The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
From insight to impact, Cisco Nexus Dashboard 4.1 sets the stage for the next leap delivering unified visibility, smarter automation, and seamless integration empowering networks to do more, faster, and smarter!
Cisco Nexus Dashboard 4.1 integrates multiple services such as Insights, Orchestrator, and Fabric Controller into a single, seamless platform for data center operations. The dashboard serves as the unified management pane for modern networks, enabling seamless operations across disparate architectures such as VXLAN, Classic LAN, AI, Routed, IPN/ISN, Media fabrics, SAN fabrics and more. It delivers real-time analytics, deep visibility, and robust assurance for networks, empowering organizations to optimize performance, and enhance reliability.
For more information, see the "Related Content" section of this document.
Table 1 New and changed information
Date |
Description |
August 22, 2025 |
●
In the “Open issues” section, added bug CSCwq86832.
●
In the “Supported UCS server firmware” table, added 4.3(5.250001) and 4.3(5.250030) releases for Cisco UCS-225-M6 (ND-NODE-L4).
|
August 18, 2025 |
Added the “Support upgrade paths” section. |
August 13, 2025 |
Release 4.1.1g became available. |
New Infrastructure features
Table 2 New Infrastructure Features
Product Impact |
Feature |
Description |
Ease of use |
Unification of the Nexus Dashboard platform and all services |
This release of Nexus Dashboard fully integrates the platform with the individual services. There is no longer a separate UI for every individual service. This significantly simplifies the deployment workflows by providing a single product experience and allowing you to enable individual features and functionality at any time. For information about supported form factors, cluster sizes, and supported scale, see the Cisco Nexus Dashboard Verified Scalability Guide for this release. |
Ability to deploy Nexus Dashboard in AWS |
Beginning with this release, you can now deploy Nexus Dashboard in Amazon Web Services (AWS) for NX-OS fabrics with both controller and telemetry functions. For more information, see the Cisco Nexus Dashboard Deployment Guide for this release. |
|
New virtual data ND appliance for 1 and 3 node deployments - ESXi and KVM (on RHEL) |
A software-based ND appliance designed for easy deployment in virtualized environments, supports both ESXi and KVM hypervisors for cost-efficient scalability without the need for dedicated hardware. For more information, see: |
|
New Cisco UCS M8 based appliance |
A next-generation, high-performance appliance powered by Cisco UCS M8 technology, is now available in flexible 1-node or 3-node cluster deployments for maximum scalability, reliability, and performance. For more information, see: |
|
2-way SSO between APIC and Nexus Dashboard |
Previously, when an ACI fabric was onboarded in a Nexus Dashboard, you could navigate to the APIC from the Nexus Dashboard GUI. With this feature, you can now navigate back to the Nexus Dashboard from the APIC GUI. For more information, see Connecting Clusters. |
|
Simplified persona based bootstrap web installer |
During installation of Nexus Dashboard, a user can choose LAN or SAN persona. Layer-2 or Layer-3 adjacent clusters can be easily setup with reduced persistent IP requirements. For more information, see the Cisco Nexus Dashboard Deployment Guide for this release. |
|
Ability to configure multi-cluster primary as an authentication domain. |
With this release, you can now configure the multi-cluster primary cluster as an authentication domain. This allows One Manage based provisioning and monitoring options to be available in the All Clusters view, without the need for an external AAA server. For more information, see the “Multi-cluster primary as an authentication domain” section in the Configuring Users, Roles, and Security article. |
|
Support for cluster advisories |
With this release, Nexus Dashboard includes advisories for cluster nodes in the System Status page. While this release includes no active advisories for the current hardware version, Nexus Dashboard manages updates through metadata. For more information, see “Advisories” section in the Reviewing System Status for Your Nexus Dashboard article. |
|
CyberArk integration for secure credential management |
Nexus Dashboard now provides the ability to use CyberArk as the secure credential store for privileged credentials. For more information, see Credentials store. |
|
Streaming of audit logs to Splunk |
Audit logs from Nexus Dashboard can now be streamed to Splunk via HEC for security, advanced analytics, compliance reporting, and real-time monitoring. For more information, see Reviewing History and Logs in Your Nexus Dashboard article. |
|
Topology Snapshots |
With this release, Nexus Dashboard introduced the Topology Snapshots for LAN fabrics that allows you to capture and analyze network topology states. You can track changes in topologies over time and perform side-by-side comparisons. The feature supports both mergeable comparisons and table-based comparisons, offering a comprehensive view of your network. For more information, see “View topology snapshots” section in the Exploring Your Nexus Dashboard article. |
|
Per fabric license tier
|
With this feature, Nexus Dashboard allows you to configure each fabric independently with one of the license tiers: Essentials, Advantage, or Premier. Nexus Dashboard grays out features that may not be entitled and displays a lock icon next to the feature. Hovering over the lock icon displays a tooltip indicating the reason for the feature's unavailability. For information on features included with each license tier, you can click the tooltip in the *License tier for fabric* area. For more information, see the “View license tier for a fabric” section in the Configuring Licensing article. |
|
Unified Role-Based Access Control (RBAC) |
Nexus Dashboard now has 6 unified roles that ensure consistent and role-based read and/or write access to specific resources across the entire product. |
|
Support for custom dashboards |
With this release, Nexus Dashboard added a Dashboards page for monitoring all the data in a centralized location. You can create custom dashboards and add widgets to display the top-level information about each widget. You can also share dashboards across users, enabling collaboration and accessibility. |
|
Support for Controller in 6vND form factor |
With this release, Nexus Dashboard supports Controller functionality on the 6 virtual node from factor (in addition to existing Monitoring and Orchestration support). For more information, see the Cisco Nexus Dashboard Verified Scalability Guide. |
|
Anomaly Normalization and Correlation Across Platform, Controller, and Observability |
Unify anomaly detection across multiple system layers to correlate events and prioritize actionable insights. |
|
Advanced Settings for TAC support |
Advanced debugging capabilities for TAC upon enablement of Advanced settings configuration. |
New LAN Automation functionality
Table 3 New LAN Automation functionality
Product Impact |
Feature |
Description |
Ease of use |
Addition of new AI fabric type (Routed and VXLAN) and Intelligent Packet Flow framework enhancements for AI |
Optimized for AI workloads, the new AI fabric type in Nexus Dashboard supports both routed and VXLAN modes thereby delivering ultra-low latency and predictable performance. Various Dynamic Load Balancing (DLB) modes can be easily provisioned on the AI fabric including flowlet, per-packet and ECMP static pinning. |
External connectivity (L3Out) workflow for VXLAN EVPN fabrics |
Beginning with Nexus Dashboard 4.1.1, there is now a simplified Layer-3 Out configuration workflow that enables fast, consistent, and policy-driven external connectivity for VXLAN EVPN environments. For more information, see the section “Routing policies” in Working with Connectivity in Your Nexus Dashboard LAN Fabrics article. |
|
Migration from a Nexus Dashboard Orchestrator (NDO)-managed NX-OS VXLAN EVPN multi-fabric environment to a Nexus Dashboard multi-cluster fabric group |
Post upgrade to Nexus Dashboard 4.1.1 release, customers can migrate their existing Nexus Dashboard Orchestrator (NDO) managed NX-OS VXLAN BGP EVPN Multi-Site environment to a multi-cluster fabric group that is driven from the ND One Manage view. For more information, see the “Migrate a Nexus Dashboard 3.2.x Orchestration-managed fabric to a multi-cluster fabric group” section in the Creating LAN and ACI Fabrics and Fabric Groups article. |
|
Security group enhancements for enhanced traffic segmentation and classification |
With this release, Nexus Dashboard added support for additional classification options for security groups in VXLAN EVPN environments. Additional selectors include
●
VLAN range
● (Port, Network)
|
|
Multi-Site with VXLAN GPO for multi-cluster deployments (One Manage) |
Nexus Dashboard now provides the ability to deploy and manage VXLAN Group Policy Options (GPOs) across multiple VXLAN BGP EVPN fabrics and clusters from the ND One Manage console, ensuring policy consistency at scale. |
|
L4-7 service load balancing and traffic steering/redirection in VXLAN EVPN multi-site environments |
With this release, Nexus Dashboard provides the ability to provision configurations for various L4-7 services use-cases in VXLAN EVPN multi-site environments. |
|
Downstream VNI support for VXLAN EVPN Multi-Site environments |
Nexus Dashboard now supports the ability to provision downstream VNIs across different VXLAN EVPN fabrics for flexible network segmentation and tenant isolation in Multi-Site deployments. |
|
Added support for Hypershield integration to onboard a Cisco Nexus 9300 smart switch N9324C-SE1U |
With this release, Nexus Dashboard automates Smart switch lifecycle tasks—from onboarding to upgrades and securing VRFs—while integrating with Cisco Hypershield for unified, fabric-wide security. For more information, see the “Add Hypershield integration” and “Smart switches and Data Processing Units (DPUs)” section in Working with integrations in Your Nexus Dashboard article. |
|
Support for leaf-ToR pairing for a Data Center VXLAN EVPN eBGP fabric |
Nexus Dashboard has now added support for leaf-ToR pairing for a Data Center VXLAN eBGP fabric. For more information, see the “Configuring ToR switches and deploying networks in Data Center VXLAN EVPN fabrics” section in the Working with Inventory in Your Nexus Dashboard LAN or IPFM Fabrics article. |
|
Integration with OpenStack for VXLAN EVPN fabrics |
With this release, Nexus Dashboard provides native integration with OpenStack using the ML2 based mechanism. Creation of projects, networks, and VM provisioning on OpenStack will automatically provision the corresponding network and VRF related configuration on the VXLAN EVPN fabrics. |
|
OpenShift integration |
Nexus Dashboard now supports an OpenShift integration that enables you to view OpenShift resources and their placement within the network. For more information, see the “OpenShift integration” section in the Working with Integrations in Your Nexus Dashboard article. |
|
NGOAM loop detection for VXLAN EVPN fabrics |
With this release, Nexus Dashboard provides the ability to detect and alert on potential forwarding loops in VXLAN EVPN fabrics using enhanced Network Generic OAM (NGOAM) capabilities. |
|
Unused VLAN listing for network attachments |
Nexus Dashboard now provides an option to view the list of unused available VLANs on a per switch basis during network attachment in a Data Center VXLAN EVPN fabric. For more information, see the section “Edit network attachment” in Working with Segmentation and Security for Your Nexus Dashboard VXLAN Fabric article. |
|
Ability to provision up to 16 secondary gateway IP addresses on a VXLAN network |
With this feature, Nexus Dashboard has added support for configuration of up to16 secondary gateway IP addresses on a per network basis in a Data Center VXLAN EVPN fabric. For more information, see the section “Configure a secondary gateway IP address” in the Working with Segmentation and Security for Your Nexus Dashboard VXLAN Fabric article. |
|
User interface enhancements |
With this release, Nexus Dashboard added several GUI enhancements for a consistent look and feel across Nexus Dashboard, customization of tables, a download to .csv option, and other GUI enhancements. For more information, see the “GUI enhancements” section of the Exploring Your Nexus Dashboard article. |
|
Preview before push configuration |
With this release, Nexus Dashboard provides a preview stage that allows the user to view the configuration before it will be deployed to the selected switches when using the ‘Push config’ action in the Configuration policies page. For more information, see the “Create a policy group” section in Working with Configuration Policies for Your Nexus Dashboard LAN or IPFM Fabrics article. |
|
Ability to execute show commands in bulk for multiple switches |
Nexus Dashboard now provides the ability to execute show commands in bulk on multiple switches, view outputs of those CLI commands as well as the ability to download the entire output in a zip file. For more information, see the “Execute show commands on switches” section in the Working with Inventory in Your Nexus Dashboard LAN or IPFM Fabrics article. |
|
Provision per port VLAN mapping options on trunk interfaces |
Nexus Dashboard now supports trunk interface policy configuration with a VLAN mapping option. This provides flexibility to map customer VLANs to provider VLANs directly within the policy settings. For more information, see “Enable VLAN mapping” section in the Working with Connectivity in Your Nexus Dashboard LAN Fabrics article. |
|
Introduction of External Streaming tab |
With this release, Nexus Dashboard introduced an External Streaming tab in Fabric settings that enables you to export the data collected by Nexus Dashboard over Kafka, email, and syslog. For more information, see the Editing fabric settings articles. |
|
Ability to add Fully Quality Domain Names (FQDN) for NTP and Syslog servers |
With this release, you can now provide a FQDN in addition to IP addresses for NTP and Syslog servers for Classic LAN, Data Center VXLAN, and IP Fabric for Media (IPFM) Fabrics. |
|
Support for visualization of port status information for IPFM fabrics |
With this release, Nexus Dashboard added support for viewing switch port utilization for IPFM fabrics. You can view port status information such as the operational status and anomaly level. For more information, see the “View switch port status information for IPFM fabrics” in the Working with Inventory in Your Nexus Dashboard LAN or IPFM Fabrics article. |
|
Support for creating a Data Center VXLAN and an IPFM fabric on the same Nexus Dashboard cluster |
With this release, Nexus Dashboard added support for creating a Data Center VXLAN and an IPFM fabric on the same Nexus Dashboard cluster. |
|
Unified anomaly rules |
Anomaly rules in the Unified Nexus Dashboard now cover both controller and telemetry use-cases including the ability to create and enable custom policies. For more information, see Detecting Anomalies and Identifying Advisories in Your Nexus Dashboard article. |
New SAN Automation functionality
Table 4 New SAN Automation functionality
Product Impact |
Feature |
Description |
Ease of use |
Default interface health policies for Hosts, ISLs, and Storage Devices |
Nexus Dashboard now creates interface health policies by default to monitor port utilization for Hosts, ISLs, and Storage Devices. For more information, see the “Default interface health policies” section in the Event Analytics for SAN Fabrics article. |
View audit logs related to zoning operations in Nexus Dashboard |
You can now view and monitor audit logs related to zoning operations in the Nexus Dashboard > Manage > Zoning page. For more information, see the “View zoning audit logs” section in the Configuring Zoning for SAN Fabrics article. |
New Orchestration functionality
Table 5 New Orchestration functionality
Product Impact |
Feature |
Description |
Ease of use |
ACI orchestration support for Endpoint Security Group |
Endpoint Security Group (ESG) can be configured through ND for ACI multi-fabric use cases. With this, ESGs can be stretched across multiple ACI fabrics that are connected through ND. Support has also been enabled for PBR with multi-fabric ESG. For more information, see “Create the ESG". |
Endpoint Security Group support for segmentation and security visibility |
With this release, Nexus Dashboard ESG enhances Segmentation and security, allowing you to view ESGs and their associated endpoints within the ACI fabric. For more information, see “Viewing ESG and endpoint association". |
|
Changed behavior for set rules and match rules in ACI fabrics |
You can now configure set rules and match rules independently from specific route map policies in ACI fabrics. For more information, see the section “Understanding match rules and set rules” in Tenants and Tenant Policies Templates for ACI Fabrics. |
|
ACI orchestration for autonomous remote leaf group |
With this release, Nexus Dashboard now offers enhanced support for remote leaf deployments. It provides new vPC validations to ensure remote leaf switches in a vPC configuration belong to the same TEP pool. For improved management and visibility of remote leaf resiliency, the Nexus Dashboard inventory also displays Autonomous Remote Leaf Group (ARL Group) and TEP pool information. For more information, see "Autonomous remote leaf group management". |
|
Nexus Dashboard as API Broker |
Directly manage your APIC configurations from Nexus Dashboard using the new API Broker feature, which provides API call execution. For more information, see “APIC configuration using Nexus Dashboard API Broker”. |
|
Move Orchestration policies across templates |
With this release, Nexus Dashboard supports contracts and filters, expanding its management capabilities beyond EPG and bridge domain objects. For more information, see "Migrating objects between templates". |
|
Auto reconciliation Enhancements |
Reconciling configuration policy objects with APIC during ND upgrade. For more information, see the Cisco Nexus Dashboard Deployment Guide for this release. |
New Monitoring and Observability functionality
Table 6 New Monitoring and Observability functionality
Product Impact |
Feature |
Description |
Ease of use |
Flow Telemetry Visibility Across Fabric using Search & Explore |
With this release, Nexus Dashboard supports the ability to query and view flow telemetry data across ACI to ACI fabrics and NX-OS to NX-OS fabrics on the Search and Explore page. |
Telemetry support for Policy-based redirect (PBR) services |
With this release, Nexus Dashboard enhanced the configuration and policy table in How do they talk? for PBR-enabled contracts. This is applicable only to ACI fabrics. For more information, see "Policy-based redirect support for Search and Explore". Also, you can now enable the creation of compliance rules to enforce traffic routing between Endpoint Groups (EPGs) through a PBR device. For more information, see “Enhanced PBR support for communication compliance”. |
|
Multi-cluster global endpoint search by MAC/IP |
The new global search feature in Nexus Dashboard includes enhanced filtering options to narrow down searches. You can view resource details directly, even if the resource is in a remote cluster, and easily navigate back to the local cluster’s fabric listing page. This feature requires telemetry-enabled clusters and delivers real-time search results. For more information, see “Multi-cluster connectivity global search across all clusters”. |
|
Ability to view platform and system alerts in global anomalies and advisories tables |
With this release, in Nexus Dashboard an option to include system anomalies and advisories in the Anomalies page and Advisories page of Nexus Dashboard has been introduced. For more information, see “View platform and system alerts in global anomalies table” and “View platform and system alerts in global advisories table” section in Detecting Anomalies and Identifying Advisories in Your Nexus Dashboard article. |
|
Resync option to resolve telemetry configuration anomalies |
With this release, Nexus Dashboard includes Resync/Resync all failed switch configuration option to resolve certain switch level telemetry configuration anomalies and restore normal telemetry operations on these affected switches. For more information, see “Resolve telemetry configuration anomalies on switches” section in Detecting Anomalies and Identifying Advisories in Your Nexus Dashboard article. |
|
Traffic analytics support for traffic redirection to L4-L7 services |
With this release, Nexus Dashboard added support for traffic redirected to Layer 4 to Layer 7 (L4-L7) services. For more information, see the sections, “Traffic analytics support for traffic redirection to L4-L7 services” and “View traffic analytics for endpoints” in the Analyzing and Troubleshooting Your Network article. |
|
Compatibility mode support for Traffic analytics |
With this release, you can choose to configure Traffic analytics compatibility mode whenever Traffic analytics full mode is not supported by the fabric. This requires NetFlow support. For more information, see the section, “Monitoring the latency, congestion, and drops for your network, using traffic analytics” in the Analyzing and Troubleshooting Your Network article. |
|
Traffic analytics support for north-south filters |
With this release, you can apply filters to limit visibility of external traffic. For more information, see the section “Traffic analytics support for north-south filters” in the Analyzing and Troubleshooting Your Network article. |
|
Traffic analytics support for UDP service endpoints |
With this release, you can now visualize the UDP service endpoints within the traffic analytics table. For more information, see the section “Manage service categories” in the Analyzing and Troubleshooting Your Network article. |
|
Traffic analytics support for Nexus 9000 H1 and H2 Series switches |
With this release, Nexus Dashboard added support for traffic analytics on these Nexus 9000 Series switches:
●
N9K-C93400LD-H1
●
N9K-C9364C-H1
●
N9K-C9332D-H2R
|
|
Traffic analytics support for Classic LAN fabrics |
With this release, Nexus Dashboard added support for traffic analytics on Classic LAN fabrics. |
|
Traffic analytics flow troubleshoot feature supported over Out-of-band (OOB) |
With this release, Nexus Dashboard added support for traffic analytics flow troubleshoot feature supported over OOB. The flow troubleshoot support over OOB is only supported on NX-OS release10.5(2) and later. |
|
Policy CAM support for NX-OS fabrics |
With this release, Nexus Dashboard Policy CAM Analyzer feature is supported on VXLAN fabrics. For more information, see the section “Gathering fabric resource information using Policy CAM” in the Analyzing and Troubleshooting Your Network article. |
|
Security Group association to Endpoints for VXLAN fabrics |
With this release, Nexus Dashboard enhances Segmentation and security, allowing you to view Security Policy contract details for NXOS VXLAN EVPN and ACI fabrics. For more information, see View the endpoints and endpoint security groups association. |
|
Security and Segmentation view for ACI fabrics |
With this release, Nexus Dashboard enhances Segmentation and security view to include EPGs, ESGs, Tenants for ACI fabrics. |
|
Observability for Smart Switches |
With this release, Nexus Dashboard introduces monitoring of Smart Switch statistics and health with advanced observability tools, enabling proactive issue detection and optimized operations. |
|
IPN/ISN visibility for improved Connectivity Analysis (CA) |
With this release, Nexus Dashboard enhances connectivity analysis with visibility into Inter-Pod Network (IPN) and Inter-Site Network (ISN) paths, ensuring faster troubleshooting and validation of interconnect health. |
|
Real-time visualization of Layer 3 neighbors and port status |
With this release, Nexus Dashboard provides insights into Layer 3 neighbor relationships and port operational status, enabling faster diagnosis of network reachability issues. |
|
Alert suspend mode for maintenance window |
With this release, Nexus Dashboard allows you to place a fabric in alerts suspend mode. The alerts are still sent to Nexus Dashboard, but any new anomalies or advisories generated for that fabric in the Fabric Overview page are not display. Useful while performing maintenance. For more information see, “Alerts suspend mode for anomalies and advisories” section in the Understanding your Nexus Dashboard Fabrics article. |
|
PTP monitoring for Catalyst platforms in IPFM |
With this release, Nexus Dashboard monitors Precision Time Protocol (PTP) performance for Catalyst platforms in IP Fabric for Media deployments, ensuring synchronization quality for media and time-sensitive applications. |
|
PTP monitoring when using Traffic Analytics/Flow Telemetry for NX-OS fabrics |
With this release, Nexus Dashboard introduces monitoring of PTP configuration on the fabrics required for Flow telemetry and Traffic Analytics |
|
Unified fabric/switch overview |
With this release, Nexus Dashboard provides Unified Fabric/Switch Overview for Nexus Fabrics when Controller and Monitoring functionality are enabled on separate clusters. |
|
Event as root in Root cause analysis |
With this release, Nexus Dashboard now correlates anomalies to events that could be the root cause of those anomalies. For more information, see Detecting Anomalies and Identifying Advisories in Your Nexus Dashboard article. |
|
Change control support for Monitoring |
With this release, Nexus Dashboard supports Change control feature for Monitoring related configuration deployments. |
New hardware support
Table 7 New hardware support
Product Impact |
Feature |
Description |
Hardware support |
Support for Nexus platforms and linecards |
This release of the Nexus Dashboard expands support for the following Nexus hardware. These devices are supported on both ACI and NX-OS operating systems. For any specific limitations on the hardware, see the Guidelines and limitations section.
●
Nexus 9364E-SG2-O and 9364E-SG2-Q platforms
●
Nexus 9324C-SE1U platforms
●
Nexus 9808 platform
●
Nexus 92348GC-FX3 platform
●
Nexus N9K-X9736C-FX3 linecard
●
Nexus 9336C-SE1 platform
|
Starting with Nexus Dashboard 4.1.1, the Cisco UCS-C225-M8 (ND-NODE-G5S) server is now supported as a physical node in the Nexus Dashboard cluster For more information, see Compatibility Information.
The following is the list of new hardware supported with this release.
Cisco Nexus Switches for LAN deployments
● N9336C-SE1 - Nexus 9300 36C
● N9364E-SG2-O - Nexus 9300 64E OSFP
● N9364E-SG2-Q - Nexus 9300 64E QSFP-DD800
● N9K-C92348GC-FX3 - Nexus 9300 48G
● N9K-C9804 - Nexus 9800 4-slot chassis
● N9K-C9808 - Nexus 9800 8-slot chassis
● N9K-X9736C-FX3 - Nexus 9500 LC 36C
● N9324C-SE1U - Nexus 9300 24C
Guidelines and limitations
For Nexus Dashboard feature guidelines and limitations, see the feature article for details.
Support upgrade paths
The platform and its individual services have now been unified into a single product. As a result, you no longer need to deploy, configure, or upgrade services individually-all management is handled collectively through the unified platform.
For further details, refer to the Supported upgrade paths section in the Cisco Nexus Dashboard Deployment and Upgrade Guide.
Changes in behavior for Nexus Dashboard
● Beginning with Nexus Dashboard release 4.1.1, bugscan no longer detects Active bugs through CLI and device log analysis, but is limited to Susceptible Bug detection using platform and software version information only. This functionality will be re-introduced in a future release.
Open issues
To see additional information about the caveats, click the bug ID to access the Bug Search Tool (BST). The “Exists In” column of the table lists the specific patches in which the issue exists.
To search for a bug ID within Cisco’s product documentation, enter in the address bar of a web browser:
<bug_number> site:cisco.com
For example: CSCwo61222 site:cisco.com
Table 8 Open issues for Nexus Dashboard
Bug ID |
Description |
Exists in |
Affected Functionality |
Connectivity Analysis does not function correctly for ACI endpoints if the corresponding bridge domain is advertising host routes. |
4.1.1g and later |
General |
|
1) On 3.2, prior to starting an upgrade there is a fault in the System Settings page that tells user there is a NAS storage that is currently not healthy. In this case, please fix the nas server before starting upgrade. NO further WA required post upgrade starts. 2) If CU missed the error above and went ahead with 4.1 iso upload and start of Installation, you would see that after the nodes reboot, the UI throws an error that mentions the nas with the issue, and a recovery command for the upgrade. |
4.1.1g and later |
General |
|
Fabric is a member of Fabric Group and the networks are exported to be imported again to create new networks or update existing networks. Export includes internal variables and only if the user changes it and imports the networks, there are some unintended side effects. |
4.1.1g and later |
General |
|
OpenSearch cluster may have shards stuck in INITIALIZING or UNASSIGNED state. The output of: esctl --name <namespace> get health may return: status: yellow or red initializing_shards >0 for hours unassigned_shards >0 for hours |
4.1.1g and later |
General |
|
Home Overview: Active Endpoints Not Updating with Refresh Active endpoints are not updated while clicking on UI refresh button |
4.1.1g and later |
General |
|
Some audit logs missing in the streaming server and logs /logs/k8_infra/streaming/fluentbit.stderr.log has logs saying failed to terminate continuously. |
4.1.1g and later |
General |
|
|
|
|
|
A new knob has been introduced on the switch preview side-by-side page for viewing Expected/Generated configurations in Nexus Dashboard Fabric Controller (NDFC) for LAN Classic and External Fabric. The Pending Config option, which is meant to display the same order of commands for the same operation, does not consistently show the correct order in some scenarios. Specifically: Incorrect Command Ordering: When there is a config diff (i.e., differences in configurations that need to be pushed), the Generated Config displays the commands in the wrong order. This is especially noticeable when comparing the configuration to the running config output in the same screen. The ordering mismatch can lead to confusion, even though there is no functional impact on the system. Display Gaps Between Configs: In some cases, there are visible gaps between configuration entries in the display, which further contributes to the confusion. These gaps may appear when comparing the Expected vs. Generated configurations, making it unclear whether there are missing configurations or misalignment in the data. While the issue does not affect the functionality of the system (i.e., the configuration will still be pushed and applied correctly), it could cause confusion for users who are relying on the previewed config order to verify changes before applying them. |
4.1.1g and later |
Automation |
|
The issue is observed in the onesearch feature on a scale setup. It takes 30 seconds to generate recommendations. |
4.1.1g and later |
Automation |
|
1. Security Groups are enabled in the fabric. 2. VRF is updated to modify the Default Security Action from 'Unenforced' to 'Enforced permit/deny'. 3a. Network(s) within the VRF is attached to anycast BGWs. or 3b. Network(s) within the VRF has enableL3OnBorder disabled and is attached to borders or vpc BGWs. |
4.1.1g and later |
Automation |
|
1. Configure secure VRFs with corresponding DPU affinities and then deploy to the smart switch. 2. After deployment, generate the fabric backup. 3. Convert the secure VRFs to regular VRF and deploy. 4. Select the smart switch and perform "restore switch" using the generated backup mentioned in step 2. 5. After competing the restore workflow, the VRF will show as non-secure in the UI as the secure VRF toggle is set to OFF |
4.1.1g and later |
Automation |
|
The additional options displayed while user navigates into All cluster Topology are non-functional and when clicked will provide an error that it is not permissible from this level(All clusters). Additionally, the nodes VRFs and Networks when clicked gives 'Failed to load' error specifically in the case of upgrade. |
4.1.1g and later |
Automation |
|
External Fabric allows neighbor switches to be added to the fabric. These switches are expected to appear only in the inventory with the role of "Neighbor." However, the switches are clickable, and ND does not support Switch Overview for neighbor switches. |
4.1.1g and later |
Automation |
|
|
|
|
|
Shadow ESGs/EPGs are missing after migrating consumer ESG/EPG from site1 to site2 while provider ESG/EPG is still present on site1. |
4.1.1g and later |
Orchestration |
|
While importing into an L3out template on NDO, an L3out which has static routes containing next hop configuration with a reference to an IPSLA monitoring policy users may be blocked for selection. On hovering over the L3out, users may see the error message "L3out reference to IPSLA Monitoring Policy 'foo' on IPSLA next-hop with address 'bar' on static route 'baz' cannot be imported into NDO. Please remove the IPSLA monitoring policy reference on the next hop to import the L3out. The import is blocked both through NDO UI and via API due to above error. |
4.1.1g and later |
Orchestration |
|
|
|
|
|
In Segmentation and Security view of the fabric, global contracts imported as interface contracts which are consumed or provided by ESGs are not shown. |
4.1.1g and later |
Monitoring/Observability |
|
When the fabric is in Traffic Analytics Compatibility mode (traffic Analytics at cluster level) Admin->System Status->Telemetry->Switches tab, Flow collections column will show "failed" for N9K model - N9K-C9364D-GX2A and version -10.3(2) and Expected configuration will show "!Netflow is not supported in this switch" |
4.1.1g and later |
Monitoring/Observability |
|
After RMA of a border node in NXOS VxLAN fabric, the user cannot edit or delete Traffic Analytics Interface Filtering rules that have been configured before swapping the device. These rules are associated with the previous switch serial number. New rules can be created and associated with the new switch serialnumber and configurations are correctly pushed to the new switch. |
4.1.1g and later |
Monitoring/Observability |
|
Fabric state in fabric overview page and one or more switches in the Inventory page show out-of-sync state. |
4.1.1g and later |
Monitoring/Observability |
|
Anomaly levels don’t match between the Switch overview screen and Manage > Inventory and also Topology switches view. |
4.1.1g and later |
Monitoring/Observability |
|
After an upgrade following a fabric re-register, the ACI fabric is in Add failed state with respect to its software telemetry status. |
4.1.1g and later |
Monitoring/Observability |
|
Traffic analytics and flow troubleshooting jobs are reporting a higher latency than the actual packet latency for traffic passing through Cisco Nexus 9000 H1 and H2 series switches. |
4.1.1g and later |
Monitoring/Observability |
|
The flow path may have unknown nodes in place of the super-spines. Or in the scenario where the correct path cannot be determined, the nodes from which flow records were received will be listed under "Uncertain Paths". |
4.1.1g and later |
Monitoring/Observability |
|
Navigation to basic inventory pages and topology gets stuck on the UI. |
4.1.1g and later |
Monitoring/Observability |
|
In TA compatibility mode, Analysis Hub -> Traffic Analytics Page -> no traffic is seen. |
4.1.1g and later |
Monitoring/Observability |
|
When telemetry is configured to stream over IPv6 with TA enabled at conversions in moderate scale, not all the conversations will be seen on Analysis hub -> Traffic Analytics page. |
4.1.1g and later |
Monitoring/Observability |
|
Cannot enable TA Compat mode on the fabric if its running TA full. |
4.1.1g and later |
Monitoring/Observability |
For Nexus Dashboard cluster sizing guidelines, see the “Cisco Nexus Dashboard Verified Scalability Guide, Release 4.1.1”.
Physical Nexus Dashboard nodes support these servers:
· Cisco UCS-220-M5 (SE-NODE-G2),
· Cisco UCS-225-M6 (ND-NODE-L4), and
· Cisco UCS-C225-M8 (ND-NODE-G5S)
Physical Nexus Dashboard nodes must be running a supported version of UCS server firmware (which includes CIMC, BIOS, RAID controller, and disk and NIC adapter firmware).
Table 9 Supported UCS server firmware
Product ID |
Supported Releases |
Cisco UCS-220-M5 (SE-NODE-G2)
|
●
4.2(3b)
●
4.2(3e)
●
4.3(2.230207)
●
4.3(2.240009)
●
4.3(2.240077)
|
Cisco UCS-225-M6 (ND-NODE-L4) |
●
4.3(4.240152)
●
4.3(4.242066)
●
4.3(5.250001)
●
4.3(5.250030)
|
Cisco UCS-C225-M8 (ND-NODE-G5S) |
●
4.3(6.250040
●
4.3(6.250053)
|
Note: Though other firmware versions than those listed above may be supported on standard UCS C220/C225 servers, they are not supported on Nexus Dashboard appliances and could lead to issues.
VMware vMotion is not supported for Nexus Dashboard virtual nodes deployed in VMware ESX.
Nexus Dashboard can be claimed in Intersight US regions ('us-east-1') or EU regions ('eu-central-1').
Browser compatibility
The Cisco Nexus Dashboard and services UI is intended to be compatible with the most recent desktop version of most common browsers, including Chrome, Firefox, Edge, and Safari. In most cases, compatibility will extend one version behind their most recent release.
While not designed for compatibility with mobile devices, most mobile browsers are still able to render the majority of Nexus Dashboard and services UI. However, using the above-listed browsers on a desktop or laptop is recommended. Mobile browsers aren’t officially supported by Cisco Nexus Dashboard and services.
For verified scalability limits, see the Cisco Nexus Dashboard Verified Scalability Guide, Release 4.1.1, which is available in the documentation is directly available on the CCO portal.
For release 4.1.1, all documentation content is provided directly in the product’s GUI and accessible via the Help Center link.
To search and view all of the ND 4.1.1 user content, go to this URL: https://www.cisco.com/c/en/us/td/docs/dcn/nd/4x/collections/nd-user-content-411.html
To provide technical feedback on this document, or to report an error or omission, send your comments to ciscodcnapps-docfeedback@cisco.com.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2025 Cisco Systems, Inc. All rights reserved.