Cisco Application Policy Infrastructure Controller Release Notes, Release 3.1(1)
The Cisco Application Centric Infrastructure (ACI) is an architecture that allows the application to define the networking requirements in a programmatic way. This architecture simplifies, optimizes, and accelerates the entire application deployment lifecycle. Cisco Application Policy Infrastructure Controller (APIC) is the software, or operating system, that acts as the controller.
The Cisco Application Centric Infrastructure Fundamentals guide provides complete details about the Cisco ACI, including a glossary of terms that are used in the Cisco ACI.
This document describes the features, bugs, and limitations for the Cisco APIC.
Note: Use this document with the Cisco Nexus 9000 ACI-Mode Switches Release Notes, Release 13.1(1), which you can view at the following location:
Release notes are sometimes updated with new information about restrictions and bugs. See the following website for the most recent version of this document:
You can watch videos that demonstrate how to perform specific tasks in the Cisco APIC on the Cisco ACI YouTube channel:
https://www.youtube.com/c/CiscoACIchannel
For the verified scalability limits (except the CLI limits), see the Verified Scalability Guide for this release.
For the CLI verified scalability limits, see the Cisco NX-OS Style Command-Line Interface Configuration Guide for this release.
You can access these documents from the following website:
Table 1 shows the online change history for this document.
Table 1 Online History Change
Date |
Description |
December 9, 2022 |
In the Open Bugs section, added bug CSCvw33061. |
August 29, 2022 |
In the Miscellaneous Compatibility Information section, for CIMC HUU ISO, added 3.0(3f). |
February 3, 2021 |
In the Miscellaneous Compatibility Information section, for CIMC HUU ISO, deleted the bullets that mentioned APIC-M3 and APIC-M4. These servers are not supported in this release. |
October 4, 2019 |
In the Miscellaneous Guidelines section, added the following bullet: ■ When you create an access port selector in a leaf interface rofile, the fexId property is configured with a default value of 101 even though a FEX is not connected and the interface is not a FEX interface. The fexId property is only used when the port selector is associated with an infraFexBndlGrp managed object. |
October 3, 2019 |
In the Miscellaneous Guidelines section, added the bullet that begins as follows: ■ Fabric connectivity ports can operate at 10G or 25G speeds (depending on the model of the APIC server) when connected to leaf switch host interfaces. |
September 17, 2019 |
3.1(1i): In the Open Bugs section, added bug CSCuu17314, CSCve84297, and CSCvg70246. |
August 5, 2019 |
3.1(1i): In the Open Bugs section, added bug CSCvj76503. |
November 21, 2018 |
3.1(1i): In the Open Bugs section, added bug CSCvn15374. |
September 21, 2018 |
In the New Software Features section, for the tracking service nodes with policy-based redirect and support for hashing algorithms feature, specified that the feature is supported only on EX and FX switches. |
September 18, 2018 |
In the Changes in Behavior section, added the following bullet: ■ The ACI Optimizer feature is deprecated. |
June 7, 2018 |
3.1(1i): In the Open Bugs section, added bug CSCvj75897. |
March 30, 2018 |
In the New Software Features section, for the " Configuring flood in encapsulation for all protocols and proxy ARP across encapsulations" feature, changed " Application Spine Engine (ASE)" to "Application Leaf Engine (ALE)." In the Miscellaneous Compatibility Information section, changed the Cisco AVS release to 5.2(1)SV3(3.20) and added Cisco ACI Virtual Edge 1.1(1a). |
March 12, 2018 |
In the New Software Features section, removed the following item: Cisco ACI Multi-Site support on the Cisco N9K-C9364C switch and N9K-C9508-FM-E2 and N9K-C9516-FM-E2 fabric modules This text was erroneously included. |
February 16, 2018 |
In the New Software Features section, for the fast link failover policy feature, added the following limitation: This feature is not support with port profiles nor remote leaf switches. When the Fast Link Failover policy is enabled, configuring SPAN on individual uplinks does not work. |
February 15, 2018 |
In the New Software Features section, added Read-Only Mode VMM Domain for VMware VDS. |
February 9, 2018 |
In the New Software Features section, added the following items: Cisco Tetration Analytics support for network performance, monitoring, and diagnostic Cisco Tetration Analytics support on the Cisco Nexus 9500-series switches with the N9K-X9736C-FX linecard Removed the following item because the feature was added in the 3.0(1) release: Cisco Tetration Analytics support on the Cisco N9K-C9348GC-FXP switch |
February 7, 2018 |
In the Changes in Behavior section, added the following bullet: ■ The following global policies were moved from the Fabric tab > Access Policies subtab > Global Policies folder to the System tab > System Settings subtab: … |
January 3, 2018 |
Modification in New Software Features: Added note. Multipod and Cisco ACI Multi-Site together are not yet supported on Cisco N9K-C9364C switch. |
December 22, 2017 |
3.1(1i): Release 3.1(1i) became available. |
This document includes the following sections:
■ Upgrade and Downgrade Information
■ Bugs
This section lists the new and changed features in this release and includes the following topics:
The following table lists the new software features in this release:
Table 2 New Software Features, Guidelines, and Restrictions
Description |
Guidelines and Restrictions |
|
Active sessions |
This release adds support for monitoring GUI user active sessions. This feature is located under the System > Active Sessions tab. See the Cisco APIC online help for more information. |
None. |
Additional NAT firewall public IP addresses for a VRF instance |
You can allocate additional public IP addresses for use with NAT rules. You can request this public IP address from any EPG where NAT is enabled, so it is available for all EPGs in the VRF instance. |
We recommend that the destination IP address of the NAT rule points only to an endpoint within the EPG and not somewhere else in the VRF instance. |
BFD support on spine switches |
This release adds support for Bidirectional Forwarding Detection (BFD) on spine switch. For more information, see the Cisco APIC Layer 3 Networking Configuration Guide. |
None. |
Cisco Application Centric Infrastructure Virtual Edge |
This release supports Cisco ACI Virtual Edge, the next generation of the Application Virtual Switch (AVS) for Cisco ACI environments. Cisco ACI Virtual Edge is a hypervisor-agnostic distributed virtual switch that runs in the user space as a service VM. It operates as a virtual leaf switch and is managed by the Cisco Application Policy Infrastructure Controller (APIC). If you use VMware VDS or Cisco AVS, you can migrate to Cisco ACI Virtual Edge and can also run Cisco ACI Virtual Edge on top of the existing VMware VDS. Decoupling the Cisco ACI Virtual Edge from the kernel space makes Cisco ACI Virtual Edge adaptable to different hypervisors. It also facilitates upgrades because Cisco ACI Virtual Edge is no longer tied to hypervisor upgrades. For more information, see the Cisco ACI Virtual Edge Release Notes. |
■ Cisco ACI Virtual Edge is available only on the VMware hypervisor. ■ Cisco ACI Virtual Edge is supported with the latest VMware vSphere 6.0 build and later releases. ■ We you can install only one Cisco ACI Virtual Edge VM per host. ■ You should deploy Cisco ACI Virtual Edge on a local disk on the host. ■ VXLAN load-balancing will be supported after Cisco ACI Virtual Edge initial release. ■ The Cisco ACI Virtual Edge management interface must have an IPv4 address. It can optionally have an additional IPv6 address, but you cannot configure it only with an IPv6 address. |
Cisco Tetration Analytics support for network performance, monitoring, and diagnostic |
The Tetration platform uses rich dataplane telemetry from hardware sensors to provide network performance, monitoring, and diagnostics capability on a Cisco ACI fabric. The following features require Cisco Nexus 9300-FX switches and Cisco Nexus 9500 series switches with N9K-X9736C-FX linecards in the Cisco ACI mode: ■ Per queue and per link aggregate stats on: bandwidth, packet drop indicators, average and max latency ■ Maps flows to link topology and queue ■ Network topology visualization and drill down ■ End-to-end fabric view per flow ■ Per hop view of a flow ■ Time-series view for all the performance indicators including network topology |
None. |
Cisco Tetration Analytics support on the Cisco Nexus 9500-series switches with the N9K-X9736C-FX linecard |
Cisco Tetration Analytics telemetry is now supported on the Cisco Nexus 9500-series switches with the N9K-X9736C-FX linecard. |
None. |
Cloud Foundry integration |
Cloud Foundry integration with Cisco ACI is a beta feature that is visible in the Cisco APIC GUI. |
This feature is not supported in this release. Contact Cisco for information about this feature. |
Cloud Orchestrator Mode |
This feature Provides a Loadbalancer-as-a-Service (LBaaS) and a Firewall-as-a-Service (FWaaS) interface to enable a standard set of parameters that creates a unified interface for configuring load balancers and firewalls in a service graph. For more information, see the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide. |
None. |
Configuring flood in encapsulation for all protocols and proxy ARP across encapsulations |
In this release, on the Cisco ACI switches with the Application Leaf Engine (ALE), all protocols are flooded in encapsulation. Multiple EPGs are now supported under one bridge domain with an external switch. When two EPGs share the same bridge domian and the Flood in Encapsulation option is turned on, the EPG flooding traffic does not reach the other EPG. It overcomes the challenges of using the Cisco ACI switches with the Virtual Connect (VC) tunnel network. For more information, see the Cisco APIC Layer 2 Networking Configuration Guide. |
None. |
Control plane policing (CoPP) per interface per protocol |
A CoPP configuration is now supported on a per interface and per protocol basis. The protocols supported are ARP, ICMP, CDP, LLDP, LACP, BGP, STP, BFD, and OSPF. For more information, see the Cisco APIC Security Configuration Guide. |
None. |
Control plane policing (CoPP) prefilter |
To protect against DDoS attacks, a CoPP prefilter profile is used on spine and leaf switches to filter access to authentication services based on specified sources and TCP ports. When the CoPP prefilter profile is deployed on a switch, the control plane traffic is denied by default. Only the traffic specified in the CoPP prefilter profile is permitted. For more information, see the Cisco APIC Security Configuration Guide. |
■ Only Ethernet type IPv4 or IPv6 packets can be matched in the egress TCAM. ARP and ND packets are not matched. ■ A total of 128 (wide key) entries can be included in the allowed list. However, some entries are reserved for internal use. |
Converting uplink ports and downlink ports |
Uplink and downlink conversion is supported on Cisco Nexus 9000-series switches with names that end in EX or FX, such as the N9K-C93180YC-EX switch. A FEX can be connected to a converted downlink ports. For more information, see the Cisco Application Centric Infrastructure Fundamentals document. |
None. |
EthType IPv4 and IPv6 support |
This release adds support for the IPv4 and IPv6 ARP security filter type. |
None. |
Fast link failover policy |
A fast link failover policy is applicable to uplinks on Cisco N9K-C93180YC-EX and N9K-C93180YC-FX platforms only. The policy efficiently load balances the traffic based on the uplink MAC status. With this functionality, the switch performs Layer 2 or Layer 3 lookup and it provides an output Layer 2 interface (uplinks) based on the packet hash algorithm by considering the uplink status. This functionality reduces the data traffic convergence to less than 10 milliseconds. |
This feature is not support with port profiles nor remote leaf switches. When the Fast Link Failover policy is enabled, configuring SPAN on individual uplinks does not work. |
Favorites |
You can now bookmark commonly-used GUI pages, which you can then access quickly from the Manage my profile > Favorites menu. You bookmark a page by clicking the star icon in the upper right of the page. |
Not all pages can be bookmarked. |
FIPS SHA1 key support |
When Federal Information Processing Standards (FIPS) is enabled, SHA1 key is supported for NTP authentication. |
None. |
First-hop security |
Starting with Cisco AVS release 5.2(1)SV3(3.20), the first-hop security (FHS) feature is supported. The FHS feature set provides improved management and IPv4 link security over the Layer 2 links. In a service provider environment, FHS controls address assignment and derived operations, such as duplicate address detection (DAD) and address resolution (AR). Cisco AVS is an FHS policy enforcer for virtual endpoints. FHS includes the following security features: IP address inspection, source guard, and ARP learning. |
■ FHS enforcement is not supported for IPv6 address family on AVS. ■ FHS is not supported with micro-segmentation. ■ FHS endpoint entry is not retained when a port is detached and attached to VMware vCenter. ■ Cisco AVS does not detect duplicate addresses across ESX hosts. ■ A static virtual endpoint (vep) configuration is required when VMware fault tolerance is enabled for virtual machines with trust ports. |
High dual stack |
The high dual stack option was added to the forwarding scale profile policy to provide scalability of up to 24k endpoints for IPv6 configurations and up to 64k endpoints for IPv4 configurations. This option also increases the LPM scale to 38K for both IPv4 and IPv6. For more information, see the Cisco APIC Forwarding Scale Profile Policy document. |
■ The high dual stack profile reduces the policy scale to 8k. ■ High dual stack does not support multicast. ■ Switches configured with high dual stack must be manually reloaded to enable the profile. |
ICMP tracking support |
TCP and ICMP protocol types are now used to track the Redirect Destination node. For more information, see the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide. |
None. |
IP SLA monitoring support |
Switches internally use the Cisco IP SLA monitoring feature to support policy-based redirect (PBR) tracking. For more information, see the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide. |
None. |
Launch Stats |
You can view the stats of a specific physical interface by going to the Fabric > Inventory tab, then navigating to pod_name > leaf_name > Interfaces. Click the button in the Stats column that corresponds to the desired interface. |
None. |
Layer 3 multicast support for Fabric Extenders |
Multicast sources or receivers connected to Fabric Extender (FEX) ports are supported. For more information, see the Cisco APIC Layer 3 Networking Configuration Guide. |
None. |
LDAP group map |
The LDAP group map feature enables you to add LDAP configurations using active directory (AD) groups in place of Cisco attribute-value (AV) pairs. For more information, see the Cisco APIC Security Configuration Guide. |
This feature does not require making changes to the LDAP server for use with the Cisco APIC. |
Location-aware policy-based redirect |
When you enable location-aware redirection and you specify Pod IDs, all of the redirect destinations in the Layer 4 to Layer 7 policy-based redirect policy will have pod awareness. For more information, see the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide. |
None. |
MACsec support |
MACsec provides MAC-layer encryption over wired networks by using out-of-band methods for encryption keying. The MACsec Key Agreement (MKA) Protocol provides the required session keys and manages the required encryption keys. For more information, see the Cisco APIC Layer 2 Networking Configuration Guide. |
None. |
Multipod support on the Cisco N9K-C9364C switch and N9K-C9508-FM-E2 and N9K-C9516-FM-E2 fabric modules |
This release adds support for multipod on the Cisco N9K-C9364C switch and N9K-C9508-FM-E2 and N9K-C9516-FM-E2 fabric modules. Note: Multipod and Cisco ACI Multi-Site together are currently not supported on the Cisco N9K-C9364C switch. |
None. |
Nesting in VMware for OpenShift and Kubernetes |
This release adds support for nesting in VMware for OpenShift and Kubernetes. |
None. |
NTP Authentication support |
This release adds support for HMAC-NTP authentication. For more information, see the Cisco APIC Basic Configuration Guide. |
None. |
NTP server |
This feature enables client switches to act as NTP servers to provide NTP time information to downstream clients. For more information, see the Cisco APIC Basic Configuration Guide. |
None. |
OpenShift support for containers on Cisco ACI |
This release introduces native Cisco ACI support for container orchestration systems. This support includes the following features: ■ Containers have direct access to the ACI policy model. ■ Containers, VMs, and physical devices have seamless integration on a Cisco ACI fabric. ■ Cisco APIC supports native policy semantics. ■ Key network capabilities are provided to operate in this ecosystem. In particular, there is load balancing for both internal and external services. |
None. |
Policy-based redirect support for service nodes in consumer and provider bridge domains |
Bridge domains that contain a consumer or provider also support service nodes. Therefore, you are not required to provision separate service node bridge domains any longer. For more information, see the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide. |
None. |
Port configuration improvements |
In the GUI, port configuration is improved to show operation and configuration. When you view a leaf switch within a pod under Fabric > Inventory, you can now click on a port to see information about that port. See the Cisco APIC online help for more information. |
None. |
Quick Start workflows for setting up node, remote leaf switch, and multipod |
This release includes Quick Start workflows for setting up node, remote leaf switch, and multipod. You can now access the workflows by navigating to Fabric > Inventory, then expanding Quick Start. For more information, see the Cisco APIC Layer 3 Networking Configuration Guide. |
None. |
Read-Only Mode VMM Domain for VMware VDS |
This release adds support for creating a read-only mode VMM domain for VMware VDS. This enables you to view information about a DVS in VMware vCenter that is not managed by the Cisco APIC. You create a read-only VMM domain by setting the access mode when you create the domain. |
■ If you want to create a read-only VMM domain, the domain must have the same name as the DVS in VMware vCenter, and the DVS must be inside a network folder with the same name. ■ You can associate EPGs to a read-only VMM domain and apply policies to it. However, the policies are not pushed to the DVS in VMware vCenter. ■ Faults are not raised for a read-only VMM domain. |
Red Hat virtualization support |
This release supports Red Hat Virtualization (RHV) integration. RHV--formerly Red Hat Enterprise Virtualization--is an open-source virtualization solution. It is based on the Kernel-based Virtual Machine (KVM) hypervisor and the oVirt management platform. It includes the RHV host and the RHV manager (RHVM). |
The concept of endpoint groups in Cisco ACI is equivalent to a network in RHV. We recommend that you use RHV release 4.1.6 or later. |
Remote leaf switches |
With a Cisco ACI fabric deployed, you can extend Cisco ACI services and Cisco APIC management to remote data centers with Cisco ACI leaf switches that have no local spine switch or Cisco APIC attached. All policies deployed in the main data center are deployed on the remote switches, which behave like local leaf switches belonging to a pod. For more information, see the Cisco APIC Layer 3 Networking Configuration Guide. |
If you have remote leaf switches deployed, if you downgrade the Cisco APIC software from release 3.1(1) or later to an earlier release that does not support the remote leaf feature, you must decommission the nodes before downgrading. For more information on decommissioning switches, see “Decommissioning and Recommissioning Switches” in the Cisco APIC Troubleshooting Guide. |
Role-based access control integration for Cisco ACI VMware vCenter plug-in |
Starting with this release, the Cisco ACI VMware vCenter plug-in supports enhanced role-based access control (RBAC) based on Cisco APIC user roles and security domains. |
None. |
RSA secure ID |
This feature provides token-based password authentication. For more information, see the Cisco APIC Security Configuration Guide. |
None. |
Shared GOLF |
For Cisco APIC sites in a Cisco ACI Multi-Site topology, if stretched VRF instances share GOLF connections, guidelines are provided to avoid the risk of cross-VRF traffic issues. For more information, see the “Cisco ACI GOLF” chapter in the Cisco APIC Layer 3 Networking Configuration Guide. |
None. |
SNMP Trap Aggregation |
The SNMP trap aggregation feature allows SNMP traps from the fabric nodes to be delivered to one of the Cisco APICs in the cluster and allows the forwarding of SNMP traps received from the fabric nodes to the external destination. For more information, see the Cisco APIC Basic Configuration Guide. |
If you decommission Cisco APICs, the trap forward server will receive redundant traps. |
Support for the deny action and the relative ordering of entries in the OSPF import route map |
OSPF import route map has been enhanced to support the deny action in addition to the permit action. You can also create permit and deny entries in a specified order. |
None. |
Switch Virtual Interface (SVI) auto state |
You can now enable the SVI auto state behavior. This allows the SVI state to be in the down state when all the ports in the VLAN go down. |
None. |
Tracking service nodes with policy-based redirect and support for hashing algorithms |
The policy-based redirect feature (PBR) supports tracking service nodes and PBR also supports specific hashing algorithms. For more information, see the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide. |
This feature is supported only on EX and FX switches. |
The following are changes in behavior for this release:
■ The Basic GUI mode is deprecated. The Cisco APIC Basic mode is no longer available.
■ The ACI Optimizer feature is deprecated.
■ In the GUI, when viewing a tenant, the Security Policies folder in the Navigation pane is now named Contracts. The Contracts folder contains the following subfolders: Standard, Taboos, Imported, and Filters.
■ The Navigation pane folders of the Tenants tab and Virtual Networking tab have been restructured to reduce the number of folders.
■ The following global policies were moved from the Fabric tab > Access Policies subtab > Global Policies folder to the System tab > System Settings subtab:
— BGP Reflector Node Endpoints
— BGP Route Reflector Policy
— Configure Port Type as Uplink or Downlink
— Coop Group Policy
— Disable Remote Endpoint Learning
— Enable OpFlex Client Authentication
— Endpoint Loop Protection
— Enforced BD Exception List
— Fabric Wide Control Plane MTU
— Global System GIPo Policy
— Globally Enforce Domain Validation
— Globally Enforce Subnet Checks
— In-Band or Out-of-Band Preferences
— IP Aging
— Load Balancer Policy
— Quota Policy
For upgrade and downgrade considerations for the Cisco APIC, see the Cisco APIC documentation site at the following URL:
See the "Upgrading and Downgrading the Cisco APIC and Switch Software" section of the Cisco APIC Installation, Upgrade, and Downgrade Guide.
This section contains lists of open and resolved bugs and known behaviors.
This section lists the open bugs. Click the bug ID to access the Bug Search tool and see additional information about the bug. The "Exists In" column of the table specifies the 3.1(1) releases in which the bug exists. A bug might also exist in releases other than the 3.1(1) releases.
Table 3 Open Bugs in This Release
Bug ID |
Description |
Exists in |
CDP is not enabled on the management interfaces for the leaf switches and spine switches. |
3.1(1i) and later |
|
The stats for a given leaf switch rule cannot be viewed if a rule is double-clicked. |
3.1(1i) and later |
|
The Port ID LLDP Neighbors panel displays the port ID when the interface does not have a description. Example: Ethernet 1/5, but if the interface has description, the Port ID property shows the Interface description instead of the port ID. |
3.1(1i) and later |
|
A service cannot be reached by using the APIC out-of-band management that exists within the 172.17.0.0/16 subnet. |
3.1(1i) and later |
|
When using mongoDB for Cisco ACI apps, the app must be deleted before the upgrade and reinstalled after the upgrade to avoid corruption of application data. |
3.1(1i) and later |
|
This enhancement is to change the name of "Limit IP Learning To Subnet" under the bridge domains to be more self-explanatory. Original : Limit IP Learning To Subnet: [check box] Suggestion : Limit Local IP Learning To BD/EPG Subnet(s): [check box] |
3.1(1i) and later |
|
A route will be advertised, but will not contain the tag value that is set from the VRF route tag policy. |
3.1(1i) and later |
|
This issue occurs while using the import-config file command on the CLI where the file is the output of export-config command. The file contains the output of show running-config of the scope where export-config was executed. The error occurs only when the file contains crypto commands, the Bash shell throws the error and hangs without returning the prompt. |
3.1(1i) and later |
|
A tenant's flows/packets information cannot be exported. |
3.1(1i) and later |
|
When the IS-IS to OSPF Multi-Site CPTEP route leaking is not programmed, inter-site BGP session might go down on the spine switch. This behavior might cause traffic drop. |
3.1(1i) and later |
|
Requesting an enhancement to allow exporting a contract by right clicking the contract itself and choosing "Export Contract" from the right click context menu. The current implementation of needing to right click the Contract folder hierarchy to export a contract is not intuitive. |
3.1(1i) and later |
|
The zoning rule installation incorrectly permitted all of the traffic to and from the L3Out to EPG as the default permit without redirecting the traffic to the service node. |
3.1(1i) and later |
|
In the leaf mode, the command "template route group <group-name> tenant <tenant-name>" fails, declaring that the tenant passed is invalid. |
3.1(1i) and later |
|
A fault for a 100% drop rate is observed for an endpoint-to-external IP address atomic counters policy after disabling/enabling a switch. |
3.1(1i) and later |
|
An external IP address-to-external IP address atomic counters policy does not give the results for the flow that matches the configured external IP addresses. |
3.1(1i) and later |
|
Clicking the Submit button in a wizard will fail if any of the entered values are invalid. |
3.1(1i) and later |
|
If a service graph is initially configured as uni-directional and later a filter is added and the service graph is made bi-direction, the service graph enters a faulty state. |
3.1(1i) and later |
|
When two different service chains (one for IPv4 traffic and the other for IPv6 traffic) are using the same exact forwarding path (the same bridge domain and VLAN on the service nodes), but different redirect policies (one for IPv4 and the other for IPv6), then the IP SLA objects might not be cleaned up when the contract is detached from the service graph. |
3.1(1i) and later |
|
When configuring an L3Out under a user tenant that is associated with a VRF instance that is under the common tenant, a customized BGP timer policy that is attached to the VRF instance is not applied to the L3Out (BGP peer) in the user tenant. |
3.1(1i) and later |
|
A newly-created VFC shows the admin state as down. |
3.1(1i) and later |
|
A service graph is in the applied state even if the VRF instance associated with the consumer EGP or consumer-facing service node EPG gets deleted. |
3.1(1i) and later |
|
In Cloud Orchestrator Mode, dual stack (that is, IPv4 and IPv6) cannot be configured on the same interface. |
3.1(1i) and later |
|
For strict security requirements, customers require custom certificates that have RSA key lengths of 3072 and 4096. |
3.1(1i) and later |
|
Cisco ACI Multi-Site Orchestrator BGP peers are down and a fault is raised for a conflicting rtrId on the fvRtdEpP managed object during L3extOut configuration. |
3.1(1i) and later |
|
Whenever a user expands a drop-down list that has many policies (>10K), the GUI tries to show all of them at once, which causes a timeout from the server, after which the server tries again. This process continues and the GUI becomes unresponsive. |
3.1(1i) and later |
|
The Cisco AVS DPA process might crash on AVS after upgrading to a 3.1.x release. This does not always occur. When it does occur, the DPA process restarts automatically. |
3.1(1i) and later |
|
There is an exhaustion of LPM entries due to the programming of an unnecessary EPG subnet gateway IP address. |
3.1(1i) and later |
|
With a 0.0.0.0/0 subnet and a specific subnet with an import route-map, the GUI shows only a 212.1.0.0/24 subnet. |
3.1(1i) and later |
|
A remote leaf switch TEP pool is not getting deleted if the remote leaf switches are decommissioned before deleting the vPC. |
3.1(1i) and later |
|
On importing an exported configuration, the import will succeed and might report a warning about a failure to extract the CISCO.CloudMode.1.0.zip archive. If the CISCO.CloudMode.1.0 device package was deleted, it will not be restored on import. |
3.1(1i) and later |
|
The IpCktEp policy might not be propagated to the leaf switch even after the policy has been configured properly on the Cisco APIC. |
3.1(1i) and later |
|
There will be fault in the Cisco APIC for a remote leaf switch after upgrading the Cisco APIC upgrade or decommissioning and recommissioning the Cisco APIC. |
3.1(1i) and later |
|
There are duplicate CoPP rules in the TCAM. |
3.1(1i) and later |
|
In the case where the user posts policies to download a specific image version and also to upgrade to that version in quick succession before waiting for the image to get downloaded, the current running catalog gets picked up for checking the compatibility. In the event where the current running catalog does not support the newly requested version of the image, the upgrade will fail with the message "version not compatible," even though the user would expect compatibility. |
3.1(1i) and later |
|
The Cisco APIC will not allow the deletion of a remote leaf switch or POD TEP pool if there are any dhcpClient managed objects present with an IP address that is assigned from that TEP pool. |
3.1(1i) and later |
|
There is an issue with upgrading in the following situation: ■ A node is decommissioned a few hours before initiating an upgrade. ■ An upgrade is triggered with the "doNotPause" flag turned on in the maintenance group. ■ The node is in the maintenance group that is being upgraded. In this situation, the upgrade stalls while waiting for that node to complete the upgrade. |
3.1(1i) and later |
|
If many unreachable stats export destinations are configured, the observer element on a switch might dump a core and restart. |
3.1(1i) and later |
|
On decommissioning and recomissioning of the Cisco APICs or nodes, extra prefix white list entries might be created on the TOR switches. |
3.1(1i) and later |
|
An iACL entry with a subnet mask of 0 or 32 is not allowed in the CoPP Pre-Filter creation wizard in the GUI. |
3.1(1i) and later |
|
This is an enhancement to allow for text-based banners for the Cisco APIC GUI login screen. |
3.1(1i) and later |
|
Enabling Multicast under the VRF on one or more bridge domains is difficult due to how the drop-down menu is designed. This is an enhancement request to make the drop-down menu searchable. |
3.1(1i) and later |
|
The APIC log files are extremely large, which takes a considerable amount of time to upload, especially for users with slow internet connectivity. |
3.1(1i) and later |
|
When authenticating with the Cisco APIC using ISE (TACACS), all logins over 31 characters fail. |
3.1(1i) and later |
|
A fault is raised that specifies problem that occurred while retrieving tagging information for a VMM controller. Inventory pull from the VMware vCenter takes a long time (>10 minutes) and it continuously completes with a partial inventory result. The processing of events from VMware vCenter is delayed, which may result in delays for the downloading of policies to the leaf switches when EPGs are deployed on-demand at the VMM domain. This would affect connectivity for newly deployed VMs or VMs which have been vMotioned. |
3.1(1i) and later |
|
A maintenance window triggered for an upgrade remains active for an unlimited time. Adding another node to this maintenance window automatically upgrades this newly added node. In some releases, such as 3.1(1i), a message may say that the window is triggered from X to Y time period; however, the maintenance window is still active for an unlimited time. |
3.1(1i) and later |
|
An SHA2 CSR for the ACI HTTPS certificate cannot be configured in the APIC GUI. |
3.1(1i) and later |
|
When upgrading Cisco APICs, constant heartbeat loss is seen, which causes the Cisco APICs to lose connectivity between one another. In the Cisco APIC appliance_director logs, the following message is seen several hundred times during the upgrade: appliance_director||DBG4||...||Lost heartbeat from appliance id= ... appliance_director||DBG4||...||Appliance has become unavailable id= ... On the switches, each process (such as policy-element) see rapidly changing leader elections and minority states: adrs_rv||DBG4||||Updated leader election on replica=(6,26,1) |
3.1(1i) and later |
|
A vulnerability in the fabric infrastructure VLAN connection establishment of the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, adjacent attacker to bypass security validations and connect an unauthorized server to the infrastructure VLAN. The vulnerability is due to insufficient security requirements during the Link Layer Discovery Protocol (LLDP) setup phase of the infrastructure VLAN. An attacker could exploit this vulnerability by sending a malicious LLDP packet on the adjacent subnet to the Cisco Nexus 9000 Series Switch in ACI mode. A successful exploit could allow the attacker to connect an unauthorized server to the infrastructure VLAN, which is highly privileged. With a connection to the infrastructure VLAN, the attacker can make unauthorized connections to Cisco Application Policy Infrastructure Controller (APIC) services or join other host endpoints. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-n9kaci-bypass |
3.1(1i) and later |
|
An APIC running the 3.0(1k) release sometimes enters the "Data Layer Partially Diverged" state. The acidiag rvread command shows the following output for the service 10 (observer): Non optimal leader for shards :10:1,10:3,10:4,10:6,10:7,10:9,10:10,10:12,10:13,10:15,10:16,10:18,10:19,10:21,10:22,10:24,10:25, 10:27,10:28,10:30,10:31 |
3.1(1i) and later |
|
When opening an external subnet, a user cannot see Aggregate Export/Import check boxes set in GUI even though they were already configured. |
3.1(1i) and later |
|
Under a corner case, the Cisco APIC cluster DB may become partially diverged after upgrading to a release that introduces new services. A new release that introduces a new DME service (such as the domainmgr in the 2.3 release) could fail to receive the full size shard vector update in first two-minute window, which causes the new service flag file to be removed before all local leader shards are able to boot into the green field mode. This results in the Cisco APIC cluster DB becoming partially diverged. |
3.1(1i) and later |
|
The last APIC in the cluster gets rebooted when APIC-1 is decommissioned due to some issue seen on APIC-1 while upgrading. In addition, after decommissioning APIC-1, the other APICs still wait for APIC-1 to get upgraded. |
3.1(1i) and later |
|
There is a minor memory leak in svc_ifc_policydist when performing various tenant configuration removals and additions. |
3.1(1i) and later |
|
For an EPG containing a static leaf node configuration, the Cisco APIC GUI returns the following error when clicking the health of Fabric Location: Invalid DN topology/pod-X/node-Y/local/svc-policyelem-id-0/ObservedEthIf, wrong rn prefix ObservedEthIf at position 63 |
3.1(1i) and later |
|
Traffic loss is observed from multiple endpoints deployed on two different vPC leaf switches. |
3.1(1i) and later |
This section lists the resolved bugs. Click the bug ID to access the Bug Search tool and see additional information about the bug. The "Fixed In" column of the table specifies whether the bug was resolved in the base release or a patch release.
Table 4 Resolved Bugs in the 3.1(1i) Release
Bug ID |
Description |
Fixed in |
This issue occurs while using the import-config file command on the CLI where the file is the output of export-config command. The file contains the output of show running-config of the scope where export-config was executed. The error occurs only when the file contains crypto commands, the bash shell throws the error and hangs without returning the prompt. |
3.1.(1i) |
|
When the IS-IS to OSPF Multi-Site CPTEP route leaking is not programmed, inter-site BGP session might go down on the spine switch. This behavior might cause traffic drop. |
3.1.(1i) |
This section lists bugs that describe known behaviors. Click the Bug ID to access the Bug Search Tool and see additional information about the bug. The "Exists In" column of the table specifies the 3.1(1) releases in which the known behavior exists. A bug might also exist in releases other than the 3.1(1) releases.
Table 5 Known Behaviors in This Release
Bug ID |
Description |
Exists in |
The Cisco APIC does not validate duplicate IP addresses that are assigned to two device clusters. The communication to devices or the configuration of service devices might be affected. |
3.1(1i) and later |
|
In some of the 5-minute statistics data, the count of ten-second samples is 29 instead of 30. |
3.1(1i) and later |
|
The node ID policy can be replicated from an old appliance that is decommissioned when it joins a cluster. |
3.1(1i) and later |
|
The DSCP value specified on an external endpoint group does not take effect on the filter rules on the leaf switch. |
3.1(1i) and later |
|
The hostname resolution of the syslog server fails on leaf and spine switches over in-band connectivity. |
3.1(1i) and later |
|
Following a FEX or switch reload, configured interface tags are no longer configured correctly. |
3.1(1i) and later |
|
Switches can be downgraded to a 1.0(1) version if the imported configuration consists of a firmware policy with a desired version set to 1.0(1). |
3.1(1i) and later |
|
If the Cisco APIC is rebooted using the CIMC power reboot, the system enters into fsck due to a corrupted disk. |
3.1(1i) and later |
|
The Cisco APIC Service (ApicVMMService) shows as stopped in the Microsoft Service Manager (services.msc in control panel > admin tools > services). This happens when a domain account does not have the correct privilege in the domain to restart the service automatically. |
3.1(1i) and later |
|
The traffic destined to a shared service provider endpoint group picks an incorrect class ID (PcTag) and gets dropped. |
3.1(1i) and later |
|
Traffic from an external Layer 3 network is allowed when configured as part of a vzAny (a collection of endpoint groups within a context) consumer. |
3.1(1i) and later |
|
Newly added microsegment EPG configurations must be removed before downgrading to a software release that does not support it. |
3.1(1i) and later |
|
Downgrading the fabric starting with the leaf switch will cause faults such as policy-deployment-failed with fault code F1371. |
3.1(1i) and later |
|
The OpenStack metadata feature cannot be used with Cisco ACI integration with the Juno release (or earlier) of OpenStack due to limitations with both OpenStack and Cisco’s ML2 driver. |
3.1(1i) and later |
|
Creating or deleting a fabricSetupP policy results in an inconsistent state. |
3.1(1i) and later |
|
After a pod is created and nodes are added in the pod, deleting the pod results in stale entries from the pod that are active in the fabric. This occurs because the Cisco APIC uses open source DHCP, which creates some resources that the Cisco APIC cannot delete when a pod is deleted. |
3.1(1i) and later |
|
When a Cisco APIC cluster is upgrading, the Cisco APIC cluster might enter the minority status if there are any connectivity issues. In this case, user logins can fail until the majority of the Cisco APICs finish the upgrade and the cluster comes out of minority. |
3.1(1i) and later |
|
When downgrading to a 2.0(1) release, the spines and its interfaces must be moved from infra L3out2 to infra L3out1. After infra L3out1 comes up, delete L3out2 and its related configuration, and then downgrade to a 2.0(1) release. |
3.1(1i) and later |
|
No fault gets raised upon using the same encapsulation VLAN in a copy device in tenant common, even though a fault should get raised. |
3.1(1i) and later |
|
When First hop security is enabled on a bridge domain, traffic is disrupted. |
3.1(1i) and later |
■ In a multipod configuration, before you make any changes to a spine switch, ensure that there is at least one operationally “up” external link that is participating in the multipod topology. Failure to do so could bring down the multipod connectivity. For more information about multipod, see the Cisco Application Centric Infrastructure Fundamentals document and the Cisco APIC Getting Started Guide.
The following sections list compatibility information for the Cisco APIC software.
This section lists virtualization compatibility information for the Cisco APIC software.
■ For a table that shows the supported virtualization products, see the ACI Virtualization Compatibility Matrix at the following URL:
■ This release supports VMM Integration and VMware Distributed Virtual Switch (DVS) 6.5.x. For more information about guidelines for upgrading VMware DVS from 5.x to 6.x and VMM integration, see the Cisco ACI Virtualization Guide, Release 3.1(1) at the following URL:
■ For information about Cisco APIC compatibility with Cisco UCS Director, see the appropriate Cisco UCS Director Compatibility Matrix document at the following URL:
■ If you use Microsoft vSwitch and want to downgrade to Cisco APIC Release 2.3(1) from a later release, you first must delete any microsegment EPGs configured with the Match All filter.
This release supports the following Cisco APIC servers:
Product ID |
Description |
APIC-L1 |
Cisco APIC with large CPU, hard drive, and memory configurations (more than 1000 edge ports) |
APIC-L2 |
Cisco APIC with large CPU, hard drive, and memory configurations (more than 1000 edge ports) |
APIC-M1 |
Cisco APIC with medium-size CPU, hard drive, and memory configurations (up to 1000 edge ports) |
APIC-M2 |
Cisco APIC with medium-size CPU, hard drive, and memory configurations (up to 1000 edge ports) |
The following list includes general hardware compatibility information:
■ For the supported hardware, see the Cisco NX-OS Release Notes for Cisco Nexus 9000 Series ACI-Mode Switches, Release 13.1(1) at the following location:
■ To connect the N2348UPQ to Cisco ACI leaf switches, the following options are available:
— Directly connect the 40G FEX ports on the N2348UPQ to the 40G switch ports on the Cisco ACI leaf switches
— Break out the 40G FEX ports on the N2348UPQ to 4x10G ports and connect to the 10G ports on all other Cisco ACI leaf switches.
Note: A fabric uplink port cannot be used as a FEX fabric port.
■ Connecting the Cisco APIC (the controller cluster) to the Cisco ACI fabric requires a 10G interface on the Cisco ACI leaf switch. You cannot connect the Cisco APIC directly to the Cisco N9332PQ ACI leaf switch, unless you use a 40G to 10G converter (part number CVR-QSFP-SFP10G), in which case the port on the Cisco N9332PQ switch auto-negotiate to 10G without requiring any manual configuration.
■ The Cisco N9K-X9736C-FX (ports 29 to 36) and Cisco N9K-C9364C-FX (ports 49-64) switches do not support 1G SFPs with QSA.
■ Cisco N9K-C9508-FM-E2 fabric modules must be physically removed before downgrading to releases earlier than Cisco APIC 3.0(1).
■ The fifth Cisco N9K-C9508-FM-E2 (also defined as FM-25) is not supported.
■ The Cisco N9K-C9508-FM-E2 and N9K-X9736C-FX locator LED enable/disable feature is supported in the GUI and not supported in the Cisco ACI NX-OS Switch CLI.
■ Contracts using matchDscp filters are only supported on switches with “EX” on the end of the switch name. For example, N9K-93108TC-EX.
■ N9K-C9508-FM-E2 and N9K-C9508-FM-E fabric modules in the mixed mode configuration are not supported on the same spine switch.
■ The N9K-C9348GC-FXP switch does not read SPROM information if the PSU is in a shut state. You might see an empty string in the Cisco APIC output.
■ When the fabric node switch (spine or leaf) is out-of-fabric, the environmental sensor values, such as Current Temperature, Power Draw, and Power Consumption, might be reported as “N/A.” A status might be reported as “Normal” even when the Current Temperature is “N/A.”
This section lists ASA compatibility information for the Cisco APIC software.
■ This release supports Adaptive Security Appliance (ASA) device package version 1.2.5.5 or later.
■ If you are running a Cisco Adaptive Security Virtual Appliance (ASA) version that is prior to version 9.3(2), you must configure SSL encryption as follows:
(config)# ssl encryption aes128-sha1
This section lists miscellaneous compatibility information for the Cisco APIC software.
■ This release supports the following software:
— Cisco NX-OS Release 13.1(1)
— Cisco AVS, Release 5.2(1)SV3(3.20)
For more information about the supported AVS releases, see the AVS software compatibility information in the Cisco Application Virtual Switch Release Notes at the following URL:
— Cisco ACI Virtual Edge 1.1(1a)
— Cisco UCS Manager software release 2.2(1c) or later is required for the Cisco UCS Fabric Interconnect and other components, including the BIOS, CIMC, and the adapter.
■ This release supports the following firmware:
— 2.0(3i) CIMC HUU ISO
— 2.0(9c) CIMC HUU ISO
— 2.0(13i) CIMC HUU ISO
■ This release supports the partner packages specified in the L4-L7 Compatibility List Solution Overview document at the following URL:
■ A known issue exists with the Safari browser and unsigned certificates, which applies when connecting to the Cisco APIC GUI. For more information, see the Cisco APIC Getting Started Guide.
■ For compatibility with OpenStack and Kubernetes distributions, see the Cisco Application Policy Infrastructure Controller OpenStack and Container Plugins, Release 3.1(1), Release Notes.
The following sections list usage guidelines for the Cisco APIC software.
This section lists virtualization-related usage guidelines for the Cisco APIC software.
■ Do not separate virtual port channel (vPC) member nodes into different configuration zones. If the nodes are in different configuration zones, then the vPCs’ modes become mismatched if the interface policies are modified and deployed to only one of the vPC member nodes.
■ If you are upgrading VMware vCenter 6.0 to vCenter 6.5, you should first delete the following folder on the VMware vCenter: C:\ProgramData\cisco_aci_plugin.
If you do not delete the folder and you try to register a fabric again after the upgrade, you will see the following error message:
Error while saving setting in C:\ProgramData\cisco_aci_plugin\<user>_<domain>.properties.
The user is the user that is currently logged in to the vSphere Web Client, and domain is the domain to which the user belongs. Although you can still register a fabric, you do not have permissions to override settings that were created in the old VMware vCenter. Enter any changes in the Cisco APIC configuration again after restarting VMware vCenter.
■ If the communication between the Cisco APIC and VMware vCenter is impaired, some functionality is adversely affected. The Cisco APIC relies on the pulling of inventory information, updating VDS configuration, and receiving event notifications from the VMware vCenter for performing certain operations.
■ When creating a vPC domain between two leaf switches, both switches must be in the same switch generation. Switches not in the same generation are not compatible vPC peers. The generations are as follows:
— Generation 1—Cisco Nexus 9200 and 9300 platform switches without “EX” on the end of the switch name; for example, Cisco Nexus 93120TX.
— Generation 2—Cisco Nexus 9300-EX and FX platform switches; for example, Cisco Nexus 93108TC-EX.
■ The following Red Hat Virtualization (RHV) guidelines apply:
— We recommend that you use release 4.1.6 or later.
— Only one controller (compCtrlr) can be associated with a Red Hat Virtualization Manager (RHVM) data center.
— Deployment immediacy is supported only as pre-provision.
— IntraEPG isolation, micro EPGs, and IntraEPG contracts are not supported.
— Using service nodes inside a RHV domain have not been validated.
This section lists GUI-related usage guidelines for the Cisco APIC software.
■ The icon in the Cisco APIC opens the menu for Show Me How modules, which provide step-by-step help through specific configurations.
— If you deviate while in progress of a Show Me How module, you will no longer be able to continue.
— You must have IPv4 enabled to use the Show Me How modules.
■ The Cisco APIC GUI includes an online version of the Quick Start Guide that includes video demonstrations.
■ To reach the Cisco APIC CLI from the GUI: choose System > Controllers, highlight a controller, right-click, and choose "launch SSH". To get the list of commands, press the escape key twice.
■ The Basic GUI mode is deprecated. We do not recommend using Cisco APIC Basic mode for configuration. However, if you want to use Cisco APIC Basic mode, use the following URL:
APIC_URL/indexSimple.html
This section lists CLI-related usage guidelines for the Cisco APIC software.
■ The output from show commands issued in the NX-OS-style CLI are subject to change in future software releases. We do not recommend using the output from the show commands for automation.
■ The CLI is supported only for users with administrative login privileges.
■ If FIPS is enabled in the Cisco ACI setups, then SHA256 support is mandatory on the SSH Client. Additionally, to have the SHA256 support, the openssh-client must be running version 6.6.1 or higher.
This section lists Layer 2 and Layer 3-related usage guidelines for the Cisco APIC software.
■ For Layer 3 external networks created through the API or GUI and updated through the CLI, protocols need to be enabled globally on the external network through the API or GUI, and the node profile for all the participating nodes needs to be added through the API or GUI before doing any further updates through the CLI.
■ When configuring two Layer 3 external networks on the same node, the loopbacks need to be configured separately for both Layer 3 networks.
■ All endpoint groups (EPGs), including application EPGs and Layer 3 external EPGs, require a domain. Interface policy groups must also be associated with an Attach Entity Profile (AEP), and the AEP must be associated with domains. Based on the association of EPGs to domains and of the interface policy groups to domains, the ports VLANs that the EPG uses are validated. This applies to all EPGs including bridged Layer 2 outside and routed Layer 3 outside EPGs. For more information, see the Cisco APIC Layer 2 Networking Configuration Guide.
Note: When creating static paths for application EPGs or Layer 2/Layer 3 outside EPGs, the physical domain is not required. Upgrading without the physical domain raises a fault on the EPG stating “invalid path configuration.”
■ In a multipod fabric, if a spine switch in POD1 uses the infra tenant L3extOut-1, the TORs of the other pods (POD2, POD3) cannot use the same infra L3extOut (L3extOut-1) for Layer 3 EVPN control plane connectivity. Each POD must use its own spine switch and infra L3extOut.
■ You do not need to create a customized monitoring policy for each tenant. By default, a tenant shares the common policy under tenant common. The Cisco APIC automatically creates a default monitoring policy and enables common observable. You can modify the default policy under tenant common based on the requirements of your fabric.
■ The Cisco APIC does not provide IPAM services for tenant workloads.
■ Do not mis-configure Control Plane Policing (CoPP) pre-filter entries. CoPP pre-filter entries might impact connectivity to multi-pod configurations, remote leaf switches, and Cisco ACI Multi-Site deployments.
This section lists IP address-related usage guidelines for the Cisco APIC software.
■ For the following services, use a DNS-based hostname with out-of-band management connectivity. IP addresses can be used with both in-band and out-of-band management connectivity.
— Syslog server
— Call Home SMTP server
— Tech support export server
— Configuration export server
— Statistics export server
■ The infrastructure IP address range must not overlap with other IP addresses used in the fabric for in-band and Out-of-band networks.
■ If an IP address is learned on one of two endpoints for which you are configuring an atomic counter policy, you should use an IP-based policy and not a client endpoint-based policy.
■ A multipod deployment requires the 239.255.255.240 system Global IP Outside (GIPo) to be configured on the inter-pod network (IPN) as a PIM BIDIR range. This 239.255.255.240 PIM BIDIR range configuration on the IPN devices can be avoided by using the Infra GIPo as System GIPo feature. The Infra GIPo as System GIPo feature must be enabled only after upgrading all of the switches in the Cisco ACI fabric, including the leaf switches and spine switches, to the latest Cisco APIC release.
■ Cisco ACI does not support a class E address as a VTEP address.
This section lists miscellaneous usage guidelines for the Cisco APIC software.
■ User passwords must meet the following criteria:
— Minimum length is 8 characters
— Maximum length is 64 characters
— Fewer than three consecutive repeated characters
— At least three of the following character types: lowercase, uppercase, digit, symbol
— Cannot be easily guessed
— Cannot be the username or the reverse of the username
— Cannot be any variation of “cisco”, “isco”, or any permutation of these characters or variants obtained by changing the capitalization of letters therein
■ In some of the 5-minute statistics data, the count of ten-second samples is 29 instead of 30.
■ The power consumption statistics are not shown on leaf node slot 1.
■ If you defined multiple login domains, you can choose the login domain that you want to use when logging in to a Cisco APIC. By default, the domain drop-down list is empty, and if you do not choose a domain, the DefaultAuth domain is used for authentication. This can result in login failure if the username is not in the DefaultAuth login domain. As such, you must enter the credentials based on the chosen login domain.
■ A firmware maintenance group should contain a maximum of 80 nodes.
■ When contracts are not associated with an endpoint group, DSCP marking is not supported for a VRF with a vzAny contract. DSCP is sent to a leaf switch along with the actrl rule, but a vzAny contract does not have an actrl rule. Therefore, the DSCP value cannot be sent.
■ The Cisco APICs must have 1 SSD and 2 HDDs, and both RAID volumes must be healthy before upgrading to this release. The Cisco APIC will not boot if the SSD is not installed.
■ In a multipod fabric setup, if a new spine switch is added to a pod, it must first be connected to at least one leaf switch in the pod. Then the spine switch is able to discover and join the fabric.
Caution: If you install 1-Gigabit Ethernet (GE) or 10GE links between the leaf and spine switches in the fabric, there is risk of packets being dropped instead of forwarded, because of inadequate bandwidth. To avoid the risk, use 40GE or 100GE links between the leaf and spine switches.
■ For a Cisco APIC REST API query of event records, the Cisco APIC system limits the response to a maximum of 500,000 event records. If the response is more than 500,000 events, it returns an error. Use filters to refine your queries. For more information, see Cisco APIC REST API Configuration Guide.
■ Subject Alternative Names (SANs) contain one or more alternate names and uses any variety of name forms for the entity that is bound by the Certificate Authority (CA) to the certified public key. These alternate names are called “Subject Alternative Names" (SANs). Possible names include:
— DNS name
— IP address
■ If a node has port profiles deployed on it, some port configurations are not removed if you decommission the node. You must manually delete the configurations after decommissioning the node to cause the ports to return to the default state. To do this, log into the switch, run the setup-clean-config.sh script, wait for the script to complete, then enter the reload command.
■ When using the SNMP trap aggregation feature, if you decommission Cisco APICs, the trap forward server will receive redundant traps.
■ Fabric connectivity ports can operate at 10G or 25G speeds (depending on the model of the APIC server) when connected to leaf switch host interfaces. We recommend connecting two fabric uplinks, each to a separate leaf switch or vPC leaf switch pair.
For APIC-M3/L3, virtual interface card (VIC) 1445 has four ports (port-1, port-2, port-3, and port-4 from left to right). Port-1 and port-2 make a single pair corresponding to eth2-1 on the APIC server; port-3 and port-4 make another pair corresponding to eth2-2 on the APIC server. Only a single connection is allowed for each pair. For example, you can connect one cable to either port-1 or port-2 and another cable to either port-3 or port-4, but not 2 cables to both ports on the same pair. Connecting 2 cables to both ports on the same pair creates instability in the APIC server. All ports must be configured for the same speed: either 10G or 25G.
■ When you create an access port selector in a leaf interface rofile, the fexId property is configured with a default value of 101 even though a FEX is not connected and the interface is not a FEX interface. The fexId property is only used when the port selector is associated with an infraFexBndlGrp managed object.
The Cisco Application Policy Infrastructure Controller (APIC) documentation can be accessed from the following website:
The documentation includes installation, upgrade, configuration, programming, and troubleshooting guides, technical references, release notes, and knowledge base (KB) articles, as well as other documentation. KB articles provide information about a specific use case or a specific topic.
By using the “Choose a topic” and “Choose a document type” fields of the APIC documentation website, you can narrow down the displayed documentation list to make it easier to find the desired document.
The following list provides links to the release notes and verified scalability documentation:
■ Cisco ACI Simulator Release Notes
■ Cisco NX-OS Release Notes for Cisco Nexus 9000 Series ACI-Mode Switches
■ Cisco Application Policy Infrastructure Controller OpenStack and Container Plugins Release Notes
■ Cisco Application Virtual Switch Release Notes
This section lists the new Cisco ACI product documents for this release.
■ Cisco ACI and OpenShift Integration
■ Cisco ACI and Red Hat Virtualization Integration
■ Cisco ACI Virtual Edge Configuration Guide
■ Cisco ACI Virtual Edge Installation Guide
■ Cisco ACI Virtual Edge Release Notes, Release 1.0(1)
■ Cisco ACI Virtualization Guide, Release 3.1(1)
■ Cisco APIC Layer 4 to Layer 7 Services Deployment Guide, Release 3.1(1)
■ Cisco Application Policy Infrastructure Controller OpenStack and Container Plugins Release 3.1(1) Release Notes
■ Cisco AVS Configuration Guide
■ Cisco AVS Installation Guide
■ Cisco AVS Release Notes
■ Verified Scalability Guide for Cisco APIC, Release 3.1(1) and Cisco Nexus 9000 Series ACI-Mode Switches, Release 13.1(1)
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2017-2022 Cisco Systems, Inc. All rights reserved.