Cisco Nexus 1000 Virtual Edge for VMware vSphere Release Notes, Release 5.2(1)SV5(1.3c)

Available Languages

Download Options

  • PDF
    (290.3 KB)
    View with Adobe Reader on a variety of devices
Updated:December 15, 2021

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

Available Languages

Download Options

  • PDF
    (290.3 KB)
    View with Adobe Reader on a variety of devices
Updated:December 15, 2021
 

     

Introduction

This document describes the features, limitations, and bugs for Cisco Nexus 1000 Virtual Edge for VMware vSphere (Cisco Nexus 1000VE) Release 5.2(1)SV5(1.3c).

Use this document with the documents listed in the Related Documentation section.

Cisco Nexus 1000VE provides a distributed, virtual switch that extends across multiple virtualized hosts. Cisco Nexus 1000VE manages a data center defined by the vCenter Server. Each server in the data center is represented as a line card in Cisco Nexus 1000VE and can be managed similar to a line card in a physical Cisco switch.

Cisco Nexus 1000VE consists of the following components:

     Virtual Supervisor Module (VSM), which contains the Cisco CLI, configuration, and high-level features.

     Virtual Service Engine (VSE), which acts as a line card and runs in each virtualized server to handle packet forwarding and other localized functions.

 

Note: The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product.

 

Date

Description

December 15, 2021

Release 5.2(1)SV5(1.3c) became available.

New Software Features

No new features in this release.

Software Compatibility

The servers that run the Cisco Nexus 1000VE VSM and VSE must be in the VMware Hardware Compatibility list.

Cisco Nexus 1000VE Release 5.2(1)SV5(1.3c) is a maintenance release and supports vSphere 6.5U2,U3 and 6.7U1,6.7U2 and 6.7U3 release trains. Cisco Nexus 1000VE supports all virtual machine network adapter types that VMware vSphere supports.

Refer to the VMware documentation when choosing a network adapter. For more information, see the VMware Knowledge Base article #1001805.

The following table lists the minimum software versions compatibility between Cisco VSG, Cisco PNSC, and Cisco Nexus 1000VE.

Cisco Nexus 1000VE Version

Cisco VSG Version

Cisco PNSC Version

VMware vCenter Version

5.2(1)SV5(1.3c)

VSG 2.2.2

PNSC 3.5.1b

Versions 6.5U2, 6.7U1, 6.7U2, and 6.7U3 for both, Windows and Linux vCenter appliances.

 

Cisco Nexus 1000VE Configuration Scale Limits

The following table lists the configuration scale limits supported in Cisco Nexus 1000VE, Release 5.2(1)SV5(1.3c). Features that do not apply are marked as N/A.

 

 

Features

Cisco Nexus 1000VE

VSE

vDS

Host/DVS

N/A

64

Total vEth Ports

300

4000

vEthernet interfaces per port profile

300

N/A

Port Profile

N/A

2000

VLANs

4094

4094

ACLs

64

64

MAC address per vSE

32000

32000

ACEs per ACL

128

128

PVLAN

N/A

123

SPAN/ERSPAN Sessions

16

16

Cisco Trustsec

       4K IPSGT Mappings (2000

       4K IPSGT Mappings

 

CLI + 2000 SXP)

(2000 CLI + 2000 SXP)

 

       1K SUBNET-SGT Mappings

       1K SUBNET-SGT

 

(512 CLI + 512 SXP)

Mappings (512 CLI + 512

 

       32 SGACLs

SXP)

 

       32 ACE's in 3 SGACL's

       32 SGACLs

 

       8 SXP Peers.

       32 ACE's in 3 SGACL's

 

       1K SGT policies.

       8 SXP Peers.

 

       300 Device Tracking entries.

       1K SGT policies.

 

 

       300 Device Tracking

 

 

entries.

 

Cisco VSG Configuration Scale Limits

The following table lists the configuration scale limits that apply and supersede the scale numbers shown in Cisco Nexus 1000V Configuration Scale Limits section for Cisco VSG.

Feature

VSE

vDS

VSG

150 protected by VSG

2400 ports protected by VSG

 

Important Notes and Limitations

This section lists important notes and limitations for Cisco Nexus 1000VE:

     It is recommended that Nexus1000v administrator save the configuration of VSM (using the write memory command) before conducting HOST reboot or VSM/VSE reboot. This ensures all port-profile mappings of VM ports to be saved on VSM and when VSM/VSE comes back online, all the port-profile mappings are restored. It is even better to save VSM configuration whenever there are changes in port-profile mappings of VM ports, so that any unforeseen HOST reboots or VSM/VSE reboots does not make VSM to lose port-profile mappings.

     The HTML5 based vCenter plugin is supported only for the installation/upgrade. For migration, you must use the flex-based plugin. It is recommended to migrate from Classical Nexus 1000V to Release 5.2(1)SV5(1.2) and then upgrade to Release5.2(1)SV5(1.3c).

     CTS tagging over DPDK is not supported with RBACLs.

     vMotion service gets enabled for VMkernel adapter automatically that causes migration of unwanted VMKernel adapters to outside trunk vDS which eventually affect some services supported on those VMKernel ports. Please refer VMware documentation or Online public forum discussions for more information.

     We do not recommend you to change the Management IP and Domain Id after establishing the SVS connection. However, if you need to the Management IP and Domain Id after change establishing the SVS connection, see Cisco Nexus 1000VE for VMware vSphere System Management Configuration Guide.

     For VSEs, the IP addresses are allocated from the Network IP Pool. Hence, after upgrading Cisco Nexus 1000VE release from any previous version to 5.2(1)SV5(1.3c), the VSE IP address may not be same as previously allocated.

     VSE module number indices displayed using the show module are dynamically allocated from an internal pool. Hence, module number indices will change after you upgrade Cisco Nexus 1000VE release from any previous version to 5.2(1)SV5(1.3c).

     Service disruption is expected during the upgrade process. Ensure that you have sufficient maintenance window during the upgrade process.

     The non-participating vEthernet ports on Cisco Nexus 1000 VE VSMs are deleted every 30 minutes.

     We recommend you to use Cisco Nexus 1000VE Manager vCenter Plugin to deploy or migrate N1KVE. For detailed information, see Cisco Nexus 1000VE Installation, Migration, and Upgrade Guide.

     We recommend you to use vmk0 IP address for adding the host to the vCenter. VSE module attach might fail if ESXi host is added using IP address of another VMK.

     We recommend you not to use write erase and reload vsm commands because they erase entire startup configuration including default port-profiles. Otherwise you need to manually move the ports to respective port-profiles, after the reload.

     Virtual Ethernet port are dynamically assigned and are not fixed for virtual machines.

     There is some traffic loss after a Virtual Machine (vMotion) is migrated from one host to another.

     Cisco Nexus 1000VE supports installation of VSM on VMware vSphere ESXi, CSP 2100, and N1100.

     Bulk migration of all the Virtual machine adapters attached to a port group configured in Nexus 1000VE VSM to any other destination network is not supported.

     Bulk migration of Virtual Network Adapters to Cisco Nexus 1000VE vDS should be limited to batches of 50 ports, with a delay of 30 seconds between batches.

     If Cisco Nexus 1000VE VSE management port-group is a part of the virtual standard switch, you must ensure that the same port-group is replicated in all the ESXi Hosts on which the VSE is to be installed or upgraded.

     Ensure that the management port-group is unique across all the vDS in the Datacenter.

     Only one uplink port-profile is supported on Cisco Nexus 1000VE per ESXi Host. If an ESXi Host in Cisco Nexus 1000V utilizes multiple uplink port-profiles, then consolidate to a single uplink port-profile before migration.

     Only Hosts using common uplink Ethernet port profile can be migrated as a batch.

     Ensure that you have configured different vmknics for Cisco Nexus 1000V specific services (for example, ERSPAN/VSG) and VMware specific services (for example, vMotion) before the migration.

     If the ERSPAN source and destination are in different subnets, and if the ERSPAN source is an L3 control VM kernel NIC attached to a Cisco Nexus 1000VE VSE, you must enable proxy-ARP on the upstream switch. If you do not enable proxy-ARP on the upstream switch (or router, if there is no default gateway), ERSPAN packets are not sent to the destination.

     DHCP is not supported for VSM management IP. The management IP must be configured statically.

     When a VSE communicates with the Cisco VSG in Layer 3 mode, an additional header with 94 bytes is added to the original packet. You must set the MTU to a minimum of 1594 bytes to accommodate this extra header for any network interface through which the traffic passes between the VSE and Cisco VSG. These interfaces can include the uplink port profile, the proxy ARP router, or a virtual switch.

     To upload VSE OVF file to the content library in VMware vCenter version 6.0, the URL option should be used. You cannot upload VSE from the local machine.

Issues

Cisco Bug Search Help Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.Use the Bug Search Tool to search for a specific bug or to search for all bugs in a release.

This section includes the following topics:

     Open Issues

     Resolved Issues

     Known Issues

Open Issues

No open issues.

Known Issues

No known issues.

Resolved Issues

Bug ID

Description

CSCvz35174

VSE ova generation failure after VCenter/ESXi Hosts rebooted.

 

MIB Support

The Cisco Management Information Base (MIB) list includes Cisco proprietary MIBs and many other Internet Engineering Task Force (IETF) standard MIBs. These standard MIBs are defined in Requests for Comments (RFCs). To find specific MIB information, you must examine the Cisco proprietary MIB structure and related IETF-standard MIBs supported by the Cisco Nexus 1000VE.

The MIB Support List is available at the following FTP site: ftp://ftp.cisco.com/pub/mibs/supportlists/nexus1000v/Nexus1000VMIBSupportList.html

Related Content

This section lists the documents used with the Cisco Nexus 1000VE and available on Cisco.com at the following URL:

https://www.cisco.com/c/en/us/support/switches/nexus-1000ve/tsd-products-support-series-home.html

General Information

            Cisco Nexus 1000VE Release Notes

 Install and Upgrade Guides

Cisco Nexus 1000VE Installation, Migration, and Upgrade Guide

Cisco VSG for VMware vSphere, Release 5.2(1)VSG2(2.2) and Cisco Prime NSC, Release 3.5.1a Installation and Upgrade Guide

Configuration Guides

Cisco Nexus 1000VE Layer 2 Switching Configuration Guide Cisco Nexus 1000VE Security Configuration Guide

Cisco Nexus 1000VE System Management Configuration Guide

Troubleshooting, Password Recovery, System Messages Guides

            Cisco Nexus 1000VE Troubleshooting Guide

Documentation Feedback

To provide technical feedback on this document, or to report an error or omission, send your comments to nexus1k-docfeedback@cisco.com. We appreciate your feedback.

Legal Information

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

© 2021 Cisco Systems, Inc. All rights reserved.

Learn more