Summary

In a fabric site with a standalone control plane, the site border learns routes from the transit CP with a BGP community tag. The same routes are also learned from the local CP without a BGP community tag. This can create routing loops and cause traffic drops when the remote site border becomes unreachable and then reachable again.

Configuration details

route-map tag_local_eids permit 5

  set community 655370 additive

Impact

This change impacts traffic.

Supplicant-based extended node feature

Table 9.             Banner title: Supplicant-based extended node feature

Value

Description

Release introduced

2.3.2.0

Full text of banner

This release provides an enhancement to optionally authenticate Catalyst 9000 Series Switches operating as Policy Extended Nodes.  To use this feature, the Policy Extended Nodes and their associated Edge Nodes must be upgraded to IOS XE 17.7.1 or later.  The Identity Service Engine (ISE) must be upgraded to version 3.1.0 or later.

This release provides further enhancements through an update to the configuration on Extended Nodes which assists in sending attributes to ISE in order to profile connected endpoints.

Summary

A more secure option is now available for supplicant-based extended node onboarding, which authenticates and authorizes the extended node through Cisco ISE.

Configuration details

Edge nodes:

device-sensor filter-list dhcp list iseDHCP

option name v-i-vendor-class <------------------------new config

 

! <if AP pool is provisioned in fabric>

template ApAutzTemplate

access-session interface-template sticky timer 60 <----updated from 10 to 60

 

On existing extended nodes:

ip dhcp snooping <-------------------------new config

ip dhcp snooping vlan <vlan-list> <-------new config

ip dhcp snooping glean <------------------new config

 

! <interface connected to Edge Node or other Extended Nodes>

ip dhcp snooping trust <---------------------new config

 

device-sensor filter-list dhcp list iseDHCP

option name v-i-vendor-class <-------------new config

 

! <if AP pool is provisioned in fabric>

template ApAutzTemplate

access-session interface-template sticky timer 60 <-- updated from 10 to 60

Impact

No impact. New functionality.

Support for CLI 'bgp nopeerup-delay nsf-switchover 1' on SVL borders

Table 10.          Banner title: Support for CLI 'bgp nopeerup-delay nsf-switchover 1' on SVL borders

Value

Description

Release introduced

2.3.2.0

Full text of banner

This release provides an update to the BGP configuration to improve convergence time during switchover of a StackWise Virtual member switch. This change applies to Border Nodes operating in StackWise Virtual that have been configured using the Layer 3 handoff automation.

Summary

When an SVL switchover occurs, convergence for south-to-north traffic takes 31 seconds. However, if you add the command "bgp nopeerup-delay nsf-switchover 1" under "router bgp <ASN>", convergence for south-to-north traffic after a switchover is reduced to well within 250 milliseconds.

Configuration details

router bgp <bgp-as>

  bgp nopeerup-delay nsf-switchover 1

Impact

This banner appears when you upgrade to 2.3.2.0 on fabric with SVL configured on borders.

This configuration change impacts traffic forwarding. It is recommended to execute this banner only during a maintenance window.

Message to configure on devices without NETCONF

Table 11.          Banner title: Message to configure on devices without NETCONF

Value

Description

Release introduced

2.2.2.x

Full text of banner

To provision subscriptions on devices that have not been discovered with NETCONF, rediscover the devices with NETCONF, and update the Telemetry Settings with the Force Configuration Push option.

Summary

This banner alerts you that some devices assigned to sites do not have NETCONF configured, which prevents the configuration of all required streaming telemetry subscriptions. When the banner is applied, Catalyst Center enables the necessary telemetry subscriptions on these devices. These subscriptions are essential for providing assurance insights.

Configuration details

Sample configuration for a single subscription to push to the Catalyst 9500:

 

telemetry ietf subscription 550

 encoding encode-tdl

 filter tdl-uri /services;serviceName=smevent/sessionevent

 receiver-type protocol

 source-address <IP_address>

 stream native

 update-policy on-change

 receiver name DNAC_ASSURANCE_RECEIVER

Impact

This banner configures all relevant streaming telemetry subscriptions on the applicable devices. These subscriptions are necessary to provide assurance insights.

RADIUS server liveliness tester

Table 12.          Banner title: RADIUS server liveliness tester

Value

Description

Release introduced

2.2.2.x

Full text of banner

To determine RADIUS server liveliness and availability to process transactions, the RADIUS automated tester sends a request periodically to the server using a test user ID. This release adds support for this automated testing feature.  With this configuration, the devices send periodic test authentication messages to the RADIUS server to test for liveliness. This configuration will be applied to policy extended nodes and all devices operating with the edge node function. Applying this change updates RADIUS server configurations which may reset the active client sessions.

Summary

This banner appears when you upgrade from a release earlier than 2.2.2.x with RADIUS server provisioned on fabric devices.

Configuration details

radius server dnac-radius_2.2.2.2

 address ipv4 2.2.2.2 auth-port 1812 acct-port 1813

 timeout 2

 retransmit 1

 automate-tester username dummy ignore-acct-port probe-on

 pac key 7 0011100F

Impact

Applying the banner may reset active client sessions.

Switched virtual interface fabric DHCP update

Table 13.          Banner title Switched virtual interface fabric DHCP update

Value

Description

Release introduced

2.1.2.3

Full text of banner

Switched Virtual Interfaces (SVIs) on switches remain in a ‘down’ state if there are no associated clients on the Layer 2 ports assigned to the VLAN. For Fabric DHCP functionality to operate correctly when deploying a Fabric in a Box and/or a colocated Border Node | Edge Node, the SVI must always remain in the ‘Up’ state. This release enables this capability through the ‘no autostate’ command applied under the SVI that have been automated as part of the fabric. These changes will not create downtime or impact the network or clients.

Summary

In a FiAB + FE deployment, DHCP packets don’t reach clients located behind the FE because the SVI on the FiAB is down (because there are no clients connected to it).

To resolve this, Catalyst Center configures the "no autostate" command on the FiAB/Border+Edge device, which brings up the SVI and enables it to forward DHCP packets.

Configuration details

interface Vlan1021

 no autostate

Impact

No impact

Self-ping IPv6-enabled switched virtual interfaces on edge nodes

Table 14.          Banner title: Self-ping IPv6-enabled switched virtual interfaces on edge nodes

Value

Description

Release introduced

2.1.2.3

Full text of banner

This release provides the ability for edge node to self-ping their IPv6-enabled Switched Virtual Interfaces (SVIs) that have been automated as part of the fabric.

Summary

The same IPv6 address is assigned to the anycast gateways on different edge nodes. Because of duplicate address detection, Catalyst Center can’t ping the anycast gateway’s IPv6 address.

Applying this banner allows Catalyst Center to ping the IPv6 anycast gateway.

Configuration details

interface vlan <vlan>

 ipv6 nd dad attempts 0

Impact

No impact

Telemetry subscription configuration on upgrades

Table 15.          Banner title: Telemetry subscription configuration on upgrades

Value

Description

Release introduced

1.3.3.x

Full text of banner

We detected IOS-XE device(s) in your network where new telemetry subscription for assurance data needs to be enabled and some of the existing subscription needs to be optimized for performance. Please note that these devices will receive a new subscription for group based policy monitoring telemetry. Do you want to take action to provision these subscriptions?

Summary

This banner prompts you to apply any missing telemetry updates to devices when new telemetry features are introduced in a Catalyst Center release. If there is a mismatch between the telemetry subscriptions on the device and those required for the current Catalyst Center release, this banner appears. After the correct telemetry is applied, the banner disappears.

Configuration details

<mdt-config-data

    xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-mdt-cfg">

    <mdt-named-protocol-rcvrs>

        <mdt-named-protocol-rcvr>

            <name>ASSURANCE_RECEIVER</name>

            <host>

                <address> <IP_address></address>

            </host>

            <protocol>tls-native</protocol>

            <profile>sdn-network-infra-iwan</profile>

            <port>25103</port>

        </mdt-named-protocol-rcvr>

    </mdt-named-protocol-rcvrs>

</mdt-config-data>

Impact

This banner updates the telemetry subscription of the devices.

Edge node multicast stub routing (MULTICAST_PIM)

Table 16.          Banner title: Edge node multicast stub routing (MULTICAST_PIM)

Value

Description

Release introduced

1.3.3.1

Full text of banner

This release provides an enhancement to the multicast configuration on Edge Nodes by enabling multicast stub routing on Switched Virtual Interfaces (SVIs) that have been automated as part of the fabric. Implementing multicast stub routing between an Edge Node and interested receivers provides efficiency by reducing the overall processing of PIM control traffic while still passing and forwarding IGMP traffic.

Summary

When upgrading from a Catalyst Center release earlier than 1.3.3.1 to a later release, this banner appears if multicast is enabled on a VN in the fabric and Layer 2 flooding is active on a subnet within the same VN.

Before 1.3.3.1, Protocol Independent Multicast – Sparse Mode (PIM-SM) was used on edge nodes. After applying this banner, edge nodes are configured with PIM-Passive instead.

With PIM-Passive configured on a routed interface, the interface doesn't process or forward PIM control traffic, only IGMP traffic. This reduces unnecessary PIM control processing on edge nodes, as they are directly connected to the receivers.

Configuration details

interface Vlan101

    no ip pim sparse-mode

    ip pim passive

Impact

This configuration change impacts multicast traffic.

Classic extended nodes as 802.1x authenticator switches and critical VLAN authentication template update

Table 17.          Banner title: Classic extended nodes as 802.1x authenticator switches and critical VLAN authentication template update

Value

Description

Release introduced

1.3.3.1

Full text of banner

This release provides an update to the authentication template on edge nodes for the critical VLAN. As a part of this enhancement, the SGT value 3999 which was previously provisioned is removed from the authentication templates.

If the deployment currently uses SGT value 3999 for the critical VLAN, this value will need to be assigned to the critical VLAN segment during host onboarding workflows.

This release provides further enhancements through an update to the configuration on classic extended nodes which provides the ability to perform as an 802.1x authenticator for connected endpoints. Once these reconfiguration processes are started, downtime will occur for wired and wireless endpoints until it is completed. Client sessions will be interrupted, and devices will need to reauthenticate with the AAA server.

Summary

In Catalyst Center 1.3.3.1, enhancements have been made to the authentication profile (IBNS) for critical VLANs and to authentication on extended nodes. If you are upgrading to this or a later release, these enhancements are not enabled by default. You must manually enable them through the banner.

Catalyst Center will update the critical VLAN settings in the authentication templates for both fabric edge and extended node devices. Catalyst Center will also update the authentication configuration on extended nodes, including the relevant authentication templates.

As a result, client devices will now be authenticated directly at the extended node.

Configuration details

SWITCH_INTERFACE_TEMPLATE

 no switchport mode trunk

 no access-session host-mode multi-host

LAP_INTERFACE_TEMPLATE

 no switchport mode trunk

 no access-session host-mode multi-host

ApAutzTemplate

 no switchport mode trunk

 no access-session host-mode multi-host

service-template DefaultCriticalAuthVlan_SRV_TEMPLATE

 vlan <critical_vlan_id>

Impact

Due to an update in the authentication templates, network traffic is impacted. The change might reset the client sessions, and those clients must be reauthenticated on Cisco ISE.

Fabric authentication key - retry

Table 18.          Banner title: Fabric authentication key - retry

Value

Description

Release introduced

1.3.1.7

Full text of banner

The fabric authentication key update did not complete successfully. This update must complete successfully before any other operations can occur in the fabric site.

Summary

If the fabric authentication key fails to update, this banner notifies you to retry the operation.

Configuration details

service ipv4

  .

  .

  etr map-server <IP_address> key 7 0357020E030C2715175D41554F46595E02 <--- modified key

  .

  .

  exit-service-ipv4

 !

 service ethernet

  .

  .

  etr map-server <IP_address> key 7 0357020E030C2715175D41554F46595E02 <--- modified key

  .

  exit-service-ethernet

 !

Impact

This reconfiguration process causes downtime for wired and wireless endpoints until the process completes. After completion, reboot any AireOS-based WLC devices operating in a fabric role.

Fabric authentication key update

Table 19.          Banner title: Fabric authentication key update

Value

Description

Release introduced

1.3.0

Full text of banner

When border nodes, edge nodes, and wireless LAN controllers (WLCs) register prefixes with the control plane node(s), that registration process uses an authentication key. This fabric authentication key must be updated. Once this reconfiguration process is started, downtime will occur for wired and wireless endpoints until it is completed. After the process is completed, please reboot your AireOS-based WLC device(s) if they are operating in a fabric role. Please make sure to reprovision all WLCs in this fabric at device level and fabric level individually to make sure there are no errors in WLC provisioning before attempting the banner push to avoid wireless outage.

Summary

This banner prompts you to update to the fabric authentication key. Previously, the key was set as a constant string; applying this banner ensures a unique, randomly generated key for each fabric. This banner appears during any migration from 1.2.x to 1.3.x or later.

Configuration details

service ipv4

  .

  .

  etr map-server <IP_address> key 7 0357020E030C2715175D41554F46595E02 <--- modified key

  .

  .

  exit-service-ipv4

 !

 service ethernet

  .

  .

  etr map-server <IP_address> key 7 0357020E030C2715175D41554F46595E02 <--- modified key

  .

  exit-service-ethernet

 !

Impact

Wired and wireless endpoints undergo downtime during this operation.

Related resources

See Cisco Catalyst Center Documentation for additional documents relating to Catalyst Center.

Legal information

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

© 2025 Cisco Systems, Inc. All rights reserved.

Learn more