The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Feedback
Cisco Enterprise NFVIS, Release 26.1.1
Cisco Enterprise NFVIS, Release 26.1.1
This release introduces significant accessibility upgrades designed to create a more inclusive user experience. Key updates include improved keyboard navigation and focus order, enhanced screen reader support through updated ARIA roles, and full compliance with WCAG 2.1 AA color contrast standards. Additionally, the update provides descriptive alternative text for all visual elements and optimizes form control structures to ensure seamless compatibility with assistive technologies.
Note: Rebranding: To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release 20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst SD-WAN Control Components.
See the latest Release Notes for a comprehensive list of all the component brand name changes. While we transition to the new names, some inconsistencies might be present in the documentation set because of a phased approach to the user interface updates of the software product.
Cisco is constantly enhancing the Cisco Enterprise Network Function Virtualization Infrastructure Software with every release, and we try and keep the content in line with the latest enhancements. The following table lists new and modified features we documented in the Configuration, Command Reference, and Hardware Installation guide.
What’s new for Cisco Enterprise NFVIS Release 26.1.1
Table 1. New software features for Cisco Enterprise NFVIS Release 26.1.1
| Product Impact |
Feature |
Description |
| Cisco Enterprise NFVIS |
||
| Ease of use |
Accessibility Enhancements in NFVIS GUI
|
● Improved keyboard navigation, operability and focus order across all workflows.
● Enhanced screen reader support through updated ARIA roles and descriptive labels.
● Corrected UI color contrast issues to meet WCAG 2.1 AA guidelines.
● Meaningful alternative text to icons and visuals, ensuring users who rely on non‑visual access receive the same information.
● Refined structure and corrected label associations of form controls for better compatibility with assistive technologies.
|
There are no new hardware features introduced in this release.
Table 2. Behavior changes for Cisco Enterprise NFVIS Release 26.1.1
| Product Impact |
Feature |
Description |
| Cisco Enterprise NFVIS |
||
| Ease of Setup |
Migrating from Insecure to Secure Configuration |
Starting from SD-WAN Manager 26.1.1, Cisco introduces the system mode insecure CLI command. This command is required if your configuration contains insecure features (such as SNMPv1/v2, HTTP, or weak ciphers). To move a device to a fully secure state, you must correct the insecure configurations and then transition the device mode from "Insecure" to "Secure." For more information, refer to Migrating from Insecure to Secure Configuration, Release 26.1.1 Resilient Infrastructure, a Cisco initiative to strengthen network security, introduces advanced security capabilities that reduce the attack surface and enable better detection and response. For more information, see Resilient Infrastructure. |
This table lists the resolved issues in this specific software release.
Note: Note: This software release may contain bug fixes first introduced in other releases. To see additional information, click the bug ID to access the Cisco Bug Tool.
Resolved issues for 26.1.1
Table 3. Resolved issues for Cisco Enterprise NFVIS 26.1.1
| Bug ID |
Description |
| NFVIS: Slowness in GUI due to delays in API calls |
This table lists the open issues in this specific software release.
This software release may contain open bugs first identified in other releases. To see additional information, click the bug ID to access the Cisco Bug Tool.
Open issues for 26.1.1
There are no open defects captured for Cisco NFVIS Release 26.1.1
The following resources are required for a standalone Cisco Enterprise NFVIS:
● For a system that has 16 or less CPU cores, one CPU core is reserved for NFVIS. For a system that has more than 16 CPU cores, 2 CPU cores are reserved for NFVIS except C8300-UCPE. C8300-UCPE-1N20 (20 cores system) will reserve 1 CPU core for NFVIS.
● NFVIS needs 5GB of system memory.
● 20 GB storage.
● For NFVIS portal, the minimum supported version of browsers are:
◦ Mozilla Firefox 66
◦ Google Chrome 71
◦ Windows 10 Edge
◦ MacOS 10.15 Safari
● Starting from Cisco NFVIS Release 4.14.1, the following are the system requirements for Cisco NFVIS devices that have more than 128 GB RAM:
◦ For a Cisco Catalyst Edge uCPE 8300 on numa node 0, 16 GB is reserved. A total of 16 GB is reserved .
● Starting from Cisco NFVIS Release 4.14.1, the following are the system requirements for Cisco NFVIS devices that have more than 64 GB RAM:
◦ For a Cisco Catalyst Edge uCPE 8300 on numa node 0, 13 GB is reserved. A total of 13 GB is reserved .
◦ For a UCS M6, numa node 0 reserves 11 GB and numa node 1 reserves 2 GB, totaling 13 GB. For other NFVIS devices, 11 GB is reserved on numa node 0, totaling 11 GB.
● Starting from Cisco NFVIS Release 4.14.1, the following are the system requirements for Cisco NFVIS devices that have more than 32 GB RAM:
◦ For a Cisco Catalyst Edge uCPE 8300 on numa node 0, 8 GB is reserved. A total of 8 GB is reserved .
◦ For a Cisco UCS C M6 Rack servers on numa node 0, 11 GB is reserved and 1 GB is reserved on the numa node 1. A total of 12 GB is reserved.
◦ For other Cisco NFVIS devices on numa node 0, 5 GB is reserved and 1 GB on the numa node 1 is reserved (if applicable).
● Starting from Cisco NFVIS Release 4.14.1, the following are the system requirements for Cisco NFVIS devices that have less than 32 GB RAM:
◦ For a Cisco Catalyst Edge uCPE 8300, 8 GB on numa node 0 is reserved. A total of 8 GB is reserved .
◦ For a Cisco UCS C M6 Rack servers, 7 GB is reserved on numa node 0 and 1 GB is reserved on the numa node 1. A total of 8 GB is reserved.
◦ For other Cisco NFVIS devices on numa node 0, 5 GB is reserved and 1 GB on the numa node 1 is reserved (if applicable).
● Starting from Cisco NFVIS Release 4.14.1, the following are the system requirements for Cisco NFVIS devices that have less than 16 GB RAM:
◦ For a Cisco Catalyst Edge uCPE 8300, 8 GB on numa node 0 is reserved and 1 GB is reserved on the numa node 1. A total of 9 GB is reserved .
◦ For other Cisco NFVIS devices on numa node 0, 5 GB is reserved and 1 GB on the numa node 1 is reserved (if applicable).
● Starting from Cisco NFVIS Release 4.14.1, the following are the system requirements for Cisco NFVIS devices that have 8 GB RAM:
◦ 3 GB is reserved for the Cisco NFVIS devices.
Note: More memory and disk space are required to be added to the system, depending on VM deployments.
The following table lists the only supported platforms and firmware for Cisco ENFV.
Table 4. Cisco ENFV
| Platform |
Firmware |
Version |
| C8200-UCPE-1N8 |
BIOS |
C8200-UCPE_1.04.103020201614 |
| MCU |
240.52 |
|
| C8300-UCPE-1N20 |
BIOS |
C83uCPE_BIOS_1.05.SPA |
| CIMC |
CIMC_4.15.0.2R.bin |
|
| UCS C-Series 240 M6 Rack Servers |
BIOS |
C240M6.4.3.2c.0.0726232000 |
| CIMC |
HUU version 4.3(2.230207) |
|
| UCS C-Series 220 M7 Rack Servers |
BIOS |
C220M7.4.3.5a.0.0905240935 |
| CIMC |
HUU version 4.3(5.240021) |
|
| UCS C-Series 220 M6 Rack Servers |
BIOS |
C220M6.4.3.2c.0.0726232000 |
| CIMC |
HUU version 4.3(2.230207) |
|
| UCS C-Series 240 M7 Rack Servers |
BIOS |
C240M7.4.3.5a.0.0905240935 |
| CIMC |
HUU version 4.3(5.240021) |
|
| UCS C-Series 220 M5 Rack Servers |
BIOS |
C220M5.4.1.3i.0.0713210713 |
| CIMC |
HUU version 4.1(3d) |
|
| UCS C-Series 240 M5 Rack Servers |
BIOS |
C240M5.4.1.3i.0.0713210713 |
| CIMC |
HUU version 4.1(3d) |
|
| UCS E-Series double-wide server module [UCS-E1100D-M6] |
NA |
NA |
Note: The last supported software release for ENCS5400 will be NFVIS 4.15 and Cisco IOS XE Catalyst SD-WAN Release 17.15.1a. For more information, see, ENCS 5400 EOL.
Table 5. Third party
| Platform |
Platform Description |
| M3X-APP |
Cubic Expeditionary Networking and Compute Platform |
| K800 |
C2-Defense Reaper Link |
| PS451 |
PacStar 451 Platform PID from Curtiss-Wright. |
This section provides information about the release packages associated with Cisco Enterprise NFVIS.
NFVIS Software Upgrade Image Details
The Cisco Enterprise NFVIS upgrade image is available as .iso file. Currently, downgrades are not supported.
For more details on the software upgrade, see the Upgrading Cisco Enterprise NFVIS section in the Cisco Network Function Virtualization Infrastructure Software Getting Started Guide.
Supported programs
The Cisco Meraki vMX solution is supported on Cisco's Enterprise NFV Infrastructure Software (NFVIS). For more information see, vMX Setup Guide for NFVIS.
Guest VNFs
This section provides support statements for different guest Virtual Network Functions (VNFs) that you can run on Cisco Routing virtual platforms that are enabled by the Cisco NFVIS Release 26.1.1.
Cisco Router VNFs
Note:
● Cisco provides deployment and configuration support for the VNF versions listed below, when these VNFs are deployed on Cisco Routing virtual platforms that are enabled by Cisco NFVIS Release 4.16.1.
● Cisco provides support on a case-by-case basis for unlisted combinations of Cisco NFVIS releases and VNF version combinations.
Table 6. Software Download Links
| Product Homepage |
Software Download |
| Cisco vEdge |
Table 7. Guest VM Compatibility matrix with NFVIS
| Platform |
NIC Type |
VM OS Kernel Driver Version |
VM OS DPDK Version |
| Cisco Catalyst 8200 Series Edge uCPE |
2.3.9.6 or higher (igbvf)
|
2.3.9.6 or higher (igbvf) |
DPDK 19.11 or higher
|
| Intel-l X553 1GbE for GEO-0 and GEO-1 |
4.9.3 or higher version (ixgbevf) |
DPDK 19.11 or higher |
|
| Cisco Catalyst 8300 Series Edge uCPE |
Intel E810 GEO-0 to GEO-6 |
iavf 4.18.7 or Higher |
DPDK 21.11.2 or higher |
| Cisco UCS C M5 and M6 Rack Servers |
|
4.9.3 or higher version (ixgbevf) |
DPDK 19.11 or higher |
| Cisco UCS C M6 Rack Servers |
UCSE-PCIE-1D 10GF (Intel X710-DA4 Quad port 10 GB) |
iavf 4.5.3 or higher |
DPDK 19.11 or higher |
| Cisco UCS C M6 Rack Servers |
Intel i350 Quad Port 1 GB Adapter |
2.3.9.6 or higher (igbuf) |
DPDK 19.11 or higher |
| Cisco UCS C M5 Rack Servers |
Intel i350-mLOM 1Gbps Network Controller |
4.18.0 or higher (igbvf) |
DPDK 19.11 or higher |
| Cisco UCS C M7 Rack Servers |
Cisco X710T2LG 2x10 GbE RJ45 OCP 3.0 NIC |
4.18.0 or higher (igbvf) |
DPDK 19.11 or higher |
Note: The last supported software release for ENCS5400 will be NFVIS 4.15 and Cisco IOS XE Catalyst SD-WAN Release 17.15.1a. For more information, see, ENCS 5400 EOL
Other Cisco Owned VNFs
Note:
● Limited testing is done to ensure you can create a guest VM instance using the software download image for these versions, as posted on Cisco Software download page.
● For full-support statement see the individual product release documentation.
The following section provides information about generic Linux Distro Images (Ubuntu 22.10 & Alma 8.6 or similar) that can be deployed on Cisco NFVIS Release 4.13.1. See the above table for details on the SRIOV driver that is required on the guest Linux VM based on the platform.
Table 8. Software Download Links
| Product Homepage |
Software Download |
| Security VNFs |
|
| WAN Optimization VNFs |
|
Non-Cisco Vendor Owned VNFs
You can run VNFs owned by various vendors on Cisco’s NFV platforms enabled by NFVIS . Formal support for these VNFs requires a joint effort between Cisco and the VNF vendor.
Cisco offers VNF vendors a "for-fee" NFVIS 3rd-party certification program to test and certify their VNFs on Cisco’s virtualized platforms. After testing and certification is complete, the results are published on this page-
For more specific support details about VNF versions and test compatibility matrix with NFVIS releases, see the VNF release documentation on the vendor support site.
As a NFVIS customer, if you need a unique combination of NFVIS release and a specific VNF version, you may submit your certification request to Cisco at nfv-ecosystem@cisco.com or reach out to the VNF vendor support team asking them to initiate a certification on the Cisco platform.
User documentation
● Cisco Network Function Virtualization Infrastructure Software Getting Started Guide
● Cisco Enterprise Network Function Virtualization Infrastructure Software Command Reference
● Design and Deployment Guide of Cisco NFVIS SD-Branch using Cisco SD-WAN Manager
● Configuration Guide for Cisco Network Plug and Play on Cisco APIC-EM, Release 1.5.x
Hardware documentation
● Cisco Catalyst 8200 Series Edge uCPE Data Sheet
● Cisco Cloud Services Platform 5000 Series Data Sheet
● Cisco 5400 Enterprise Network Compute System Hardware Installation Guide
● Cisco 5400 Enterprise Network Compute System Data Sheet
Release and compatibility information
Upgrade Matrix for Upgrading Cisco NFVIS
API documentation
● For information on NFVIS API documentation (NFVIS API release 4.14.1 and later), see NFVIS API
● For information on NFVIS API documentation (NFVIS API releases earlier than 4.14.1), see API Reference for Cisco Enterprise Network Function Virtualization Infrastructure Software
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2025 Cisco Systems, Inc. All rights reserved.