Table Of Contents
Cisco MDS 9000 Family Release Notes
for Cisco MDS NX-OS Release 5.0(4b)MDS 9000 Chassis and Module Support
Migrating from Supervisor-1 Modules to Supervisor-2 Modules
Determining the Software Version
Determining Software Version Compatibility
Selecting the Correct Software Image for an MDS 9100 Series Switch
Selecting the Correct Software Image for an MDS 9200 Series Switch
Selecting the Correct Software Image for an MDS 9500 Series Switch
Upgrading Your Cisco MDS NX-OS Software Image
FICON Supported Releases and Upgrade Paths
Upgrading a Cisco MDS 9124 or Cisco MDS 9134 Switch
Performing a Disruptive Upgrade on an MDS 9000 Family Switch
Converting Automatically Created PortChannels Before an Upgrade
Downgrading Your Cisco MDS SAN-OS Software Image
General Downgrading Guidelines
NX-OS Release 5.0(x) Software Downgrade and Upgrade Matrix for Cisco MDS 9509 and 9506 Switches
New Features in Cisco MDS NX-OS Release 5.0(4b)
Licensed Cisco NX-OS Software Packages
Storage Services Enabler Package
On-Demand Port Activation License
Support for Generation One Modules
Generation 1 Module Limitation
Maximum Number of Zones Supported in Interop Mode 4
Using a RSA Version 1 Key for SSH Following an Upgrade
CFS Cannot Distribute All Call Home Information
Availability of F Port Trunking and F Port Channels
Reserved VSAN Range and Isolated VSAN Range Guidelines
Applying Zone Configurations to VSAN 1
Running Storage Applications on the MSM-18/4
RSPAN Traffic Not Supported on CTS Ports on 8-Gbps Switching Modules
I/O Accelerator Feature Limitations
Support for FCIP Compression Modes
Saving Copies of the Running Kickstart and System Images
Configuring Buffer Credits on a Generation 2 or Generation 3 Module
Features Not Supported on the Cisco MDS 9148 Switch
PPRC Not Supported with FCIP Write Acceleration
Configuring a Persistent FCID in an IVR Configuration with Brocade SwitchesRegulatory Compliance and Safety Information
Software Installation and Upgrade
Intelligent Storage Networking Services Configuration Guides
Obtaining Documentation and Submitting a Service Request
Cisco MDS 9000 Family Release Notes
for Cisco MDS NX-OS Release 5.0(4b)
Release Date: January 13, 2011
Part Number: OL-21012-04 G0
This document describes the caveats and limitations for switches in the Cisco MDS 9000 Family. Use this document in conjunction with documents listed in the "Related Documentation" section.
![]()
Note
As of Cisco Fabric Manager Release 4.2(1a), Fabric Manager information will no longer appear in the Cisco MDS 9000 Family Release Notes for NX-OS releases. Cisco Fabric Manager Release Notes will include information that is exclusive to Fabric Manager as a management tool for Cisco MDS 9000 Family switches and Cisco Nexus 5000 Series switches. Refer to the following website for Release Notes for Cisco Fabric Manager:
http://www.cisco.com/en/US/products/ps10495/prod_release_notes_list.html
Release notes are sometimes updated with new information on restrictions and caveats. Refer to the following website for the most recent version of the Cisco MDS 9000 Family Release Notes: http://www.cisco.com/en/US/products/ps5989/prod_release_notes_list.html
Table 1 shows the on-line change history for this document.
Table 1 Online History Change
Revision Date DescriptionA0
01/132011
Created release notes.
B0
02/09/2011
Updated the "Licensed Cisco NX-OS Software Packages" section.
C0
04/27/2011
Added DDTS CSCtn68418.
D0
04/29/2011
Added DDTS CSCto68011.
E0
09/10/2011
Updated Table 11.
Added the limitation "Configuring a Persistent FCID in an IVR Configuration with Brocade Switches".
F0
03/11/2012
G0
April 30, 2012
•
Added the "NX-OS Release 5.0(x) Software Downgrade and Upgrade Matrix for Cisco MDS 9509 and 9506 Switches" section.
•
Added open caveat CSCty32238.
•
Corrected Table 11.
Contents
This document includes the following sections:
•
MDS 9000 Chassis and Module Support
•
Migrating from Supervisor-1 Modules to Supervisor-2 Modules
•
Upgrading Your Cisco MDS NX-OS Software Image
•
Downgrading Your Cisco MDS SAN-OS Software Image
•
New Features in Cisco MDS NX-OS Release 5.0(4b)
•
Licensed Cisco NX-OS Software Packages
•
Obtaining Documentation and Submitting a Service Request
Introduction
The Cisco MDS 9000 Family of Multilayer Directors and Fabric Switches provides industry-leading availability, scalability, security, and management, allowing you to deploy high performance storage-area networks with lowest total cost of ownership. Layering a rich set of intelligent features onto a high performance, protocol agnostic switch fabric, the Cisco MDS 9000 Family addresses the stringent requirements of large data center storage environments: uncompromising high availability, security, scalability, ease of management, and seamless integration of new technologies.
Cisco MDS 9000 NX-OS Software powers the award winning Cisco MDS 9000 Series Multilayer Switches. It is designed to create a strategic SAN platform with superior reliability, performance, scalability, and features. Formerly known as Cisco SAN-OS, Cisco MDS 9000 NX Software is fully interoperable with earlier Cisco SAN-OS versions and enhances hardware platform and module support.
Components Supported
Table 2 lists the NX-OS software part numbers and hardware components supported by the Cisco MDS 9000 Family.
![]()
Note
To use the Cisco Storage Services Enabler package, Cisco MDS SAN-OS Release 1.3(5) or later must be installed on the MDS switch.
MDS 9000 Chassis and Module Support
Table 3 lists the MDS hardware chassis supported by Cisco MDS NX-OS 5.x.
![]()
Note
As of Cisco MDS NX-OS Release 5.0(1a), support for the MDS 9216i switch is discontinued.
Table 4 lists the MDS hardware modules supported by Cisco MDS NX-OS 5.x. For the list of MDS hardware modules supported by Cisco MDS SAN-OS 4.x, see Table 5. For the list of MDS hardware modules supported by Cisco MDS SAN-OS 3.x, see Table 6.
![]()
Note
As of Cisco MDS NX-OS Release 5.0(1a), support for the following Generation 1 modules is discontinued:
•
DS-X9302-14K9, 14/2-port Multiprotocol Services (MPS-14/2) Module
•
DS-X9016, 16-port 1-, 2-Gbps Fibre Channel Switching Module
•
DS-X9032, 32-port 1-, 2-Gbps Fibre Channel Switching Module
•
DS-X9032SSM, 32-port Storage Services Module (SSM)
Generation 1 modules should be removed from a switch chassis before the installation of NX-OS Release 5.0(4b) begins.
Table 4 Module Support Matrix for Cisco MDS NX-OS 5.x
Module Description MDS 9500 Series MDS 9222iDS-X9530-SF2-K9
MDS 9500 Supervisor-2 Module
Yes
N/A
DS-X9530-SF2A-K9
MDS 9500 Supervisor-2A Module
Yes
N/A
DS-13SLT-FAB2
MDS 9513 Fabric Module 2
Yes
N/A
DS-13SLT-FAB1
MDS 9513 Fabric Module 1
Yes
N/A
DS-X9224-96K9
24-port 8-Gbps Fibre Channel Switching Module
Yes1
No
DS-X9248-96K9
48-port 8-Gbps Fibre Channel Switching Module
Yes2
No
DS-X9248-48K9
4/44-port Host Optimized8-Gbps Fibre Channel Switching Module
Yes
Yes
DS-X9316-SSNK9
16-port Storage Services Node (SSN-16)
Yes
Yes
DS-X9304-18K9
18/4-Port Multiservice Module (MSM-18/4)
Yes
Yes
DS-X9112
12-port 4-Gbps Fibre Channel Switching Module
Yes
Yes
DS-X9124
24-port 4-Gbps Fibre Channel Switching Module
Yes
Yes
DS-X9148
48-port 4-Gbps Fibre Channel Switching Module
Yes
Yes
DS-X9704
4-port 10-Gbps Fibre Channel Switching Module
Yes
Yes
1 Requires DS-13SLT-FAB2 in the MDS 9513.
Table 5 lists the MDS hardware modules supported by Cisco MDS NX-OS 4.x. For the list of MDS hardware modules supported by Cisco MDS SAN-OS 3.x, see Table 6.
Table 5 Module Support Matrix for Cisco MDS NX-OS 4.x
Module Description MDS 9500 Series MDS 9222i MDS 9216iDS-X9530-SF2-K9
MDS 9500 Supervisor-2 Module
Yes
N/A
N/A
DS-X9530-SF2A-K9
MDS 9500 Supervisor-2A Module
Yes1
N/A
N/A
DS-X9530-SF1-K9
MDS 9500 Supervisor-1 Module
No
N/A
N/A
DS-13SLT-FAB2
MDS 9513 Fabric Module 2
Yes
N/A
N/A
DS-13SLT-FAB1
MDS 9513 Fabric Module 1
Yes
N/A
N/A
DS-X9224-96K9
24-port 8-Gbps Fibre Channel Switching Module
Yes2
No
No
DS-X9248-96K9
48-port 8-Gbps Fibre Channel Switching Module
Yes2
No
No
DS-X9248-48K9
4/44-port Host Optimized8-Gbps Fibre Channel Switching Module
Yes
Yes
No
DS-X9316-SSNK9
16-port Storage Services Node (SSN-16)
Yes
Yes
Yes
DS-X9304-18K9
18/4-Port Multiservice Module (MSM-18/4)
Yes
Yes
Yes
DS-X9112
12-port 4-Gbps Fibre Channel Switching Module
Yes
Yes
Yes
DS-X9124
24-port 4-Gbps Fibre Channel Switching Module
Yes
Yes
Yes
DS-X9148
48-port 4-Gbps Fibre Channel Switching Module
Yes
Yes
Yes
DS-X9704
4-port 10-Gbps Fibre Channel Switching Module
Yes
Yes
Yes
DS-X9302-14K9
14/2-port Multiprotocol Services (MPS-14/2) Module
Yes
No
Yes
DS-X9016
16-port 1-, 2-Gbps Fibre Channel Switching Module
Yes
No
Yes
DS-X9032
32-port 1-, 2-Gbps Fibre Channel Switching Module
Yes
No
Yes
DS-X9032-SSM
32-port Storage Services Module (SSM)
Yes
Yes
Yes
DS-X9308-SMIP
8-port 1-, 2-Gbps IP Switching Module
No
No
No
DS-X9304-SMIP
4-port 1-, 2-Gbps IP Switching Module
No
No
No
1 In software releases earlier than Cisco NX-OS Release 4.2(7a), the Supervisor-2A module appears as unsupported hardware in Device Manager, but the Supervisor-2A module does work with Cisco NX-OS release 4.x software.
2 Requires DS-13SLT-FAB2 in the MDS 9513.
Table 6 lists the MDS hardware modules supported by Cisco MDS SAN-OS 3.x.
Table 6 Module Support Matrix for Cisco MDS SAN-OS 3.x
Module Description MDS 9500 Series MDS 9222i MDS 9216i MDS 9216A MDS 9216DS-X9530-SF2-K9
MDS 9500 Supervisor-2 Module
Yes
N/A
N/A
N/A
N/A
DS-X9530-SF2A-K9
MDS 9500 Supervisor-2A Module
Yes1
N/A
N/A
N/A
N/A
DS-X9530-SF1-K9
MDS 9500 Supervisor-1 Module
Yes
N/A
N/A
N/A
N/A
DS-13SLT-FAB2
MDS 9513 Fabric Module 2
Yes
N/A
N/A
N/A
N/A
DS-13SLT-FAB1
MDS 9513 Fabric Module 1
Yes
N/A
N/A
N/A
N/A
DS-X9224-96K9
24-port 8-Gbps Fibre Channel Switching Module
No
No
No
No
No
DS-X9248-96K9
48-port 8-Gbps Fibre Channel Switching Module
No
No
No
No
No
DS-X9248-48K9
4/44-port Host Optimized8-Gbps Fibre Channel Switching Module
No
No
No
No
No
DS-X9316-SSNK9
16-port Storage Services Node (SSN-16)
No
No
No
No
No
DS-X9304-18K9
18/4-Port Multiservice Module (MSM-18/4)2
Yes
Yes
Yes
Yes
No
DS-X9112
12-port 4-Gbps Fibre Channel Switching Module
Yes
Yes
Yes
Yes
No
DS-X9124
24-port 4-Gbps Fibre Channel Switching Module
Yes
Yes
Yes
Yes
No
DS-X9148
48-port 4-Gbps Fibre Channel Switching Module
Yes
Yes
Yes
Yes
No
DS-X9704
4-port 10-Gbps Fibre Channel Switching Module
Yes
Yes
Yes
Yes
No
DS-X9302-14K9
14/2-port Multiprotocol Services (MPS-14/2) Module
Yes
No
Yes
Yes
Yes
DS-X9016
16-port 1-, 2-Gbps Fibre Channel Switching Module
Yes
No
Yes
Yes
Yes
DS-X9032
32-port 1-, 2-Gbps Fibre Channel Switching Module
Yes
No
Yes
Yes
Yes
DS-X9032-SSM
32-port Storage Services Module (SSM)
Yes
Yes
Yes
Yes
Yes
DS-X9308-SMIP
8-port 1-, 2-Gbps IP Switching Module
Yes
No
Yes
Yes
Yes
DS-X9304-SMIP
4-port 1-, 2-Gbps IP Switching Module
Yes
Yes
Yes
Yes
Yes
1 In software releases earlier than Cisco NX-OS Release 3.3(5a), the Supervisor-2A module appears as unsupported hardware in Device Manager, but the Supervisor-2A module does work with Cisco NX-OS release 3.x software.
2 Cisco SAN-OS Release 3.2(1) and later support the 18/4-Port Multiservice Module (MSM-18/4).
Migrating from Supervisor-1 Modules to Supervisor-2 Modules
As of Cisco MDS SAN-OS Release 3.0(1), the Cisco MDS 9509 and 9506 Directors support both Supervisor-1 and Supervisor-2 modules. Supervisor-1 and Supervisor-2 modules cannot be installed in the same switch, except during migration. Both the active and standby supervisor modules must be of the same type, either Supervisor-1 or Supervisor-2 modules. For Cisco MDS 9513 Directors, both supervisor modules must be Supervisor-2 modules.
![]()
CautionMigrating your supervisor modules is a disruptive operation.
![]()
Note
Migrating from Supervisor-2 modules to Supervisor-1 modules is not supported.
To migrate from a Supervisor-1 module to a Supervisor-2 module, refer to the step-by-step instructions in the Cisco MDS 9000 NX-OS Release 4.1(x) and SAN-OS 3(x) Software Upgrade and Downgrade Guide.
Software Download Process
Use the software download procedure to upgrade to a later version, or downgrade to an earlier version, of an operating system. This section describes the software download process for the Cisco MDS NX-OS software and includes the following topics:
•
Determining the Software Version
•
Determining Software Version Compatibility
•
Selecting the Correct Software Image for an MDS 9100 Series Switch
•
Selecting the Correct Software Image for an MDS 9200 Series Switch
•
Selecting the Correct Software Image for an MDS 9500 Series Switch
Determining the Software Version
To determine the version of Cisco MDS NX-OS or SAN-OS software currently running on a Cisco MDS 9000 Family switch using the CLI, log in to the switch and enter the show version EXEC command.
To determine the version of Cisco MDS NX-OS or SAN-OS software currently running on a Cisco MDS 9000 Family switch using the Fabric Manager, view the Switches tab in the Information pane, locate the switch using the IP address, logical name, or WWN, and check its version in the Release column.
Determining Software Version Compatibility
Table 7 lists the software versions that are compatible in a mixed SAN environment, the minimum software versions that are supported, and the versions that have been tested. We recommend that you use the latest software release supported by your vendor for all Cisco MDS 9000 Family products.
Downloading Software
The Cisco MDS NX-OS software is designed for mission-critical high availability environments. To realize the benefits of nondisruptive upgrades on the Cisco MDS 9500 Directors, we highly recommend that you install dual supervisor modules.
To download the latest Cisco MDS NX-OS software, access the Software Center at this URL:
http://www.cisco.com/public/sw-center
See the following sections in this release note for details on how you can nondisruptively upgrade your Cisco MDS 9000 switch. Issuing the install all command from the CLI, or using Fabric Manager to perform the downgrade, enables the compatibility check. The check indicates if the upgrade can happen nondisruptively or disruptively depending on the current configuration of your switch and the reason.
Compatibility check is done:Module bootable Impact Install-type Reason------ -------- -------------- ------------ ------1 yes non-disruptive rolling2 yes disruptive rolling Hitless upgrade is not supported3 yes disruptive rolling Hitless upgrade is not supported4 yes non-disruptive rolling5 yes non-disruptive reset6 yes non-disruptive resetAt a minimum, you need to disable the default device alias distribution feature using the no device-alias distribute command in global configuration mode. The show incompatibility system bootflash:system image filename command determines which additional features need to be disabled.
![]()
Note
If you would like to request a copy of the source code under the terms of either GPL or LGPL, please send an e-mail to mds-software-disclosure@cisco.com.
Selecting the Correct Software Image for an MDS 9100 Series Switch
The system and kickstart image that you use for an MDS 9100 series switch depends on which switch you use, as shown in Table 8.
Selecting the Correct Software Image for an MDS 9200 Series Switch
The system and kickstart image that you use for an MDS 9200 series switch depends on which switch you use, as shown in Table 9.
Table 9 Software Images for MDS 9200 Series Switches
Cisco MDS 9200 Series Switch Type Naming ConventionMDS 9222i
Filename begins with m9200-s2ek9
Selecting the Correct Software Image for an MDS 9500 Series Switch
The system and kickstart image that you use for an MDS 9500 Series are for switches with a Supervisor-2 module, as shown in Table 10. Cisco NX-OS Release 5.x and Release 4.x do not support the Supervisor-1 module.
Use the show module command to display the type of supervisor module in the switch. The following is sample output from the show module command on a Supervisor 2 module:
switch# show module
Mod Ports Module-Type Model Status--- ----- -------------------------------- ------------------ ------------......7 0 Supervisor/Fabric-2 DS-X9530-SF2-K9 active *8 0 Supervisor/Fabric-2 DS-X9530-SF2-K9 ha-standbyUpgrading Your Cisco MDS NX-OS Software Image
This section lists the guidelines recommended for upgrading your Cisco MDS NX-OS software image and includes the following topics:
•
Upgrading Effect on VSAN 4079
•
FICON Supported Releases and Upgrade Paths
•
Upgrading a Cisco MDS 9124 or Cisco MDS 9134 Switch
•
Upgrading a Cisco MDS 9124 or Cisco MDS 9134 Switch
•
Performing a Disruptive Upgrade on an MDS 9000 Family Switch
•
Converting Automatically Created PortChannels Before an Upgrade
![]()
Note
Before you begin the upgrade process, review the list of chassis and modules that Cisco MDS NX-OS Release 5.0(4b) supports. See the "MDS 9000 Chassis and Module Support" section.
For detailed instructions for performing a software upgrade using Cisco Fabric Manager, see the Cisco Fabric Manager Release Notes for Release 4.2(1a), which is available from the following website:
http://www.cisco.com/en/US/products/ps10495/prod_release_notes_list.html
General Upgrading Guidelines
![]()
Note
To upgrade to NX-OS Release 5.0(4b) from SAN-OS Release 3.2(3a) or earlier, first upgrade to SAN-OS Release 3.3(x), then upgrade to NX-OS Release 4.1(x) or 4.2(x), and then upgrade to NX-OS Release 5.0(4b).
Use the following guidelines when upgrading to Cisco MDS NX-OS Release 5.0(4b):
•
Install and configure dual supervisor modules.
•
Issue the show install all impact upgrade-image CLI command to determine if your upgrade will be nondisruptive.
•
Follow the recommended guidelines for upgrading a Cisco MDS 9124 or MDS 9134 Switch as described in "Upgrading a Cisco MDS 9124 or Cisco MDS 9134 Switch" section.
•
Follow the guidelines for upgrading a single supervisor switch as described in "Performing a Disruptive Upgrade on an MDS 9000 Family Switch" section.
•
Be aware of the impact of an upgrade on VSAN 4079 if you are upgrading from SAN-OS Release 3.x to NX-OS 5.0(4b). See the "Upgrading Effect on VSAN 4079" section for details.
•
Be aware that some features impact whether an upgrade is disruptive or nondisruptive:
–
Fibre Channel Ports: Fibre Channel ports can be nondisruptively upgraded without affecting traffic on the ports. See Table 11 for the nondisruptive upgrade path for all NX-OS and SAN-OS releases.
–
SSM: Intelligent services traffic on the SSM, such as SANTap, NASB, and FC write acceleration, is disrupted during an upgrade. SSM Fibre Channel traffic is not.
–
Gigabit Ethernet Ports: Traffic on Gigabit Ethernet ports is disrupted during an upgrade or downgrade. This includes IPS modules and the Gigabit Ethernet ports on the MPS-14/2 module, the MSM-18/4 module, and the MDS 9222i switch. Those nodes that are members of VSANs traversing an FCIP ISL are impacted, and a fabric reconfiguration occurs. iSCSI initiators connected to the Gigabit Ethernet ports lose connectivity to iSCSI targets while the upgrade is in progress.
–
Inter-VSAN Routing (IVR): With IVR enabled, you must follow additional steps if you are upgrading from Cisco SAN-OS Release 2.1.(1a), 2.1(1b), or 2.1.(2a). See the "Upgrading with IVR Enabled" section for these instructions.
–
FICON: If you have FICON enabled, the upgrade path is different. See the "FICON Supported Releases and Upgrade Paths" section.
![]()
Note
In addition to these guidelines, you may want to review the information in the "Limitations and Restrictions" section prior to a software upgrade to determine if a feature may possibly behave differently following the upgrade.
Use Table 11 to determine your nondisruptive upgrade path to Cisco MDS NX-OS Release 5.0(4b), find the image release number you are currently using in the Current column of the table, and use the path recommended.
![]()
Note
The software upgrade information in Table 11 applies only to Fibre Channel switching traffic. Upgrading system software disrupts IP traffic and SSM intelligent services traffic.
Table 11 Nondisruptive Upgrade Path to Cisco MDS NX-OS Release 5.0(4b)
Current Release Nondisruptive Upgrade Path and Ordered Upgrade StepsNX-OS:
Release 5.0(4) and all 5.0(1x) releases.
Upgrade to NX-OS Release 5.0(4b).1
All 4.2(x) releases
Upgrade to NX-OS Release 5.0(4b).
All 4.1(x) releases
Upgrade to NX-OS Release 5.0(4b).
SAN-OS:
Release 3.3(1c), 3.3(2), 3.3(3), 3.3(4x), and 3.3(5x).
1.
Upgrade to NX-OS Release 4.1(x) or 4.2(x).
2.
Upgrade to NX-OS Release 5.0(4b).
Release 3.2(1a), all 3.2(x), 3.1(x), and 3.0(x) releases, and release 2.1(3), 2.1(2e), 2.1(2d), and 2.1(2b)
1.
Upgrade to SAN-OS Release 3.3(1c).
2.
Upgrade to NX-OS Release 4.1(x) or 4.2(x).
3.
Upgrade to NX-OS Release 5.0(4b).
Release 2.1(2), 2.1(1b), 2.1(1a), and
2.0(x)1.
Upgrade to SAN-OS Release 2.1(2b), 2.1(2d), 2.1(2e), or 2.1(3).
2.
Upgrade to SAN-OS Release 3.3(1c).
3.
Upgrade to NX-OS Release 4.1(x) or 4.2(x).
4.
Upgrade to NX-OS Release 5.0(4b).
Release 1.x
1.
Upgrade to SAN-OS Release 1.3(4a).
2.
Upgrade to SAN-OS Release 2.1(2b).
3.
Upgrade to SAN-OS Release 3.3(1c).
4.
Upgrade to NX-OS Release 4.1(x) or 4.2(x).
5.
Upgrade to NX-OS Release 5.0(4b).
1 See Table 14 before you begin a software upgrade on a Cisco MDS 9509 or MDS 9506 switch.
FICON Supported Releases and Upgrade Paths
Cisco MDS NX-OS Release 5.0(4b) does not support FICON
Table 12 lists the SAN-OS and NX-OS releases that support FICON. Refer to the specific release notes for FICON upgrade path information.
Table 12 FICON Supported Releases
FICON Supported ReleasesNX-OS
Release 4.2(1b)
Release 4.1(1c)
SAN-OS
Release 3.3(1c)
Release 3.2(2c)
Release 3.0(3b)
Release 3.0(3)
Release 3.0(2)
Release 2.0(2b)
Use Table 13 to determine your FICON nondisruptive upgrade path to Cisco MDS NX-OS Release 5.0 Find the image release number you are currently using in the Current Release with FICON Enabled column of the table and follow the recommended path.
Upgrading Effect on VSAN 4079
If you upgrade to NX-OS Release 5.0(4b), and you have not created VSAN 4079, the NX-OS software will automatically create VSAN 4079 and reserve it for EVFP use.
If VSAN 4079 is reserved for EVFP use, the switchport trunk allowed vsan command will filter out VSAN 4079 from the allowed list. In the following example, the allowed list appears on a separate line following the command:
switch(config-if)# switchport trunk allowed vsan 1-4080
1-4078,4080switch(config-if)#
If you have created VSAN 4079, the upgrade to NX-OS Release 5.0(4b) will have no affect on VSAN 4079.
If you downgrade to a release of NX-OS lower than NX-OS Release 4.1(x) after NX-OS Release 5.0(4b) creates VSAN 4079 and reserves it for EVFP use, the VSAN will no longer be reserved.
Upgrading with IVR Enabled
An Inter-Switch Link (ISL) flap resulting in fabric segmentation or a merge during or after an upgrade from Cisco MDS SAN-OS Release 2.0(x) to a later image where IVR is enabled might be disruptive. Some possible scenarios include the following:
•
FCIP connection flapping during the upgrade process resulting in fabric segmentation or merge.
•
ISL flap results in fabric segmentation or merge because of hardware issues or a software bug.
•
ISL port becomes part of PCP results in fabric segmentation or merge because of a port flap.
If this problem occurs, syslogs indicate a failure and the flapped ISL could remain in a down state because of a domain overlap.
This issue was resolved in Cisco SAN-OS Release 2.1(2b); you must upgrade to Release 2.1(2b) before upgrading to Release 3.3(1c). An upgrade from Cisco SAN-OS Releases 2.1(1a), 2.1(1b), or 2.1(2a) to Release 2.1(2b) when IVR is enabled requires that you follow the procedure below. If you have VSANs in interop mode 2 or 3, you must issue an IVR refresh for those VSANs.
To upgrade from Cisco SAN-OS Releases 2.1(1a), 2.1(1b), or 2.1(2a) to Release 2.1(2b) for all other VSANs with IVR enabled, follow these steps:
Step 1
Configure static domains for all switches in all VSANs where IVR is enabled. Configure the static domain the same as the running domain so that there is no change in domain IDs. Make sure that all domains are unique across all of the IVR VSANs. We recommend this step as a best practice for IVR-non-NAT mode. Issue the fcdomain domain id static vsan vsan id command to configure the static domains.
![]()
Note
Complete Step 1 for all switches before moving to Step 2.
Step 2
Issue the no ivr virtual-fcdomain-add vsan-ranges vsan-range command to disable RDI mode on all IVR enabled switches. The range of values for a VSAN ID is 1 to 4093. This can cause traffic disruption.
![]()
Note
Complete Step 2 for all IVR enabled switches before moving to Step 3.
Step 3
Check the syslogs for any ISL that was isolated.
2005 Aug 31 21:52:04 switch %FCDOMAIN-2-EPORT_ISOLATED:%$VSAN 2005%$ Isolation of interfacePortChannel 52 (reason: unknown failure)2005 Aug 31 21:52:04 switch %FCDOMAIN-2-EPORT_ISOLATED: %$VSAN 2005%$Isolation of interface PortChannel 51(reason: domain ID assignment failure)Step 4
Issue the following commands for the isolated switches in Step 3:
switch(config)# vsan database
switch(config-vsan-db)# vsan vsan-id suspendswitch(config-vsan-db)# no vsan vsan-id suspendStep 5
Issue the ivr refresh command to perform an IVR refresh on all the IVR enabled switches.
Step 6
Issue the copy running-config startup-config command to save the RDI mode in the startup configuration on all of the switches.
Step 7
Follow the normal upgrade guidelines for Release 2.1(2b). If you are adding new switches running Cisco MDS SAN-OS Release 2.1(2b) or later, upgrade all of your existing switches to Cisco SAN-OS Release 2.1(2b) as described in this workaround. Then follow the normal upgrade guidelines for Release 3.3(1c).
![]()
Note
RDI mode should not be disabled for VSANs running in interop mode 2 or interop mode 3.
Upgrading a Cisco MDS 9124 or Cisco MDS 9134 Switch
If you are upgrading from Cisco MDS SAN-OS Release 3.1(1) to Cisco NX-OS Release 4.2(1b) before upgrading to NX-OS Release 5.0(4b) on a Cisco MDS 9124 or MDS 9134 Switch, follow these guidelines:
•
During the upgrade, configuration is not allowed and the fabric is expected to be stable.
•
The Fabric Shortest Path First (FSPF) timers must be configured to the default value of 20 seconds; otherwise, the nondisruptive upgrade is blocked to ensure that the maximum down time for the control plane can be 80 seconds.
•
If there are any CFS commits in the fabric, the nondisruptive upgrade will fail.
•
If there is a zone server merge in progress in the fabric, the nondisruptive upgrade will fail.
•
If a service terminates the nondisruptive upgrade, the show install all failure-reason command can display the reason that the nondisruptive upgrade cannot proceed.
•
If there is not enough memory in the system to load the new images, the upgrade will be made disruptive due to insufficient resources and the user will be notified in the compatibility table.
Performing a Disruptive Upgrade on an MDS 9000 Family Switch
If you do not follow the upgrade path when performing a disruptive upgrade on an MDS 9000 Family switch, (for example, you upgrade directly from SAN-OS Release 2.1(2) or earlier version to NX-OS Release 4.2(x)), the binary startup configuration is deleted because it is not compatible with the new image, and the ASCII startup configuration file is applied when the switch comes up with the new upgraded image. When the ASCII startup configuration file is applied, there may be errors. Because of this, we recommend that you follow the nondisruptive upgrade path.
![]()
Note
You cannot upgrade the software image on an MDS 9120 switch, an MDS 9140 switch, or an MDS 9216i switch to Cisco NX-OS Release 5.x. See Table 3 for the list of switches that support Cisco NX-OS Release 5.0(4b).
Resetting SNMP Notifications
Following a software upgrade or downgrade, SNMP notifications will reset as follows:
•
When you upgrade from SAN-OS Release 3.x to NX-OS Release 4.1(x), and then to NX-OS Release 5.x, SNMP notifications will reset to their default settings.
•
When you upgrade from SAN-OS Release 3.x to NX-OS Release 4.2(x), and then to NX-OS Release 5.x, SNMP notifications will not reset to their default settings.
•
When you downgrade from any NX-OS Release 4.2(x), SNMP notifications will reset to their default configuration settings.
Use the snmp-server enable traps command to reenable your required SNMP notifications.
Converting Automatically Created PortChannels Before an Upgrade
Before upgrading from NX-OS Release 4.1(x) or 4.2(x) to Release 5.x, ensure that you do not have any automatically created PortChannels present in the switch configuration. Use the port-channel persistent command to convert an automatically created PortChannel to a persistent PortChannel. Failure to convert automatically created PortChannels prior to the upgrade can result in traffic disruption because Autocreation of PortChannels is a deprecated feature as of NX-OS Release 4.1(1b).
Downgrading Your Cisco MDS SAN-OS Software Image
This section lists the guidelines recommended for downgrading your Cisco MDS SAN-OS software image and includes the following topics:
•
General Downgrading Guidelines
•
New Features in Cisco MDS NX-OS Release 5.0(4b)
•
NX-OS Release 5.0(x) Software Downgrade and Upgrade Matrix for Cisco MDS 9509 and 9506 Switches
General Downgrading Guidelines
Use the following guidelines to nondisruptively downgrade your Cisco MDS NX-OS Release 5.0(4b):
•
Install and configure dual supervisor modules.
•
Issue the system no acl-adjacency-sharing execute command to disable ACL adjacency usage on Generation 2 and Generation 1 modules. If this command fails, reduce the number of zones, IVR zones, TE ports, or a combination of these in the system and issue the command again.
•
Disable all features not supported by the downgrade release. Use the show incompatibility system downgrade-image command to determine what you need to disable.
•
Use the show install all impact downgrade-image command to determine if your downgrade will be nondisruptive.
•
Be aware that some features impact whether a downgrade is disruptive or nondisruptive:
–
Fibre Channel Ports: Fibre Channel ports can be nondisruptively downgraded without affecting traffic on the ports. See Table 15 for the nondisruptive downgrade path for all SAN-OS releases.
–
SSM: Intelligent services traffic on the SSM, such as SANTap, NASB, and FC write acceleration, is disrupted during a downgrade. SSM Fibre Channel traffic is not.
–
Gigabit Ethernet Ports: Traffic on Gigabit Ethernet ports is disrupted during a downgrade. This includes IPS modules and the Gigabit Ethernet ports on the MPS-14/2 module, the MSM-18/4 module, and the MDS 9222i switch. Those nodes that are members of VSANs traversing an FCIP ISL are impacted, and a fabric reconfiguration occurs. iSCSI initiators connected to the Gigabit Ethernet ports lose connectivity to iSCSI targets while the downgrade is in progress.
–
IVR: With IVR enabled, you must follow additional steps if you are downgrading from Cisco SAN-OS Release 2.1.(1a), 2.1(1b), or 2.1.(2a). See the "Upgrading with IVR Enabled" section for these instructions.
–
FICON: If you have FICON enabled, the downgrade path is different. See the "FICON Downgrade Paths" section.
![]()
Note
A downgrade from NX-OS Release 4.2(1b) to SAN-OS Release 3.3(1x) is not supported on MDS switches, when FC-Redirect based applications, such as Data Mobility Manager or Storage Media Encryption, are configured in the fabric if either of the following conditions are satisfied:
1.
A target for which FC-Redirect is configured is connected locally and there are Generation 1 modules with ISLs configured in the switch.
2.
A host, for which FC-redirect is configured, is connected locally on a Generation 1 module.
If these conditions exist, remove the application configuration for these targets and hosts before proceeding with the downgrade.
NX-OS Release 5.0(x) Software Downgrade and Upgrade Matrix for Cisco MDS 9509 and 9506 Switches
See the compatibility information in Table 14 to determine if a downgrade to, or upgrade from Release 5.0(x) software is disruptive or nondisruptive on a Cisco MDS 9509 or 9506 switch.
Use Table 15 to determine the nondisruptive downgrade path from Cisco NX-OS Release 5.0(4b). Find the SAN-OS image you want to downgrade to in the To SAN-OS Release column of the table and use the path recommended.
![]()
Note
The software downgrade information in Table 15 applies only to Fibre Channel switching traffic. Downgrading system software disrupts IP and SSM intelligent services traffic.
Table 15 Nondisruptive Downgrade Path from NX-OS Release 5.0(4b)
To NX-OS or SAN-OS Release Nondisruptive Downgrade Path and Ordered Downgrade StepsNX-OS:
Release 5.0(4), and all 5.0(1x) releases
Downgrade directly from NX-OS Release 5.0(4b).1
All 4.2(x) and 4.1(x) releases
Downgrade to NX-OS Release 4.2(x) or 4.1(x).
SAN-OS:
All 3.3(x) releases
1.
Downgrade to NX-OS Release 4.2(x) or Release 4.1(x).
2.
Downgrade to SAN-OS Release 3.3(x).
All 3.2(x), 3.1(x), 3.0(x) releases, and all 2.1(x) releases.
1.
Downgrade to NX-OS Release 4.2(x) or Release 4.1(x).
2.
Downgrade to SAN-OS Release 3.3(x).
3.
Downgrade to SAN-OS Release 3.2(x), Release 3.1(x)., Release 3.0(x), or Release 2.1(x).
All 2.0(x) releases.
1.
Downgrade to NX-OS Release 4.2(x) or Release 4.1(x).
2.
Downgrade to SAN-OS Release 3.3(x).
3.
Downgrade to SAN-OS Release 2.1(2x).
4.
Downgrade to SAN-OS Release 2.0(x).
Release 1.x
1.
Downgrade to NX-OS Release 4.2(x) or Release 4.1(x).
2.
Downgrade to SAN-OS Release 3.3(x).
3.
Downgrade to SAN-OS Release 2.1(2b).
4.
Downgrade to SAN-OS Release 1.3(4a).
5.
Downgrade to SAN-OS Release 1.x.
1 See Table 14 before you perform a software downgrade on a Cisco MDS 9509 or MDS 9506 switch.
FICON Downgrade Paths
Table 16 lists the downgrade paths for FICON releases. Find the image release number that you want to downgrade to in the To Release with FICON Enabled column of the table and follow the recommended downgrade path.
New Features in Cisco MDS NX-OS Release 5.0(4b)
Cisco MDS NX-OS Release 5.0(4b) is a hot fix release. It does not include new features.
Licensed Cisco NX-OS Software Packages
Most Cisco MDS 9000 family software features are included in the standard package. However, some features are logically grouped into add-on packages that must be licensed separately, such as the Cisco MDS 9000 Enterprise package, SAN Extension over IP package, Mainframe package, Fabric Manager Server (FMS) package, Storage Services Enabler (SSE) package, Storage Media Encryption package, and Data Mobility Manager package. On-demand ports activation licenses are also available for the Cisco MDS Blade Switch Series and 4-Gbps Cisco MDS 9100 Series Multilayer Fabric switches.
Enterprise Package
The standard software package that is bundled at no charge with the Cisco MDS 9000 Family switches includes the base set of features that Cisco believes are required by most customers for building a SAN. The Cisco MDS 9000 family also has a set of advanced features that are recommended for all enterprise SANs. These features are bundled together in the Cisco MDS 9000 Enterprise package. Refer to the Cisco MDS 9000 Enterprise package fact sheet for more information.
SAN Extension over IP Package
The Cisco MDS 9000 SAN Extension over IP package allows the customer to use FCIP to extend SANs over wide distances on IP networks using the Cisco MDS 9000 family IP storage services. Refer to the Cisco MDS 9000 SAN Extension over IP package fact sheet for more information.
Mainframe Package
The Cisco MDS 9000 Mainframe package uses the FICON protocol and allows control unit port management for in-band management from IBM S/390 and z/900 processors. FICON VSAN support is provided to help ensure true hardware-based separation of FICON and open systems. Switch cascading, fabric binding, and intermixing are also included in this package. Refer to the Cisco MDS 9000 Mainframe package fact sheet for more information.
Storage Services Enabler Package
The Cisco MDS 9000 SSE package allows network-based storage applications and services to run on the Cisco MDS 9000 family SSMs, Cisco MDS 9000 18/4-Port Multiservice Module (MSM-18/4), and Cisco MDS 9222i. Intelligent fabric applications simplify complex IT storage environments and help organizations gain control of capital and operating costs by providing consistent and automated storage management. Refer to the Cisco MDS 9000 SSE package fact sheet for more information.
On-Demand Port Activation License
On-demand ports allow customers to benefit from Cisco NX-OS Software features while initially purchasing only a small number of activated ports on 8-Gbps or 4-Gbps Cisco MDS 9100 Series Multilayer Fabric switches. As needed, customers can expand switch connectivity by licensing additional ports.
I/O Accelerator Package
The Cisco I/O Accelerator (IOA) package activates IOA on the Cisco MDS 9222i fabric switch, the Cisco MDS 9000 18/4 Multiservice Module (MSM-18/4), and on the SSN-16 module. The IOA package is licensed per service engine and is tied to the chassis. The number of licenses required is equal to the number of service engines on which the intelligent fabric application is used.The SSN-16 requires a separate license for each engine on which you want to run IOA. Each SSN-16 engine that you configure for IOA checks out a license from the pool managed at the chassis level. SSN-16 IOA licenses are available as single licenses.
XRC Acceleration License
The Cisco Extended Remote Copy (XRC) acceleration license activates FICON XRC acceleration on the Cisco MDS 9222i switch and on the MSM-18/4 in the Cisco MDS 9500 Series directors. One license per chassis is required. You must install the Mainframe Package and the SAN Extension over FCIP Package before you install the XRC acceleration license. The Mainframe Package enables the underlying FICON support, and the FCIP license or licenses enable the underlying FCIP support. XRC acceleration is not supported on the SSN-16.
Limitations and Restrictions
This section lists the limitations and restrictions for this release. The following limitations are described:
•
Support for Generation One Modules
•
IPv6
•
Generation 1 Module Limitation
•
Maximum Number of Zones Supported in Interop Mode 4
•
Using a RSA Version 1 Key for SSH Following an Upgrade
•
CFS Cannot Distribute All Call Home Information
•
Availability of F Port Trunking and F Port Channels
•
Reserved VSAN Range and Isolated VSAN Range Guidelines
•
Applying Zone Configurations to VSAN 1
•
Running Storage Applications on the MSM-18/4
•
RSPAN Traffic Not Supported on CTS Ports on 8-Gbps Switching Modules
•
I/O Accelerator Feature Limitations
•
Support for FCIP Compression Modes
•
Saving Copies of the Running Kickstart and System Images
•
Configuring Buffer Credits on a Generation 2 or Generation 3 Module
•
Features Not Supported on the Cisco MDS 9148 Switch
•
PPRC Not Supported with FCIP Write Acceleration
•
Configuring a Persistent FCID in an IVR Configuration with Brocade Switches
Support for Generation One Modules
As of Cisco MDS NX-OS Release 5.0(1a), support for Generation One modules has been discontinued.
IPv6
The management port on Cisco MDS switches supports one user-configured IPv6 address, but does not support auto-configuration of an IPv6 address.
User Roles
In SAN-OS Release 3.3(x) and earlier, when a user belongs to a role which has a VSAN policy set to Deny and the role allows access to a specific set of VSANs (for example, 1 through 10), the user is restricted from performing the configuration, clear, execute, and debug commands which had a VSAN parameter outside this specified set. Beginning with NX-OS Release 4.1(1b), these users are still prevented from performing configuration, clear, execute, and debug commands as before, however, they are allowed to perform show commands for all VSANs. The ability to execute the show command addresses the following:
•
In a network environment, users often need to view information in other VSANs even though they do not have permission to modify configurations in those VSANs.
•
This behavior makes Cisco MDS 9000 Series switches consistent with other Cisco products, such as Cisco Nexus 7000 Series switches, that exhibit the same behavior for those roles (when they apply to the VLAN policy).
Red Hat Enterprise Linux
The Linux kernel core dump is not supported in NX-OS Release 4.1(1b) and later versions and therefore the CLI command has been removed. A syntax error message will be displayed if you import configurations from SAN-OS Release 3.3(x) and earlier to NX-OS Release 4.1(1b) and later. These syntax errors do not affect the application of other commands in the configuration and can be safely ignored. To address this, remove the kernel core configuration from the ASCII configuration file before importing the configuration.
Generation 1 Module Limitation
When a Cisco or other vendor switch port is connected to a Generation 1 module port (ISL connection), the receive buffer-to-buffer credit of the port connected to a Generation 1 module port should not exceed 255.
Schedule Job Configurations
As of MDS NX-OS Release 4.1(1b) and later, the scheduler job configurations need to be entered in a single line with a semicolon(;) as the delimiter.
Job configuration files created with SAN-OS Release 3.3(1c) and earlier, are not supported. However, you can edit the job configuration file and add the delimiter to support Cisco NX-OS Release 4.1(3a).
Maximum Number of Zones Supported in Interop Mode 4
In interop mode 4, the maximum number of zones that is supported in an active zone set is 2047, due to limitations in the connected vendor switch.
When IVR is used in interop mode 4, the maximum number of zones supported, including IVR zones, in the active zone set is 2047.
InterVSAN Routing
When using InterVSAN Routing (IVR), it is recommended to enable Cisco Fabric Services (CFS) on all IVR-enabled switches. Failure to do so may cause mismatched active zone sets if an error occurs during zone set activation.
Java Web Start
When using Java Web Start, it is recommended that you do not use an HTML cache or proxy server. You can use the Java Web Start Preferences panel to view or edit the proxy configuration. To do this, launch the Application Manager, either by clicking the desktop icon (Microsoft Windows), or type ./javaws in the Java Web Start installation directory (Solaris Operating Environment and Linux), and then select Edit> Preferences.
If you fail to change these settings, you may encounter installation issues regarding a version mismatch. If this occurs, you should clear your Java cache and retry.
VRRP Availability
The Virtual Router Redundancy Protocol (VRRP) is not available on the Gigabit Ethernet interfaces on the MSM-18/4 module or module 1 of the MDS 9222i switch, even though it is visible on these modules. The feature is not implemented in the current release.
Using a RSA Version 1 Key for SSH Following an Upgrade
For security reasons, NX-OS Release 4.2(1b) does not support RSA version 1 keys. As a result, if you upgrade to NX-OS Release 4.2(1b) from an earlier version that did support RSA version 1 keys, and you had configured a RSA version 1 key for SSH, then you will not be able to log in through SSH following the upgrade.
If you have a RSA version 1 key configured for SSH, before upgrading to NX-OS Release 4.1(3a), follow these steps:
Step 1
Disable SSH.
Step 2
Create RSA version 2 DSA keys.
Step 3
Enable SSH.
Step 4
Delete any RSA version 1 keys on any remote SSH clients and replace the version 1 keys with the new version 2 keys from the switch.
Proceed with the upgrade to NX-OS Release 4.2(1b).
If you upgrade before disabling SSH and creating RSA version 2 keys, follow these steps:
Step 1
Open a Telnet session and log in through the console.
Step 2
Issue the no feature ssh command to disable SSH.
Step 3
Issue the ssh key rsa 1024 command to create RSA version 2 keys.
Step 4
Issue the feature ssh command to enable SSH.
CFS Cannot Distribute All Call Home Information
In MDS NX-OS Release 4.2(1b), CFS cannot distribute the following Call Home commands that can be configured with the destination-profile command:
•
destination-profile profile_name transport-method
•
destination-profile profile_name http
The output of the show running-config callhome command shows configured Call Home commands:
switch#
show running-config callhome> version 4.1(3)
> callhome
> email-contact abc@cisco.com <mailto:abc@cisco.com>
> phone-contact +14087994089
> streetaddress xyxxyx
> distribute
> destination-profile testProfile
> destination-profile testProfile format XML
> no destination-profile testProfile transport-method email
> destination-profile testProfile transport-method http
> destination-profile testProfile http https://xyz.abc.com
> destination-profile testProfile alert-group all
> transport email smtp-server 64.104.140.134 port 25 use-vrf management
> transport email from abc@cisco.com <mailto:abc@cisco.com>
> enable
> commit
When you attempt to apply these commands in the ASCII configuration, the following commands fail:
> no destination-profile testProfile transport-method email> destination-profile testProfile transport-method http> destination-profile testProfile http https://xyz.abc.com
To work around this issue, issue these commands after the commit command.
Availability of F Port Trunking and F Port Channels
Trunking F ports and trunking F port channels are not supported on the following MDS 9000 components:
•
DS-C9134-K9, Cisco MDS 9134 Multilayer Fabric Switch, if NPIV is enabled and the switch is used as the NPV core switch
•
DS-C9124-K9, Cisco MDS 9124 Multilayer Fabric Switch, if NPIV is enabled and the switch is used as the NPV core switch
Trunking F ports, trunking F port channels and regular F port channels are not supported on the following MDS 9000 components:
•
DS-X9016, Cisco MDS 9000 2-Gbps16-Port Fibre Channel Switching Module
•
DS-X9032, Cisco MDS 9000 2-Gbps 32-Port Fibre Channel Switching Module
•
DS-X9032-14K9, Cisco MDS 9000 14/2-Port Multiprotocol Services Module (MPS-14/2)
For configuration information, refer to the "Configuring Trunking" section in the Cisco MDS 9000 NX-OS Interfaces Configuration Guide.
Reserved VSAN Range and Isolated VSAN Range Guidelines
On an NPV switch with a trunking configuration on any interface, or on a regular switch where the feature fport_channel_trunk command has been issued to enable the Trunking F PortChannels feature, follow these configuration guidelines for reserved VSANs and the isolated VSAN:
•
If trunk mode is on for any of the interfaces or NP PortChannel is up, the reserved VSANs are 3040 to 4078, and they are not available for user configuration.
•
The Exchange Virtual Fabric Protocol (EVFP) isolated VSAN is 4079, and it is not available for user configuration.
•
VSAN 4079 will be impacted by an upgrade to NX-OS Release 4.1(3a), depending on whether or not VSAN 4079 was created prior to the upgrade. See the "Upgrading Effect on VSAN 4079" section for details.
The following VSAN IDs are assigned in the Fibre Channel Framing and Signaling (FC-FS) interface standard:
Applying Zone Configurations to VSAN 1
In the setup script, you can configure system default values for the default-zone to be permit or deny, and you can configure default values for the zone distribution method and for the zone mode.
These default settings are applied when a new VSAN is created. However, the settings will not take effect on VSAN 1, because it exists prior to running the setup script. Therefore, when you need those settings for VSAN 1, you must explicitly issue the following commands:
•
zone default-zone permit vsan 1
•
zoneset distribute full vsan 1
•
zone mode enhanced vsan 1
Running Storage Applications on the MSM-18/4
The Cisco MDS 9000 18/4-Port Multiservice Module (MSM-18/4) does not support multiple, concurrent storage applications. Only one application, such as SME or DMM, can run on the MSM-18/4 at a time.
RSPAN Traffic Not Supported on CTS Ports on 8-Gbps Switching Modules
An inter-switch link (ISL) that is enabled for Cisco TrustSec (CTS) encryption must be brought up in non-CTS mode to support remote SPAN (RSPAN) traffic on the following modules:
•
DS-X9248-96K9: Cisco MDS 9000 48-Port 8-Gbps Fibre Channel Switching Module
•
DS-X9224-96K9: Cisco MDS 9000 24-Port 8-Gbps Fibre Channel Switching Module
•
DS-X9248-48K9: Cisco MDS 9000 4/44-Port Host-Optimized 8-Gbps Fibre Channel Switching Module
If the ISL link is brought up with CTS enabled, random packets drops of both RSPAN traffic and normal traffic will occur on the receiver port switch.
I/O Accelerator Feature Limitations
IOA does not support the following NX-OS features:
•
F port trunking
•
F port channeling
•
IOA cannot be configured on flows in topologies that have devices with NPV and NPIV enabled. For example, IOA is not supported in a topology where a host logs in from a NPV edge switch and IOA is deployed on a NPV core switch for this host.
Support for FCIP Compression Modes
In Cisco NX-OS Release 4.2(1b) and later, FCIP compression mode 1 and compression mode 3 are not supported on the Cisco MSM-18/4 module and on the SSN-16 module.
Saving Copies of the Running Kickstart and System Images
After you upgrade to MDS NX-OS Release 4.2(1b), you are not allowed to delete, rename, move, or overwrite the kickstart and system images that are in the current system bootvar settings on an active or standby MDS Supervisor-2 module on any Cisco MDS 9500 Series switch. This restriction does not apply to the integrated supervisor module on the MDS 9200 and MDS 9100 series switches.
Configuring Buffer Credits on a Generation 2 or Generation 3 Module
When you configure port mode to auto or E on a Generation 2 module, one of the ports will not come up for the following configuration:
•
Port Mode: auto or E for all of the ports
•
Rate Mode: dedicated
•
Buffer Credits: default value
When you configure port mode to auto or E on a Generation 3 module, one or two of the ports will not come up for the following configuration:
•
Port Mode: auto or E for the first half of the ports, the second half of the ports, or for all of the ports
•
Rate Mode: dedicated
•
Buffer Credits: default value
When you configure port mode to auto or E for all ports in the global buffer pool, you need to reconfigure buffer credits on one or more of the ports. The total number of buffer credits configured for all the ports in the global buffer pool should be reduced by 64.
Features Not Supported on the Cisco MDS 9148 Switch
The Cisco MDS 9148 Multilayer Fabric Switch does not support the following NX-OS features:
•
IVR
•
Remote Span
•
Translative loop support
•
FCC - no generation, quench reaction only
•
FC-Redirect
In addition, the following features have these limits:
•
VSANs - 31 maximum
•
SPAN - 1 session maximum
PPRC Not Supported with FCIP Write Acceleration
IBM Peer to Peer Remote Copy (PPRC) is not supported with FCIP Write Acceleration.
Configuring a Persistent FCID in an IVR Configuration with Brocade SwitchesThe following information is relevant if you have a fabric that consists of Cisco MDS 9000 switches and Brocade switches, and the Cisco MDS switches are running either NX-OS Release 4.x or Release 5.x and Brocade is running FOS higher than 6.x. In an IVR configuration, when IVR NAT is enabled on a Cisco MDS 9000 switch, the device in the native VSAN should be configured with a persistent FCID. Assuming the FCID is 0xAABBCC, AA should be configured with the virtual IVR domain ID of the VSAN that contains the ISLs and BB should be configured in the following range:
•
1 through 64 if the Brocade switch is operating in native interop mode.
•
1 through 30 if the Brocade switch is operating in McData Fabric mode or McData Open Fabric Mode.
This configuration ensures that the devices connected to the Cisco MDS 9000 switch can be seen in the name server database on the Brocade switch.
Caveats
This section lists the open and resolved caveats for this release. Use Table 17 to determine the status of a particular caveat. In the table, "O" indicates an open caveat and "R" indicates a resolved caveat.
Resolved Caveats
•
CSCtj47693
Symptom: When the SME Tape feature is in use, the performance of the IBM LT03 device is lower than when SME Tape is not in use.
Workaround: This issue is resolved.
•
CSCtj56122
Symptom: The IPS processor does not compact IO packets whose compressed length is 256.
Workaround: This issue is resolved.
•
CSCtj87140
Symptom: IOA does not work correctly for an IBM TSM backup application system that uses the IBM A tape driver to communicate with an IBM LTO-5 drive. When IOA is introduced, the backup fails. The underlying reason is that a vendor-specific command is sent by the driver to the LTO-5 tape drive and IOA does not recognize the command.
Workaround: This issue is resolved.
•
CSCtk47039
Symptom: A Cisco MDS 9000 switch does not respond to an FDISC request from an attached switch with NPV enabled if the MDS 9000 switch is already processing an FDISC request for the same pWWN. This symptom might be seen if the downstream device has NPV mode enabled, and the MDS 9000 switch is processing an FDISC request for the same pWWN and no ABTS request is sent to cancel the in-progress FDISC request.
Workaround: This issue is resolved.
•
CSCtd04154
Symptom: The DMM CPP interface cpp1/1/1 does not come up unless there is an active port in VSAN 1, which is the DMM management VSAN. This symptom might be seen when an interface is either not defined or is not up in VSAN 1.
Workaround: This issue is resolved.
•
CSCti38286
Symptom: When you create a DMM job, DMM might intermittently display the following message:
DMM_JOB_INFRA_FC_REDIRECT_SETUP_ERR.This symptom might be seen when there are two or more paths to a host, multiple paths to existing storage, and multiple paths to the new storage.
Workaround: This issue is resolved.
•
CSCtj84690
Symptom: When you upgrade from Cisco NX-OS Release 4.1(3a) to NX-OS Release 5.0(1a), certain ports are brought down because of diagnostics failure. Messages similar to the following are displayed:
2010 Jul 5 19:33:39 MDSSWITCH %IMAGE_DNLD-SLOT5-2-IMG_DNLD_STARTED:Module image download process. Please wait until completion...2010 Jul 5 19:33:57 MDSSWITCH %IMAGE_DNLD-SLOT5-2-IMG_DNLD_COMPLETE:Module image download process. Download successful.2010 Jul 5 19:35:00 MDSSWITCH %MODULE-5-LCM_MODULE_UPGRADE_END: Upgradeof module 5 ended2010 Jul 5 19:35:00 MDSSWITCH %PLATFORM-5-MOD_STATUS: Module 5current-status is MOD_STATUS_ONLINE/OK2010 Jul 5 19:35:00 MDSSWITCH %PORT-5-IF_DOWN_LOOPBACK_DIAG_FAILURE:%$VSAN 10%$ Interface fc5/37 is down (Diag failure)2010 Jul 5 19:35:00 MDSSWITCH %PORT-5-IF_DOWN_LOOPBACK_DIAG_FAILURE:%$VSAN 10%$ Interface fc5/38 is down (Diag failure)2010 Jul 5 19:35:00 MDSSWITCH %PORT-5-IF_DOWN_LOOPBACK_DIAG_FAILURE:%$VSAN 10%$ Interface fc5/39 is down (Diag failure)The following information is written to the logs:
5) Event:E_DEBUG, length:84, at 242335 usecs after Mon Jul 5 19:35:00 2010[103] 3170:ohms_lc_exception: ERROR: Exception from module 5PortBits 0xfff000000000All interfaces that were brought down with "Diag failure" were listed in an exception that happened before the upgrade occurred.
Workaround: This issue is resolved.
•
CSCtk18444
Symptom: When a ICMP error packet (type 3 code 4) is received, there is no way to track the sender of the error packet or to determine the MTU size provided in the error packet.
Workaround: This issue is resolved. The code has been enhanced to print the entire ICMP packet in both the receive and send path when the debug ips ipstack icmp port command is enabled.
Open Caveats
•
CSCto68011
Symptom: The fcdomain service on both supervisor modules fails, which results in a reload of the device. An error message similar to the following is displayed:
'' %SYSMGR-2-SERVICE_CRASHED: Service ''fcdomain'' (PID 4688) hasn't caught signal 11 (core will be saved)''This issue affects the following products when they have SNMP configured:
–
Cisco MDS 9000 Series Multilayer switches
–
Cisco Nexus 5000 Series switches and Cisco Nexus 2000 Series, running in FC switching mode (NPV mode is not affected).
The following products are confirmed not vulnerable:
–
Cisco Nexus 7000 Series switches
–
Cisco Nexus 4000 Series switches
Workaround: The following workaround is available:
Infrastructure Access Control Lists
![]()
CautionBecause the feature in this vulnerability uses UDP as a transport, it is possible to spoof the sender's IP address, which may defeat ACLs that permit communication to these ports from trusted IP addresses.
Although it is often difficult to block traffic that transits a network, it is possible to identify traffic that should never be allowed to target infrastructure devices and block that traffic at the border of networks. Infrastructure Access Control Lists (iACLs) are a network security best practice and should be considered as a long-term addition to good network security as well as a workaround for this specific vulnerability. The iACL example below should be included as part of the deployed infrastructure access-list which will protect all devices with IP addresses in the infrastructure IP address range:
!---!--- Feature: SNMP!---!---!--- Permit SNMP traffic from trusted sources.!---ip access-list 150 permit udp TRUSTED_SOURCE_ADDRESSES WILDCARDINFRASTRUCTURE_ADDRESSES WILDCARD eq port snmpip access-list 150 permit tcp TRUSTED_SOURCE_ADDRESSES WILDCARDINFRASTRUCTURE_ADDRESSES WILDCARD eq port snmp!---!--- Deny SNMP traffic from all other sources.!---ip access-list 150 deny udp any any eq port snmpip access-list 150 deny tcp any any eq port snmp!---!--- Permit/deny all other Layer 3 and Layer 4 traffic in!--- accordance with existing security policies and!--- configurations. Permit all other traffic to transit the!--- device.!---access-list 150 permit ip any any!--- Apply access-list to management interfaceinterface serial 2/0ip access-group 150 inFor more information on IP Access Control Lists see the "Configuring IPv4 and IPv6 Access Control List" section in the Cisco MDS 9000 Family NX-OS Security Configuration Guide at the following location:
For more information on IP Access Control Lists see the "Configuring ACLs" section in the Cisco Nexus 5000 Series NX-OS Software Configuration Guide at the following location:
•
CSCtf16263
Symptom: Following an upgrade from Cisco MDS NX-OS Release 4.2(3a) to Release 5.0(1a) on an MDS 9222i switch, the Encapsulating Security Protocol (ESP) configuration is not applied to members of a PortChannel. This issue occurs only on the MDS 9222i switch.
Workaround: To workaround this issue, following these steps:
1.
Enable Fibre Channel Security Protocol (FCSP) on the interface and enter configuration-interface-esp submode.
switch(config)# interface po103
switch(config-if)# fcsp on
switch(config-if)# fcsp esp manual
2.
Add the old egress Security Association (egress-sa) configuration on the switch. Egress-sa is the other side of the active ingress-sa.
switch(config-if-esp)# egress-sa 2583.
Add a new ingress-sa on the switch. Do not use the previous SA.
switch(config-if-esp)# ingress-sa 2564.
On the other side of the PortChannel, reconfigure egress with 256.
switch(config)# interface po103
switch(config-if)# fcsp esp manual
switch(config-if-esp)# egress-sa 256
At this point, the link is fully secured on both sides.
5.
Clean up the old ingress-sa, by deleting it. An error message displays, but the ingress-sa does get deleted.
switch(config-if-esp)# no ingress-sa 258
ERROR: SA 258 not in ingress listIf you fail to delete the old ingress-sa, an error message displays:
switch(config-if-esp)# ingress-sa 258
ERROR: SA 258 already in ingress list6.
Add the old ingress-sa.
switch(config-if-esp)# ingress-sa 258
•
CSCty32238
Symptom: On certain hardware, certain Cisco MDS 9000 Series features and applications do not work. These include IVR, IOA, DMM, SME, fcflow, and SPAN.
The following devices with hardware revision 1.5 are affected by this issue:
–
DS-X9248-96K9, 48-port 8-Gbps Fibre Channel Switching Module
–
DS-X9248-48K9, 4/44-port host-optimized 8-Gbps Fibre Channel Switching Module
–
DS-X9224-96K9, 24-port 8-Gbps Fibre Channel Switching Module
The following devices with hardware revision 1.0 are affected by this issue:
–
DS-X9304-18K9, 18/4-Port Multiservice Module (MSM-18/4)
For this module, the affected version is 73-14372-01A0 hardware version 1.0 (due to the new 73-number)–
DS-C9222i-K9, Cisco MDS 9222i Multilayer Fabric Switch
For this switch, the affected version is 73-14373-01A0 hardware version 1.0 (due to the new 73-number)For the DS-X9248-96K9, DS-X9248-48K9 and DS-X9224-96K9 modules, the output of the show module command indicates whether or not the device is affected.
switch# sh mod 2Mod Ports Module-Type Model Status--- ----- ----------------------------------- ------------------ ----------2 24 1/2/4/8 Gbps FC Module DS-X9224-96K9 okMod Sw Hw World-Wide-Name(s) (WWN)--- -------------- ------ --------------------------------------------------2 5.2(1) <B>1.0</B> 20:41:00:0d:ec:24:f4:c0 to20:58:00:0d:ec:24:f4:c0In the preceding output, the device is hardware revision 1.0 and therefore not affected.
For the DS-X9304-18K9 and the DS-C9222i-K9, the show module command might indicate hardware version 1.0 due to new part numbers; however the show sprom module command shows the affected parts.
switch# sh mod 9Mod Ports Module-Type Model Status--- ----- ----------------------------------- ------------------ ----------9 22 4x1GE IPS, 18x1/2/4Gbps FC Module DS-X9304-18K9 okMod Sw Hw World-Wide-Name(s) (WWN)--- -------------- ------ --------------------------------------------------9 5.2(1) 1.0 22:01:00:0d:ec:25:e9:80 to 22:12:00:0d:ec:25:e9:80Mod MAC-Address(es) Serial-Num--- -------------------------------------- ----------9 00-1a-e2-03-4c-5c to 00-1a-e2-03-4c-64 JAE1131SCBWswitch# sh sprom module 9 1 |egrep "Part|Serial"Serial Number : JAE1131SCBWPart Number : 73-10688-06 <-- Not 73-14372-01 so h/w ver 1.0 is OKPart Revision : A0Workaround: Upgrade to software release that has the fix for this issue.
–
After performing a software upgrade to a Cisco NX-OS release that contains a fix for this issue, it may be necessary to enter the shut command followed by the no shut command on the affected host ports to regain connectivity.
–
If you perform a nondisruptive upgrade or downgrade from a release that contains a fix to a release that does not contain the fix, you need to reload each module affected by this issue.
–
If you have a Cisco MDS 9222i swtich that is affected by this issue, and you perform a nondisruptive upgrade or downgrade from a release that contains a fix to a release that does not contain the fix, you need to reload the switch.
•
CSCsq20408
Symptom: The show startup command displays aspects of the running configuration when SANTap is configured and/or SANTap objects are created. When a user creates objects such as a CVT or DVT, the configuration is showing in the running-configuration and in the startup-configuration without copying the configuration into the startup-configuration.
Workaround: Issue a copy running-config startup-config command whenever you create objects such as a CVT or DVT so that the running-configuration and startup-configuration are synchronized.
•
CSCtn68418
Symptom: When you try to save a configuration, you might see the following message:
switch# copy run start
[########################################] 100%Configuration update aborted: request was aborted%DAEMON-3-SYSTEM_MSG: ntp:can't open /mnt/pss/ntp.drift.TEMP: No space left on device- ntpd[xxxx]%PLATFORM-2-MEMORY_ALERT: Memory Status Alert : MINOR%PLATFORM-2-MEMORY_ALERT: Memory Status Alert : MINOR ALERT RECOVERED`show system internal flash` output will display /isan as 100% full.Mount-on 1K-blocks Used Available Use% Filesystem/ 204800 54624 150176 27 /dev/root/proc 0 0 0 0 proc/isan 409600 409576 24 100 noneThis symptom was seen because the Call Home feature had duplicate message throttling disabled and there were flapping interfaces that generated thousands of Call Home messages. These messages filled up the ISAN directory.
Workaround: To work around this issue, enable Call Home duplicate message throttling. If you find that the /isan directory is 100 percent full, open a TAC case to get assistance with deleting the files.
Related Documentation
The documentation set for NX-OS for the Cisco MDS 9000 Family includes the following documents. To find a document online, access the following web site:
http://www.cisco.com/en/US/products/ps5989/tsd_products_support_series_home.html
The documentation set for Cisco Fabric Manager appears in the Cisco Fabric Manager Release Notes for Release 4.2(1), which is available from the following website:
http://www.cisco.com/en/US/products/ps10495/prod_release_notes_list.html
Release Notes
•
Cisco MDS 9000 Family Release Notes for Cisco MDS NX-OS Releases
•
Cisco MDS 9000 Family Release Notes for MDS SAN-OS Releases
•
Cisco MDS 9000 Family Release Notes for Storage Services Interface Images
•
Cisco MDS 9000 Family Release Notes for Cisco MDS 9000 EPLD Images
Regulatory Compliance and Safety Information
•
Regulatory Compliance and Safety Information for the Cisco MDS 9000 Family
Compatibility Information
•
Cisco Data Center Interoperability Support Matrix
•
Cisco MDS 9000 NX-OS Hardware and Software Compatibility Information and Feature Lists
•
Cisco MDS NX-OS Release Compatibility Matrix for Storage Service Interface Images
•
Cisco MDS 9000 Family Switch-to-Switch Interoperability Configuration Guide
•
Cisco MDS NX-OS Release Compatibility Matrix for IBM SAN Volume Controller Software for Cisco MDS 9000
•
Cisco MDS SAN-OS Release Compatibility Matrix for VERITAS Storage Foundation for Networks Software
Hardware Installation
•
Cisco MDS 9500 Series Hardware Installation Guide
•
Cisco MDS 9500 Series Supervisor-2A Tech Note
•
Cisco MDS 9200 Series Hardware Installation Guide
•
Cisco MDS 9100 Series Hardware Installation Guide
•
Cisco MDS 9124 and Cisco MDS 9134 Multilayer Fabric Switch Quick Start Guide
Software Installation and Upgrade
•
Cisco MDS 9000 NX-OS Release 4.1(x) and SAN-OS 3(x) Software Upgrade and Downgrade Guide
•
Cisco MDS 9000 Family Storage Services Interface Image Install and Upgrade Guide
•
Cisco MDS 9000 Family Storage Services Module Software Installation and Upgrade Guide
Cisco NX-OS
•
Cisco MDS 9000 Family NX-OS Licensing Guide
•
Cisco MDS 9000 Family NX-OS Fundamentals Configuration Guide
•
Cisco MDS 9000 Family NX-OS System Management Configuration Guide
•
Cisco MDS 9000 Family NX-OS Interfaces Configuration Guide
•
Cisco MDS 9000 Family NX-OS Fabric Configuration Guide
•
Cisco MDS 9000 Family NX-OS Quality of Service Configuration Guide
•
Cisco MDS 9000 Family NX-OS Security Configuration Guide
•
Cisco MDS 9000 Family NX-OS IP Services Configuration Guide
•
Cisco MDS 9000 Family NX-OS Intelligent Storage Services Configuration Guide
•
Cisco MDS 9000 Family NX-OS High Availability and Redundancy Configuration Guide
•
Cisco MDS 9000 Family NX-OS Inter-VSAN Routing Configuration Guide
Command-Line Interface
•
Cisco MDS 9000 Family Command Reference
Intelligent Storage Networking Services Configuration Guides
•
Cisco MDS 9000 I/O Acceleration Configuration Guide
•
Cisco MDS 9000 Family SANTap Deployment Guide
•
Cisco MDS 9000 Family Data Mobility Manager Configuration Guide
•
Cisco MDS 9000 Family Storage Media Encryption Configuration Guide
•
Cisco MDS 9000 Family Secure Erase Configuration Guide
•
Cisco MDS 9000 Family Cookbook for Cisco MDS SAN-OS
Troubleshooting and Reference
•
Cisco NX-OS System Messages Reference
•
Cisco MDS 9000 Family NX-OS Troubleshooting Guide
•
Cisco MDS 9000 Family NX-OS MIB Quick Reference
•
Cisco MDS 9000 Family NX-OS SMI-S Programming Reference
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.
This document is to be used in conjunction with the documents listed in the "Related Documentation" section.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
© 2011 Cisco Systems, Inc. All rights reserved.