Cisco ACI Virtual Edge Release Notes, Release 1.2(6a)
This document describes the features, bugs, and limitations for the Cisco Application Centric Infrastructure (ACI) Virtual Edge Switch software.
Note: Use this document in combination with the Cisco Application Policy Infrastructure Controller (APIC) Release Notes, which you can view at the following location:
Release notes are sometimes updated with new information about restrictions and bugs. See this website for the most recent version of this document.
Table 1 shows the online change history for this document.
Table 1 Online History Change
| Date |
Description |
| 2019-05-08 |
Cisco ACI Virtual Edge Release 1.2(6a) became available. |
| 2021-03-25 |
Added bug CSCvq34172 to the Open Bugs section. |
This document includes the following sections:
Introduction: Cisco ACI Virtual Edge
Cisco ACI Virtual Edge Software Compatibility
Cisco ACI Virtual Edge is a hypervisor-independent distributed service virtual machine (VM) that is specifically designed for Cisco ACI. It leverages the native distributed virtual switch that belongs to the hypervisor. Cisco ACI Virtual Edge runs in the user space, operates as a virtual leaf, and is managed by Cisco APIC. If you use Cisco AVS, you can migrate to Cisco ACI Virtual Edge; if you use VMware VDS, you can run Cisco ACI Virtual Edge on top of it.
Cisco ACI Virtual Edge supports two modes of traffic forwarding: local switching and no local switching. The forwarding mode is selected during Cisco ACI Virtual Edge installation.
Cisco ACI Virtual Edge is supported as a vLeaf for Cisco APIC with the VMware ESXi hypervisor. It manages a data center defined by the VMware vCenter Server.
Cisco ACI Virtual Edge is compatible with any upstream physical access layer switch that complies with the Ethernet standard, including Cisco Nexus switches. Cisco ACI Virtual Edge is compatible with any server hardware listed in the VMware Hardware Compatibility Guide on the VMware website.
Cisco ACI Virtual Edge Release 1.2(6a) is supported as a vLeaf for Cisco APIC with releases 6.0 and later versions of the VMware ESXi hypervisor.
Cisco ACI Virtual Edge Release 1.2(6a) is compatible with Cisco APIC 3.2(6i) and later versions.
See the Cisco APIC and ACI Virtual Edge Support Matrix for details.
The Cisco ACI Virtualization Compatibility Matrix provides interoperability information for Cisco ACI components and configurations that have been tested and validated by Cisco, by Cisco partners, or both.
The Cisco APIC Versus ACI Virtual Edge Support Matrix is an interactive tool that enables you to choose an APIC version and view the compatible Cisco ACI Virtual Edge, vSphere, and compatible Cisco APIC versions.
You must use the Cisco ACI vCenter plug-in to upgrade Cisco ACI Virtual Edge. See the chapter "Cisco ACI Virtual Edge Upgrade" in the Cisco ACI Virtual Edge Installation Guide on Cisco.com for upgrade instructions.
If you use static or DHCP IP pools and want to upgrade Cisco ACI Virtual Edge, ensure that you have enough IP addresses. There must be more IP addresses in the static or DHCP pools than there are the in the Cisco ACI Virtual Edge service VMs in the data center in VMware vCenter. Otherwise, the upgrade of the new Cisco ACI Virtual Edge will fail.
Cisco ACI Virtual Edge provides most of the functionality of the Cisco AVS solution, including support VLAN and VXLAN encapsulation, Microsegmentation with Cisco ACI, and Distributed Firewall. Cisco ACI Virtual Edge also provides near-seamless migration from Cisco AVS and VMware VDS.
Note: When you install or configure Cisco ACI Virtual Edge, you may see Cisco ACI Virtual Edge options labeled Cisco AVE or AVE.
This section describes new of changed features in the Cisco ACI Virtual Edge Release 1.2(2a). There are no new features in Cisco ACI Virtual Edge releases 1.2(3a), 1.2(4a), and 1.2(6a).
Beginning with Cisco APIC Release 3.2(5d), the flood in encapsulation feature supports domains with the VXLAN encapsulation. Previously, the feature supported only domains with VLAN encapsulation. When you have bridge domain containing multiple EPGs, the flood in encapsulation enables you to limit traffic within individual EPGs associated with domains. Otherwise, broadcast traffic would go to all EPGs in the bridge domain.
You choose flood in encapsulation when you create or modify a bridge domain or EPG. For more information about the flood in encapsulation feature, see the section “Configuring Flood in Encapsulation for All Protocols and Proxy ARP Across Encapsulations” in the Bridging chapter of the Cisco ACI Layer 2 Network Configuration Guide on Cisco.com.
Beginning with Cisco APIC Release 3.2(5d), you can ensure that VMware VM groups are moved out of Cisco ACI Virtual Edge hosts when the hosts stop working. The configuration overrides any affinity groups that would otherwise keep the VMs with particular hosts.
For more information, see the section "VM Group Quarantine Protection" in the Cisco ACI Virtual Edge Installation Guide for Release 1.2(4) on Cisco.com.
Beginning with this release, VMware vSphere version 6.7 supports Cisco ACI Virtual Edge. VMware vSphere version 6.7 includes vCenter 6.7, ESXi 6.7, and DVS 6.6.
Beginning with the 1.2(1a) release, Cisco ACI Virtual Edge can deployed on a shared file system.
Beginning with the 1.2(1a) release, Layer 4 to Layer 7 service graphs are supported for Cisco ACI Virtual Edge. Layer 4 to Layer 7 services are supported only for routed mode in the initial release; there is no support for transparent mode. See the Cisco ACI Virtual Edge Configuration Guide, Release 1.2(1) for more information.
Beginning with the 1.2(1a) release, Cisco ACI Virtual Edge faults are reported in addition to faults for leaf and spine switches in the Cisco ACI fabric. See the knowledge base article, Cisco ACI Virtual Edge Health Status, for more information.
Beginning with the 1.2(1a) release, you can track the number of Cisco ACI Virtual Edge licenses on each host. For more information, see the Cisco ACI Virtual Edge Installation Guide, Release 1.2(1) for more information.
Beginning with the 1.2(1a) release, Cisco ACI Virtual Edge can be deployed on remote storage as well as local storage. A fault is raised in Cisco APIC when Cisco ACI Virtual Edge is disconnected from remote storage.
For Cisco ACI Virtual Edge scalability information, see the Verified Scalability Guide for Cisco ACI for the relevant Cisco APIC release.
L3 Multicast is not supported on bridge domains with endpoints after AVE.
Cisco ACI Virtual Edge is available only on the VMware hypervisor at initial release.
Cisco ACI Virtual Edge is supported only on VMware vSphere 6.0 and later versions.
Cisco ACI Virtual Edge is not supported for Cisco ACI Multi-Site environments.
· The server where you install Cisco ACI Virtual Edge must have an Intel Nehalem CPU or later. You also must set the cluster Enhanced vMotion Compatibility (EVC) to a Nehalem CPU or later. See the knowledge base article Enhanced vMotion Compatibility (EVC) processor support (1003212) on the VMware web site.
· We recommend that you install only one Cisco ACI Virtual Edge virtual machine (VM) on each host.
· Removing Cisco ACI Virtual Edge or the ESXi host from the VMware vCenter and then adding it back in is not supported. If you do that, Cisco ACI Virtual Edge loses password, infra VLAN, IP address, and other key configurations. You should instead delete the original Cisco ACI Virtual Edge and deploy a new one.
· After you deploy Cisco ACI Virtual Edge, if the Cisco ACI Virtual Edge VM is moved across VMware vCenter, all the configurations that you made during deployment are lost.
The Cisco ACI Virtual Edge management interface must have an IPv4 address. It can have an additional IPv6 address, but you cannot configure it with only an IPv6 address.
vMotion is supported for endpoints but not supported for Cisco ACI Virtual Edge itself.
Note: After you migrate VMs using cross-data center VMware vMotion in the same VMware vCenter, you may find a stale VM entry under the source DVS. This stale entry can cause problems, such as host removal failure. The workaround for this problem is to enable "Start monitoring port state" on the vNetwork DVS. See the KB topic "Refreshing port state information for a vNetwork Distributed Virtual Switch" on the VMware Web site for instructions.
The following features are not supported for Cisco ACI Virtual Edge with multipod in the Cisco APIC 1.2(6a) release:
· Storage vMotion with two separate NFS in two separate PODs
· ERSPAN destination in different PODs
· Distributed Firewall syslog server in different PODs
When you set EPG resolution immediacy, Cisco ACI Virtual Edge does not support pre-provisioning, which downloads a policy to a switch before the switch is installed.
Permission Denied for some Files on vem support with Admin Login
When you log in as an administrator, you may be denied some files when you enter a vem-support command. However, you can get permission if you log in as root.
Brief Delay Possible When Switching EPG from Native to AVE Mode
Changing the switching mode from Native to AVE (Cisco ACI Virtual Edge) on an EPG requires changing the underlying switching platform from regular VMware DVS to Cisco ACI Virtual Edge. It also requires moving all the associated ports from DVS to Cisco ACI Virtual Edge.
This operation requires reprogramming of the port group associated with that EPG. That in turn requires a VMware vCenter operation. This operation may take a few seconds to complete and for ports to show up in forwarding state on the Cisco ACI Virtual Edge switching platform. It length of time depends on the VMware vCenter load as well as the number of endpoints that reside on the EPG that is being moved from Native to AVE mode.
Table 2 lists the open bugs in Cisco ACI Virtual Edge Release 1.2(6a):
Table 2 – Open Cisco ACI Virtual Edge bugs
| Bug ID |
Headline |
| Port removed on source ACI Virtual Edge on vMotion failure event causing traffic loss |
|
| Bulk vMotion of 50 or more ports per host incurs delays for ports to come to FORWARD state |
|
| Cisco ACI Virtual Edge has a stale endpoint when vMotion is done when TOR is down |
|
| Stale endpoint: VM moves in and out of Cisco ACI Virtual Edge when OpFlex is down |
|
| Cisco AVS/Cisco ACI Virtual Edge/VMware VDS: vMotion across TOR/PG can cause multicast traffic loss up to querier interval configured |
|
| Cisco ACI Virtual Edge deployment with PowerCLI not putting the host back in maintenance mode |
|
| Cisco ACI Virtual Edge moves to different host when we power off to enter host in maintenance mode |
|
| Cisco ACI Virtual Edge: Changing memory reservation from 3G to 4G |
The compatible Cisco APIC version contains bug fixes; see the Cisco APIC Release Notes.
Table 3 lists the resolved bugs in the Cisco ACI Virtual Edge Release 1.2(6a):
Table 3 – Closed Cisco ACI Virtual Edge bugs
| Bug ID |
Headline |
| Ports not freed and gets exhausted on continuous vMotion while moving between microsegments |
|
| Headless vMotion: Fails to attach EPs while existing EPs wait for inventory |
|
| Cisco ACI Virtual Edge is not correctly handling less than 60-byte Ethernet frame |
|
| Cisco ACI Virtual Edge fails to send epp igmp joins for more than 20 groups |
|
| Cisco ACI Virtual Edge domain not getting deployed on VMware vCenter |
Cisco ACI Virtual Edge documentation is available at the following URL:
Cisco APIC documentation is available at the following URL:
Cisco APIC documentation includes the Cisco ACI Virtualization Guide, which provides detailed information about Distributed Firewall and Microsegmentation with Cisco AVS.
To provide technical feedback on this document or report an error or omission, please send your comments to avs-docfeedback@cisco.com. We appreciate your feedback.
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, see What's New in Cisco Product Documentation at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html.
Subscribe to What's New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2018-2021 Cisco Systems, Inc. All rights reserved.