Cisco Nexus Cloud Services Platform Release Notes, Release 5.2(1)SP1(7.1)
Support for Cavium Nitrox Crypto Card
Cisco Nexus Cloud Services Platform Features
Support for the 10 G Interface Card on the Cisco Nexus 1110-X
No Support for Static Topology
Support for Cavium Nitrox Crypto Card
Automatic Copy of Changed VSB Configuration into Running Configuration
Support for Cisco Nexus 1000V for KVM
Notes About Upgrading to the Cisco Nexus Cloud Services Platform, Release 5.2(1)SP1(7.1)
SNMP User Accounts Must Be Reconfigured After an Upgrade
Domain ID and HA Role Cannot Be Changed
Boot Variables Cannot Be Manually Configured
Changing the Control or Mgmt VLAN Requires a Reload
Cisco Virtual Security Gateway
Obtaining Documentation and Submitting a Service Request
This document describes the features, limitations, and bugs for the Cisco Nexus Cloud Services Platform management software. Use this document in combination with documents listed in the Related Documentation.
This document includes the following information about the Cisco Nexus Cloud Services Platform:
The Cisco Nexus Cloud Services Platform is a hardware shell that can host multiple virtual service blades, including the Cisco Nexus Virtual Supervisor Modules (VSMs). From a network management perspective, the hosted VSMs appear as a cluster. Each VSM and its associated VEMs make up one virtual switch.
The Cisco Nexus Cloud Services Platform family includes the following appliances:
The following new hardware feature is introduced in the Cisco Nexus Cloud Services Platform, Release 5.2(1)SP1(7.1).
Beginning this release, the Cisco Nexus 1110-X enables you to use the Cavium Nitrox CNN3550-C20-NHB-2.0-G Security processor card (SSL card), to offload security processing and crypto acceleration. The SSL card is available as a field replacement unit (FRU) for the Cisco Nexus Cloud Services Platform and provides up to 30 Gbps (aggregated) of SSL offload for all virtual service blades (VSBs) on the Cisco Nexus Cloud Services Platform.
For detailed information about how to insert the SSL card on the Cisco Nexus Cloud Services Platform, see the Cisco Nexus Cloud Services Platform Hardware Installation Guide. To enable the SSL card and configure the crypto bandwidth, see the Cisco Nexus Cloud Services Platform Software Configuration Guide.
Table 1 lists the features of the Cisco Nexus Cloud Services Platform appliances.
Up to 6 VSBs (limited by the available RAM on the Cisco Nexus Cloud Services Platform) |
|||
For information about the hardware feature descriptions and specifications, see the Cisco Nexus Cloud Services Platform Hardware Installation Guide.
For information about the software installation and upgrade, see the Cisco Nexus Cloud Services Platform Software Installation and Upgrade Guide.
The Cisco Nexus Cloud Services Platform, Release 5.2(1)SP1(7.1) supports the following new features:
Starting Release 5.2(1)SP1(7.1), the Cisco Nexus Cloud Services Platform Software detects the presence and enables use of the UCS VIC 1225 10 G Dual Port NIC (10 G card) on the Cisco Nexus 1110-X. On the Cisco Nexus 1110-X, you can replace the UCS 10 G card or the Intel IG quad port NIC with a Cavium Nitrox card on the same PCI slot. After a fresh installation of the Cisco Nexus 1110-X, or an upgrade to this release, you can assign uplinks to the 10 G interface, or form a port channel with another 10 G interface.
For detailed information about how to switch the 10 G card with the Cavium SSL card or the Intel 1G quad port NIC, see the Cisco Nexus Cloud Services Platform Hardware Installation Guide.
For information about enabling the10 G card and other caveats about enabling the 10 G card, see the Cisco Nexus Cloud Services Platform Software Configuration Guide.
Starting Release 5.2(1)SP1(7.1), the Cisco Nexus Cloud Services Platform supports only a flexible topology as the default topology type. All previously configured static topology settings will be converted to the flexible topology upon an upgrade to the current release. For more information about the benefits of connecting to your network in a flexible topology, see the Cisco Nexus Cloud Services Platform Software Configuration Guide.
The Cavium Nitrox security processor card on the Cisco Nexus 1110-X provides a total of 30 GBps of SSL offload capacity that is shared by all the VSBs on the Cisco Nexus Cloud Services Platform. The Cisco Nexus Cloud Services Platform slices the security processor card and allocates the corresponding capacities to the VSBs based on their bandwidth requirement. However, you have to configure the VSBs to utilize the allocated slice of the security processor card.
For information about installing the Cavium Nitrox Security Processor card on the Cisco Nexus Cloud Services Platform, see the Cisco Nexus Cloud Services Platform Hardware Installation Guide. For information about enabling the SSL card and configuring the bandwidth requirement, see the Cisco Nexus Cloud Services Platform Software Configuration Guide.
Beginning this release of the Cisco Nexus Cloud Services Platform, you do not have to execute the copy running-config startup-config command to save your VSB and network configuration settings during a reload or a power failure. The copy running-config startup-config command is automatically executed every five minutes to persistently save your configuration settings, and copy them into the startup configuration. For a complete list of the commands that trigger the auto-save feature, see the Cisco Nexus Cloud Services Platform Software Configuration Guide.
Note ● Even though the copy running-config startup-config command is automatically triggered at five minute intervals, it is a recommended best practice to immediately save your critical configuration settings manually.
Cisco Nexus 1000V for KVM is a virtual distributed switch that works with the Linux Kernel-based virtual machine (KVM) open source hypervisor. The Linux KVM hypervisor is ideally suited for OpenStack environments. Using the Cisco Nexus 1000V for KVM VSM, you can create policy profiles (called port profiles on the VSM), which define port classification information, such as security settings (ACLs and so on).
When a VM is deployed, a port profile is dynamically created on the Cisco Nexus 1000V for KVM for each unique combination of policy port profile and network segment. All other VMs deployed with the same policy to this network reuse this dynamic port profile. You can use the Cisco Nexus 1000V for KVM as a virtual service blade on the Cisco Nexus Cloud Services Platform. For more information about the Cisco Nexus 1000V for KVM, see Cisco Nexus 1000V for KVM Virtual Network Configuration Guide.
– Version 1.5(4e) for the Cisco Nexus 1110 product family
– Version 1.4(3s) for the Cisco Nexus 1010 product family
The Cisco Nexus Cloud Services Platform controls the virtual services and blades running on the Cisco Nexus 1010 and Cisco Nexus 1110 appliances.
For details on Software Compatibility with the Cisco Nexus Cloud Services Platform, see the Cisco Nexus Cloud Services Platform Software Compatibility Information Guide.
For detailed information on the weighting matrix and the supported configuration of VSBs on the Cisco Nexus Cloud Services Platform, see the weighting matrix in the Cisco Nexus Cloud Services Platform Compatibility Information Guide.
The Cisco Nexus Cloud Services Platform has the following restrictions:
During an upgrade, the SNMP engine ID changes internally to a unique engine ID. You must reconfigure all SNMP user accounts to work with the new engine ID. Until the SNMP user accounts are reconfigured, all SNMPv3 queries fail. This restriction is associated with the defect CSCuo12696.
After an upgrade, the engine ID is shown as 128:0:0:9:3:2:0:12:0:0:0, as follows:
Complete the following steps to delete and recreate the username. Note that paswd123 is an example that represents the SNMP user password.
Step 2 Use one of the following options to recreate the username:
Step 3 Confirm that the engine ID has been updated, as follows:
Step 4 Verify that the engine ID is unique:
The configured domain ID and high availability (HA) role (standalone, primary, or secondary) can never be changed. To change the domain ID or the HA role, you must use the write erase command.
The boot variables cannot be configured manually. To change the boot variables, you must enter the install nexus CSP command. This command installs the software from the bootflash:/repository directory and updates the boot variables with the name of the software image.
This section includes the following topics:
The following are descriptions of the open bugs in Cisco Nexus Cloud Services Platform, Release 5.2(1)SP1(7.1). The bug ID links you to the Cisco Bug Search tool.
The following bugs are resolved in the Cisco Nexus Cloud Services Platform Release 5.2(1)SP1(7.1). The bug ID links you to the Cisco Bug Search tool.
The Cisco Nexus Cloud Services Platform documentation is available at the following URL:
http://www.cisco.com/en/US/products/ps12752/tsd_products_support_series_home.html
Cisco Nexus 1000V for VMware vSphere:
http://www.cisco.com/en/US/products/ps9902/tsd_products_support_series_home.html
Cisco Nexus 1000V for Microsoft Hyper-V:
https://www.cisco.com/en/US/products/ps13056/tsd_products_support_series_home.html
To provide technical feedback on this document or report an error or omission, please send your comments to:
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.